| 2024 | A Blockchain-based Multi-Factor Honeytoken Dynamic Authentication Mechanism. Vassilis Papaspirou, Ioanna Kantzavelou, Yagmur Yigit, Leandros Maglaras, Sokratis K. Katsikas |
| 2024 | A Case Study on the Detection of Hash-Chain-based Covert Channels Using Heuristics and Machine Learning. Jeff Schymiczek, Tobias Schmidbauer, Steffen Wendzel |
| 2024 | A Comprehensive Pattern-based Overview of Stegomalware. Fabian Strachanski, Denis Petrov, Tobias Schmidbauer, Steffen Wendzel |
| 2024 | A Framework Towards Assessing the Resilience of Urban Transport Systems. Gérald Rocher, Jean-Yves Tigli, Stéphane Lavirotte, Nicolas Ferry |
| 2024 | A Framework for In-network Inference using P4. Huu Nghia Nguyen, Manh-Dung Nguyen, Edgardo Montes de Oca |
| 2024 | A Framework for Managing Separation of Duty Policies. Sebastian Groll, Sascha Kern, Ludwig Fuchs, Günther Pernul |
| 2024 | A Large-Scale Study on the Prevalence and Usage of TEE-based Features on Android. Davide Bove |
| 2024 | A Metalanguage for Dynamic Attack Graphs and Lazy Generation. Viktor Engström, Giuseppe Nebbione, Mathias Ekstedt |
| 2024 | A Model-based Approach for Assessing the Security of Cyber-Physical Systems. Hugo Teixeira De Castro, Ahmed Hussain, Gregory Blanc, Jamal El Hachem, Dominique Blouin, Jean Leneutre, Panos Papadimitratos |
| 2024 | A Multi-layer Approach through Threat Modelling and Attack Simulation for Enhanced Cyber Security Assessment. Eider Iturbe, Javier Arcas, Erkuden Rios, Nerea Toledo |
| 2024 | A Privacy Measure Turned Upside Down? Investigating the Use of HTTP Client Hints on the Web. Stephan Wiefling, Marian Hönscheid, Luigi Lo Iacono |
| 2024 | A Quantitative Analysis of Inappropriate Content, Age Rating Compliance, and Risks to Youth on the Whisper Platform. Jeng-Yu Chou, Brian Levine |
| 2024 | A Risk Assessment and Legal Compliance Framework for Supporting Personal Data Sharing with Privacy Preservation for Scientific Research. Christos Baloukas, Lazaros Papadopoulos, Kostas Demestichas, Axel Weissenfeld, Sven Schlarb, Mikel Aramburu, David Redó, Jorge García, Seán Gaines, Thomas Marquenie, Ezgi Eren, Irmak Erdogan Peter |
| 2024 | A SOAR platform for standardizing, automating operational processes and a monitoring service facilitating auditing procedures among IoT trustworthy environments. Vasiliki-Georgia Bilali, Eustratios Magklaris, Dimitrios Kosyvas, Lazaros Karagiannidis, Eleftherios Ouzounoglou, Angelos Amditis |
| 2024 | A Systematic Review of Contemporary Applications of Privacy-Aware Graph Neural Networks in Smart Cities. Jingyan Zhang, Irina Tal |
| 2024 | A Technical Exploration of Strategies for Augmented Monitoring and Decision Support in Information Warfare. Frida Muñoz Plaza, Inés Hernández San Román, Marco Antonio Sotelo Monge |
| 2024 | A Trust and Reputation System for Examining Compliance with Access Control. Thomas Baumer, Johannes Grill, Jacob Adan, Günther Pernul |
| 2024 | A Unified Framework for GDPR Compliance in Cloud Computing. Argyri Pattakou, Vasiliki Diamantopoulou, Christos Kalloniatis, Stefanos Gritzalis |
| 2024 | A Web Browser Plugin for Users' Security Awareness. Thomas Hoad, Erisa Karafili |
| 2024 | A comprehensive evaluation of interrupt measurement techniques for predictability in safety-critical systems. Daniele Lombardi, Mario Barbareschi, Salvatore Barone, Valentina Casola |
| 2024 | A tool for IoT Firmware Certification. Giuseppe Marco Bianco, Luca Ardito, Michele Valsesia |
| 2024 | AI-Powered Penetration Testing using Shennina: From Simulation to Validation. Stylianos Karagiannis, Camilla Fusco, Leonidas Agathos, Wissam Mallouli, Valentina Casola, Christoforos Ntantogian, Emmanouil Magkos |
| 2024 | AI4SOAR: A Security Intelligence Tool for Automated Incident Response. Manh-Dung Nguyen, Wissam Mallouli, Ana Rosa Cavalli, Edgardo Montes de Oca |
| 2024 | AIAS: AI-ASsisted cybersecurity platform to defend against adversarial AI attacks. Georgios Petihakis, Aristeidis Farao, Panagiotis Bountakas, Athanasia Sabazioti, John Polley, Christos Xenakis |
| 2024 | ARGAN-IDS: Adversarial Resistant Intrusion Detection Systems using Generative Adversarial Networks. João Costa, Filipe Apolinário, Carlos Ribeiro |
