| 2022 | "Fake News Detector": An Automatic System for the Reliability Evaluation of Digital News. Claudio Cilli, Giulio Magnanini, Lorenzo Manduca, Fabrizio Venettoni |
| 2022 | A Fast and Cost-effective Design for FPGA-based Fuzzy Rainbow Tradeoffs. Leonardo Veronese, Francesco Palmarini, Riccardo Focardi, Flaminia L. Luccio |
| 2022 | A Novel Key Exchange Protocol using Logic Algebra for the Factorization Problem. Junhui Xiao, Ashish Neupane, Hiba F. Fayoumi, Weiqing Sun |
| 2022 | A Privacy-Preserving Auction Platform with Public Verifiability for Smart Manufacturing. Thomas Lorünser, Florian Wohner, Stephan Krenn |
| 2022 | A Tailored Model for Cyber Security Education Utilizing a Cyber Range. Gregor Langner, Florian Skopik, Steven Furnell, Gerald Quirchmayr |
| 2022 | Age Bias in Finger Vein Biometric Research. Joanne L. Hall, Jomin John, Jessica Liebig, Anju Skariah |
| 2022 | An Analysis of Cloud Certifications' Performance on Privacy Protections. Tian Wang, Masooda N. Bashir |
| 2022 | An Exploratory Study of Why UMLsec Is Not Adopted. Shouki A. Ebad |
| 2022 | Analysis and Enhancement of Self-sovereign Identity System Properties Compiling Standards and Regulations. Charnon Pattiyanon, Toshiaki Aoki |
| 2022 | Android Data Storage Locations and What App Developers Do with It from a Security and Privacy Perspective. Kris Heid, Tobias Tefke, Jens Heider, Ralf C. Staudemeyer |
| 2022 | Benchmarking Consumer Data and Privacy Knowledge in Connected and Autonomous Vehicles. Flora Barber, Steven Furnell |
| 2022 | Can We Formally Catch Cheating in E-exams? Itzel Vázquez Sandoval, Gabriele Lenzini |
| 2022 | Classifying COVID-19 Disinformation on Twitter using a Convolutional Neural Network. Mohamad Nabeel, Christine Große |
| 2022 | Cluster Crash: Learning from Recent Vulnerabilities in Communication Stacks. Anne Borcherding, Philipp Takacs, Jürgen Beyerer |
| 2022 | Comparing Perception of Disclosure of Different Types of Information Related to Automated Tools. Vanessa Bracamonte, Takamasa Isohara |
| 2022 | Comparing the Detection of XSS Vulnerabilities in Node.js and a Multi-tier JavaScript-based Language via Deep Learning. Héloïse Maurel, Santiago A. Vidal, Tamara Rezk |
| 2022 | Construction of a Support Tool for User Reading of Privacy Policies and Assessment of its User Impact. Sachiko Kanamori, Hirotsune Sato, Naoya Tabata, Ryo Nojima |
| 2022 | Containment Strategy Formalism in a Probabilistic Threat Modelling Framework. Per Fahlander, Mathias Ekstedt, Preetam Mukherjee, Ashish Kumar Dwivedi |
| 2022 | Cryptanalysis of Some Electronic Checkbook Schemes. Isa Sertkaya, Öznur Kalkar |
| 2022 | Culturally-sensitive Cybersecurity Awareness Program Design for Iranian High-school Students. Rooya Karimnia, Kaie Maennel, Mahtab Shahin |
| 2022 | Cyber Attack Stage Tracing System based on Attack Scenario Comparison. Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura |
| 2022 | Cyber Exercises in Computer Science Education. Melisa Gafic, Simon Tjoa, Peter Kieseberg, Otto Hellwig, Gerald Quirchmayr |
| 2022 | Data Security and Privacy in Emerging Scenarios. Pierangela Samarati |
| 2022 | DeDup.js: Discovering Malicious and Vulnerable Extensions by Detecting Duplication. Pablo Picazo-Sanchez, Maximilian Algehed, Andrei Sabelfeld |
| 2022 | Detecting Obfuscated Malware using Memory Feature Engineering. Tristan Carrier, Princy Victor, Ali Tekeoglu, Arash Habibi Lashkari |
| 2022 | Differential-linear Attacks on Permutation Ciphers Revisited: Experiments on Ascon and DryGASCON. Aslí Basak Civek, Cihangir Tezcan |
