ARES B

156 papers

YearTitle / Authors
2023A Bring Your Own Device security awareness survey among professionals.
George Petihakis, Dimitrios Kiritsis, Aristeidis Farao, Panagiotis Bountakas, Aggeliki Panou, Christos Xenakis
2023A Case Study with CICIDS2017 on the Robustness of Machine Learning against Adversarial Attacks in Intrusion Detection.
Marta Catillo, Andrea Del Vecchio, Antonio Pecchia, Umberto Villano
2023A Comprehensive Study on Third-Party User Tracking in Mobile Applications.
Federica Paci, Jacopo Pizzoli, Nicola Zannone
2023A Concept-Based Validation Approach to Validate Security Systems for Protection of Interconnected Critical Infrastructures.
Tim H. Stelkens-Kobsch, Hilke Boumann, Florian Piekert, Meilin Schaper, Nils Carstengerdes
2023A Decentralised Public Key Infrastructure for X-Road.
Mariia Bakhtina, Kin Long Leung, Raimundas Matulevicius, Ahmed Awad, Petr Svenda
2023A Forensic I/O Recorder for Industrial Control Systems Using PLCs and OPC UA.
Alexios Karagiozidis, Martin Gergeleit
2023A Generic IoT Quantum-Safe Watchdog Timer Protocol.
Michael Eckel, Tanja Gutsche, Hagen Lauer, Andre Rein
2023A Practical Attack on the TLSH Similarity Digest Scheme.
Gábor Fuchs, Roland Nagy, Levente Buttyán
2023A Qualitative Analysis of Illicit Arms Trafficking on Darknet Marketplaces.
Pantelitsa Leonidou, Nikos Salamanos, Aristeidis Farao, Maria Aspri, Michael Sirivianos
2023A Quic(k) Security Overview: A Literature Research on Implemented Security Recommendations.
Stefan Tatschner, Sebastian N. Peters, David Emeis, John Morris, Thomas Newe
2023A Study of Different Awareness Campaigns in a Company.
Laura Gamisch, Daniela Pöhn
2023A Survey of Steganography Tools at Layers 2-4 and HTTP.
Stefano Bistarelli, Michele Ceccarelli, Chiara Luchini, Ivan Mercanti, Francesco Santini
2023A Systematic Review of Threat Analysis and Risk Assessment Methodologies for Connected and Automated Vehicles.
Meriem Benyahya, Teri Lenard, Anastasija Collen, Niels Alexander Nijdam
2023A deep learning anomaly detection framework with explainability and robustness.
Manh-Dung Nguyen, Anis Bouaziz, Valeria Valdés, Ana Rosa Cavalli, Wissam Mallouli, Edgardo Montes de Oca
2023A hybrid anonymization pipeline to improve the privacy-utility balance in sensitive datasets for ML purposes.
Jenno Verdonck, Kevin De Boeck, Michiel Willocx, Jorn Lapon, Vincent Naessens
2023A2P2 - An Android Application Patching Pipeline Based On Generic Changesets.
Florian Draschbacher
2023AI/ML-based real-time classification of Software Defined Networking traffic.
Alexandru Vulpe, Cosmin Dobrin, Apostol Stefan, Alexandru Caranica
2023Actions Speak Louder Than Passwords: Dynamic Identity for Machine-to-Machine Communication.
Wil Liam Teng, Kasper Rasmussen
2023Adoption of Information Security Practices in Large-Scale Agile Software Development: A Case Study in the Finance Industry.
Sascha Nägele, Lorena Korn, Florian Matthes
2023Adversarial Machine Learning Attacks on Multiclass Classification of IoT Network Traffic.
Vasileios Pantelakis, Panagiotis Bountakas, Aristeidis Farao, Christos Xenakis
2023An Analysis of PhotoDNA.
Martin Steinebach
2023An Analysis of Stack Exchange Questions: Identifying Challenges in Software Design and Development with a Focus on Data Privacy and Data Protection.
Andreas Diepenbrock, Jonas Fleck, Sabine Sachweh
2023An Exploratory Study on the Use of Threat Intelligence Sharing Platforms in Germany, Austria and Switzerland.
Daniel Fischer, Clemens Sauerwein, Martin Werchan, Dirk Stelzer
2023An Improved Honeypot Model for Attack Detection and Analysis.