| 2024 | Acceleration of DICE Key Generation using Key Caching. Dominik Lorych, Lukas Jäger, Andreas Fuchs |
| 2024 | Accuracy Evaluation of SBOM Tools for Web Applications and System-Level Software. Andreas Halbritter, Dominik Merli |
| 2024 | Advanced methods for generalizing time and duration during dataset anonymization. Jenno Verdonck, Kevin De Boeck, Michiel Willocx, Vincent Naessens |
| 2024 | Advancing ESSecA: a step forward in Automated Penetration Testing. Massimiliano Rak, Felice Moretta, Daniele Granata |
| 2024 | Adversary Tactic Driven Scenario and Terrain Generation with Partial Infrastructure Specification. Ádám Ruman, Martin Drasar, Lukás Sadlek, Shanchieh Jay Yang, Pavel Celeda |
| 2024 | Aligning eIDAS and Trust Over IP: A Mapping Approach. Cristian Lepore, Romain Laborde, Jessica Eynard |
| 2024 | An Analysis of Security Concerns in Transitioning Battery Management Systems from First to Second Life. Julian Blümke, Kevin Mayer, Hans-Joachim Hof |
| 2024 | An Exploratory Case Study on Data Breach Journalism. Jukka Ruohonen, Kalle Hjerppe, Maximilian von Zastrow |
| 2024 | An IEC 62443-security oriented domain specific modelling language. Jolahn Vaudey, Stéphane Mocanu, Gwenaël Delaval, Éric Rutten |
| 2024 | An Identity Key Management System with Deterministic Key Hierarchy for SSI-native Internet of Things. Alice Colombatto, Luca Giorgino, Andrea Vesco |
| 2024 | Analysis of the Capability and Training of Chat Bots in the Generation of Rules for Firewall or Intrusion Detection Systems. Bernardo Louro, Raquel Abreu, Joana Cabral Costa, João B. F. Sequeiros, Pedro R. M. Inácio |
| 2024 | Analysis of the Windows Control Flow Guard. Niels Pfau, Patrick Kochberger |
| 2024 | Analyzing Air-traffic Security using GIS-"blur' with Information Flow Control in the IIIf. Florian Kammueller |
| 2024 | Anomaly detection mechanisms for in-vehicle and V2X systems. Alexios Lekidis |
| 2024 | Anomaly-Based Intrusion Detection for Blackhole Attack Mitigation. Ashraf Abdelhamid, Mahmoud Said Elsayed, Heba K. Aslan, Marianne A. Azer |
| 2024 | Are Deepfakes a Game-changer in Digital Images Steganography Leveraging the Cover-Source-Mismatch? Arthur Méreur, Antoine Mallet, Rémi Cogranne |
| 2024 | Article 45 of the eIDAS Directive Unveils the need to implement the X.509 4-cornered trust model for the WebPKI. Ahmad Samer Wazan, Romain Laborde, Abdelmalek Benzekri, Muhammad Imran Taj |
| 2024 | Assessing the Impact of Large Language Models on Cybersecurity Education: A Study of ChatGPT's Influence on Student Performance. Marc Ohm, Christian Bungartz, Felix Boes, Michael Meier |
| 2024 | Assessing the Performance of Ethereum and Hyperledger Fabric Under DDoS Attacks for Cyber-Physical Systems. Vijay Jayadev, Naghmeh Moradpoor, Andrei Petrovski |
| 2024 | Attack Analysis and Detection for the Combined Electric Vehicle Charging and Power Grid Domains. Dustin Kern, Christoph Krauß, Matthias Hollick |
| 2024 | Automated Passport Control: Mining and Checking Models of Machine Readable Travel Documents. Stefan Marksteiner, Marjan Sirjani, Mikael Sjödin |
| 2024 | Automating Side-Channel Testing for Embedded Systems: A Continuous Integration Approach. Philipp Schloyer, Peter Knauer, Bernhard Bauer, Dominik Merli |
| 2024 | Behavioural Modelling for Sustainability in Smart Homes. Luca Ardito |
| 2024 | BenchIMP: A Benchmark for Quantitative Evaluation of the Incident Management Process Assessment. Alessandro Palma, Nicola Bartoloni, Marco Angelini |
| 2024 | Beyond the Bugs: Enhancing Bug Bounty Programs through Academic Partnerships. Andrej Kristofík, Jakub Vostoupal, Kamil Malinka, Frantisek Kasl, Pavel Loutocký |
| 2024 | Blue Skies from (X?s) Pain: A Digital Forensic Analysis of Threads and Bluesky. Joseph Brown, Abdur Rahman Onik, Ibrahim Baggili |
| 2024 | Chain Links on Wheels: A Security Scheme for IoV Connectivity through Blockchain Integration. Ibtisam Ehsan, Muhammad Irfan Khalid, Markus Helfert, Mansoor Ahmed |
| 2024 | Combinatorial Testing Methods for Reverse Engineering Undocumented CAN Bus Functionality. Christoph Wech, Reinhard Kugler, Manuel Leithner, Dimitris E. Simos |
