| 2023 | A Bring Your Own Device security awareness survey among professionals. George Petihakis, Dimitrios Kiritsis, Aristeidis Farao, Panagiotis Bountakas, Aggeliki Panou, Christos Xenakis |
| 2023 | A Case Study with CICIDS2017 on the Robustness of Machine Learning against Adversarial Attacks in Intrusion Detection. Marta Catillo, Andrea Del Vecchio, Antonio Pecchia, Umberto Villano |
| 2023 | A Comprehensive Study on Third-Party User Tracking in Mobile Applications. Federica Paci, Jacopo Pizzoli, Nicola Zannone |
| 2023 | A Concept-Based Validation Approach to Validate Security Systems for Protection of Interconnected Critical Infrastructures. Tim H. Stelkens-Kobsch, Hilke Boumann, Florian Piekert, Meilin Schaper, Nils Carstengerdes |
| 2023 | A Decentralised Public Key Infrastructure for X-Road. Mariia Bakhtina, Kin Long Leung, Raimundas Matulevicius, Ahmed Awad, Petr Svenda |
| 2023 | A Forensic I/O Recorder for Industrial Control Systems Using PLCs and OPC UA. Alexios Karagiozidis, Martin Gergeleit |
| 2023 | A Generic IoT Quantum-Safe Watchdog Timer Protocol. Michael Eckel, Tanja Gutsche, Hagen Lauer, Andre Rein |
| 2023 | A Practical Attack on the TLSH Similarity Digest Scheme. Gábor Fuchs, Roland Nagy, Levente Buttyán |
| 2023 | A Qualitative Analysis of Illicit Arms Trafficking on Darknet Marketplaces. Pantelitsa Leonidou, Nikos Salamanos, Aristeidis Farao, Maria Aspri, Michael Sirivianos |
| 2023 | A Quic(k) Security Overview: A Literature Research on Implemented Security Recommendations. Stefan Tatschner, Sebastian N. Peters, David Emeis, John Morris, Thomas Newe |
| 2023 | A Study of Different Awareness Campaigns in a Company. Laura Gamisch, Daniela Pöhn |
| 2023 | A Survey of Steganography Tools at Layers 2-4 and HTTP. Stefano Bistarelli, Michele Ceccarelli, Chiara Luchini, Ivan Mercanti, Francesco Santini |
| 2023 | A Systematic Review of Threat Analysis and Risk Assessment Methodologies for Connected and Automated Vehicles. Meriem Benyahya, Teri Lenard, Anastasija Collen, Niels Alexander Nijdam |
| 2023 | A deep learning anomaly detection framework with explainability and robustness. Manh-Dung Nguyen, Anis Bouaziz, Valeria Valdés, Ana Rosa Cavalli, Wissam Mallouli, Edgardo Montes de Oca |
| 2023 | A hybrid anonymization pipeline to improve the privacy-utility balance in sensitive datasets for ML purposes. Jenno Verdonck, Kevin De Boeck, Michiel Willocx, Jorn Lapon, Vincent Naessens |
| 2023 | A2P2 - An Android Application Patching Pipeline Based On Generic Changesets. Florian Draschbacher |
| 2023 | AI/ML-based real-time classification of Software Defined Networking traffic. Alexandru Vulpe, Cosmin Dobrin, Apostol Stefan, Alexandru Caranica |
| 2023 | Actions Speak Louder Than Passwords: Dynamic Identity for Machine-to-Machine Communication. Wil Liam Teng, Kasper Rasmussen |
| 2023 | Adoption of Information Security Practices in Large-Scale Agile Software Development: A Case Study in the Finance Industry. Sascha Nägele, Lorena Korn, Florian Matthes |
| 2023 | Adversarial Machine Learning Attacks on Multiclass Classification of IoT Network Traffic. Vasileios Pantelakis, Panagiotis Bountakas, Aristeidis Farao, Christos Xenakis |
