ARES B

203 papers

YearTitle / Authors
2024A Blockchain-based Multi-Factor Honeytoken Dynamic Authentication Mechanism.
Vassilis Papaspirou, Ioanna Kantzavelou, Yagmur Yigit, Leandros Maglaras, Sokratis K. Katsikas
2024A Case Study on the Detection of Hash-Chain-based Covert Channels Using Heuristics and Machine Learning.
Jeff Schymiczek, Tobias Schmidbauer, Steffen Wendzel
2024A Comprehensive Pattern-based Overview of Stegomalware.
Fabian Strachanski, Denis Petrov, Tobias Schmidbauer, Steffen Wendzel
2024A Framework Towards Assessing the Resilience of Urban Transport Systems.
Gérald Rocher, Jean-Yves Tigli, Stéphane Lavirotte, Nicolas Ferry
2024A Framework for In-network Inference using P4.
Huu Nghia Nguyen, Manh-Dung Nguyen, Edgardo Montes de Oca
2024A Framework for Managing Separation of Duty Policies.
Sebastian Groll, Sascha Kern, Ludwig Fuchs, Günther Pernul
2024A Large-Scale Study on the Prevalence and Usage of TEE-based Features on Android.
Davide Bove
2024A Metalanguage for Dynamic Attack Graphs and Lazy Generation.
Viktor Engström, Giuseppe Nebbione, Mathias Ekstedt
2024A Model-based Approach for Assessing the Security of Cyber-Physical Systems.
Hugo Teixeira De Castro, Ahmed Hussain, Gregory Blanc, Jamal El Hachem, Dominique Blouin, Jean Leneutre, Panos Papadimitratos
2024A Multi-layer Approach through Threat Modelling and Attack Simulation for Enhanced Cyber Security Assessment.
Eider Iturbe, Javier Arcas, Erkuden Rios, Nerea Toledo
2024A Privacy Measure Turned Upside Down? Investigating the Use of HTTP Client Hints on the Web.
Stephan Wiefling, Marian Hönscheid, Luigi Lo Iacono
2024A Quantitative Analysis of Inappropriate Content, Age Rating Compliance, and Risks to Youth on the Whisper Platform.
Jeng-Yu Chou, Brian Levine
2024A Risk Assessment and Legal Compliance Framework for Supporting Personal Data Sharing with Privacy Preservation for Scientific Research.
Christos Baloukas, Lazaros Papadopoulos, Kostas Demestichas, Axel Weissenfeld, Sven Schlarb, Mikel Aramburu, David Redó, Jorge García, Seán Gaines, Thomas Marquenie, Ezgi Eren, Irmak Erdogan Peter
2024A SOAR platform for standardizing, automating operational processes and a monitoring service facilitating auditing procedures among IoT trustworthy environments.
Vasiliki-Georgia Bilali, Eustratios Magklaris, Dimitrios Kosyvas, Lazaros Karagiannidis, Eleftherios Ouzounoglou, Angelos Amditis
2024A Systematic Review of Contemporary Applications of Privacy-Aware Graph Neural Networks in Smart Cities.
Jingyan Zhang, Irina Tal
2024A Technical Exploration of Strategies for Augmented Monitoring and Decision Support in Information Warfare.
Frida Muñoz Plaza, Inés Hernández San Román, Marco Antonio Sotelo Monge
2024A Trust and Reputation System for Examining Compliance with Access Control.
Thomas Baumer, Johannes Grill, Jacob Adan, Günther Pernul
2024A Unified Framework for GDPR Compliance in Cloud Computing.
Argyri Pattakou, Vasiliki Diamantopoulou, Christos Kalloniatis, Stefanos Gritzalis
2024A Web Browser Plugin for Users' Security Awareness.
Thomas Hoad, Erisa Karafili
2024A comprehensive evaluation of interrupt measurement techniques for predictability in safety-critical systems.
Daniele Lombardi, Mario Barbareschi, Salvatore Barone, Valentina Casola
2024A tool for IoT Firmware Certification.
Giuseppe Marco Bianco, Luca Ardito, Michele Valsesia
2024AI-Powered Penetration Testing using Shennina: From Simulation to Validation.
Stylianos Karagiannis, Camilla Fusco, Leonidas Agathos, Wissam Mallouli, Valentina Casola, Christoforos Ntantogian, Emmanouil Magkos
2024AI4SOAR: A Security Intelligence Tool for Automated Incident Response.
Manh-Dung Nguyen, Wissam Mallouli, Ana Rosa Cavalli, Edgardo Montes de Oca
2024AIAS: AI-ASsisted cybersecurity platform to defend against adversarial AI attacks.
Georgios Petihakis, Aristeidis Farao, Panagiotis Bountakas, Athanasia Sabazioti, John Polley, Christos Xenakis
2024ARGAN-IDS: Adversarial Resistant Intrusion Detection Systems using Generative Adversarial Networks.