| 2024 | Comparative Analysis and Implementation of Jump Address Masking for Preventing TEE Bypassing Fault Attacks. Shoei Nashimoto, Rei Ueno, Naofumi Homma |
| 2024 | Comparing Hyperbolic Graph Embedding models on Anomaly Detection for Cybersecurity. Mohamed Yacine Touahria Miliani, Souhail Abdelmouaiz Sadat, Mohammed Haddad, Hamida Seba, Karima Amrouche |
| 2024 | Comparison of Multiple Feature Selection Techniques for Machine Learning-Based Detection of IoT Attacks. Viet Anh Phan, Jan Jerabek, Lukas Malina |
| 2024 | Compromising anonymity in identity-reserved k-anonymous datasets through aggregate knowledge. Kevin De Boeck, Jenno Verdonck, Michiel Willocx, Jorn Lapon, Vincent Naessens |
| 2024 | Confidence-Aware Fault Trees. Alexander Günther, Sebastian J. Vollmer, Peter Liggesmeyer |
| 2024 | Continuous Authentication Leveraging Matrix Profile. Luis Ibañez-Lissen, José María de Fuentes, Lorena González-Manzano, Nicolas Anciaux |
| 2024 | Create, Read, Update, Delete: Implications on Security and Privacy Principles regarding GDPR. Michail Pantelelis, Christos Kalloniatis |
| 2024 | DDS Security+: Enhancing the Data Distribution Service With TPM-based Remote Attestation. Paul Georg Wagner, Pascal Birnstill, Jürgen Beyerer |
| 2024 | DECEPTWIN: Proactive Security Approach for IoV by Leveraging Deception-based Digital Twins and Blockchain. Mubashar Iqbal, Sabah Suhail, Raimundas Matulevicius |
| 2024 | DealSecAgg: Efficient Dealer-Assisted Secure Aggregation for Federated Learning. Joshua Stock, Henry Heitmann, Janik Noel Schug, Daniel Demmler |
| 2024 | Dealing with Bad Apples: Organizational Awareness and Protection for Bit-flip and Typo-Squatting Attacks. Huancheng Hu, Afshin Zivi, Christian Doerr |
| 2024 | Deployment of Cybersecurity Controls in the Norwegian Industry 4.0. Kristian Kannelønning, Sokratis K. Katsikas |
| 2024 | Detection of AI-Generated Emails - A Case Study. Pawel Gryka, Kacper T. Gradon, Marek Kozlowski, Milosz Kutyla, Artur Janicki |
| 2024 | Developing a Call Detail Record Generator for Cultural Heritage Preservation and Theft Mitigation: Applications and Implications. Robert-Ionut Vatasoiu, Alexandru Vulpe, Robert Florescu, Mari-Anais Sachian, George Suciu |
| 2024 | Digital Forensic Artifacts of FIDO2 Passkeys in Windows 11. Patrício Domingues, Miguel Frade, Miguel Negrão |
| 2024 | DistIN: Analysis and Validation of a Concept and Protocol for Distributed Identity Information Networks. Michael Hofmeier, Daniela Pöhn, Wolfgang Hommel |
| 2024 | Don't, Stop, Drop, Pause: Forensics of CONtainer CheckPOINTs (ConPoint). Taha Gharaibeh, Steven Seiden, Mohamed Abouelsaoud, Elias Bou-Harb, Ibrahim M. Baggili |
| 2024 | Elevating TARA: A Maturity Model for Automotive Threat Analysis and Risk Assessment. Manfred Vielberth, Kristina Raab, Magdalena Glas, Patrick Grümer, Günther Pernul |
| 2024 | EmuFlex: A Flexible OT Testbed for Security Experiments with OPC UA. Alexander Giehl, Michael P. Heinl, Victor Embacher |
| 2024 | Enhancing Algorithmic Fairness: Integrative Approaches and Multi-Objective Optimization Application in Recidivism Models. Michael Mayowa Farayola, Malika Bendechache, Takfarinas Saber, Regina Connolly, Irina Tal |
| 2024 | Enhancing Cybersecurity Curriculum Development: AI-Driven Mapping and Optimization Techniques. Petr Dzurenda, Sara Ricci, Marek Sikora, Michal Stejskal, Imre Lendák, Pedro Adão |
| 2024 | Enhancing Network Security Through Granular Computing: A Clustering-by-Time Approach to NetFlow Traffic Analysis. Mikolaj Komisarek, Marek Pawlicki, Salvatore D'Antonio, Rafal Kozik, Aleksandra Pawlicka, Michal Choras |
| 2024 | Enhancing Secure Deployment with Ansible: A Focus on Least Privilege and Automation for Linux. Eddie Billoir, Romain Laborde, Ahmad Samer Wazan, Yves Rütschlé, Abdelmalek Benzekri |
| 2024 | Entity Recognition on Border Security. George Suciu, Mari-Anais Sachian, Razvan-Alexandru Bratulescu, Kejsi Koci, Grigor Parangoni |
| 2024 | Evaluating Cyber Security Dashboards for Smart Cities and Buildings: Enhancing User Modeling with LLMs. Hanning Zhao, Bilhanan Silverajan |
| 2024 | Evaluating Cybersecurity Risk: A Comprehensive Comparison of Vulnerability Scoring Methodologies. Konstantina Milousi, Prodromos Kiriakidis, Notis Mengidis, Georgios Rizos, Mariana S. Mazi, Antonis Voulgaridis, Konstantinos Votis, Dimitrios Tzovaras |