| 2023 | An Analysis of PhotoDNA. Martin Steinebach |
| 2023 | An Analysis of Stack Exchange Questions: Identifying Challenges in Software Design and Development with a Focus on Data Privacy and Data Protection. Andreas Diepenbrock, Jonas Fleck, Sabine Sachweh |
| 2023 | An Exploratory Study on the Use of Threat Intelligence Sharing Platforms in Germany, Austria and Switzerland. Daniel Fischer, Clemens Sauerwein, Martin Werchan, Dirk Stelzer |
| 2023 | An Improved Honeypot Model for Attack Detection and Analysis. Marwan Abbas-Escribano, Hervé Debar |
| 2023 | An inclusive Lifecycle Approach for IoT Devices Trust and Identity Management. Konstantinos Loupos, Harris Niavis, Fotis Michalopoulos, George Misiakoulis, Antonio F. Skarmeta, Jesús Garcia, Angel Palomares, Hui Song, Rustem Dautov, Francesca Giampaolo, Rosella Mancilla, Francesca Costantino, Dimitri Van Landuyt, Sam Michiels, Stefan More, Christos Xenakis, Michail Bampatsikos, Ilias Politis, Konstantinos Krilakis, Sokratis Vavilis |
| 2023 | Application of Secure Two-Party Computation in a Privacy-Preserving Android App. Marco De Vincenzi, Ilaria Matteucci, Fabio Martinelli, Stefano Sebastio |
| 2023 | Approach to harmonisation of technological solutions, operating procedures, preparedness and cross-sectorial collaboration opportunities for first aid response in cross-border mass-casualty incidents. Yantsislav Yanakiev, Sergio López Bernal, Alberto Montarelo Navajo, Nikolai Stoianov, Manuel Gil Pérez, Carmen Curto Martin |
| 2023 | Artificial Intelligence for next generation cybersecurity: The AI4CYBER framework. Eider Iturbe, Erkuden Rios, Angel Rego, Nerea Toledo |
| 2023 | Attack on "A Privacy-Preserving Online Ride-Hailing System Without Involving a Third Trusted Server". Srinivas Vivek |
| 2023 | Automated ICS template for STRIDE Microsoft Threat Modeling Tool. Mike Da Silva, Maxime Puys, Pierre-Henri Thevenon, Stéphane Mocanu, Nelson Nkawa |
| 2023 | Automated Side-Channel Attacks using Black-Box Neural Architecture Search. Pritha Gupta, Jan Peter Drees, Eyke Hüllermeier |
| 2023 | Automatic Test Generation to Improve Scrum for Safety Agile Methodology. Mario Barbareschi, Salvatore Barone, Valentina Casola, Salvatore Della Torca, Daniele Lombardi |
| 2023 | Automatic incident response solutions: a review of proposed solutions' input and output. Henrik Karlzén, Teodor Sommestad |
| 2023 | Beware the Doppelgänger: Attacks against Adaptive Thresholds in Facial Recognition Systems. Willem Verheyen, Tim Van hamme, Sander Joos, Davy Preuveneers, Wouter Joosen |
| 2023 | Breaching the Defense: Investigating FGSM and CTGAN Adversarial Attacks on IEC 60870-5-104 AI-enabled Intrusion Detection Systems. Dimitrios Christos Asimopoulos, Panagiotis I. Radoglou-Grammatikis, Ioannis Makris, Valeri M. Mladenov, Konstantinos E. Psannis, Sotirios K. Goudos, Panagiotis G. Sarigiannidis |
| 2023 | Bypassing antivirus detection: old-school malware, new tricks. Efstratios Chatzoglou, Georgios Karopoulos, Georgios Kambourakis, Zisis Tsiatsikas |
| 2023 | CACS: A Cloud Privacy-Preserving Attribute Management System. Aivo Kalu, Burak Can Kus, Peeter Laud, Kin Long Leung, Nikita Snetkov, Jelizaveta Vakarjuk |