| 2022 | Digital Supply Chain Vulnerabilities in Critical Infrastructure: A Systematic Literature Review on Cybersecurity in the Energy Sector. Mari Aarland, Terje Gjøsæter |
| 2022 | Effective & Efficient Access Control in Smart Farms: Opportunities, Challenges & Potential Approaches. Ghadeer I. Yassin, Lakshmish Ramaswamy |
| 2022 | Efficient and Secure Encryption Adjustment for JSON Data. Maryam Almarwani, Boris Konev, Alexei Lisitsa |
| 2022 | Estimating the Time-To-Compromise of Exploiting Industrial Control System Vulnerabilities. Engla Rencelj Ling, Mathias Ekstedt |
| 2022 | Evaluating Deep Learning-based NIDS in Adversarial Settings. Hesamodin Mohammadian, Arash Habibi Lashkari, Ali A. Ghorbani |
| 2022 | Feature Importance and Deep Learning for Android Malware Detection. Adam Talbi, Arthur Viens, Louis-Clément Leroux, Morgane François, Mathias Caillol, Nga Nguyen |
| 2022 | Formalizing Real-world Threat Scenarios. Paul Tavolato, Robert Luh, Sebastian Eresheim |
| 2022 | Game Theoretic Analysis of Ransomware: A Preliminary Study. Rudra Prasad Baksi, Shambhu J. Upadhyaya |
| 2022 | Impact of Cross-standard Cell Libraries on Machine Learning based Hardware Trojan Detection. Shang-Wen Chen, Jian-Wei Liao, Chia-Wei Tien, Jung-Hsin Hsiao |
| 2022 | Implementing Post-quantum Cryptography for Developers. Julius Hekkala, Kimmo Halunen, Visa Antero Vallivaara |
| 2022 | Incentivisation of Outsourced Network Testing: View from Platform Perspective. Sultan Alasmari, Weichao Wang, Yu Wang |
| 2022 | Industrial and Automation Control System Cyber Range Prototype for Offensive Capability Development. Austris Uljans, Bernhards Blumbergs |
| 2022 | Intent-aware Permission Architecture: A Model for Rethinking Informed Consent for Android Apps. Md. Rashedur Rahman, Elizabeth Miller, Moinul Hossain, Aisha I. Ali-Gombe |
| 2022 | Linguistic Steganography for Messaging Applications. Elsa Serret, Antoine Lesueur, Alban Gabillon |
| 2022 | Malware in Motion. Robert Choudhury, Zhiyuan Luo, Khuong An Nguyen |
| 2022 | NLP-based User Authentication through Mouse Dynamics. Hoseong Asher Lee, Nikhil Prathapani, Rajesh Paturi, Sarp Parmaksiz, Fabio Di Troia |
| 2022 | Network Intrusion Detection: A Comprehensive Analysis of CIC-IDS2017. Arnaud Rosay, Eloïse Cheval, Florent Carlier, Pascal Leroux |
| 2022 | On Tracking Ransomware on the File System. Luigi Catuogno, Clemente Galdi |
| 2022 | On the Influence of Image Settings in Deep Learning-based Malware Detection. Francesco Mercaldo, Fabio Martinelli, Antonella Santone, Vinod P. |
| 2022 | On the LPSE Password Meter's Discrepancies among Different Datasets. Agnieszka Rucka, Wojciech Wodo |
| 2022 | PDF Malware Detection based on Stacking Learning. Maryam Issakhani, Princy Victor, Ali Tekeoglu, Arash Habibi Lashkari |
| 2022 | PREUNN: Protocol Reverse Engineering using Neural Networks. Valentin Kiechle, Matthias Börsig, Sven Nitzsche, Ingmar Baumgart, Jürgen Becker |
| 2022 | Planning for Cryptographic Readiness in an Era of Quantum Computing Advancement. David Ott, Dennis Moreau, Manish Gaur |
| 2022 | Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device. Jon Barton, William J. Buchanan, Nikolaos Pitropakis, Sarwar Sayeed, Will Abramson |
| 2022 | Privacy-preserving Parallel Computation of Shortest Path Algorithms with Low Round Complexity. Mohammad Anagreh, Peeter Laud, Eero Vainikko |