Marwan Abbas-Escribano, Hervé Debar
2023An inclusive Lifecycle Approach for IoT Devices Trust and Identity Management.
Konstantinos Loupos, Harris Niavis, Fotis Michalopoulos, George Misiakoulis, Antonio F. Skarmeta, Jesús Garcia, Angel Palomares, Hui Song, Rustem Dautov, Francesca Giampaolo, Rosella Mancilla, Francesca Costantino, Dimitri Van Landuyt, Sam Michiels, Stefan More, Christos Xenakis, Michail Bampatsikos, Ilias Politis, Konstantinos Krilakis, Sokratis Vavilis
2023Application of Secure Two-Party Computation in a Privacy-Preserving Android App.
Marco De Vincenzi, Ilaria Matteucci, Fabio Martinelli, Stefano Sebastio
2023Approach to harmonisation of technological solutions, operating procedures, preparedness and cross-sectorial collaboration opportunities for first aid response in cross-border mass-casualty incidents.
Yantsislav Yanakiev, Sergio López Bernal, Alberto Montarelo Navajo, Nikolai Stoianov, Manuel Gil Pérez, Carmen Curto Martin
2023Artificial Intelligence for next generation cybersecurity: The AI4CYBER framework.
Eider Iturbe, Erkuden Rios, Angel Rego, Nerea Toledo
2023Attack on "A Privacy-Preserving Online Ride-Hailing System Without Involving a Third Trusted Server".
Srinivas Vivek
2023Automated ICS template for STRIDE Microsoft Threat Modeling Tool.
Mike Da Silva, Maxime Puys, Pierre-Henri Thevenon, Stéphane Mocanu, Nelson Nkawa
2023Automated Side-Channel Attacks using Black-Box Neural Architecture Search.
Pritha Gupta, Jan Peter Drees, Eyke Hüllermeier
2023Automatic Test Generation to Improve Scrum for Safety Agile Methodology.
Mario Barbareschi, Salvatore Barone, Valentina Casola, Salvatore Della Torca, Daniele Lombardi
2023Automatic incident response solutions: a review of proposed solutions' input and output.
Henrik Karlzén, Teodor Sommestad
2023Beware the Doppelgänger: Attacks against Adaptive Thresholds in Facial Recognition Systems.
Willem Verheyen, Tim Van hamme, Sander Joos, Davy Preuveneers, Wouter Joosen
2023Breaching the Defense: Investigating FGSM and CTGAN Adversarial Attacks on IEC 60870-5-104 AI-enabled Intrusion Detection Systems.
Dimitrios Christos Asimopoulos, Panagiotis I. Radoglou-Grammatikis, Ioannis Makris, Valeri M. Mladenov, Konstantinos E. Psannis, Sotirios K. Goudos, Panagiotis G. Sarigiannidis
2023Bypassing antivirus detection: old-school malware, new tricks.
Efstratios Chatzoglou, Georgios Karopoulos, Georgios Kambourakis, Zisis Tsiatsikas
2023CACS: A Cloud Privacy-Preserving Attribute Management System.
Aivo Kalu, Burak Can Kus, Peeter Laud, Kin Long Leung, Nikita Snetkov, Jelizaveta Vakarjuk
2023Canary in Twitter Mine: Collecting Phishing Reports from Experts and Non-experts.
Hiroki Nakano, Daiki Chiba, Takashi Koide, Naoki Fukushi, Takeshi Yagi, Takeo Hariu, Katsunari Yoshioka, Tsutomu Matsumoto
2023Characterizing the MasterPrint threat on Android devices with capacitive sensors.
Miguel Peidro-Paredes, José María de Fuentes, Lorena González-Manzano, Miguel Velasco-Gomez
2023Characterizing the Use of Code Obfuscation in Malicious and Benign Android Apps.
Ulf Kargén, Noah Mauthe, Nahid Shahmehri
2023Cheaper than you thought? A dive into the darkweb market of cyber-crime products.
Dimitrios Georgoulias, Ricardo Yaben, Emmanouil Vasilomanolakis
2023Confidential Quantum Computing.
Barbora Hrdá, Sascha Wessel
2023Cookiescanner: An Automated Tool for Detecting and Evaluating GDPR Consent Notices on Websites.
Ralf Gundelach, Dominik Herrmann
2023Creating a Decryption Proof Verifier for the Estonian Internet Voting System.