| 2023 | Canary in Twitter Mine: Collecting Phishing Reports from Experts and Non-experts. Hiroki Nakano, Daiki Chiba, Takashi Koide, Naoki Fukushi, Takeshi Yagi, Takeo Hariu, Katsunari Yoshioka, Tsutomu Matsumoto |
| 2023 | Characterizing the MasterPrint threat on Android devices with capacitive sensors. Miguel Peidro-Paredes, José María de Fuentes, Lorena González-Manzano, Miguel Velasco-Gomez |
| 2023 | Characterizing the Use of Code Obfuscation in Malicious and Benign Android Apps. Ulf Kargén, Noah Mauthe, Nahid Shahmehri |
| 2023 | Cheaper than you thought? A dive into the darkweb market of cyber-crime products. Dimitrios Georgoulias, Ricardo Yaben, Emmanouil Vasilomanolakis |
| 2023 | Confidential Quantum Computing. Barbora Hrdá, Sascha Wessel |
| 2023 | Cookiescanner: An Automated Tool for Detecting and Evaluating GDPR Consent Notices on Websites. Ralf Gundelach, Dominik Herrmann |
| 2023 | Creating a Decryption Proof Verifier for the Estonian Internet Voting System. Jan Willemson |
| 2023 | Cross-Domain Sharing of User Claims: A Design Proposal for OpenID Connect Attribute Authorities. Amir Sharif, Francesco Antonio Marino, Giada Sciarretta, Giuseppe De Marco, Roberto Carbone, Silvio Ranise |
| 2023 | Curricula Designer with Enhanced ECSF Analysis. Jan Hajny, Marek Sikora, Konstantinos Adamos, Fabio Di Franco |
| 2023 | DJM-CYBER: A Joint Master in Advanced Cybersecurity. Yianna Danidou, Sara Ricci, Antonio F. Skarmeta, Jiri Hosek, Stefano Zanero, Imre Lendak |
| 2023 | Data Loss Prevention Solution for Linux Endpoint Devices. Lukas Daubner, Adam Povazanec |
| 2023 | Detecting a Complex Attack Scenario in an Airport: The PRAETORIAN Framework. Stefan Schauer, Tamara Hadjina, Melita Damjanovic, Eva María Muñoz Navarro, Juan Jose Hernandez-Montesinos, Javier Hingant Gómez, Lazaros Papadopoulos |
| 2023 | Digital Forensics Triage App for Android. Jannik Neth, Marko Schuba, Karsten Brodkorb, Georg Neugebauer, Tim Hoener, Sacha Hack |
| 2023 | Digital Twin-Enhanced Incident Response for Cyber-Physical Systems. David Allison, Paul Smith, Kieran McLaughlin |
| 2023 | Dizzy: Large-Scale Crawling and Analysis of Onion Services. Yazan Boshmaf, Isuranga Perera, Udesh Kumarasinghe, Sajitha Liyanage, Husam Al Jawaheri |
| 2023 | Dynamic Cybersecurity Curriculum Optimization Method (DyCSCOM). Marko Zivanovic, Imre Lendak, Ranko Popovic |
| 2023 | Dynamic Intrusion Detection Framework for UAVCAN Protocol Using AI. Fadhila Tlili, Samiha Ayed, Lamia Chaari Fourati |
| 2023 | ELECTRON: An Architectural Framework for Securing the Smart Electrical Grid with Federated Detection, Dynamic Risk Assessment and Self-Healing. Panagiotis I. Radoglou-Grammatikis, Athanasios Liatifis, Christos Dalamagkas, Alexios Lekidis, Konstantinos Voulgaridis, Thomas Lagkas, Nikolaos Fotos, Sofia-Anna Menesidou, Thomas Krousarlis, Pedro Ruzafa Alcazar, Juan Francisco Martinez, Antonio F. Skarmeta, Alberto Molinuevo Martín, Iñaki Angulo, Jesus Villalobos Nieto, Hristo Koshutanski, Rodrigo Diaz Rodriguez, Ilias Siniosoglou, Orestis Mavropoulos, Konstantinos Kyranou, Theocharis Saoulidis, Allon Adir, Ramy Masalha, Emanuele Bellini, Nicholas Kolokotronis, Stavros Shiaeles, Jose Garcia Franquelo, George Lalas, Andreas Zalonis, Antonis Voulgaridis, Angelina D. Bintoudi, Konstantinos Votis, David Pampliega, Panagiotis G. Sarigiannidis |