João Costa, Filipe Apolinário, Carlos Ribeiro
2024Acceleration of DICE Key Generation using Key Caching.
Dominik Lorych, Lukas Jäger, Andreas Fuchs
2024Accuracy Evaluation of SBOM Tools for Web Applications and System-Level Software.
Andreas Halbritter, Dominik Merli
2024Advanced methods for generalizing time and duration during dataset anonymization.
Jenno Verdonck, Kevin De Boeck, Michiel Willocx, Vincent Naessens
2024Advancing ESSecA: a step forward in Automated Penetration Testing.
Massimiliano Rak, Felice Moretta, Daniele Granata
2024Adversary Tactic Driven Scenario and Terrain Generation with Partial Infrastructure Specification.
Ádám Ruman, Martin Drasar, Lukás Sadlek, Shanchieh Jay Yang, Pavel Celeda
2024Aligning eIDAS and Trust Over IP: A Mapping Approach.
Cristian Lepore, Romain Laborde, Jessica Eynard
2024An Analysis of Security Concerns in Transitioning Battery Management Systems from First to Second Life.
Julian Blümke, Kevin Mayer, Hans-Joachim Hof
2024An Exploratory Case Study on Data Breach Journalism.
Jukka Ruohonen, Kalle Hjerppe, Maximilian von Zastrow
2024An IEC 62443-security oriented domain specific modelling language.
Jolahn Vaudey, Stéphane Mocanu, Gwenaël Delaval, Éric Rutten
2024An Identity Key Management System with Deterministic Key Hierarchy for SSI-native Internet of Things.
Alice Colombatto, Luca Giorgino, Andrea Vesco
2024Analysis of the Capability and Training of Chat Bots in the Generation of Rules for Firewall or Intrusion Detection Systems.
Bernardo Louro, Raquel Abreu, Joana Cabral Costa, João B. F. Sequeiros, Pedro R. M. Inácio
2024Analysis of the Windows Control Flow Guard.
Niels Pfau, Patrick Kochberger
2024Analyzing Air-traffic Security using GIS-"blur' with Information Flow Control in the IIIf.
Florian Kammueller
2024Anomaly detection mechanisms for in-vehicle and V2X systems.
Alexios Lekidis
2024Anomaly-Based Intrusion Detection for Blackhole Attack Mitigation.
Ashraf Abdelhamid, Mahmoud Said Elsayed, Heba K. Aslan, Marianne A. Azer
2024Are Deepfakes a Game-changer in Digital Images Steganography Leveraging the Cover-Source-Mismatch?
Arthur Méreur, Antoine Mallet, Rémi Cogranne
2024Article 45 of the eIDAS Directive Unveils the need to implement the X.509 4-cornered trust model for the WebPKI.
Ahmad Samer Wazan, Romain Laborde, Abdelmalek Benzekri, Muhammad Imran Taj
2024Assessing the Impact of Large Language Models on Cybersecurity Education: A Study of ChatGPT's Influence on Student Performance.
Marc Ohm, Christian Bungartz, Felix Boes, Michael Meier
2024Assessing the Performance of Ethereum and Hyperledger Fabric Under DDoS Attacks for Cyber-Physical Systems.
Vijay Jayadev, Naghmeh Moradpoor, Andrei Petrovski
2024Attack Analysis and Detection for the Combined Electric Vehicle Charging and Power Grid Domains.
Dustin Kern, Christoph Krauß, Matthias Hollick
2024Automated Passport Control: Mining and Checking Models of Machine Readable Travel Documents.
Stefan Marksteiner, Marjan Sirjani, Mikael Sjödin
2024Automating Side-Channel Testing for Embedded Systems: A Continuous Integration Approach.
Philipp Schloyer, Peter Knauer, Bernhard Bauer, Dominik Merli
2024Behavioural Modelling for Sustainability in Smart Homes.
Luca Ardito
2024BenchIMP: A Benchmark for Quantitative Evaluation of the Incident Management Process Assessment.
Alessandro Palma, Nicola Bartoloni, Marco Angelini
2024Beyond the Bugs: Enhancing Bug Bounty Programs through Academic Partnerships.
Andrej Kristofík, Jakub Vostoupal, Kamil Malinka, Frantisek Kasl, Pavel Loutocký
2024Blue Skies from (X?s) Pain: A Digital Forensic Analysis of Threads and Bluesky.
Joseph Brown, Abdur Rahman Onik, Ibrahim Baggili
2024Chain Links on Wheels: A Security Scheme for IoV Connectivity through Blockchain Integration.
Ibtisam Ehsan, Muhammad Irfan Khalid, Markus Helfert, Mansoor Ahmed
2024Combinatorial Testing Methods for Reverse Engineering Undocumented CAN Bus Functionality.
Christoph Wech, Reinhard Kugler, Manuel Leithner, Dimitris E. Simos
2024Comparative Analysis and Implementation of Jump Address Masking for Preventing TEE Bypassing Fault Attacks.