Jan Willemson
2023Cross-Domain Sharing of User Claims: A Design Proposal for OpenID Connect Attribute Authorities.
Amir Sharif, Francesco Antonio Marino, Giada Sciarretta, Giuseppe De Marco, Roberto Carbone, Silvio Ranise
2023Curricula Designer with Enhanced ECSF Analysis.
Jan Hajny, Marek Sikora, Konstantinos Adamos, Fabio Di Franco
2023DJM-CYBER: A Joint Master in Advanced Cybersecurity.
Yianna Danidou, Sara Ricci, Antonio F. Skarmeta, Jiri Hosek, Stefano Zanero, Imre Lendak
2023Data Loss Prevention Solution for Linux Endpoint Devices.
Lukas Daubner, Adam Povazanec
2023Detecting a Complex Attack Scenario in an Airport: The PRAETORIAN Framework.
Stefan Schauer, Tamara Hadjina, Melita Damjanovic, Eva María Muñoz Navarro, Juan Jose Hernandez-Montesinos, Javier Hingant Gómez, Lazaros Papadopoulos
2023Digital Forensics Triage App for Android.
Jannik Neth, Marko Schuba, Karsten Brodkorb, Georg Neugebauer, Tim Hoener, Sacha Hack
2023Digital Twin-Enhanced Incident Response for Cyber-Physical Systems.
David Allison, Paul Smith, Kieran McLaughlin
2023Dizzy: Large-Scale Crawling and Analysis of Onion Services.
Yazan Boshmaf, Isuranga Perera, Udesh Kumarasinghe, Sajitha Liyanage, Husam Al Jawaheri
2023Dynamic Cybersecurity Curriculum Optimization Method (DyCSCOM).
Marko Zivanovic, Imre Lendak, Ranko Popovic
2023Dynamic Intrusion Detection Framework for UAVCAN Protocol Using AI.
Fadhila Tlili, Samiha Ayed, Lamia Chaari Fourati
2023ELECTRON: An Architectural Framework for Securing the Smart Electrical Grid with Federated Detection, Dynamic Risk Assessment and Self-Healing.
Panagiotis I. Radoglou-Grammatikis, Athanasios Liatifis, Christos Dalamagkas, Alexios Lekidis, Konstantinos Voulgaridis, Thomas Lagkas, Nikolaos Fotos, Sofia-Anna Menesidou, Thomas Krousarlis, Pedro Ruzafa Alcazar, Juan Francisco Martinez, Antonio F. Skarmeta, Alberto Molinuevo Martín, Iñaki Angulo, Jesus Villalobos Nieto, Hristo Koshutanski, Rodrigo Diaz Rodriguez, Ilias Siniosoglou, Orestis Mavropoulos, Konstantinos Kyranou, Theocharis Saoulidis, Allon Adir, Ramy Masalha, Emanuele Bellini, Nicholas Kolokotronis, Stavros Shiaeles, Jose Garcia Franquelo, George Lalas, Andreas Zalonis, Antonis Voulgaridis, Angelina D. Bintoudi, Konstantinos Votis, David Pampliega, Panagiotis G. Sarigiannidis
2023Easier in Reverse: Simplifying URL Reading for Phishing URLs via Reverse Domain Name Notation.
Vincent Drury, Jakob Drees, Ulrike Meyer
2023Effect of Group Based Synchronization on User Anonymity in Mix Networks.
Alperen Aksoy, Dogan Kesdogan
2023Efficient Implementation of a Post-Quantum Anonymous Credential Protocol.
Olivier Blazy, Céline Chevalier, Guillaume Renaut, Thomas Ricosset, Éric Sageloli, Hugo Senet
2023Enabling Efficient Threshold Signature Computation via Java Card API.
Antonín Dufka, Petr Svenda
2023Enabling Qualified Anonymity for Enhanced User Privacy in the Digital Era.
Vaios Bolgouras, Kostantinos Papadamou, Ioana Stroinea, Michail Papadakis, George Gugulea, Michael Sirivianos, Christos Xenakis
2023Enabling the forensic study of application-level encrypted data in Android via a Frida-based decryption framework.
Cosimo Anglano, Massimo Canonico, Andrea Cepollina, Davide Freggiaro, Alderico Gallo, Marco Guazzone
2023Enhancing Cybersecurity Education in Europe: The REWIRE's Course Selection Methodology.
