| 2019 | "When and Where Do You Want to Hide?" - Recommendation of Location Privacy Preferences with Local Differential Privacy. Maho Asada, Masatoshi Yoshikawa, Yang Cao |
| 2019 | A Distributed Ledger Approach to Digital Twin Secure Data Sharing. Marietheres Dietz, Benedikt Putz, Günther Pernul |
| 2019 | AGBuilder: An AI Tool for Automated Attack Graph Building, Analysis, and Refinement. Bruhadeshwar Bezawada, Indrajit Ray, Kushagra Tiwary |
| 2019 | Adversarial Sampling Attacks Against Phishing Detection. Hossein Shirazi, Bruhadeshwar Bezawada, Indrakshi Ray, Charles Anderson |
| 2019 | Algorithm Diversity for Resilient Systems. Scott D. Stoller, Yanhong A. Liu |
| 2019 | Analysis of Multi-path Onion Routing-Based Anonymization Networks. Wladimir De la Cadena, Daniel Kaiser, Asya Mitseva, Andriy Panchenko, Thomas Engel |
| 2019 | Analysis of Privacy Policies to Enhance Informed Consent. Raúl Pardo, Daniel Le Métayer |
| 2019 | CASFinder: Detecting Common Attack Surface. Mengyuan Zhang, Yue Xin, Lingyu Wang, Sushil Jajodia, Anoop Singhal |
| 2019 | Contributing to Current Challenges in Identity and Access Management with Visual Analytics. Alexander Puchta, Fabian Böhm, Günther Pernul |
| 2019 | Data and Applications Security and Privacy XXXIII - 33rd Annual IFIP WG 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15-17, 2019, Proceedings Simon N. Foley |
| 2019 | Detecting Adversarial Attacks in the Context of Bayesian Networks. Emad Alsuwat, Hatim Alsuwat, John R. Rose, Marco Valtorta, Csilla Farkas |
| 2019 | Droids in Disarray: Detecting Frame Confusion in Hybrid Android Apps. Davide Caputo, Luca Verderame, Simone Aonzo, Alessio Merlo |
| 2019 | Geo-Graph-Indistinguishability: Protecting Location Privacy for LBS over Road Networks. Shun Takagi, Yang Cao, Yasuhito Asano, Masatoshi Yoshikawa |
| 2019 | Is My Phone Listening in? On the Feasibility and Detectability of Mobile Eavesdropping. Jacob Leon Kröger, Philip Raschke |
| 2019 | Lost in TLS? No More! Assisted Deployment of Secure TLS Configurations. Salvatore Manfredi, Silvio Ranise, Giada Sciarretta |
| 2019 | On Practical Aspects of PCFG Password Cracking. Radek Hranický, Filip Listiak, Dávid Mikus, Ondrej Rysavý |
| 2019 | Online Malware Detection in Cloud Auto-scaling Systems Using Shallow Convolutional Neural Networks. Mahmoud Abdelsalam, Ram Krishnan, Ravi S. Sandhu |
| 2019 | Redirecting Malware's Target Selection with Decoy Processes. Sara M. Sutton, Garret Michilli, Julian L. Rrushi |
| 2019 | Refresh Instead of Revoke Enhances Safety and Availability: A Formal Analysis. Mehrnoosh Shakarami, Ravi S. Sandhu |
| 2019 | Shoal: Query Optimization and Operator Placement for Access Controlled Stream Processing Systems. Cory Thoma, Alexandros Labrinidis, Adam J. Lee |
| 2019 | That's My DNA: Detecting Malicious Tampering of Synthesized DNA. Diptendu Mohan Kar, Indrajit Ray |
| 2019 | Wrangling in the Power of Code Pointers with ProxyCFI. Misiker Tadesse Aga, Colton Holoday, Todd M. Austin |