| 2020 | A Comparison of Blockchain-based PKI Implementations. Clemens Brunner, Fabian Knirsch, Andreas Unterweger, Dominik Engel |
| 2020 | A Curious Exploration of Malicious PDF Documents. Julian Lindenhofer, Rene Offenthaler, Martin Pirker |
| 2020 | A Domain-specific Modeling Framework for Attack Surface Modeling. Tithnara Nicolas Sun, Bastien Drouot, Fahad Rafique Golra, Joël Champeau, Sylvain Guérin, Luka Le Roux, Raúl Mazo, Ciprian Teodorov, Lionel Van Aertryck, Bernard L'Hostis |
| 2020 | A Formal Approach for the Analysis of the XRP Ledger Consensus Protocol. Lara Mauri, Stelvio Cimato, Ernesto Damiani |
| 2020 | A Homomorphic Proxy Re-authenticators based Efficient Multi-client Non-interactive Verifiable Computation Scheme. Shuaijianni Xu, Liang Feng Zhang |
| 2020 | A Meta Model for a Comprehensive Description of Network Protocols Improving Security Tests. Steffen Pfrang, David Meier, Andreas Fleig, Jürgen Beyerer |
| 2020 | A Practical Approach to Stakeholder-driven Determination of Security Requirements based on the GDPR and Common Criteria. Sandra Domenique Zinsmaier, Hanno Langweg, Marcel Waldvogel |
| 2020 | A Quantitative Study of Vulnerabilities in the Internet of Medical Things. Hervé Debar, Razvan Beuran, Yasuo Tan |
| 2020 | A Study of Classification of Texts into Categories of Cybersecurity Incident and Attack with Topic Models. Masahiro Ishii, Satoshi Matsuura, Kento Mori, Masahiko Tomoishi, Yong Jin, Yoshiaki Kitaguchi |
| 2020 | A Systematic Approach toward Extracting Technically Enforceable Policies from Data Usage Control Requirements. Arghavan Hosseinzadeh, Andreas Eitel, Christian Jung |
| 2020 | AMNESIA: A Technical Solution towards GDPR-compliant Machine Learning. Christoph Stach, Corinna Giebler, Manuela Wagner, Christian Weber, Bernhard Mitschang |
| 2020 | Accidental Sensitive Data Leaks Prevention via Formal Verification. Madalina G. Ciobanu, Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone |
| 2020 | Accountant: Protection of Data Integrity and Identification of Malicious Nodes in In-network Data Processing. David Jost, Mathias Fischer |
| 2020 | Achieving Privacy, Security, and Interoperability among Biometric Networks using Symmetric Encryption. Eduardo Magalhães De Lacerda Filho, Vinícius P. Gonçalves |
| 2020 | Active Directory Kerberoasting Attack: Monitoring and Detection Techniques. Lukás Kotlaba, Simona Buchovecká, Róbert Lórencz |
| 2020 | An Analytical Scanning Technique to Detect and Prevent the Transformed SQL Injection and XSS Attacks. Mohammad Qbea'h, Saed Alrabaee, Djedjiga Mouheb |
| 2020 | An Approach to Secure Legacy Software Systems. Stefanie Jasser, Jonas Kelbert |
| 2020 | Analysis of Security Attacks in Wireless Sensor Networks: From UPPAAL to Castalia. Cinzia Bernardeschi, Gianluca Dini, Maurizio Palmieri, Francesco Racciatti |
| 2020 | Android Run-time Permission Exploitation User Awareness by Means of Formal Methods. Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone |
| 2020 | Anomaly Detection in Communication Networks of Cyber-physical Systems using Cross-over Data Compression. Hubert Schölnast, Paul Tavolato, Philipp Kreimel |
| 2020 | Assessing Testing Strategies for Access Control Systems: A Controlled Experiment. Said Daoudagh, Francesca Lonetti, Eda Marchetti |