Alan Briones Delgado, Sara Ricci, Argyro Chatzopoulou, Jakub Cegan, Petr Dzurenda, Ioannis Koutoudis
2023Evaluating Statistical Disclosure Attacks and Countermeasures for Anonymous Voice Calls.
David Schatz, Michael Rossberg, Guenter Schaefer
2023Evaluation of Real-World Risk-Based Authentication at Online Services Revisited: Complexity Wins.
Jan-Phillip Makowski, Daniela Pöhn
2023Experiences with Secure Pipelines in Highly Regulated Environments.
Jose Andre Morales, Hasan Yasar
2023Explainable AI-based Intrusion Detection in the Internet of Things.
Marios Siganos, Panagiotis I. Radoglou-Grammatikis, Igor Kotsiuba, Evangelos Markakis, Ioannis D. Moscholios, Sotirios K. Goudos, Panagiotis G. Sarigiannidis
2023Exploiting Digital Twin technology for Cybersecurity Monitoring in Smart Grids.
Luigi Coppolino, Roberto Nardone, Alfredo Petruolo, Luigi Romano, Andrej Souvent
2023Exploring Federated Learning for Speech-based Parkinson's Disease Detection.
Athanasios Sarlas, Alexandros Kalafatelis, Georgios Alexandridis, Michail-Alexandros Kourtis, Panagiotis Trakadas
2023Exploring NFT Validation through Digital Watermarking.
Mila Dalla Preda, Francesco Masaia
2023FISMOS - An FPGA Implementation of a Security Module as Open Source.
Philipp Schubaur, Peter Knauer, Dominik Merli
2023Fairness of AI in Predicting the Risk of Recidivism: Review and Phase Mapping of AI Fairness Techniques.
Michael Mayowa Farayola, Irina Tal, Malika Bendechache, Takfarinas Saber, Regina Connolly
2023Fingerprint forgery training: Easy to learn, hard to perform.
Agata Kruzikova, Vashek Matyas
2023Formal Security Analysis of Vehicle Diagnostic Protocols.
Timm Lauser, Christoph Krauß
2023Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators.
Alpesh Bhudia, Anna Cartwright, Edward J. Cartwright, Darren Hurley-Smith, Julio C. Hernandez-Castro
2023Graph-Based Android Malware Detection and Categorization through BERT Transformer.
Andrea Saracino, Marco Simoni
2023HTTP/2 Attacks Generation using 5Greplay.
Francesco G. Caccavale, Huu Nghia Nguyen, Ana R. Cavalli, Edgardo Montes de Oca, Wissam Mallouli
2023HoneyICS: A High-interaction Physics-aware Honeynet for Industrial Control Systems.
Marco Lucchese, Francesco Lupia, Massimo Merro, Federica Paci, Nicola Zannone, Angelo Furfaro
2023How to hide your VM from the big bad wolf? Co-location resistance vs. resource utilisation in VM placement strategies.
Jens Lindemann
2023ICSvertase: A Framework for Purpose-based Design and Classification of ICS Honeypots.
Stash Kempinski, Shuaib Ichaarine, Savio Sciancalepore, Emmanuele Zambon
2023Identification and Evaluation of Cyber-Physical Threats on Interdependent Critical Infrastructures.
Sandra König, Abdelkader Magdy Shaaban, Tamara Hadjina, Klemen Gregorc, Albert Kutej
2023Implementing Data Sovereignty: Requirements & Challenges from Practice.
Malte Hellmeier, Julia Pampus, Haydar Qarawlus, Falk Howar
2023Interactive Environment for Effective Cybersecurity Teaching and Learning.
Willi Lazarov, Tomas Stodulka, Tiina Schafeitel-Tähtinen, Marko Helenius, Zdenek Martinasek
2023Investigating Impact of Fake-Type Content Poisoning Attack on NDN.
Noriaki Kamiyama, Takuto Kudo
2023IoT Network Attack Detection: Leveraging Graph Learning for Enhanced Security.
Mohamed-Lamine Messai, Hamida Seba
2023IoT Security Seminar: Raising Awareness and Sharing Critical Knowledge.
Victor Goeman, Dairo de Ruck, Ilse Bohé, Jorn Lapon, Vincent Naessens
2023JITScanner: Just-in-Time Executable Page Check in the Linux Operating System.