Shoei Nashimoto, Rei Ueno, Naofumi Homma
2024Comparing Hyperbolic Graph Embedding models on Anomaly Detection for Cybersecurity.
Mohamed Yacine Touahria Miliani, Souhail Abdelmouaiz Sadat, Mohammed Haddad, Hamida Seba, Karima Amrouche
2024Comparison of Multiple Feature Selection Techniques for Machine Learning-Based Detection of IoT Attacks.
Viet Anh Phan, Jan Jerabek, Lukas Malina
2024Compromising anonymity in identity-reserved k-anonymous datasets through aggregate knowledge.
Kevin De Boeck, Jenno Verdonck, Michiel Willocx, Jorn Lapon, Vincent Naessens
2024Confidence-Aware Fault Trees.
Alexander Günther, Sebastian J. Vollmer, Peter Liggesmeyer
2024Continuous Authentication Leveraging Matrix Profile.
Luis Ibañez-Lissen, José María de Fuentes, Lorena González-Manzano, Nicolas Anciaux
2024Create, Read, Update, Delete: Implications on Security and Privacy Principles regarding GDPR.
Michail Pantelelis, Christos Kalloniatis
2024DDS Security+: Enhancing the Data Distribution Service With TPM-based Remote Attestation.
Paul Georg Wagner, Pascal Birnstill, Jürgen Beyerer
2024DECEPTWIN: Proactive Security Approach for IoV by Leveraging Deception-based Digital Twins and Blockchain.
Mubashar Iqbal, Sabah Suhail, Raimundas Matulevicius
2024DealSecAgg: Efficient Dealer-Assisted Secure Aggregation for Federated Learning.
Joshua Stock, Henry Heitmann, Janik Noel Schug, Daniel Demmler
2024Dealing with Bad Apples: Organizational Awareness and Protection for Bit-flip and Typo-Squatting Attacks.
Huancheng Hu, Afshin Zivi, Christian Doerr
2024Deployment of Cybersecurity Controls in the Norwegian Industry 4.0.
Kristian Kannelønning, Sokratis K. Katsikas
2024Detection of AI-Generated Emails - A Case Study.
Pawel Gryka, Kacper T. Gradon, Marek Kozlowski, Milosz Kutyla, Artur Janicki
2024Developing a Call Detail Record Generator for Cultural Heritage Preservation and Theft Mitigation: Applications and Implications.
Robert-Ionut Vatasoiu, Alexandru Vulpe, Robert Florescu, Mari-Anais Sachian, George Suciu
2024Digital Forensic Artifacts of FIDO2 Passkeys in Windows 11.
Patrício Domingues, Miguel Frade, Miguel Negrão
2024DistIN: Analysis and Validation of a Concept and Protocol for Distributed Identity Information Networks.
Michael Hofmeier, Daniela Pöhn, Wolfgang Hommel
2024Don't, Stop, Drop, Pause: Forensics of CONtainer CheckPOINTs (ConPoint).
Taha Gharaibeh, Steven Seiden, Mohamed Abouelsaoud, Elias Bou-Harb, Ibrahim M. Baggili
2024Elevating TARA: A Maturity Model for Automotive Threat Analysis and Risk Assessment.
Manfred Vielberth, Kristina Raab, Magdalena Glas, Patrick Grümer, Günther Pernul
2024EmuFlex: A Flexible OT Testbed for Security Experiments with OPC UA.
Alexander Giehl, Michael P. Heinl, Victor Embacher
2024Enhancing Algorithmic Fairness: Integrative Approaches and Multi-Objective Optimization Application in Recidivism Models.
Michael Mayowa Farayola, Malika Bendechache, Takfarinas Saber, Regina Connolly, Irina Tal
2024Enhancing Cybersecurity Curriculum Development: AI-Driven Mapping and Optimization Techniques.
Petr Dzurenda, Sara Ricci, Marek Sikora, Michal Stejskal, Imre Lendák, Pedro Adão
2024Enhancing Network Security Through Granular Computing: A Clustering-by-Time Approach to NetFlow Traffic Analysis.
Mikolaj Komisarek, Marek Pawlicki, Salvatore D'Antonio, Rafal Kozik, Aleksandra Pawlicka, Michal Choras
2024Enhancing Secure Deployment with Ansible: A Focus on Least Privilege and Automation for Linux.
Eddie Billoir, Romain Laborde, Ahmad Samer Wazan, Yves Rütschlé, Abdelmalek Benzekri
2024Entity Recognition on Border Security.
George Suciu, Mari-Anais Sachian, Razvan-Alexandru Bratulescu, Kejsi Koci, Grigor Parangoni
2024Evaluating Cyber Security Dashboards for Smart Cities and Buildings: Enhancing User Modeling with LLMs.
Hanning Zhao, Bilhanan Silverajan
2024Evaluating Cybersecurity Risk: A Comprehensive Comparison of Vulnerability Scoring Methodologies.