| 2024 | Evaluating the impact of contextual information on the performance of intelligent continuous authentication systems. Pedro Miguel Sánchez Sánchez, Adrián Abenza Cano, Alberto Huertas Celdrán, Gregorio Martínez Pérez |
| 2024 | Evaluation of Cyber Situation Awareness - Theory, Techniques and Applications. Georgi Nikolov, Axelle Perez, Wim Mees |
| 2024 | Event-based Data Collection and Analysis in the Cyber Range Environment. Willi Lazarov, Samuel Janek, Zdenek Martinasek, Radek Fujdiak |
| 2024 | Exploring the influence of the choice of prior of the Variational Auto-Encoder on cybersecurity anomaly detection. Tengfei Yang, Yuansong Qiao, Brian Lee |
| 2024 | Extracting Randomness from Nucleotide Sequencers for use in a Decentralised Randomness Beacon. Darren Hurley-Smith, Alastair P. Droop, Remy Lyon, Roxana Teodor |
| 2024 | FedHE-Graph: Federated Learning with Hybrid Encryption on Graph Neural Networks for Advanced Persistent Threat Detection. Atmane Ayoub Mansour Bahar, Kamel Soaïd Ferrahi, Mohamed-Lamine Messai, Hamida Seba, Karima Amrouche |
| 2024 | Forensic Analysis of Artifacts from Microsoft's Multi-Agent LLM Platform AutoGen. Clinton Walker, Taha Gharaibeh, Ruba Alsmadi, Cory Lloyd Hall, Ibrahim M. Baggili |
| 2024 | Forensic Investigation of An Android Jellybean-based Car Audio Video Navigation System. Yejin Yoon, Jeehun Jung, Seong-je Cho, Jongmoo Choi, MinKyu Park, Sangchul Han |
| 2024 | Forensic Investigation of Humanoid Social Robot: A Case Study on Zenbo Robot. Farkhund Iqbal, Abdullah Kazim, Áine MacDermott, Richard Ikuesan, Musaab Hasan, Andrew Marrington |
| 2024 | From Code to EM Signals: A Generative Approach to Side Channel Analysis-based Anomaly Detection. Kurt A. Vedros, Constantinos Kolias, Daniel Barbará, Robert C. Ivans |
| 2024 | From Seaweed to Security: Harnessing Alginate to Challenge IoT Fingerprint Authentication. Pouria Rad, Gokila Dorai, Mohsen M. Jozani |
| 2024 | Further Insights: Balancing Privacy, Explainability, and Utility in Machine Learning-based Tabular Data Analysis. Wisam Abbasi, Paolo Mori, Andrea Saracino |
| 2024 | Future-proofing Secure V2V Communication against Clogging DoS Attacks. Hongyu Jin, Zhichao Zhou, Panos Papadimitratos |
| 2024 | GDPR-compliant Video Search and Retrieval System for Surveillance Data. Amna Shifa, Rónán Kennedy, Mamoona Naveed Asghar |
| 2024 | GNN-IDS: Graph Neural Network based Intrusion Detection System. Zhenlu Sun, André M. H. Teixeira, Salman Toor |
| 2024 | Gateway to the Danger Zone: Secure and Authentic Remote Reset in Machine Safety. Sebastian N. Peters, Nikolai Puch, Michael P. Heinl, Philipp Zieris, Mykolai Protsenko, Thorsten Larsen-Vefring, Marcel Ely Gomes, Aliza Maftun, Thomas Zeschg |
| 2024 | Give Me Steam: A Systematic Approach for Handling Stripped Symbols in Memory Forensics of the Steam Deck. Ruba Alsmadi, Taha Gharaibeh, Andrew M. Webb, Ibrahim M. Baggili |
| 2024 | Graph-Based Spectral Analysis for Detecting Cyber Attacks. Majed Jaber, Nicolas Boutry, Pierre Parrend |
| 2024 | Hardware Trust Anchor Authentication for Updatable IoT Devices. Dominik Lorych, Christian Plappert |
| 2024 | HeMate: Enhancing Heap Security through Isolating Primitive Types with Arm Memory Tagging Extension. Yu-Chang Chen, Shih-Wei Li |
| 2024 | How to Find out What's Going on in Encrypted Smart Meter Networks - without Decrypting Anything. Oliver Eigner, Hubert Schölnast, Paul Tavolato |
| 2024 | How to evade modern web cryptojacking detection tools? A review of practical findings. Krzysztof Chmiel, Pawel Rajba |
| 2024 | Identification of industrial devices based on payload. Ondrej Pospisil, Radek Fujdiak |
| 2024 | Identity and Access Management Architecture in the SILVANUS Project. Pawel Rajba, Natan Orzechowski, Karol Rzepka, Przemyslaw Szary, Dawid Nastaj, Krzysztof Cabaj |
| 2024 | If It Looks Like a Rootkit and Deceives Like a Rootkit: A Critical Examination of Kernel-Level Anti-Cheat Systems. Christoph Dorner, Lukas Daniel Klausner |
| 2024 | Image-based detection and classification of Android malware through CNN models. Alessandro Aldini, Tommaso Petrelli |