Pasquale Caporaso, Giuseppe Bianchi, Francesco Quaglia
2023Key Management Systems for Large-Scale Quantum Key Distribution Networks.
Paul James, Stephan Laschet, Sebastian Ramacher, Luca Torresetti
2023Leveraging Knowledge Graphs For Classifying Incident Situations in ICT Systems.
Lionel Tailhardat, Raphaël Troncy, Yoan Chabot
2023Linux-based IoT Benchmark Generator For Firmware Security Analysis Tools.
Dairo de Ruck, Victor Goeman, Michiel Willocx, Jorn Lapon, Vincent Naessens
2023Long-Term Analysis of the Dependability of Cloud-based NISQ Quantum Computers.
Chuanqi Xu, Jakub Szefer
2023Malware Finances and Operations: a Data-Driven Study of the Value Chain for Infections and Compromised Access.
Juha Nurmi, Mikko S. Niemelä, Billy Bob Brumley
2023Memory Forensics of the OpenDaylight Software-Defined Networking (SDN) Controller.
Abdullah Alshaya, Adam Kardorff, Christian Facundus, Ibrahim M. Baggili, Golden G. Richard III
2023Mitigate Data Poisoning Attack by Partially Federated Learning.
Khanh-Huu-The Dam, Axel Legay
2023Mitigating Intersection Attacks in Anonymous Microblogging.
Sarah Abdelwahab Gaballah, Thanh Hoang Long Nguyen, Lamya Abdullah, Ephraim Zimmer, Max Mühlhäuser
2023Mitigating Privilege Misuse in Access Control through Anomaly Detection.
Gelareh Hasel Mehri, Inez L. Wester, Federica Paci, Nicola Zannone
2023Mitigating undesired interactions between liveness detection components in biometric authentication.
Emma Lavens, Davy Preuveneers, Wouter Joosen
2023Modeling Tor Network Growth by Extrapolating Consensus Data.
Christoph Döpmann, Florian Tschorsch
2023Modern NetFlow network dataset with labeled attacks and detection methods.
Mikolaj Komisarek, Marek Pawlicki, Tomi Simic, David Kavcnik, Rafal Kozik, Michal Choras
2023Multi-Attribute Decision Making-based Trust Score Calculation in Trust Management in IoT.
Michail Bampatsikos, Ilias Politis, Vaios Bolgouras, Christos Xenakis
2023Nakula: Coercion Resistant Data Storage against Time-Limited Adversary.
Hayyu Imanda, Kasper Rasmussen
2023Needle in the Haystack: Analyzing the Right of Access According to GDPR Article 15 Five Years after the Implementation.
Daniela Pöhn, Niklas Mörsdorf, Wolfgang Hommel
2023Network Covert Channels in Routing Protocols.
Michael Schneider, Daniel Spiekermann, Jörg Keller
2023New Identity-Based Identification and Signature Schemes in the Standard Model.
Syh-Yuan Tan, Swee-Huay Heng
2023Obfuscated Mobile Malware Detection by Means of Dynamic Analysis and Explainable Deep Learning.
Francesco Mercaldo, Giovanni Ciaramella, Antonella Santone, Fabio Martinelli
2023On Deploying Quantum-Resistant Cybersecurity in Intelligent Infrastructures.
Lukas Malina, Patrik Dobias, Jan Hajny, Kim-Kwang Raymond Choo
2023On Efficiency and Usability of Group Signatures on Smartphone and Single-board Platforms.
Patrik Dobias, Lukas Malina, Petr Ilgner, Petr Dzurenda
2023OpenScope-sec: An ADS-B Simulator to Support the Security Research.
Riccardo Cestaro, Mauro Conti, Elonora Mancini, Federico Turrin
2023PLC Logic-Based Cybersecurity Risks Identification for ICS.
Mike Da Silva, Maxime Puys, Pierre-Henri Thevenon, Stéphane Mocanu
2023PRAETORIAN: A Framework for the Protection of Critical Infrastructures from advanced Combined Cyber and Physical Threats.
Lazaros Papadopoulos, Antonios Karteris, Dimitrios Soudris, Eva María Muñoz Navarro, Juan Jose Hernandez-Montesinos, Stéphane Paul, Nicolas Museux, Sandra König, Manuel Egger, Stefan Schauer, Javier Hingant Gómez, Tamara Hadjina
2023Parameterizing poisoning attacks in federated learning-based intrusion detection.