| 2020 | Backdooring Deep Learning Architectures: Threats and (some) Opportunities. Mauro Barni |
| 2020 | Bank Credit Risk Management based on Data Mining Techniques. Fabio Martinelli, Francesco Mercaldo, Domenico Raucci, Antonella Santone |
| 2020 | Bident Structure for Neural Network Model Protection. Hsiao-Ying Lin, Chengfang Fang, Jie Shi |
| 2020 | Building Competitive Advantage from Ubuntu: An African Information Security Awareness Model. Tapiwa Gundu, Nthabiseng Modiba |
| 2020 | CCA Secure Unidirectional PRE with Key Pair in the Standard Model without Pairings. Anass Sbai, Cyril Drocourt, Gilles Dequen |
| 2020 | CoProtect: Collaborative Management of Cryptographic Keys for Data Security in Cloud Systems. Lorenzo Bracciale, Pierpaolo Loreti, Emanuele Raso, Maurizio Naldi, Giuseppe Bianchi |
| 2020 | CoRA: A Scalable Collective Remote Attestation Protocol for Sensor Networks. Aïda Diop, Maryline Laurent, Jean Leneutre, Jacques Traoré |
| 2020 | Comparing Machine Learning Techniques for Malware Detection. Joanna Moubarak, Tony Feghali |
| 2020 | Comparison of the Paillier and ElGamal Cryptosystems for Smart Grid Aggregation Protocols. Fabian Knirsch, Andreas Unterweger, Maximilian Unterrainer, Dominik Engel |
| 2020 | Computer Viruses: The Abstract Theory Revisited. Nikolai Gladychev |
| 2020 | Detection of Crawler Traps: Formalization and Implementation Defeating Protection on Internet and on the TOR Network. Maxence Delong, Baptiste David, Eric Filiol |
| 2020 | Distance Metric Learning using Particle Swarm Optimization to Improve Static Malware Detection. Martin Jurecek, Róbert Lórencz |
| 2020 | Distributed Defence of Service (DiDoS): A Network-layer Reputation-based DDoS Mitigation Architecture. Andikan Otung, Andrew P. Martin |
| 2020 | Dual-use Research in Ransomware Attacks: A Discussion on Ransomware Defence Intelligence. Ziya Alper Genç, Gabriele Lenzini |
| 2020 | Email Image Spam Classification based on ResNet Convolutional Neural Network. Vít Listík, Jan Sedivý, Václav Hlavác |
| 2020 | Email Spoofing Attack Detection through an End to End Authorship Attribution System. Giacomo Giorgi, Andrea Saracino, Fabio Martinelli |
| 2020 | Evaluating the Effect of Justification and Confidence Information on User Perception of a Privacy Policy Summarization Tool. Vanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay, Shinsaku Kiyomoto |
| 2020 | Evaluation to Classify Ransomware Variants based on Correlations between APIs. Jiaxing Zhou, Miyuki Hirose, Yoshio Kakizaki, Atsuo Inomata |
| 2020 | Exploring Vulnerabilities in Solidity Smart Contract. Phitchayaphong Tantikul, Sudsanguan Ngamsuriyaroj |
| 2020 | External Contextual Factors in Information Security Behaviour. Dirk Snyman, Hennie A. Kruger |
| 2020 | Greater Control and Transparency in Personal Data Processing. Giray Havur, Miel Vander Sande, Sabrina Kirrane |
| 2020 | Harmonized Group Mix for ITS. Mirja Nitschke, Christian Roth, Christian Hoyer, Dogan Kesdogan |
| 2020 | Homomorphic Encryption at Work for Private Analysis of Security Logs. Aymen Boudguiga, Oana Stan, Hichem Sedjelmaci, Sergiu Carpov |
| 2020 | Host Fingerprinting for Web Servers Authentication. Ezio Lefons, Sebastiano Pizzutilo, Filippo Tangorra |