| 2024 | Immutability and non-repudiation in the exchange of key messages within the EU IoT-Edge-Cloud Continuum. Salvador Cuñat, Raúl Reinosa Simón, Ignacio Lacalle, Carlos Enrique Palau |
| 2024 | Increasing the Confidence in Security Assurance Cases using Game Theory. Antonia Welzel, Rebekka Wohlrab, Mazen Mohamad |
| 2024 | Individual privacy levels in query-based anonymization. Sascha Schiegg, Florian Strohmeier, Armin Gerl, Harald Kosch |
| 2024 | Integrating Hyperledger Fabric with Satellite Communications: A Revolutionary Approach for Enhanced Security and Decentralization in Space Networks. Anastassios Voudouris, Aristeidis Farao, Aggeliki Panou, John Polley, Christos Xenakis |
| 2024 | Introducing a Multi-Perspective xAI Tool for Better Model Explainability. Marek Pawlicki, Damian Puchalski, Sebastian Szelest, Aleksandra Pawlicka, Rafal Kozik, Michal Choras |
| 2024 | Investigating HTTP Covert Channels Through Fuzz Testing. Kai Hölk, Wojciech Mazurczyk, Marco Zuppelli, Luca Caviglione |
| 2024 | Is Personalization Worth It? Notifying Blogs about a Privacy Issue Resulting from Poorly Implemented Consent Banners. Theresa Kriecherbauer, Richard Schwank, Adrian Krauss, Konstantin Neureither, Lian Remme, Melanie Volkamer, Dominik Herrmann |
| 2024 | Just Rewrite It Again: A Post-Processing Method for Enhanced Semantic Similarity and Privacy Preservation of Differentially Private Rewritten Text. Stephen Meisenbacher, Florian Matthes |
| 2024 | Lattice-based Multisignature Optimization for RAM Constrained Devices. Sara Ricci, Vladyslav Shapoval, Petr Dzurenda, Peter B. Roenne, Jan Oupický, Lukas Malina |
| 2024 | Let Them Drop: Scalable and Efficient Federated Learning Solutions Agnostic to Stragglers. Riccardo Taiello, Melek Önen, Clémentine Gritti, Marco Lorenzi |
| 2024 | Let the Users Choose: Low Latency or Strong Anonymity? Investigating Mix Nodes with Paired Mixing Techniques. Sarah Abdelwahab Gaballah, Lamya Abdullah, Max Mühlhäuser, Karola Marky |
| 2024 | Leveraging Overshadowing for Time-Delay Attacks in 4G/5G Cellular Networks: An Empirical Assessment. Virgil Hamici-Aubert, Julien Saint-Martin, Renzo E. Navas, Georgios Z. Papadopoulos, Guillaume Doyen, Xavier Lagrange |
| 2024 | Long-Lived Verifiable Credentials: Ensuring Durability Beyond the Issuer's Lifetime. Ricardo Bochnia, Jürgen Anke |
| 2024 | Manipulating the Swap Memory for Forensic Investigation. Maximilian Olbort, Daniel Spiekermann, Jörg Keller |
| 2024 | Mealy Verifier: An Automated, Exhaustive, and Explainable Methodology for Analyzing State Machines in Protocol Implementations. Arthur Tran Van, Olivier Levillain, Hervé Debar |
| 2024 | Modeling Human Error Factors with Security Incidents in Industrial Control Systems: A Bayesian Belief Network Approach. Pushparaj Bhosale, Wolfgang Kastner, Thilo Sauter |
| 2024 | Modelling the privacy landscape of the Internet of Vehicles. Ruben Cacciato, Mario Raciti, Sergio Esposito, Giampaolo Bella |
| 2024 | Monitor-based Testing of Network Protocol Implementations Using Symbolic Execution. Hooman Asadian, Paul Fiterau-Brostean, Bengt Jonsson, Konstantinos Sagonas |
| 2024 | Multimodal Security Mechanisms for Critical Time Systems using blockchain in Chriss project. Mari-Anais Sachian, George Suciu, Maria Niculae, Adrian Florin Paun, Petrica Ciotirnae, Ivan Horatiu, Cristina Tudor, Robert Florescu |
| 2024 | NERO: Advanced Cybersecurity Awareness Ecosystem for SMEs. Charalambos Klitis, Ioannis Makris, Pavlos S. Bouzinis, Dimitrios Christos Asimopoulos, Wissam Mallouli, Kitty Kioskli, Eleni Seralidou, Christos Douligeris, Loizos Christofi |
| 2024 | NEWSROOM: Towards Automating Cyber Situational Awareness Processes and Tools for Cyber Defence. Markus Wurzenberger, Stephan Krenn, Max Landauer, Florian Skopik, Cora Lisa Perner, Jarno Lötjönen, Jani Päijänen, Georgios Gardikis, Nikos Alabasis, Liisa Sakerman, Kristiina Omri, Juha Röning, Kimmo Halunen, Vincent Thouvenot, Martin Weise, Andreas Rauber, Vasileios Gkioulos, Sokratis K. Katsikas, Luigi Sabetta, Jacopo Bonato, Rocío Ortíz, Daniel Navarro, Nikolaos Stamatelatos, Ioannis Avdoulas, Rudolf Mayer, Andreas Ekelhart, Ioannis Giannoulakis, Emmanouil Kafetzakis, Antonello Corsi, Ulrike Lechner, Corinna Schmitt |