Mohamed Amine Merzouk, Frédéric Cuppens, Nora Boulahia-Cuppens, Reda Yaich
2023Practical Verifiable & Privacy-Preserving Double Auctions.
Armin Memar Zahedani, Jelle Vos, Zekeriya Erkin
2023Privacy Impact Assessment of Cyber Attacks on Connected and Autonomous Vehicles.
Sakshyam Panda, Emmanouil Panaousis, George Loukas, Konstantinos Kentrotis
2023Proceedings of the 18th International Conference on Availability, Reliability and Security, ARES 2023, Benevento, Italy, 29 August 2023- 1 September 2023
2023Program Characterization for Software Exploitation Detection.
Ayman Youssef, Mohamed Abdelrazek, Chandan K. Karmakar
2023Proof-of-work based new encoding scheme for information hiding purposes.
Pawel Rajba, Jörg Keller, Wojciech Mazurczyk
2023Quantum-resistant End-to-End Secure Messaging and Email Communication.
Christoph Döberl, Wolfgang Eibner, Simon Gärtner, Manuela Kos, Florian Kutschera, Sebastian Ramacher
2023RETRACT: Expressive Designated Verifier Anonymous Credentials.
Heini Bergsson Debes, Thanassis Giannetsos
2023Real-Time Defensive Strategy Selection via Deep Reinforcement Learning.
Axel Charpentier, Christopher Neal, Nora Boulahia-Cuppens, Frédéric Cuppens, Reda Yaich
2023Real-world actor-based image steganalysis via classifier inconsistency detection.
Daniel Lerch-Hostalot, David Megías
2023Reconstructing Timelines: From NTFS Timestamps to File Histories.
Jelle Bouma, Hugo Jonker, Vincent van der Meer, Eddy Van Den Aker
2023RiBAC: Strengthening Access Control Systems for Pandemic Risk Reduction while Preserving Privacy.
Stephan Krenn, Jan Orlicky, Daniel Slamanig, Tomas Trpisovský
2023Risk Assessments in Virtual Power Plants with NESCOR Criteria, Practical Application, Advantages and Disadvantages.
Georgios Gkoktsis, Hagen Lauer, Lukas Jäger
2023Rogue key and impersonation attacks on FIDO2: From theory to practice.
Manuel Barbosa, André Cirne, Luís Esquível
2023STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports.
Francesco Marchiori, Mauro Conti, Nino Vincenzo Verde
2023ScasDK - A Development Kit for Security Assurance test in Multi-Network-Function 5G.
Francesco Mancini, Giuseppe Bianchi
2023Secure Multi-User Contract Certificate Management for ISO 15118-20 Using Hardware Identities.
Christian Plappert, Lukas Jäger, Alexander Irrgang, Chandrasekhar Potluri
2023Securing Data Exchange in the Convergence of Metaverse and IoT Applications.
Rizwan Patan, Reza M. Parizi
2023Securing Federated GANs: Enabling Synthetic Data Generation for Health Registry Consortiums.
Narasimha Raghavan Veeraragavan, Jan Franz Nygård
2023Securing cloud-based military systems with Security Chaos Engineering and Artificial Intelligence.
Martin Bedoya, Sara Palacios Chavarro, Daniel Díaz López, Pantaleone Nespoli, Estefania Laverde, Sebastián Suárez
2023Securing the Flow: Security and Privacy Tools for Flow-based Programming.
Thodoris Ioannidis, Vaios Bolgouras, Christos Xenakis, Ilias Politis
2023Security Analysis of the KNX Smart Building Protocol.
Malte Küppers, Marko Schuba, Georg Neugebauer, Tim Hoener, Sacha Hack
2023Security Architecture in the SILVANUS project.
Natan Orzechowski, Karol Rzepka, Przemyslaw Szary, Krzysztof Cabaj, Wojciech Mazurczyk, Helen C. Leligou, Marcin Przybyszewski, Rafal Kozik, Michal Choras
2023Security level evaluation with F4SLE.
Mari Seeba, Tarmo Oja, Maria Pibilota Murumaa, Václav Stupka
2023Simulated environment for multiparty quantum digital signature across the network.