| 2020 | Improving Accuracy and Speed of Network-based Intrusion Detection using Gradient Boosting Trees. Ryosuke Terado, Morihiro Hayashida |
| 2020 | Integration of Data Envelopment Analysis in Business Process Models: A Novel Approach to Measure Information Security. Agnes Åkerlund, Christine Große |
| 2020 | Introducing a Verified Authenticated Key Exchange Protocol over Voice Channels for Secure Voice Communication. Piotr Krasnowski, Jérôme Lebrun, Bruno Martin |
| 2020 | Is Ethereum's ProgPoW ASIC Resistant? Jason Orender, Ravi Mukkamala, Mohammad Zubair |
| 2020 | Legislation and the Negative Impact on Cybersecurity in Healthcare. Jesse Daniels, Sajal Bhatia |
| 2020 | Leveraging Blockchain Technology to Enhance Security and Privacy in the Internet of Things. Sokratis K. Katsikas |
| 2020 | Lightweight Authentication and Secure Communication Suitable for IoT Devices. Simona Buchovecká, Róbert Lórencz, Jirí Bucek, Filip Kodýtek |
| 2020 | Maturity Modelling to Prepare for Cyber Crisis Escalation and Management. Grethe Østby, Basel Katt |
| 2020 | MedBIoT: Generation of an IoT Botnet Dataset in a Medium-sized IoT Network. Alejandro Guerra-Manzanares, Jorge Medina-Galindo, Hayretdin Bahsi, Sven Nõmm |
| 2020 | Methodology and Feedback about Systematic Cybersecurity Experts Auditing in Belgium. Christophe Ponsard, Jeremy Grandclaudon, Nicolas Point |
| 2020 | Modeling Cyber Threat Intelligence. Siri Bromander, Morton Swimmer, Martin Eian, Geir Skjøtskift, Fredrik Borg |
| 2020 | Multi-level Distributed Intrusion Detection System for an IoT based Smart Home Environment. Simone Facchini, Giacomo Giorgi, Andrea Saracino, Gianluca Dini |
| 2020 | Neural Network Security: Hiding CNN Parameters with Guided Grad-CAM. Linda Guiga, A. W. Roscoe |
| 2020 | New General Secret Sharing Scheme using Hierarchical Threshold Scheme: Improvement of Information Rates for Specified Participants. Kouya Tochikubo |
| 2020 | On Analyzing Third-party Tracking via Machine Learning. Alfonso Guarino, Delfina Malandrino, Rocco Zaccagnino, Federico Cozza, Antonio Rapuano |
| 2020 | Ontology-based Automation of Penetration Testing. Ge Chu, Alexei Lisitsa |
| 2020 | Patients to Mobilize Their Data: Secure and Flexible mHealth Delegation. Rafael Almeida, Pedro Vieira-Marques, Ana Ferreira |
| 2020 | Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach. Orestis Christou, Nikolaos Pitropakis, Pavlos Papadopoulos, Sean McKeown, William J. Buchanan |
| 2020 | Presence Metadata in the Internet of Things: Challenges and Opportunities. Robert Hegarty, John Haggerty |
| 2020 | Privacy with Health Information Technologies: What Story Do Data Breaches in US Tell Us? Sylvestre Uwizeyemungu, Placide Poba-Nzaou |
| 2020 | Privacy-preserving Measures in Smart City Video Surveillance Systems. Shizra Sultan, Christian Damsgaard Jensen |
| 2020 | Privacy-preserving Surveillance Methods using Homomorphic Encryption. William Bowditch, Will Abramson, William J. Buchanan, Nikolaos Pitropakis, Adam J. Hall |
| 2020 | Proceedings of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, Valletta, Malta, February 25-27, 2020. Steven Furnell, Paolo Mori, Edgar R. Weippl, Olivier Camp |
| 2020 | Quantifying the Significance of Cybersecurity Text through Semantic Similarity and Named Entity Recognition. Otgonpurev Mendsaikhan, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada |
