| 2021 | A Dynamic Access Control System based on Situations of Users. Hirokazu Hasegawa, Hiroki Takakura |
| 2021 | A Lemon by Any Other Label. Vaibhav Garg |
| 2021 | A New Dataset for Smartphone Gesture-based Authentication. Elliu Huang, Fabio Di Troia, Mark Stamp, Preethi Sundaravaradhan |
| 2021 | A Novel Simplified Framework to Secure IoT Communications. Sairath Bhattacharjya, Hossein Saiedian |
| 2021 | A Permissioned Blockchain-based System for Collaborative Drug Discovery. Christoffer Olsson, Mohsen Toorani |
| 2021 | A Protection against the Extraction of Neural Network Models. Hervé Chabanne, Vincent Despiegel, Linda Guiga |
| 2021 | A Secure Network Scanner Architecture for Asset Management in Strongly Segmented ICS Networks. Matthias Niedermaier, Thomas Hanka, Florian Fischer, Dominik Merli |
| 2021 | A State Saturation Attack against Massively Multiplayer Online Videogames. Blake D. Bryant, Hossein Saiedian |
| 2021 | Accessible Cyber Security: The Next Frontier? Karen Renaud |
| 2021 | Active Directory Kerberoasting Attack: Detection using Machine Learning Techniques. Lukás Kotlaba, Simona Buchovecká, Róbert Lórencz |
| 2021 | Admonita: A Recommendation-based Trust Model for Dynamic Data Integrity. Wassnaa Al-Mawee, Steve Carr, Jean Mayo |
| 2021 | Adversarial Machine Learning: A Comparative Study on Contemporary Intrusion Detection Datasets. Yulexis Pacheco, Weiqing Sun |
| 2021 | An Analytic Attack against ARX Addition Exploiting Standard Side-channel Leakage. Yan Yan, Elisabeth Oswald, Srinivas Vivek |
| 2021 | An Asynchronous Federated Learning Approach for a Security Source Code Scanner. Sabrina Kall, Slim Trabelsi |
| 2021 | An Overview of Cryptographic Accumulators. Ilker Özçelik, Sai Medury, Justin T. Broaddus, Anthony Skjellum |
| 2021 | Automated Black Box Detection of HTTP GET Request-based Access Control Vulnerabilities in Web Applications. Malte Kushnir, Olivier Favre, Marc Rennhard, Damiano Esposito, Valentin Zahnd |
| 2021 | Automatic Detection and Decryption of AES by Monitoring S-Box Access. Josef Kokes, Jonatan Matejka, Róbert Lórencz |
| 2021 | Automatic Detection of Cyber Security Events from Turkish Twitter Stream and Newspaper Data. Özgür Ural, Cengiz Acartürk |
| 2021 | Automatically Extracting Business Level Access Control Requirements from BPMN Models to Align RBAC Policies. Roman Pilipchuk, Robert Heinrich, Ralf H. Reussner |
| 2021 | Blockchain based Secured Virtual Machine Image Monitor. Srijita Basu, Sandip Karmakar, Debasish Bera |
| 2021 | Bridging Knowledge Gaps in Security Analytics. Fabian Böhm, Manfred Vielberth, Günther Pernul |
| 2021 | Canopy: A Learning-based Approach for Automatic Low-and-Slow DDoS Mitigation. Lucas Cadalzo, Christopher H. Todd, Banjo Obayomi, W. Brad Moore, Anthony C. Wong |
| 2021 | Checking Contact Tracing App Implementations. Robert Flood, Sheung Shi Chan, Wei Chen, David Aspinall |
| 2021 | Colluding Covert Channel for Malicious Information Exfiltration in Android Environment. Rosangela Casolare, Fabio Martinelli, Francesco Mercaldo, Antonella Santone |
| 2021 | Continuous Authentication based on Hand Micro-movement during Smartphone Form Filling by Seated Human Subjects. Aratrika Ray, Daqing Hou, Stephanie Schuckers, Abbie Barbir |
| 2021 | CyExec*: Automatic Generation of Randomized Cyber Range Scenarios. Ryotaro Nakata, Akira Otsuka |
| 2021 | DLP-Visor: A Hypervisor-based Data Leakage Prevention System. Guy Amit, Amir Yeshooroon, Michael Kiperberg, Nezer J. Zaidenberg |
| 2021 | Detecting Cyber Security Attacks against a Microservices Application using Distributed Tracing. Stephen Jacob, Yuansong Qiao, Brian Lee |
| 2021 | Developing Cyber-risk Centric Courses and Training Material for Cyber Ranges: A Systematic Approach. Gencer Erdogan, Antonio Álvarez Romero, Niccolò Zazzeri, Anze Zitnik, Mariano Basile, Giorgio Aprile, Mafalda Osório, Claudia Pani, Ioannis Kechaoglou |
| 2021 | Dreaming of Keys: Introducing the Phantom Gradient Attack. Åvald Åslaugson Sommervoll |
| 2021 | Efficient Semantic Representation of Network Access Control Configuration for Ontology-based Security Analysis. Florian Patzer, Jürgen Beyerer |