| 2024 | NITRO: an Interconnected 5G-IoT Cyber Range. Aristeidis Farao, Christoforos Ntantogian, Stylianos Karagiannis, Emmanouil Magkos, Alexandra Dritsa, Christos Xenakis |
| 2024 | NORIA UI: Efficient Incident Management on Large-Scale ICT Systems Represented as Knowledge Graphs. Lionel Tailhardat, Yoan Chabot, Antoine Py, Perrine Guillemette |
| 2024 | Natural Language Steganography by ChatGPT. Martin Steinebach |
| 2024 | Navigating the landscape of IoT security and associated risks in critical infrastructures. Andrej Pastorek, Andrea Tundis |
| 2024 | Network Intrusion Response using Deep Reinforcement Learning in an Aircraft IT-OT Scenario. Matthew Reaney, Kieran McLaughlin, James Grant |
| 2024 | No Country for Leaking Containers: Detecting Exfiltration of Secrets Through AI and Syscalls. Marco Zuppelli, Massimo Guarascio, Luca Caviglione, Angelica Liguori |
| 2024 | OOBKey: Key Exchange with Implantable Medical Devices Using Out-Of-Band Channels. Mo Zhang, Eduard Marin, Mark Ryan, Vassilis Kostakos, Toby Murray, Benjamin Tag, David F. Oswald |
| 2024 | On Implementing Linear Regression on Homomorphically Encrypted Data: A Case-Study. Gianluca Dini |
| 2024 | On the Application of Natural Language Processing for Advanced OSINT Analysis in Cyber Defence. Florian Skopik, Benjamin Akhras, Elisabeth Woisetschläger, Medina Andresel, Markus Wurzenberger, Max Landauer |
| 2024 | On the Effectiveness of Large Language Models for GitHub Workflows. Xinyu Zhang, Siddharth Muralee, Sourag Cherupattamoolayil, Aravind Machiry |
| 2024 | Open V2X Management Platform Cyber-Resilience and Data Privacy Mechanisms. Alexios Lekidis, Hugo Morais |
| 2024 | Operation Assessment in cyberspace: Understanding the effects of Cyber Deception. Salvador Llopis Sánchez, David Lopes Antunes |
| 2024 | PAKA: Pseudonymous Authenticated Key Agreement without bilinear cryptography. Raphael Schermann, Simone Bussa, Rainer Urian, Ronald Toegl, Christian Steger |
| 2024 | PQ-REACT: Post Quantum Cryptography Framework for Energy Aware Contexts. Marta Irene García Cid, Michail-Alexandros Kourtis, David Domingo Martín, Nikolay Tcholtchev, Evangelos K. Markakis, Marcin Niemiec, Javier Faba, Laura Ortíz, Vicente Martín, Diego R. López, George Xilouris, Maria Gagliardi, José González, Miguel García, Giovanni Comandè, Nikolai Stoianov |
| 2024 | ParsEval: Evaluation of Parsing Behavior using Real-world Out-in-the-wild X.509 Certificates. Stefan Tatschner, Sebastian N. Peters, Michael P. Heinl, Tobias Specht, Thomas Newe |
| 2024 | Privacy Preserving Release of Mobile Sensor Data. Rahat Masood, Wing Yan Cheng, Dinusha Vatsalan, Deepak Mishra, Hassan Jameel Asghar, Dali Kaafar |
| 2024 | Proceedings of the 19th International Conference on Availability, Reliability and Security, ARES 2024, Vienna, Austria, 30 July 2024 - 2 August 2024 |
| 2024 | Prov2vec: Learning Provenance Graph Representation for Anomaly Detection in Computer Systems. Bibek Bhattarai, H. Howie Huang |
| 2024 | Provably Secure Communication Protocols for Remote Attestation. Johannes Wilson, Mikael Asplund, Niklas Johansson, Felipe Boeira |
| 2024 | Proxy Re-Encryption for Enhanced Data Security in Healthcare: A Practical Implementation. Saber Mhiri, Alfonso Egio, Maxime Compastié, Pablo Cosio |
| 2024 | Quantum-Resistant and Secure MQTT Communication. Lukas Malina, Patrik Dobias, Petr Dzurenda, Gautam Srivastava |
| 2024 | RMF: A Risk Measurement Framework for Machine Learning Models. Jan Schröder, Jakub Breier |
| 2024 | Reverse Engineered MiniFS File System. Dmitrii Belimov, Evgenii Vinogradov |
| 2024 | Robust and Homomorphic Covert Channels in Streams of Numeric Data. Jörg Keller, Carina Heßeling, Steffen Wendzel |
| 2024 | SBOM Ouverture: What We Need and What We Have. Gregorio Dalia, Corrado Aaron Visaggio, Andrea Di Sorbo, Gerardo Canfora |
| 2024 | SECL: A Zero-Day Attack Detector and Classifier based on Contrastive Learning and Strong Regularization. Robin Duraz, David Espes, Julien Francq, Sandrine Vaton |
| 2024 | SECURA: Unified Reference Architecture for Advanced Security and Trust in Safety Critical Infrastructures. Michael Eckel, Sigrid Gürgens |