Konstantina Milousi, Prodromos Kiriakidis, Notis Mengidis, Georgios Rizos, Mariana S. Mazi, Antonis Voulgaridis, Konstantinos Votis, Dimitrios Tzovaras
2024Evaluating the impact of contextual information on the performance of intelligent continuous authentication systems.
Pedro Miguel Sánchez Sánchez, Adrián Abenza Cano, Alberto Huertas Celdrán, Gregorio Martínez Pérez
2024Evaluation of Cyber Situation Awareness - Theory, Techniques and Applications.
Georgi Nikolov, Axelle Perez, Wim Mees
2024Event-based Data Collection and Analysis in the Cyber Range Environment.
Willi Lazarov, Samuel Janek, Zdenek Martinasek, Radek Fujdiak
2024Exploring the influence of the choice of prior of the Variational Auto-Encoder on cybersecurity anomaly detection.
Tengfei Yang, Yuansong Qiao, Brian Lee
2024Extracting Randomness from Nucleotide Sequencers for use in a Decentralised Randomness Beacon.
Darren Hurley-Smith, Alastair P. Droop, Remy Lyon, Roxana Teodor
2024FedHE-Graph: Federated Learning with Hybrid Encryption on Graph Neural Networks for Advanced Persistent Threat Detection.
Atmane Ayoub Mansour Bahar, Kamel Soaïd Ferrahi, Mohamed-Lamine Messai, Hamida Seba, Karima Amrouche
2024Forensic Analysis of Artifacts from Microsoft's Multi-Agent LLM Platform AutoGen.
Clinton Walker, Taha Gharaibeh, Ruba Alsmadi, Cory Lloyd Hall, Ibrahim M. Baggili
2024Forensic Investigation of An Android Jellybean-based Car Audio Video Navigation System.
Yejin Yoon, Jeehun Jung, Seong-je Cho, Jongmoo Choi, MinKyu Park, Sangchul Han
2024Forensic Investigation of Humanoid Social Robot: A Case Study on Zenbo Robot.
Farkhund Iqbal, Abdullah Kazim, Áine MacDermott, Richard Ikuesan, Musaab Hasan, Andrew Marrington
2024From Code to EM Signals: A Generative Approach to Side Channel Analysis-based Anomaly Detection.
Kurt A. Vedros, Constantinos Kolias, Daniel Barbará, Robert C. Ivans
2024From Seaweed to Security: Harnessing Alginate to Challenge IoT Fingerprint Authentication.
Pouria Rad, Gokila Dorai, Mohsen M. Jozani
2024Further Insights: Balancing Privacy, Explainability, and Utility in Machine Learning-based Tabular Data Analysis.
Wisam Abbasi, Paolo Mori, Andrea Saracino
2024Future-proofing Secure V2V Communication against Clogging DoS Attacks.
Hongyu Jin, Zhichao Zhou, Panos Papadimitratos
2024GDPR-compliant Video Search and Retrieval System for Surveillance Data.
Amna Shifa, Rónán Kennedy, Mamoona Naveed Asghar
2024GNN-IDS: Graph Neural Network based Intrusion Detection System.
Zhenlu Sun, André M. H. Teixeira, Salman Toor
2024Gateway to the Danger Zone: Secure and Authentic Remote Reset in Machine Safety.
Sebastian N. Peters, Nikolai Puch, Michael P. Heinl, Philipp Zieris, Mykolai Protsenko, Thorsten Larsen-Vefring, Marcel Ely Gomes, Aliza Maftun, Thomas Zeschg
2024Give Me Steam: A Systematic Approach for Handling Stripped Symbols in Memory Forensics of the Steam Deck.
Ruba Alsmadi, Taha Gharaibeh, Andrew M. Webb, Ibrahim M. Baggili
2024Graph-Based Spectral Analysis for Detecting Cyber Attacks.
Majed Jaber, Nicolas Boutry, Pierre Parrend
2024Hardware Trust Anchor Authentication for Updatable IoT Devices.
Dominik Lorych, Christian Plappert
2024HeMate: Enhancing Heap Security through Isolating Primitive Types with Arm Memory Tagging Extension.
Yu-Chang Chen, Shih-Wei Li
2024How to Find out What's Going on in Encrypted Smart Meter Networks - without Decrypting Anything.
Oliver Eigner, Hubert Schölnast, Paul Tavolato
2024How to evade modern web cryptojacking detection tools? A review of practical findings.
Krzysztof Chmiel, Pawel Rajba
2024Identification of industrial devices based on payload.
Ondrej Pospisil, Radek Fujdiak
2024Identity and Access Management Architecture in the SILVANUS Project.
Pawel Rajba, Natan Orzechowski, Karol Rzepka, Przemyslaw Szary, Dawid Nastaj, Krzysztof Cabaj
2024If It Looks Like a Rootkit and Deceives Like a Rootkit: A Critical Examination of Kernel-Level Anti-Cheat Systems.
Christoph Dorner, Lukas Daniel Klausner
2024Image-based detection and classification of Android malware through CNN models.