| 2023 | Easier in Reverse: Simplifying URL Reading for Phishing URLs via Reverse Domain Name Notation. Vincent Drury, Jakob Drees, Ulrike Meyer |
| 2023 | Effect of Group Based Synchronization on User Anonymity in Mix Networks. Alperen Aksoy, Dogan Kesdogan |
| 2023 | Efficient Implementation of a Post-Quantum Anonymous Credential Protocol. Olivier Blazy, Céline Chevalier, Guillaume Renaut, Thomas Ricosset, Éric Sageloli, Hugo Senet |
| 2023 | Enabling Efficient Threshold Signature Computation via Java Card API. Antonín Dufka, Petr Svenda |
| 2023 | Enabling Qualified Anonymity for Enhanced User Privacy in the Digital Era. Vaios Bolgouras, Kostantinos Papadamou, Ioana Stroinea, Michail Papadakis, George Gugulea, Michael Sirivianos, Christos Xenakis |
| 2023 | Enabling the forensic study of application-level encrypted data in Android via a Frida-based decryption framework. Cosimo Anglano, Massimo Canonico, Andrea Cepollina, Davide Freggiaro, Alderico Gallo, Marco Guazzone |
| 2023 | Enhancing Cybersecurity Education in Europe: The REWIRE's Course Selection Methodology. Alan Briones Delgado, Sara Ricci, Argyro Chatzopoulou, Jakub Cegan, Petr Dzurenda, Ioannis Koutoudis |
| 2023 | Evaluating Statistical Disclosure Attacks and Countermeasures for Anonymous Voice Calls. David Schatz, Michael Rossberg, Guenter Schaefer |
| 2023 | Evaluation of Real-World Risk-Based Authentication at Online Services Revisited: Complexity Wins. Jan-Phillip Makowski, Daniela Pöhn |
| 2023 | Experiences with Secure Pipelines in Highly Regulated Environments. Jose Andre Morales, Hasan Yasar |
| 2023 | Explainable AI-based Intrusion Detection in the Internet of Things. Marios Siganos, Panagiotis I. Radoglou-Grammatikis, Igor Kotsiuba, Evangelos Markakis, Ioannis D. Moscholios, Sotirios K. Goudos, Panagiotis G. Sarigiannidis |
| 2023 | Exploiting Digital Twin technology for Cybersecurity Monitoring in Smart Grids. Luigi Coppolino, Roberto Nardone, Alfredo Petruolo, Luigi Romano, Andrej Souvent |
| 2023 | Exploring Federated Learning for Speech-based Parkinson's Disease Detection. Athanasios Sarlas, Alexandros Kalafatelis, Georgios Alexandridis, Michail-Alexandros Kourtis, Panagiotis Trakadas |
| 2023 | Exploring NFT Validation through Digital Watermarking. Mila Dalla Preda, Francesco Masaia |
| 2023 | FISMOS - An FPGA Implementation of a Security Module as Open Source. Philipp Schubaur, Peter Knauer, Dominik Merli |
| 2023 | Fairness of AI in Predicting the Risk of Recidivism: Review and Phase Mapping of AI Fairness Techniques. Michael Mayowa Farayola, Irina Tal, Malika Bendechache, Takfarinas Saber, Regina Connolly |
| 2023 | Fingerprint forgery training: Easy to learn, hard to perform. Agata Kruzikova, Vashek Matyas |
| 2023 | Formal Security Analysis of Vehicle Diagnostic Protocols. Timm Lauser, Christoph Krauß |
| 2023 | Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators. Alpesh Bhudia, Anna Cartwright, Edward J. Cartwright, Darren Hurley-Smith, Julio C. Hernandez-Castro |