| 2021 | Enabling Monetization of Depreciating Data on Blockchains. Christian Dahdah, Coline Van Leeuwen, Ziad Kheil, Jérôme Lacan, Jonathan Detchart, Thibault Gateau |
| 2021 | Enhanced Information Management in Inter-organisational Planning for Critical Infrastructure Protection: Case and Framework. Christine Große |
| 2021 | Evaluation of Vulnerability Reproducibility in Container-based Cyber Range. Ryotaro Nakata, Akira Otsuka |
| 2021 | Experiences and Recommendations from Operating a Tor Exit Node at a University. Michael Sonntag, René Mayrhofer |
| 2021 | Experimental Evaluation of Description Logic Concept Learning Algorithms for Static Malware Detection. Peter Svec, Stefan Balogh, Martin Homola |
| 2021 | Field Studies on the Impact of Cryptographic Signatures and Encryption on Phishing Emails. Stefanie Pham, Matthias Schopp, Lars Stiemert, Sebastian Seeber, Daniela Pöhn, Wolfgang Hommel |
| 2021 | From Exposed to Exploited: Drawing the Picture of Industrial Control Systems Security Status in the Internet Age. Yixiong Wu, Jianwei Zhuge, Tingting Yin, Tianyi Li, Junmin Zhu, Guannan Guo, Yue Liu, Jianju Hu |
| 2021 | How to Improve the GDPR Compliance through Consent Management and Access Control. Said Daoudagh, Eda Marchetti, Vincenzo Savarino, Roberto Di Bernardo, Marco Alessi |
| 2021 | Hydra: Practical Metadata Security for Contact Discovery, Messaging, and Dialing. David Schatz, Michael Rossberg, Guenter Schaefer |
| 2021 | HyperPass: Secure Password Input Platform. Michael Kiperberg, Nezer J. Zaidenberg |
| 2021 | Implementation of Secondary Available Digital Content Protection Schemes using Identity-based Signatures. Nozomi Nagashima, Masaki Inamura, Keiichi Iwamura |
| 2021 | Implementing Secure Applications Thanks to an Integrated Secure Element. Sylvain Guilley, Michel Le Rolland, Damien Quenson |
| 2021 | Improvement of Secure Multi-Party Multiplication of (k, n) Threshold Secret Sharing Using Only N = k Servers. Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura |
| 2021 | Improving Classification of Malware Families using Learning a Distance Metric. Martin Jurecek, Olha Jurecková, Róbert Lórencz |
| 2021 | Learning from Smartphone Location Data as Anomaly Detection for Behavioral Authentication through Deep Neuroevolution. Mhd Irvan, Tran Phuong Thao, Ryosuke Kobayashi, Toshiyuki Nakata, Rie Shigetomi Yamaguchi |
| 2021 | Leveraging Dynamic Information for Identity and Access Management: An Extension of Current Enterprise IAM Architecture. Alexander Puchta, Sebastian Groll, Günther Pernul |
| 2021 | Linking Biometric Voice Identity with Self-monitoring Health Data as a Temporal-spatial Event Stored in a Mobile Device. Bon Sy |
| 2021 | MADLIRA: A Tool for Android Malware Detection. Khanh-Huu-The Dam, Tayssir Touili |
| 2021 | Malware Classification using Long Short-term Memory Models. Dennis Dang, Fabio Di Troia, Mark Stamp |
| 2021 | Malware Classification with GMM-HMM Models. Jing Zhao, Samanvitha Basole, Mark Stamp |
| 2021 | Malware Classification with Word Embedding Features. Aparna Sunil Kale, Fabio Di Troia, Mark Stamp |
| 2021 | Mobile Robots: An Overview of Data and Security. Esmeralda Kadena, Huu Phuoc Dai Nguyen, Lourdes Ruiz |
| 2021 | Model-based Threat and Risk Assessment for Systems Design. Avi Shaked, Yoram Reich |
| 2021 | New Directions for High-throughput and High-security Communication. Adrian Perrig |
| 2021 | On Formalising and Analysing the Tweetchain Protocol. Mariapia Raimondo, Simona Bernardi, Stefano Marrone |
| 2021 | On Security Analysis of Periodic Systems: Expressiveness and Complexity. Musab A. Alturki, Tajana Ban Kirigin, Max I. Kanovich, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott |
| 2021 | Ontology-based Cybersecurity and Resilience Framework. Helmar Hutschenreuter, Salva Daneshgadeh Çakmakçi, Christian Maeder, Thomas Kemmerich |
| 2021 | Optimizing Leak Detection in Open-source Platforms with Machine Learning Techniques. Sofiane Lounici, Marco Rosa, Carlo Maria Negri, Slim Trabelsi, Melek Önen |
| 2021 | Parallel Privacy-preserving Computation of Minimum Spanning Trees. Mohammad Anagreh, Eero Vainikko, Peeter Laud |