Alessandro Aldini, Tommaso Petrelli
2024Immutability and non-repudiation in the exchange of key messages within the EU IoT-Edge-Cloud Continuum.
Salvador Cuñat, Raúl Reinosa Simón, Ignacio Lacalle, Carlos Enrique Palau
2024Increasing the Confidence in Security Assurance Cases using Game Theory.
Antonia Welzel, Rebekka Wohlrab, Mazen Mohamad
2024Individual privacy levels in query-based anonymization.
Sascha Schiegg, Florian Strohmeier, Armin Gerl, Harald Kosch
2024Integrating Hyperledger Fabric with Satellite Communications: A Revolutionary Approach for Enhanced Security and Decentralization in Space Networks.
Anastassios Voudouris, Aristeidis Farao, Aggeliki Panou, John Polley, Christos Xenakis
2024Introducing a Multi-Perspective xAI Tool for Better Model Explainability.
Marek Pawlicki, Damian Puchalski, Sebastian Szelest, Aleksandra Pawlicka, Rafal Kozik, Michal Choras
2024Investigating HTTP Covert Channels Through Fuzz Testing.
Kai Hölk, Wojciech Mazurczyk, Marco Zuppelli, Luca Caviglione
2024Is Personalization Worth It? Notifying Blogs about a Privacy Issue Resulting from Poorly Implemented Consent Banners.
Theresa Kriecherbauer, Richard Schwank, Adrian Krauss, Konstantin Neureither, Lian Remme, Melanie Volkamer, Dominik Herrmann
2024Just Rewrite It Again: A Post-Processing Method for Enhanced Semantic Similarity and Privacy Preservation of Differentially Private Rewritten Text.
Stephen Meisenbacher, Florian Matthes
2024Lattice-based Multisignature Optimization for RAM Constrained Devices.
Sara Ricci, Vladyslav Shapoval, Petr Dzurenda, Peter B. Roenne, Jan Oupický, Lukas Malina
2024Let Them Drop: Scalable and Efficient Federated Learning Solutions Agnostic to Stragglers.
Riccardo Taiello, Melek Önen, Clémentine Gritti, Marco Lorenzi
2024Let the Users Choose: Low Latency or Strong Anonymity? Investigating Mix Nodes with Paired Mixing Techniques.
Sarah Abdelwahab Gaballah, Lamya Abdullah, Max Mühlhäuser, Karola Marky
2024Leveraging Overshadowing for Time-Delay Attacks in 4G/5G Cellular Networks: An Empirical Assessment.
Virgil Hamici-Aubert, Julien Saint-Martin, Renzo E. Navas, Georgios Z. Papadopoulos, Guillaume Doyen, Xavier Lagrange
2024Long-Lived Verifiable Credentials: Ensuring Durability Beyond the Issuer's Lifetime.
Ricardo Bochnia, Jürgen Anke
2024Manipulating the Swap Memory for Forensic Investigation.
Maximilian Olbort, Daniel Spiekermann, Jörg Keller
2024Mealy Verifier: An Automated, Exhaustive, and Explainable Methodology for Analyzing State Machines in Protocol Implementations.
Arthur Tran Van, Olivier Levillain, Hervé Debar
2024Modeling Human Error Factors with Security Incidents in Industrial Control Systems: A Bayesian Belief Network Approach.
Pushparaj Bhosale, Wolfgang Kastner, Thilo Sauter
2024Modelling the privacy landscape of the Internet of Vehicles.
Ruben Cacciato, Mario Raciti, Sergio Esposito, Giampaolo Bella
2024Monitor-based Testing of Network Protocol Implementations Using Symbolic Execution.
Hooman Asadian, Paul Fiterau-Brostean, Bengt Jonsson, Konstantinos Sagonas
2024Multimodal Security Mechanisms for Critical Time Systems using blockchain in Chriss project.
Mari-Anais Sachian, George Suciu, Maria Niculae, Adrian Florin Paun, Petrica Ciotirnae, Ivan Horatiu, Cristina Tudor, Robert Florescu
2024NERO: Advanced Cybersecurity Awareness Ecosystem for SMEs.
Charalambos Klitis, Ioannis Makris, Pavlos S. Bouzinis, Dimitrios Christos Asimopoulos, Wissam Mallouli, Kitty Kioskli, Eleni Seralidou, Christos Douligeris, Loizos Christofi
2024NEWSROOM: Towards Automating Cyber Situational Awareness Processes and Tools for Cyber Defence.
Markus Wurzenberger, Stephan Krenn, Max Landauer, Florian Skopik, Cora Lisa Perner, Jarno Lötjönen, Jani Päijänen, Georgios Gardikis, Nikos Alabasis, Liisa Sakerman, Kristiina Omri, Juha Röning, Kimmo Halunen, Vincent Thouvenot, Martin Weise, Andreas Rauber, Vasileios Gkioulos, Sokratis K. Katsikas, Luigi Sabetta, Jacopo Bonato, Rocío Ortíz, Daniel Navarro, Nikolaos Stamatelatos, Ioannis Avdoulas, Rudolf Mayer, Andreas Ekelhart, Ioannis Giannoulakis, Emmanouil Kafetzakis, Antonello Corsi, Ulrike Lechner, Corinna Schmitt
2024NITRO: an Interconnected 5G-IoT Cyber Range.