| 2023 | Graph-Based Android Malware Detection and Categorization through BERT Transformer. Andrea Saracino, Marco Simoni |
| 2023 | HTTP/2 Attacks Generation using 5Greplay. Francesco G. Caccavale, Huu Nghia Nguyen, Ana R. Cavalli, Edgardo Montes de Oca, Wissam Mallouli |
| 2023 | HoneyICS: A High-interaction Physics-aware Honeynet for Industrial Control Systems. Marco Lucchese, Francesco Lupia, Massimo Merro, Federica Paci, Nicola Zannone, Angelo Furfaro |
| 2023 | How to hide your VM from the big bad wolf? Co-location resistance vs. resource utilisation in VM placement strategies. Jens Lindemann |
| 2023 | ICSvertase: A Framework for Purpose-based Design and Classification of ICS Honeypots. Stash Kempinski, Shuaib Ichaarine, Savio Sciancalepore, Emmanuele Zambon |
| 2023 | Identification and Evaluation of Cyber-Physical Threats on Interdependent Critical Infrastructures. Sandra König, Abdelkader Magdy Shaaban, Tamara Hadjina, Klemen Gregorc, Albert Kutej |
| 2023 | Implementing Data Sovereignty: Requirements & Challenges from Practice. Malte Hellmeier, Julia Pampus, Haydar Qarawlus, Falk Howar |
| 2023 | Interactive Environment for Effective Cybersecurity Teaching and Learning. Willi Lazarov, Tomas Stodulka, Tiina Schafeitel-Tähtinen, Marko Helenius, Zdenek Martinasek |
| 2023 | Investigating Impact of Fake-Type Content Poisoning Attack on NDN. Noriaki Kamiyama, Takuto Kudo |
| 2023 | IoT Network Attack Detection: Leveraging Graph Learning for Enhanced Security. Mohamed-Lamine Messai, Hamida Seba |
| 2023 | IoT Security Seminar: Raising Awareness and Sharing Critical Knowledge. Victor Goeman, Dairo de Ruck, Ilse Bohé, Jorn Lapon, Vincent Naessens |
| 2023 | JITScanner: Just-in-Time Executable Page Check in the Linux Operating System. Pasquale Caporaso, Giuseppe Bianchi, Francesco Quaglia |
| 2023 | Key Management Systems for Large-Scale Quantum Key Distribution Networks. Paul James, Stephan Laschet, Sebastian Ramacher, Luca Torresetti |
| 2023 | Leveraging Knowledge Graphs For Classifying Incident Situations in ICT Systems. Lionel Tailhardat, Raphaël Troncy, Yoan Chabot |
| 2023 | Linux-based IoT Benchmark Generator For Firmware Security Analysis Tools. Dairo de Ruck, Victor Goeman, Michiel Willocx, Jorn Lapon, Vincent Naessens |
| 2023 | Long-Term Analysis of the Dependability of Cloud-based NISQ Quantum Computers. Chuanqi Xu, Jakub Szefer |
| 2023 | Malware Finances and Operations: a Data-Driven Study of the Value Chain for Infections and Compromised Access. Juha Nurmi, Mikko S. Niemelä, Billy Bob Brumley |
| 2023 | Memory Forensics of the OpenDaylight Software-Defined Networking (SDN) Controller. Abdullah Alshaya, Adam Kardorff, Christian Facundus, Ibrahim M. Baggili, Golden G. Richard III |
| 2023 | Mitigate Data Poisoning Attack by Partially Federated Learning. Khanh-Huu-The Dam, Axel Legay |
| 2023 | Mitigating Intersection Attacks in Anonymous Microblogging. Sarah Abdelwahab Gaballah, Thanh Hoang Long Nguyen, Lamya Abdullah, Ephraim Zimmer, Max Mühlhäuser |
| 2023 | Mitigating Privilege Misuse in Access Control through Anomaly Detection. Gelareh Hasel Mehri, Inez L. Wester, Federica Paci, Nicola Zannone |
