DBSec B

22 papers

YearTitle / Authors
2019"When and Where Do You Want to Hide?" - Recommendation of Location Privacy Preferences with Local Differential Privacy.
Maho Asada, Masatoshi Yoshikawa, Yang Cao
2019A Distributed Ledger Approach to Digital Twin Secure Data Sharing.
Marietheres Dietz, Benedikt Putz, Günther Pernul
2019AGBuilder: An AI Tool for Automated Attack Graph Building, Analysis, and Refinement.
Bruhadeshwar Bezawada, Indrajit Ray, Kushagra Tiwary
2019Adversarial Sampling Attacks Against Phishing Detection.
Hossein Shirazi, Bruhadeshwar Bezawada, Indrakshi Ray, Charles Anderson
2019Algorithm Diversity for Resilient Systems.
Scott D. Stoller, Yanhong A. Liu
2019Analysis of Multi-path Onion Routing-Based Anonymization Networks.
Wladimir De la Cadena, Daniel Kaiser, Asya Mitseva, Andriy Panchenko, Thomas Engel
2019Analysis of Privacy Policies to Enhance Informed Consent.
Raúl Pardo, Daniel Le Métayer
2019CASFinder: Detecting Common Attack Surface.
Mengyuan Zhang, Yue Xin, Lingyu Wang, Sushil Jajodia, Anoop Singhal
2019Contributing to Current Challenges in Identity and Access Management with Visual Analytics.
Alexander Puchta, Fabian Böhm, Günther Pernul
2019Data and Applications Security and Privacy XXXIII - 33rd Annual IFIP WG 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15-17, 2019, Proceedings
Simon N. Foley
2019Detecting Adversarial Attacks in the Context of Bayesian Networks.
Emad Alsuwat, Hatim Alsuwat, John R. Rose, Marco Valtorta, Csilla Farkas
2019Droids in Disarray: Detecting Frame Confusion in Hybrid Android Apps.
Davide Caputo, Luca Verderame, Simone Aonzo, Alessio Merlo
2019Geo-Graph-Indistinguishability: Protecting Location Privacy for LBS over Road Networks.
Shun Takagi, Yang Cao, Yasuhito Asano, Masatoshi Yoshikawa
2019Is My Phone Listening in? On the Feasibility and Detectability of Mobile Eavesdropping.
Jacob Leon Kröger, Philip Raschke
2019Lost in TLS? No More! Assisted Deployment of Secure TLS Configurations.
Salvatore Manfredi, Silvio Ranise, Giada Sciarretta
2019On Practical Aspects of PCFG Password Cracking.
Radek Hranický, Filip Listiak, Dávid Mikus, Ondrej Rysavý
2019Online Malware Detection in Cloud Auto-scaling Systems Using Shallow Convolutional Neural Networks.
Mahmoud Abdelsalam, Ram Krishnan, Ravi S. Sandhu
2019Redirecting Malware's Target Selection with Decoy Processes.
Sara M. Sutton, Garret Michilli, Julian L. Rrushi
2019Refresh Instead of Revoke Enhances Safety and Availability: A Formal Analysis.
Mehrnoosh Shakarami, Ravi S. Sandhu
2019Shoal: Query Optimization and Operator Placement for Access Controlled Stream Processing Systems.
Cory Thoma, Alexandros Labrinidis, Adam J. Lee
2019That's My DNA: Detecting Malicious Tampering of Synthesized DNA.
Diptendu Mohan Kar, Indrajit Ray
2019Wrangling in the Power of Code Pointers with ProxyCFI.
Misiker Tadesse Aga, Colton Holoday, Todd M. Austin