Daniel Gómez Aguado, Marta Irene García Cid, Laura Ortiz Martín, Vicente Martín Ayuso
2023Smartphones in a Microwave: Formal and Experimental Feasibility Study on Fingerprinting the Corona-Warn-App.
Henrik Graßhoff, Florian Adamsky, Stefan Schiffner
2023SoK: A Systematic Review of TEE Usage for Developing Trusted Applications.
Arttu Paju, Muhammad Owais Javed, Juha Nurmi, Juha Savimäki, Brian McGillion, Billy Bob Brumley
2023SoK: Modeling Explainability in Security Analytics for Interpretability, Trustworthiness, and Usability.
Dipkamal Bhusal, Rosalyn Shin, Ajay Ashok Shewale, Monish Kumar Manikya Veerabhadran, Michael Clifford, Sara Rampazzi, Nidhi Rastogi
2023SoK: Practical Detection of Software Supply Chain Attacks.
Marc Ohm, Charlene Stuke
2023Survey on Digital Twins: from concepts to applications.
Jessica B. Heluany, Vasileios Gkioulos
2023TASEP: A Collaborative Social Engineering Tabletop Role-Playing Game to Prevent Successful Social Engineering Attacks.
Lukas Hafner, Florian Wutz, Daniela Pöhn, Wolfgang Hommel
2023TRUSTEE: Towards the creation of secure, trustworthy and privacy-preserving framework.
Sarwar Sayeed, Nikolaos Pitropakis, William J. Buchanan, Evangelos Markakis, Dimitra Papatsaroucha, Ilias Politis
2023Tactics, Techniques and Procedures of Cybercrime: A Methodology and Tool for Cybercrime Investigation Process.
Gargi Sarkar, Hardeep Singh, Subodh Kumar, Sandeep K. Shukla
2023The Age of fighting machines: the use of cyber deception for Adversarial Artificial Intelligence in Cyber Defence.
David Lopes Antunes, Salvador Llopis Sánchez
2023The Curation Mechanism for the Czech National Qualifications Framework in Cybersecurity.
Frantisek Kasl, Pavel Loutocký, Jakub Vostoupal
2023The DYNABIC approach to resilience of critical infrastructures.
Erkuden Rios, Eider Iturbe, Angel Rego, Nicolas Ferry, Jean-Yves Tigli, Stéphane Lavirotte, Gérald Rocher, Phu Hong Nguyen, Hui Song, Rustem Dautov, Wissam Mallouli, Ana Rosa Cavalli
2023The Effect of Length on Key Fingerprint Verification Security and Usability.
Dan Turner, Siamak F. Shahandashti, Helen Petrie
2023Towards Grammatical Tagging for the Legal Language of Cybersecurity.
Gianpietro Castiglione, Giampaolo Bella, Daniele Francesco Santamaria
2023Towards Obfuscation of Programmable Logic Controllers.
Vittoria Cozza, Mila Dalla Preda, Marco Lucchese, Massimo Merro, Nicola Zannone
2023Towards the Definition of Cognitive Warfare and Related Countermeasures: A Systematic Review.
Frida Muñoz Plaza, Marco Antonio Sotelo Monge, Hector Gonzalez Ordi
2023Trust Scheme Interoperability: Connecting Heterogeneous Trust Schemes.
Stefan More
2023Universal Remote Attestation for Cloud and Edge Platforms.
Simon Ott, Monika Kamhuber, Joana Pecholt, Sascha Wessel
2023User Acceptance Criteria for Privacy Preserving Machine Learning Techniques.
Sascha Löbner, Sebastian Pape, Vanessa Bracamonte
2023VeriDevOps Software Methodology: Security Verification and Validation for DevOps Practices.
Eduard Paul Enoiu, Dragos Truscan, Andrey Sadovykh, Wissam Mallouli
2023Why Mary Can Hack: Effectively Introducing High School Girls to Cybersecurity.
Gabriele Costa, Silvia de Francisci, Serenella Valiani, Paolo Prinetto
2023You Only Get One-Shot: Eavesdropping Input Images to Neural Network by Spying SoC-FPGA Internal Bus.
May Myat Thu, Maria Méndez Real, Maxime Pelcat, Philippe Besnier
2023k-Anonymity on Metagenomic Features in Microbiome Databases.
Rudolf Mayer, Alicja Karlowicz, Markus Hittmeir