| 2023 | Mitigating undesired interactions between liveness detection components in biometric authentication. Emma Lavens, Davy Preuveneers, Wouter Joosen |
| 2023 | Modeling Tor Network Growth by Extrapolating Consensus Data. Christoph Döpmann, Florian Tschorsch |
| 2023 | Modern NetFlow network dataset with labeled attacks and detection methods. Mikolaj Komisarek, Marek Pawlicki, Tomi Simic, David Kavcnik, Rafal Kozik, Michal Choras |
| 2023 | Multi-Attribute Decision Making-based Trust Score Calculation in Trust Management in IoT. Michail Bampatsikos, Ilias Politis, Vaios Bolgouras, Christos Xenakis |
| 2023 | Nakula: Coercion Resistant Data Storage against Time-Limited Adversary. Hayyu Imanda, Kasper Rasmussen |
| 2023 | Needle in the Haystack: Analyzing the Right of Access According to GDPR Article 15 Five Years after the Implementation. Daniela Pöhn, Niklas Mörsdorf, Wolfgang Hommel |
| 2023 | Network Covert Channels in Routing Protocols. Michael Schneider, Daniel Spiekermann, Jörg Keller |
| 2023 | New Identity-Based Identification and Signature Schemes in the Standard Model. Syh-Yuan Tan, Swee-Huay Heng |
| 2023 | Obfuscated Mobile Malware Detection by Means of Dynamic Analysis and Explainable Deep Learning. Francesco Mercaldo, Giovanni Ciaramella, Antonella Santone, Fabio Martinelli |
| 2023 | On Deploying Quantum-Resistant Cybersecurity in Intelligent Infrastructures. Lukas Malina, Patrik Dobias, Jan Hajny, Kim-Kwang Raymond Choo |
| 2023 | On Efficiency and Usability of Group Signatures on Smartphone and Single-board Platforms. Patrik Dobias, Lukas Malina, Petr Ilgner, Petr Dzurenda |
| 2023 | OpenScope-sec: An ADS-B Simulator to Support the Security Research. Riccardo Cestaro, Mauro Conti, Elonora Mancini, Federico Turrin |
| 2023 | PLC Logic-Based Cybersecurity Risks Identification for ICS. Mike Da Silva, Maxime Puys, Pierre-Henri Thevenon, Stéphane Mocanu |
| 2023 | PRAETORIAN: A Framework for the Protection of Critical Infrastructures from advanced Combined Cyber and Physical Threats. Lazaros Papadopoulos, Antonios Karteris, Dimitrios Soudris, Eva María Muñoz Navarro, Juan Jose Hernandez-Montesinos, Stéphane Paul, Nicolas Museux, Sandra König, Manuel Egger, Stefan Schauer, Javier Hingant Gómez, Tamara Hadjina |
| 2023 | Parameterizing poisoning attacks in federated learning-based intrusion detection. Mohamed Amine Merzouk, Frédéric Cuppens, Nora Boulahia-Cuppens, Reda Yaich |
| 2023 | Practical Verifiable & Privacy-Preserving Double Auctions. Armin Memar Zahedani, Jelle Vos, Zekeriya Erkin |
| 2023 | Privacy Impact Assessment of Cyber Attacks on Connected and Autonomous Vehicles. Sakshyam Panda, Emmanouil Panaousis, George Loukas, Konstantinos Kentrotis |
| 2023 | Proceedings of the 18th International Conference on Availability, Reliability and Security, ARES 2023, Benevento, Italy, 29 August 2023- 1 September 2023 |
| 2023 | Program Characterization for Software Exploitation Detection. Ayman Youssef, Mohamed Abdelrazek, Chandan K. Karmakar |
| 2023 | Proof-of-work based new encoding scheme for information hiding purposes. Pawel Rajba, Jörg Keller, Wojciech Mazurczyk |
| 2023 | Quantum-resistant End-to-End Secure Messaging and Email Communication. Christoph Döberl, Wolfgang Eibner, Simon Gärtner, Manuela Kos, Florian Kutschera, Sebastian Ramacher |