| 2021 | Practical and Provably Sound Static Analysis of Ethereum Smart Contracts. Matteo Maffei |
| 2021 | Predicting Security Program Effectiveness in Bring-Your-Own-Device Deployment in Organizations. Alexander O. Akande, Vu N. Tran |
| 2021 | Privacy Preserving Services for Intelligent Transportation Systems with Homomorphic Encryption. Aymen Boudguiga, Oana Stan, Abdessamad Fazzat, Houda Labiod, Pierre-Emmanuel Clet |
| 2021 | Proceedings of the 7th International Conference on Information Systems Security and Privacy, ICISSP 2021, Online Streaming, February 11-13, 2021. Paolo Mori, Gabriele Lenzini, Steven Furnell |
| 2021 | Profiling and Discriminating of Containerized ML Applications in Digital Data Marketplaces (DDM). Lu Zhang, Reginald Cushing, Ralph Koning, Cees de Laat, Paola Grosso |
| 2021 | Protecting Privacy during a Pandemic Outbreak. Karsten Martiny, Linda Briesemeister, Grit Denker, Mark F. St. John, Ron Moore |
| 2021 | Release-aware In-out Encryption Adjustment in MongoDB Query Processing. Maryam Almarwani, Boris Konev, Alexei Lisitsa |
| 2021 | Remote WebAuthn: FIDO2 Authentication for Less Accessible Devices. Paul Wagner, Kris Heid, Jens Heider |
| 2021 | Representation of PE Files using LSTM Networks. Martin Jurecek, Matous Kozák |
| 2021 | Securing Orchestrated Containers with BSI Module SYS.1.6. Christoph Haar, Erik Buchmann |
| 2021 | Securing the Linux Boot Process: From Start to Finish. Jakob Hagl, Oliver Mann, Martin Pirker |
| 2021 | Security Property Modeling. Hiba Hnaini, Luka Le Roux, Joël Champeau, Ciprian Teodorov |
| 2021 | Sociocultural Influences for Password Definition: An AI-based Study. Carlos Ocanto Dávila, Rocío Cabrera Lozoya, Slim Trabelsi |
| 2021 | Stopping DNS Rebinding Attacks in the Browser. Mohammadreza Hazhirpasand, Arash Ale Ebrahim, Oscar Nierstrasz |
| 2021 | Study of Intra- and Inter-user Variance in Password Keystroke Dynamics. Blaine Ayotte, Mahesh K. Banavar, Daqing Hou, Stephanie Schuckers |
| 2021 | The Comparison of Word Embedding Techniques in RNNs for Vulnerability Detection. Hai Ngoc Nguyen, Songpon Teerakanok, Atsuo Inomata, Tetsutaro Uehara |
| 2021 | The Proposal of Double Agent Architecture using Actor-critic Algorithm for Penetration Testing. Hoang Viet Nguyen, Songpon Teerakanok, Atsuo Inomata, Tetsutaro Uehara |
| 2021 | Towards Academic and Skills Credentialing Standards and Distributed Ledger Technologies. Morné Pretorius, Nelisiwe Dlamini, Sthembile Mthethwa |
| 2021 | Towards Collaborative Cyber Threat Intelligence for Security Management. Oleksii Osliak, Andrea Saracino, Fabio Martinelli, Theo Dimitrakos |
| 2021 | Towards Exploring User Perception of a Privacy Sensitive Information Detection Tool. Vanessa Bracamonte, Welderufael B. Tesfay, Shinsaku Kiyomoto |
| 2021 | Towards Formal Security Verification of Over-the-Air Update Protocol: Requirements, Survey and UpKit Case Study. Christophe Ponsard, Denis Darquennes |
| 2021 | Towards a Formalisation of Expert's Knowledge for an Automatic Construction of a Vulnerability Model of a Cyberphysical System. Witold Klaudel, Artur Rataj |
| 2021 | Towards an Ontology for Enterprise Level Information Security Policy Analysis. Debashis Mandal, Chandan Mazumdar |
| 2021 | Two Stage Anomaly Detection for Network Intrusion Detection. Helmut Neuschmied, Martin Winter, Katharina Hofer-Schmitz, Branka Stojanovic, Ulrike Kleb |
| 2021 | Unconventional Attack against Voting Machines Enlarging the Scope of Cybersecurity Risk Analysis. Eric Filiol |
| 2021 | Understanding How People Weigh the Costs and Benefits of using Facebook. Jack McClary, Sid Stamm |
| 2021 | Utilizing Keystroke Dynamics as Additional Security Measure to Protect Account Recovery Mechanism. Ahmed Anu Wahab, Daqing Hou, Stephanie Schuckers, Abbie Barbir |
| 2021 | Who Stores the Private Key? An Exploratory Study about User Preferences of Key Management for Blockchain-based Applications. Clemens Brunner, Günther Eibl, Peter Fröhlich, Andreas Sackl, Dominik Engel |
| 2021 | Windows Malware Binaries in C/C++ GitHub Repositories: Prevalence and Lessons Learned. William La Cholter, Matthew Elder, Antonius Q. Stalick |