| 2024 | SOVEREIGN - Towards a Holistic Approach to Critical Infrastructure Protection. Georg T. Becker, Thomas Eisenbarth, Hannes Federrath, Mathias Fischer, Nils Loose, Simon Ott, Joana Pecholt, Stephan Marwedel, Dominik Meyer, Jan Stijohann, Anum Talpur, Matthias Vallentin |
| 2024 | SYNAPSE - An Integrated Cyber Security Risk & Resilience Management Platform, With Holistic Situational Awareness, Incident Response & Preparedness Capabilities: SYNAPSE. Panagiotis Bountakas, Konstantinos Fysarakis, Thomas Kyriakakis, Panagiotis Karafotis, Aristeidis Sotiropoulos, Maria Tasouli, Cristina Alcaraz, George Alexandris, Vassiliki Andronikou, Tzortzia Koutsouri, Romarick Yatagha, George Spanoudakis, Sotiris Ioannidis, Fabio Martinelli, Oleg Illiashenko |
| 2024 | ScaNeF-IoT: Scalable Network Fingerprinting for IoT Device. Tadani Nasser Alyahya, Leonardo Aniello, Vladimiro Sassone |
| 2024 | Secure Noise Sampling for DP in MPC with Finite Precision. Hannah Keller, Helen Möllering, Thomas Schneider, Oleksandr Tkachenko, Liang Zhao |
| 2024 | Secure and Privacy-Preserving Car-Sharing Systems. Lukas Malina, Petr Dzurenda, Norbert Lövinger, Ijeoma Faustina Ekeh, Raimundas Matulevicius |
| 2024 | Security Analysis of a Decentralized, Revocable and Verifiable Attribute-Based Encryption Scheme. Thomas Prantl, Marco Lauer, Lukas Horn, Simon Engel, David Dingel, André Bauer, Christian Krupitzer, Samuel Kounev |
| 2024 | Service Provider Accreditation: Enabling and Enforcing Privacy-by-Design in Credential-based Authentication Systems. Stefan More, Jakob Heher, Edona Fasllija, Maximilian Mathie |
| 2024 | Single-image steganalysis in real-world scenarios based on classifier inconsistency detection. Daniel Lerch-Hostalot, David Megías Jiménez |
| 2024 | SoK: A Comparison of Autonomous Penetration Testing Agents. Raphael Simon, Wim Mees |
| 2024 | SoK: A Taxonomy for Hardware-Based Fingerprinting in the Internet of Things. Christian Spinnler, Torsten Labs, Norman Franchi |
| 2024 | SoK: A Unified Data Model for Smart Contract Vulnerability Taxonomies. Claudia Ruggiero, Pietro Mazzini, Emilio Coppa, Simone Lenti, Silvia Bonomi |
| 2024 | SoK: Automated Software Testing for TLS Libraries. Ben Swierzy, Felix Boes, Timo Pohl, Christian Bungartz, Michael Meier |
| 2024 | SoK: Federated Learning based Network Intrusion Detection in 5G: Context, State of the Art and Challenges. Sara Chennoufi, Gregory Blanc, Houda Jmila, Christophe Kiennert |
| 2024 | SoK: How Artificial-Intelligence Incidents Can Jeopardize Safety and Security. Richard May, Jacob Krüger, Thomas Leich |
| 2024 | SoK: Visualization-based Malware Detection Techniques. Matteo Brosolo, Vinod Puthuvath, Asmitha KA, Rafidha Rehiman K. A., Mauro Conti |
| 2024 | Subjective Logic-based Decentralized Federated Learning for Non-IID Data. Agnideven Palanisamy Sundar, Feng Li, Xukai Zou, Tianchong Gao |
| 2024 | Sustainability in Digital Forensics. Sabrina Friedl, Charlotte Zajewski, Günther Pernul |
| 2024 | Sybil Attack Strikes Again: Denying Content Access in IPFS with a Single Computer. Thibault Cholez, Claudia-Lavinia Ignat |
| 2024 | Systematic Analysis of Label-flipping Attacks against Federated Learning in Collaborative Intrusion Detection Systems. Léo Lavaur, Yann Busnel, Fabien Autrel |
| 2024 | Tackling the cybersecurity workforce gap with tailored cybersecurity study programs in Central and Eastern Europe. Marko Zivanovic, Imre Lendák, Ranko Popovic |
| 2024 | Telemetry data sharing based on Attribute-Based Encryption schemes for cloud-based Drone Management system. Alexandr Silonosov, Lawrence Henesey |
| 2024 | The Cyber Safe Position: An STPA for Safety, Security, and Resilience Co-Engineering Approach. Georgios Gkoktsis, Ludger Peters |
| 2024 | The PRECINCT Ecosystem Platform for Critical Infrastructure Protection: Architecture, Deployment and Transferability. Djibrilla Amadou Kountché, Jocelyn Aubert, Manh-Dung Nguyen, Natalia Kalfa, Nicola Gregorio Durante, Cristiano Passerini, Stéphane Kuding |
| 2024 | The Right to Be Zero-Knowledge Forgotten. Ivan Visconti |
| 2024 | The State of Boot Integrity on Linux - a Brief Review. Robert Haas, Martin Pirker |