| 2023 | RETRACT: Expressive Designated Verifier Anonymous Credentials. Heini Bergsson Debes, Thanassis Giannetsos |
| 2023 | Real-Time Defensive Strategy Selection via Deep Reinforcement Learning. Axel Charpentier, Christopher Neal, Nora Boulahia-Cuppens, Frédéric Cuppens, Reda Yaich |
| 2023 | Real-world actor-based image steganalysis via classifier inconsistency detection. Daniel Lerch-Hostalot, David Megías |
| 2023 | Reconstructing Timelines: From NTFS Timestamps to File Histories. Jelle Bouma, Hugo Jonker, Vincent van der Meer, Eddy Van Den Aker |
| 2023 | RiBAC: Strengthening Access Control Systems for Pandemic Risk Reduction while Preserving Privacy. Stephan Krenn, Jan Orlicky, Daniel Slamanig, Tomas Trpisovský |
| 2023 | Risk Assessments in Virtual Power Plants with NESCOR Criteria, Practical Application, Advantages and Disadvantages. Georgios Gkoktsis, Hagen Lauer, Lukas Jäger |
| 2023 | Rogue key and impersonation attacks on FIDO2: From theory to practice. Manuel Barbosa, André Cirne, Luís Esquível |
| 2023 | STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports. Francesco Marchiori, Mauro Conti, Nino Vincenzo Verde |
| 2023 | ScasDK - A Development Kit for Security Assurance test in Multi-Network-Function 5G. Francesco Mancini, Giuseppe Bianchi |
| 2023 | Secure Multi-User Contract Certificate Management for ISO 15118-20 Using Hardware Identities. Christian Plappert, Lukas Jäger, Alexander Irrgang, Chandrasekhar Potluri |
| 2023 | Securing Data Exchange in the Convergence of Metaverse and IoT Applications. Rizwan Patan, Reza M. Parizi |
| 2023 | Securing Federated GANs: Enabling Synthetic Data Generation for Health Registry Consortiums. Narasimha Raghavan Veeraragavan, Jan Franz Nygård |
| 2023 | Securing cloud-based military systems with Security Chaos Engineering and Artificial Intelligence. Martin Bedoya, Sara Palacios Chavarro, Daniel Díaz López, Pantaleone Nespoli, Estefania Laverde, Sebastián Suárez |
| 2023 | Securing the Flow: Security and Privacy Tools for Flow-based Programming. Thodoris Ioannidis, Vaios Bolgouras, Christos Xenakis, Ilias Politis |
| 2023 | Security Analysis of the KNX Smart Building Protocol. Malte Küppers, Marko Schuba, Georg Neugebauer, Tim Hoener, Sacha Hack |
| 2023 | Security Architecture in the SILVANUS project. Natan Orzechowski, Karol Rzepka, Przemyslaw Szary, Krzysztof Cabaj, Wojciech Mazurczyk, Helen C. Leligou, Marcin Przybyszewski, Rafal Kozik, Michal Choras |
| 2023 | Security level evaluation with F4SLE. Mari Seeba, Tarmo Oja, Maria Pibilota Murumaa, Václav Stupka |
| 2023 | Simulated environment for multiparty quantum digital signature across the network. Daniel Gómez Aguado, Marta Irene García Cid, Laura Ortiz Martín, Vicente Martín Ayuso |
| 2023 | Smartphones in a Microwave: Formal and Experimental Feasibility Study on Fingerprinting the Corona-Warn-App. Henrik Graßhoff, Florian Adamsky, Stefan Schiffner |
| 2023 | SoK: A Systematic Review of TEE Usage for Developing Trusted Applications. Arttu Paju, Muhammad Owais Javed, Juha Nurmi, Juha Savimäki, Brian McGillion, Billy Bob Brumley |