| 2020 | Radical Text Detection based on Stylometry. Álvaro de Pablo, Oscar Araque, Carlos Angel Iglesias |
| 2020 | Recommender Systems Robust to Data Poisoning using Trim Learning. Seira Hidano, Shinsaku Kiyomoto |
| 2020 | Revisiting Higher-order Computational Attacks against White-box Implementations. Houssem Maghrebi, Davide Alessio |
| 2020 | Revisiting Privacy-aware Blockchain Public Key Infrastructure. Paul Plessing, Olamide Omolola |
| 2020 | Risk Identification: From Requirements to Threat Models. Roman Wirtz, Maritta Heisel |
| 2020 | Secrecy and Authenticity Properties of the Lightning Network Protocol. Hans Hüttel, Vilim Staroveski |
| 2020 | Secure Comparison and Interval Test Protocols based on Three-party MPC. Wataru Fujii, Keiichi Iwamura, Masaki Inamura |
| 2020 | Secure Ownership Transfer for the Internet of Things. Martin Gunnarsson, Christian Gehrmann |
| 2020 | Securing Industrial Production from Sophisticated Cyberattacks. Andrew Sundstrom, Damas W. Limoge, Vadim Pinskiy, Matthew Putman |
| 2020 | Securing IoT Devices using Geographic and Continuous Login Blocking: A Honeypot Study. Fredrik Heiding, Mohammad-Ali Omer, Andreas Wallström, Robert Lagerström |
| 2020 | Security and Privacy in Smart Grids: Challenges, Current Solutions and Future Opportunities. Ismail Butun, Alexios Lekidis, Daniel Ricardo dos Santos |
| 2020 | Security of Digital Banking Systems in Poland: Users Study 2019. Wojciech Wodo, Damian Stygar |
| 2020 | Speeding Up the Computation of Elliptic Curve Scalar Multiplication based on CRT and DRM. Mohammad Anagreh, Eero Vainikko, Peeter Laud |
| 2020 | Systematization of Threats and Requirements for Private Messaging with Untrusted Servers: The Case of e-Mailing and Instant Messaging. Iraklis Symeonidis, Gabriele Lenzini |
| 2020 | The Blockchain Potential in Computer Virology. Joanna Moubarak, Eric Filiol, Maroun Chamoun |
| 2020 | The Root Causes of Compromised Accounts at the University. Philip Nyblom, Gaute Wangen, Mazaher Kianpour, Grethe Østby |
| 2020 | Threat Modeling and Attack Simulations of Smart Cities: A Literature Review and Explorative Study. Robert Lagerström, Wenjun Xiong, Mathias Ekstedt |
| 2020 | Tool Support for Risk-driven Planning of Trustworthy Smart IoT Systems within DevOps. Andreas Thompson, Gencer Erdogan |
| 2020 | Toward Active and Passive Confidentiality Attacks on Cryptocurrency Off-chain Networks. Utz Nisslmueller, Klaus-Tycho Foerster, Stefan Schmid, Christian Decker |
| 2020 | Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification. Christian Colombo, Mark Vella |
| 2020 | Track Down Identity Leaks using Threat Intelligence. Timo Malderle, Sven Knauer, Martin Lang, Matthias Wübbeling, Michael Meier |
| 2020 | Translating Data Protection into Software Requirements. Ralf Kneuper |
| 2020 | Using Eyetracker to Find Ways to Mitigate Ransomware. Budi Arief, Andy Periam, Orçun Çetin, Julio C. Hernandez-Castro |
| 2020 | Verifying Sanitizer Correctness through Black-Box Learning: A Symbolic Finite Transducer Approach. Sophie Lathouwers, Maarten H. Everts, Marieke Huisman |
| 2020 | Visualizing Syscalls using Self-organizing Maps for System Intrusion Detection. Max Landauer, Florian Skopik, Markus Wurzenberger, Wolfgang Hotwagner, Andreas Rauber |