Aristeidis Farao, Christoforos Ntantogian, Stylianos Karagiannis, Emmanouil Magkos, Alexandra Dritsa, Christos Xenakis
2024NORIA UI: Efficient Incident Management on Large-Scale ICT Systems Represented as Knowledge Graphs.
Lionel Tailhardat, Yoan Chabot, Antoine Py, Perrine Guillemette
2024Natural Language Steganography by ChatGPT.
Martin Steinebach
2024Navigating the landscape of IoT security and associated risks in critical infrastructures.
Andrej Pastorek, Andrea Tundis
2024Network Intrusion Response using Deep Reinforcement Learning in an Aircraft IT-OT Scenario.
Matthew Reaney, Kieran McLaughlin, James Grant
2024No Country for Leaking Containers: Detecting Exfiltration of Secrets Through AI and Syscalls.
Marco Zuppelli, Massimo Guarascio, Luca Caviglione, Angelica Liguori
2024OOBKey: Key Exchange with Implantable Medical Devices Using Out-Of-Band Channels.
Mo Zhang, Eduard Marin, Mark Ryan, Vassilis Kostakos, Toby Murray, Benjamin Tag, David F. Oswald
2024On Implementing Linear Regression on Homomorphically Encrypted Data: A Case-Study.
Gianluca Dini
2024On the Application of Natural Language Processing for Advanced OSINT Analysis in Cyber Defence.
Florian Skopik, Benjamin Akhras, Elisabeth Woisetschläger, Medina Andresel, Markus Wurzenberger, Max Landauer
2024On the Effectiveness of Large Language Models for GitHub Workflows.
Xinyu Zhang, Siddharth Muralee, Sourag Cherupattamoolayil, Aravind Machiry
2024Open V2X Management Platform Cyber-Resilience and Data Privacy Mechanisms.
Alexios Lekidis, Hugo Morais
2024Operation Assessment in cyberspace: Understanding the effects of Cyber Deception.
Salvador Llopis Sánchez, David Lopes Antunes
2024PAKA: Pseudonymous Authenticated Key Agreement without bilinear cryptography.
Raphael Schermann, Simone Bussa, Rainer Urian, Ronald Toegl, Christian Steger
2024PQ-REACT: Post Quantum Cryptography Framework for Energy Aware Contexts.
Marta Irene García Cid, Michail-Alexandros Kourtis, David Domingo Martín, Nikolay Tcholtchev, Evangelos K. Markakis, Marcin Niemiec, Javier Faba, Laura Ortíz, Vicente Martín, Diego R. López, George Xilouris, Maria Gagliardi, José González, Miguel García, Giovanni Comandè, Nikolai Stoianov
2024ParsEval: Evaluation of Parsing Behavior using Real-world Out-in-the-wild X.509 Certificates.
Stefan Tatschner, Sebastian N. Peters, Michael P. Heinl, Tobias Specht, Thomas Newe
2024Privacy Preserving Release of Mobile Sensor Data.
Rahat Masood, Wing Yan Cheng, Dinusha Vatsalan, Deepak Mishra, Hassan Jameel Asghar, Dali Kaafar
2024Proceedings of the 19th International Conference on Availability, Reliability and Security, ARES 2024, Vienna, Austria, 30 July 2024 - 2 August 2024
2024Prov2vec: Learning Provenance Graph Representation for Anomaly Detection in Computer Systems.
Bibek Bhattarai, H. Howie Huang
2024Provably Secure Communication Protocols for Remote Attestation.
Johannes Wilson, Mikael Asplund, Niklas Johansson, Felipe Boeira
2024Proxy Re-Encryption for Enhanced Data Security in Healthcare: A Practical Implementation.
Saber Mhiri, Alfonso Egio, Maxime Compastié, Pablo Cosio
2024Quantum-Resistant and Secure MQTT Communication.
Lukas Malina, Patrik Dobias, Petr Dzurenda, Gautam Srivastava
2024RMF: A Risk Measurement Framework for Machine Learning Models.
Jan Schröder, Jakub Breier
2024Reverse Engineered MiniFS File System.
Dmitrii Belimov, Evgenii Vinogradov
2024Robust and Homomorphic Covert Channels in Streams of Numeric Data.
Jörg Keller, Carina Heßeling, Steffen Wendzel
2024SBOM Ouverture: What We Need and What We Have.
Gregorio Dalia, Corrado Aaron Visaggio, Andrea Di Sorbo, Gerardo Canfora
2024SECL: A Zero-Day Attack Detector and Classifier based on Contrastive Learning and Strong Regularization.
