| 2024 | A Graph-Based Framework for ABAC Policy Enforcement and Analysis. Mian Yang, Vijayalakshmi Atluri, Shamik Sural, Jaideep Vaidya |
| 2024 | A Privacy-Preserving Graph Encryption Scheme Based on Oblivious RAM. Seyni Kane, Anis Bkakria |
| 2024 | ALERT: A Framework for Efficient Extraction of Attack Techniques from Cyber Threat Intelligence Reports Using Active Learning. Fariha Ishrat Rahman, Sadaf Md. Halim, Anoop Singhal, Latifur Khan |
| 2024 | Adaptive Image Adversarial Example Detection Based on Class Activation Mapping. Xiujuan Wang, Qipeng Li, Shuaibing Lu |
| 2024 | All Your LLMs Belong to Us: Experiments with a New Extortion Phishing Dataset. Fatima Zahra Qachfar, Rakesh M. Verma |
| 2024 | DT-Anon: Decision Tree Target-Driven Anonymization. Sabrina De Capitani di Vimercati, Sara Foresti, Valerio Ghirimoldi, Pierangela Samarati |
| 2024 | Data and Applications Security and Privacy XXXVIII - 38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15-17, 2024, Proceedings Anna Lisa Ferrara, Ram Krishnan |
| 2024 | Does Differential Privacy Prevent Backdoor Attacks in Practice? Fereshteh Razmi, Jian Lou, Li Xiong |
| 2024 | Enhancing EV Charging Station Security Using a Multi-dimensional Dataset: CICEVSE2024. Emmanuel Dana Buedi, Ali A. Ghorbani, Sajjad Dadkhah, Raphael Ferreira |
| 2024 | Ensuring End-to-End IoT Data Security and Privacy Through Cloud-Enhanced Confidential Computing. Md Shihabul Islam, Mahmoud Zamani, Kevin W. Hamlen, Latifur Khan, Murat Kantarcioglu |
| 2024 | From Play to Profession: A Serious Game to Raise Awareness on Digital Forensics. Sabrina Friedl, Tobias Reittinger, Günther Pernul |
| 2024 | Human Digital Twins: Efficient Privacy-Preserving Access Control Through Views Pre-materialisation. Giorgia Sirigu, Barbara Carminati, Elena Ferrari |
| 2024 | IAM Meets CTI: Make Identity and Access Management Ready for Cyber Threat Intelligence. Alexander Puchta, Thomas Baumer, Mathis Müller, Günther Pernul |
| 2024 | Incentivized Federated Learning with Local Differential Privacy Using Permissioned Blockchains. Saptarshi De Chaudhury, Likhith Reddy, Matta Varun, Tirthankar Sengupta, Sandip Chakraborty, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri |
| 2024 | Optimal Automated Generation of Playbooks. Kéren Saint-Hilaire, Christopher Neal, Frédéric Cuppens, Nora Boulahia-Cuppens, Makhlouf Hadji |
| 2024 | Resiliency Analysis of Mission-Critical System of Systems Using Formal Methods. Mahmoud Abdelgawad, Indrakshi Ray |
| 2024 | SmartSSD-Accelerated Cryptographic Shuffling for Enhancing Database Security. Tieming Geng, Chin-Tser Huang |
| 2024 | Towards Atomicity and Composability in Cross-Chain NFTs. Yong Zhi Lim, Wen Qing Ong Perry, Jianying Zhou |
| 2024 | User Perceptions of CAPTCHAs: University vs. Internet Users. Arun Reddy, Yuan Cheng |
| 2024 | Visor: Privacy-Preserving Reputation for Decentralized Marketplaces. Tassos Dimitriou |
| 2024 | VulPrompt: Prompt-Based Vulnerability Detection Using Few-Shot Graph Learning. Saquib Irtiza, Xiaodi Li, Mahmoud Zamani, Latifur Khan, Kevin W. Hamlen |