| 2022 | Proceedings of the 8th International Conference on Information Systems Security and Privacy, ICISSP 2022, Online Streaming, February 9-11, 2022. Paolo Mori, Gabriele Lenzini, Steven Furnell |
| 2022 | Profile Hidden Markov Model Malware Detection and API Call Obfuscation. Muhammad Ali, Monem Hamid, Jacob Jasser, Joachim Lerman, Samod Shetty, Fabio Di Troia |
| 2022 | Protecting Shared Virtualized Environments against Cache Side-channel Attacks. Abdullah Albalawi, Vassilios G. Vassilakis, Radu Calinescu |
| 2022 | Public Key Compression and Fast Polynomial Multiplication for NTRU using the Corrected Hybridized NTT-Karatsuba Method. Rohon Kundu, Alessandro De Piccoli, Andrea Visconti |
| 2022 | Ransomware Detection with Deep Neural Networks. Matan Davidian, Natalia Vanetik, Michael Kiperberg |
| 2022 | Revisiting Ontology Based Access Control: The Case for Ontology Based Data Access. Özgü Can, Murat Osman Ünalir |
| 2022 | SMPG: Secure Multi Party Computation on Graph Databases. Nouf Al-Juaid, Alexei Lisitsa, Sven Schewe |
| 2022 | SecTL: Secure and Verifiable Transfer Learning-based inference. Abbass Madi, Oana Stan, Renaud Sirdey, Cédric Gouy-Pailler |
| 2022 | Security Issue Classification for Vulnerability Management with Semi-supervised Learning. Emil Wåreus, Anton Duppils, Magnus Tullberg, Martin Hell |
| 2022 | Semantic Attack on Disassociated Transactions. Asma Alshuhail, Jianhue Shao |
| 2022 | Side Channel Identification using Granger Time Series Clustering with Applications to Control Systems. Matthew Lee, Joshua Sylvester, Sunjoli Aggarwal, Aviraj Sinha, Michael A. Taylor, Nathan Srirama, Eric C. Larson, Mitchell A. Thornton |
| 2022 | SpamFender: A Semi-supervised Incremental Spam Classification System across Social Networks. Shengyuan Wen, Weiqing Sun |
| 2022 | Survey and Guidelines about Learning Cyber Security Risk Assessment. Christophe Ponsard, Philippe Massonet |
| 2022 | Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks. Amir Naseredini, Stefan Gast, Martin Schwarzl, Pedro Miguel Sousa Bernardo, Amel Smajic, Claudio Canella, Martin Berger, Daniel Gruss |
| 2022 | TEEm: A Tangle-based Elastic Emulator for Storing Connected Vehicle Data in a Distributed Ledger Technology. David Werden, Matthew Muccioli, Anyi Liu |
| 2022 | Tamer: A Sandbox for Facilitating and Automating IoT Malware Analysis with Techniques to Elicit Malicious Behavior. Shun Yonamine, Yuzo Taenaka, Youki Kadobayashi |
| 2022 | The GDPR Compliance and Access Control Systems: Challenges and Research Opportunities. Said Daoudagh, Eda Marchetti |
| 2022 | The Role of Information Deserts in Information Security Awareness and Behaviour. Dirk P. Snyman, Hennie A. Kruger |
| 2022 | Towards a Better Understanding of Machine Learning based Network Intrusion Detection Systems in Industrial Networks. Anne Borcherding, Lukas Feldmann, Markus Karch, Ankush Meshram, Jürgen Beyerer |
| 2022 | Utility of Anonymised Data in Decision Tree Derivation. Jack R. Davies, Jianhua Shao |
| 2022 | WhatsApp Web Client Live Forensics Technique. Alberto Magno Muniz Soares |
| 2022 | Who Watches the Watchers: A Multi-Task Benchmark for Anomaly Detection. Phil Demetriou, Ingolf Becker, Stephen Hailes |
| 2022 | Why Rigorous Underpinnings for Cyber Security Education and Training Matter? Experiences from CyBOK: The Cyber Security Body of Knowledge. Awais Rashid |
| 2022 | Why Usability Has Become Privacy's Biggest Challenge and What We Can Do About It. Norman M. Sadeh |
| 2022 | iProfile: Collecting and Analyzing Keystroke Dynamics from Android Users. Haytham Elmiligi, Sherif Saad |