Robin Duraz, David Espes, Julien Francq, Sandrine Vaton
2024SECURA: Unified Reference Architecture for Advanced Security and Trust in Safety Critical Infrastructures.
Michael Eckel, Sigrid Gürgens
2024SOVEREIGN - Towards a Holistic Approach to Critical Infrastructure Protection.
Georg T. Becker, Thomas Eisenbarth, Hannes Federrath, Mathias Fischer, Nils Loose, Simon Ott, Joana Pecholt, Stephan Marwedel, Dominik Meyer, Jan Stijohann, Anum Talpur, Matthias Vallentin
2024SYNAPSE - An Integrated Cyber Security Risk & Resilience Management Platform, With Holistic Situational Awareness, Incident Response & Preparedness Capabilities: SYNAPSE.
Panagiotis Bountakas, Konstantinos Fysarakis, Thomas Kyriakakis, Panagiotis Karafotis, Aristeidis Sotiropoulos, Maria Tasouli, Cristina Alcaraz, George Alexandris, Vassiliki Andronikou, Tzortzia Koutsouri, Romarick Yatagha, George Spanoudakis, Sotiris Ioannidis, Fabio Martinelli, Oleg Illiashenko
2024ScaNeF-IoT: Scalable Network Fingerprinting for IoT Device.
Tadani Nasser Alyahya, Leonardo Aniello, Vladimiro Sassone
2024Secure Noise Sampling for DP in MPC with Finite Precision.
Hannah Keller, Helen Möllering, Thomas Schneider, Oleksandr Tkachenko, Liang Zhao
2024Secure and Privacy-Preserving Car-Sharing Systems.
Lukas Malina, Petr Dzurenda, Norbert Lövinger, Ijeoma Faustina Ekeh, Raimundas Matulevicius
2024Security Analysis of a Decentralized, Revocable and Verifiable Attribute-Based Encryption Scheme.
Thomas Prantl, Marco Lauer, Lukas Horn, Simon Engel, David Dingel, André Bauer, Christian Krupitzer, Samuel Kounev
2024Service Provider Accreditation: Enabling and Enforcing Privacy-by-Design in Credential-based Authentication Systems.
Stefan More, Jakob Heher, Edona Fasllija, Maximilian Mathie
2024Single-image steganalysis in real-world scenarios based on classifier inconsistency detection.
Daniel Lerch-Hostalot, David Megías Jiménez
2024SoK: A Comparison of Autonomous Penetration Testing Agents.
Raphael Simon, Wim Mees
2024SoK: A Taxonomy for Hardware-Based Fingerprinting in the Internet of Things.
Christian Spinnler, Torsten Labs, Norman Franchi
2024SoK: A Unified Data Model for Smart Contract Vulnerability Taxonomies.
Claudia Ruggiero, Pietro Mazzini, Emilio Coppa, Simone Lenti, Silvia Bonomi
2024SoK: Automated Software Testing for TLS Libraries.
Ben Swierzy, Felix Boes, Timo Pohl, Christian Bungartz, Michael Meier
2024SoK: Federated Learning based Network Intrusion Detection in 5G: Context, State of the Art and Challenges.
Sara Chennoufi, Gregory Blanc, Houda Jmila, Christophe Kiennert
2024SoK: How Artificial-Intelligence Incidents Can Jeopardize Safety and Security.
Richard May, Jacob Krüger, Thomas Leich
2024SoK: Visualization-based Malware Detection Techniques.
Matteo Brosolo, Vinod Puthuvath, Asmitha KA, Rafidha Rehiman K. A., Mauro Conti
2024Subjective Logic-based Decentralized Federated Learning for Non-IID Data.
Agnideven Palanisamy Sundar, Feng Li, Xukai Zou, Tianchong Gao
2024Sustainability in Digital Forensics.
Sabrina Friedl, Charlotte Zajewski, Günther Pernul
2024Sybil Attack Strikes Again: Denying Content Access in IPFS with a Single Computer.
Thibault Cholez, Claudia-Lavinia Ignat
2024Systematic Analysis of Label-flipping Attacks against Federated Learning in Collaborative Intrusion Detection Systems.
Léo Lavaur, Yann Busnel, Fabien Autrel
2024Tackling the cybersecurity workforce gap with tailored cybersecurity study programs in Central and Eastern Europe.
Marko Zivanovic, Imre Lendák, Ranko Popovic
2024Telemetry data sharing based on Attribute-Based Encryption schemes for cloud-based Drone Management system.
Alexandr Silonosov, Lawrence Henesey
2024The Cyber Safe Position: An STPA for Safety, Security, and Resilience Co-Engineering Approach.
Georgios Gkoktsis, Ludger Peters
2024The PRECINCT Ecosystem Platform for Critical Infrastructure Protection: Architecture, Deployment and Transferability.
Djibrilla Amadou Kountché, Jocelyn Aubert, Manh-Dung Nguyen, Natalia Kalfa, Nicola Gregorio Durante, Cristiano Passerini, Stéphane Kuding
2024The Right to Be Zero-Knowledge Forgotten.