| 2023 | SoK: Modeling Explainability in Security Analytics for Interpretability, Trustworthiness, and Usability. Dipkamal Bhusal, Rosalyn Shin, Ajay Ashok Shewale, Monish Kumar Manikya Veerabhadran, Michael Clifford, Sara Rampazzi, Nidhi Rastogi |
| 2023 | SoK: Practical Detection of Software Supply Chain Attacks. Marc Ohm, Charlene Stuke |
| 2023 | Survey on Digital Twins: from concepts to applications. Jessica B. Heluany, Vasileios Gkioulos |
| 2023 | TASEP: A Collaborative Social Engineering Tabletop Role-Playing Game to Prevent Successful Social Engineering Attacks. Lukas Hafner, Florian Wutz, Daniela Pöhn, Wolfgang Hommel |
| 2023 | TRUSTEE: Towards the creation of secure, trustworthy and privacy-preserving framework. Sarwar Sayeed, Nikolaos Pitropakis, William J. Buchanan, Evangelos Markakis, Dimitra Papatsaroucha, Ilias Politis |
| 2023 | Tactics, Techniques and Procedures of Cybercrime: A Methodology and Tool for Cybercrime Investigation Process. Gargi Sarkar, Hardeep Singh, Subodh Kumar, Sandeep K. Shukla |
| 2023 | The Age of fighting machines: the use of cyber deception for Adversarial Artificial Intelligence in Cyber Defence. David Lopes Antunes, Salvador Llopis Sánchez |
| 2023 | The Curation Mechanism for the Czech National Qualifications Framework in Cybersecurity. Frantisek Kasl, Pavel Loutocký, Jakub Vostoupal |
| 2023 | The DYNABIC approach to resilience of critical infrastructures. Erkuden Rios, Eider Iturbe, Angel Rego, Nicolas Ferry, Jean-Yves Tigli, Stéphane Lavirotte, Gérald Rocher, Phu Hong Nguyen, Hui Song, Rustem Dautov, Wissam Mallouli, Ana Rosa Cavalli |
| 2023 | The Effect of Length on Key Fingerprint Verification Security and Usability. Dan Turner, Siamak F. Shahandashti, Helen Petrie |
| 2023 | Towards Grammatical Tagging for the Legal Language of Cybersecurity. Gianpietro Castiglione, Giampaolo Bella, Daniele Francesco Santamaria |
| 2023 | Towards Obfuscation of Programmable Logic Controllers. Vittoria Cozza, Mila Dalla Preda, Marco Lucchese, Massimo Merro, Nicola Zannone |
| 2023 | Towards the Definition of Cognitive Warfare and Related Countermeasures: A Systematic Review. Frida Muñoz Plaza, Marco Antonio Sotelo Monge, Hector Gonzalez Ordi |
| 2023 | Trust Scheme Interoperability: Connecting Heterogeneous Trust Schemes. Stefan More |
| 2023 | Universal Remote Attestation for Cloud and Edge Platforms. Simon Ott, Monika Kamhuber, Joana Pecholt, Sascha Wessel |
| 2023 | User Acceptance Criteria for Privacy Preserving Machine Learning Techniques. Sascha Löbner, Sebastian Pape, Vanessa Bracamonte |
| 2023 | VeriDevOps Software Methodology: Security Verification and Validation for DevOps Practices. Eduard Paul Enoiu, Dragos Truscan, Andrey Sadovykh, Wissam Mallouli |
| 2023 | Why Mary Can Hack: Effectively Introducing High School Girls to Cybersecurity. Gabriele Costa, Silvia de Francisci, Serenella Valiani, Paolo Prinetto |
| 2023 | You Only Get One-Shot: Eavesdropping Input Images to Neural Network by Spying SoC-FPGA Internal Bus. May Myat Thu, Maria Méndez Real, Maxime Pelcat, Philippe Besnier |
| 2023 | k-Anonymity on Metagenomic Features in Microbiome Databases. Rudolf Mayer, Alicja Karlowicz, Markus Hittmeir |