| 2024 | The Trade-off Between Privacy & Quality for Counterfactual Explanations. Sjoerd Berning, Vincent Dunning, Dayana Spagnuelo, Thijs Veugen, Jasper van der Waa |
| 2024 | Threat-TLS: A Tool for Threat Identification in Weak, Malicious, or Suspicious TLS Connections. Diana Gratiela Berbecaru, Antonio Lioy |
| 2024 | Timestamp-based Application Fingerprinting in NTFS. Michael Galhuber, Robert Luh |
| 2024 | Toward a Log-based Anomaly Detection System for Cyber Range Platforms. Francesco Blefari, Francesco Aurelio Pironti, Angelo Furfaro |
| 2024 | Towards 5G Advanced network slice assurance through isolation mechanisms. Alexios Lekidis |
| 2024 | Towards Availability of Strong Authentication in Remote and Disruption-Prone Operational Technology Environments. Mohammad Reza Nosouhi, Zubair A. Baig, Robin Doss, Divyans Mahansaria, Debi Prasad Pati, Praveen Gauravaram, Lei Pan, Keshav Sood |
| 2024 | Towards Functions for Verifiable Credentials in a 2-Holder Model. Markus Batz, Sebastian Zickau |
| 2024 | Towards Post-Quantum Verifiable Credentials. Tim Wood, Keerthi Thomas, Matthew Dean, Swaminathan Kannan, Robert Learney |
| 2024 | Towards Reducing Business-Risk of Data Theft Implementing Automated Simulation Procedures of Evil Data Exfiltration. Michael Mundt, Harald Baier, Antje Raab-Düsterhöft |
| 2024 | Towards Secure Virtual Elections: Multiparty Computation of Order Based Voting Rules. Tamir Tassa, Lihi Dery |
| 2024 | Towards realistic problem-space adversarial attacks against machine learning in network intrusion detection. Marta Catillo, Antonio Pecchia, Antonio Repola, Umberto Villano |
| 2024 | Towards the adoption of automated cyber threat intelligence information sharing with integrated risk assessment. Valeria Valdés Ríos, Fatiha Zaïdi, Ana Rosa Cavalli, Angel Rego |
| 2024 | Transfer Adversarial Attacks through Approximate Computing. Valentina Casola, Salvatore Della Torca |
| 2024 | Trust-minimizing BDHKE-based e-cash mint using secure hardware and distributed computation. Antonín Dufka, Jakub Janku, Petr Svenda |
| 2024 | Trustworthiness and explainability of a watermarking and machine learning-based system for image modification detection to combat disinformation. Andrea Rosales, Agnieszka Malanowska, Tanya Koohpayeh Araghi, Minoru Kuribayashi, Marcin Kowalczyk, Daniel Blanche-Tarragó, Wojciech Mazurczyk, David Megías |
| 2024 | Trustworthy AI-based Cyber-Attack Detector for Network Cyber Crime Forensics. Damian Puchalski, Marek Pawlicki, Rafal Kozik, Rafal Renk, Michal Choras |
| 2024 | Unlocking the Potential of Knowledge Graphs: A Cyber Defense Ontology for a Knowledge Representation and Reasoning System. José María Jorquera Valero, Antonio López Martínez, Pedro Miguel Sánchez Sánchez, Daniel Navarro-Martínez, Rodrigo Varas López, Javier Ignacio Rojo Lacal, Antonio Lopez Vivar, Marco Antonio Sotelo Monge, Manuel Gil Pérez, Gregorio Martínez Pérez |
| 2024 | Unveiling Vulnerabilities in Bitcoin's Misbehavior-Score Mechanism: Attack and Defense. Yuwen Zou, Wenjun Fan, Zhen Ma |
| 2024 | Unveiling the Darkness: Analysing Organised Crime on the Wall Street Market Darknet Marketplace using PGP Public Keys. Shiying Fan, Paul Moritz Ranly, Lukas Graner, Inna Vogel, Martin Steinebach |
| 2024 | Using Artificial Intelligence in Cyber Security Risk Management for Telecom Industry 4.0. Ijeoma Ebere-Uneze, Syed Naqvi |
| 2024 | Using DNS Patterns for Automated Cyber Threat Attribution. Cristoffer Leite, Jerry den Hartog, Daniel Ricardo dos Santos |
| 2024 | Vulnerability detection tool in source code by building and leveraging semantic code graph. Sabine Delaître, José Maria Pulgar Gutiérrez |
| 2024 | Vulnerability management digital twin for energy systems. Jessica B. Heluany, Johannes Götzfried, Bernhard Mehlig, Vasileios Gkioulos |
| 2024 | What Johnny thinks about using two-factor authentication on GitHub: A survey among open-source developers. Agata Kruzikova, Jakub Suchanek, Milan Broz, Martin Ukrop, Vashek Matyas |
| 2024 | ZW-IDS: Zero-Watermarking-based network Intrusion Detection System using data provenance. Omair Faraj, David Megías, Joaquín García-Alfaro |