Ivan Visconti
2024The State of Boot Integrity on Linux - a Brief Review.
Robert Haas, Martin Pirker
2024The Trade-off Between Privacy & Quality for Counterfactual Explanations.
Sjoerd Berning, Vincent Dunning, Dayana Spagnuelo, Thijs Veugen, Jasper van der Waa
2024Threat-TLS: A Tool for Threat Identification in Weak, Malicious, or Suspicious TLS Connections.
Diana Gratiela Berbecaru, Antonio Lioy
2024Timestamp-based Application Fingerprinting in NTFS.
Michael Galhuber, Robert Luh
2024Toward a Log-based Anomaly Detection System for Cyber Range Platforms.
Francesco Blefari, Francesco Aurelio Pironti, Angelo Furfaro
2024Towards 5G Advanced network slice assurance through isolation mechanisms.
Alexios Lekidis
2024Towards Availability of Strong Authentication in Remote and Disruption-Prone Operational Technology Environments.
Mohammad Reza Nosouhi, Zubair A. Baig, Robin Doss, Divyans Mahansaria, Debi Prasad Pati, Praveen Gauravaram, Lei Pan, Keshav Sood
2024Towards Functions for Verifiable Credentials in a 2-Holder Model.
Markus Batz, Sebastian Zickau
2024Towards Post-Quantum Verifiable Credentials.
Tim Wood, Keerthi Thomas, Matthew Dean, Swaminathan Kannan, Robert Learney
2024Towards Reducing Business-Risk of Data Theft Implementing Automated Simulation Procedures of Evil Data Exfiltration.
Michael Mundt, Harald Baier, Antje Raab-Düsterhöft
2024Towards Secure Virtual Elections: Multiparty Computation of Order Based Voting Rules.
Tamir Tassa, Lihi Dery
2024Towards realistic problem-space adversarial attacks against machine learning in network intrusion detection.
Marta Catillo, Antonio Pecchia, Antonio Repola, Umberto Villano
2024Towards the adoption of automated cyber threat intelligence information sharing with integrated risk assessment.
Valeria Valdés Ríos, Fatiha Zaïdi, Ana Rosa Cavalli, Angel Rego
2024Transfer Adversarial Attacks through Approximate Computing.
Valentina Casola, Salvatore Della Torca
2024Trust-minimizing BDHKE-based e-cash mint using secure hardware and distributed computation.
Antonín Dufka, Jakub Janku, Petr Svenda
2024Trustworthiness and explainability of a watermarking and machine learning-based system for image modification detection to combat disinformation.
Andrea Rosales, Agnieszka Malanowska, Tanya Koohpayeh Araghi, Minoru Kuribayashi, Marcin Kowalczyk, Daniel Blanche-Tarragó, Wojciech Mazurczyk, David Megías
2024Trustworthy AI-based Cyber-Attack Detector for Network Cyber Crime Forensics.
Damian Puchalski, Marek Pawlicki, Rafal Kozik, Rafal Renk, Michal Choras
2024Unlocking the Potential of Knowledge Graphs: A Cyber Defense Ontology for a Knowledge Representation and Reasoning System.
José María Jorquera Valero, Antonio López Martínez, Pedro Miguel Sánchez Sánchez, Daniel Navarro-Martínez, Rodrigo Varas López, Javier Ignacio Rojo Lacal, Antonio Lopez Vivar, Marco Antonio Sotelo Monge, Manuel Gil Pérez, Gregorio Martínez Pérez
2024Unveiling Vulnerabilities in Bitcoin's Misbehavior-Score Mechanism: Attack and Defense.
Yuwen Zou, Wenjun Fan, Zhen Ma
2024Unveiling the Darkness: Analysing Organised Crime on the Wall Street Market Darknet Marketplace using PGP Public Keys.
Shiying Fan, Paul Moritz Ranly, Lukas Graner, Inna Vogel, Martin Steinebach
2024Using Artificial Intelligence in Cyber Security Risk Management for Telecom Industry 4.0.
Ijeoma Ebere-Uneze, Syed Naqvi
2024Using DNS Patterns for Automated Cyber Threat Attribution.
Cristoffer Leite, Jerry den Hartog, Daniel Ricardo dos Santos
2024Vulnerability detection tool in source code by building and leveraging semantic code graph.
Sabine Delaître, José Maria Pulgar Gutiérrez
2024Vulnerability management digital twin for energy systems.
Jessica B. Heluany, Johannes Götzfried, Bernhard Mehlig, Vasileios Gkioulos
2024What Johnny thinks about using two-factor authentication on GitHub: A survey among open-source developers.
Agata Kruzikova, Jakub Suchanek, Milan Broz, Martin Ukrop, Vashek Matyas
2024ZW-IDS: Zero-Watermarking-based network Intrusion Detection System using data provenance.
Omair Faraj, David Megías, Joaquín García-Alfaro