| 2023 | A Biometric Self Authentication Scheme. Hervé Chabanne |
| 2023 | A Framework for Assessing Decompiler Inference Accuracy of Source-Level Program Constructs. Jace Kline, Prasad Kulkarni |
| 2023 | A Game Theoretic Analysis of Cyber Threats. Paul Tavolato, Robert Luh, Sebastian Eresheim |
| 2023 | A Scenario-Driven Cyber Security Awareness Exercise Utilizing Dynamic Polling: Methodology and Lessons Learned. Maria Leitner |
| 2023 | A Self-Configuration Controller To Detect, Identify, and Recover Misconfiguration at IoT Edge Devices and Containerized Cluster System. Areeg Samir, Håvard Dagenborg Johansen |
| 2023 | A Stochastic Game Model for Cloud Platform Security. Lu Li, Guanling Zhao, Kai Shi, Fengjun Zhang |
| 2023 | A Systematic Review of Secure IoT Data Sharing. Thanh Tran, Phu Nguyen, Gencer Erdogan |
| 2023 | A k-Anonymization Method for Social Network Data with Link Prediction. Risa Sugai, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga |
| 2023 | An Analysis of Cybersecurity Awareness Efforts for Swiss SMEs. Ciarán Bryce |
| 2023 | An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes. Francesco Antognazza, Alessandro Barenghi, Gerardo Pelosi, Ruggero Susella |
| 2023 | An End-to-End Encrypted Cache System with Time-Dependent Access Control. Keita Emura, Masato Yoshimi |
| 2023 | An Explainable Convolutional Neural Network for Dynamic Android Malware Detection. Francesco Mercaldo, Fabio Martinelli, Antonella Santone |
| 2023 | Anomalous File System Activity Detection Through Temporal Association Rule Mining. Mohammad Reza Heidari Iman, Pavel Chikul, Gert Jervan, Hayretdin Bahsi, Tara Ghasempouri |
| 2023 | Assessing Risk in High Performance Computing Attacks. Erika A. Leal, Cimone Wright-Hamor, Joseph B. Manzano, Nicholas J. Multari, Kevin J. Barker, David O. Manz, Jiang Ming |
| 2023 | Assessing Security and Privacy Insights for Smart Home Users. Samiah Alghamdi, Steven Furnell |
| 2023 | Assessing the Impact of Attacks on Connected and Autonomous Vehicles in Vehicular Ad Hoc Networks. Kaushik Krishnan Balaji, Dimah Almani, Steven Furnell |
| 2023 | Automata-Based Study of Dynamic Access Control Policies. Ahmed Khoumsi |
| 2023 | Automating Vehicle SOA Threat Analysis Using a Model-Based Methodology. Yuri Gil Dantas, Simon Barner, Pei Ke, Vivek Nigam, Ulrich Schöpp |
| 2023 | Automating XSS Vulnerability Testing Using Reinforcement Learning. Kento Hasegawa, Seira Hidano, Kazuhide Fukushima |
| 2023 | Bypassing Multiple Security Layers Using Malicious USB Human Interface Device. Mathew Nicho, Ibrahim Sabry |
| 2023 | CHARRA-PM: An Attestation Approach Relying on the Passport Model. António Marques, Bruno Sousa |
| 2023 | Clipaha: A Scheme to Perform Password Stretching on the Client. Francisco Blas Izquierdo Riera, Magnus Almgren, Pablo Picazo-Sanchez, Christian Rohner |
| 2023 | Cloud Inspector: A Tool-Based Approach for Public Administrations to Establish Information Security Processes Towards Public Clouds. Michael Diener, Thomas Bolz |
| 2023 | Comparing the Effect of Privacy and Non-Privacy Social Media Photo Tools on Factors of Privacy Concern. Vanessa Bracamonte, Sebastian Pape, Sascha Löbner |
| 2023 | Concrete Quantum Circuits to Prepare Generalized Dicke States on a Quantum Machine. Shintaro Narisada, Shohei Beppu, Kazuhide Fukushima, Shinsaku Kiyomoto |
| 2023 | Correlating Intrusion Detection with Attack Graph on Virtual Computer Networkings. Hanwen Zhang, Wenyong Wang, Lisheng Huang, Junrui Wu, Fengjun Zhang, Kai Shi |
| 2023 | Cyber Teaching Hospitals: Developing Cyber Workforce Competence. James R. Elste, David T. Croasdell |
| 2023 | Cybersecurity Awareness and Capacities of SMEs. Gencer Erdogan, Ragnhild Halvorsrud, Costas Boletsis, Simeon Tverdal, John Brian Pickering |
| 2023 | Cybersecurity, Nicolas Cage and Peppa Pig. Luca Viganò |
| 2023 | Dark Ending: What Happens when a Dark Web Market Closes down. Yichao Wang, Budi Arief, Julio C. Hernandez-Castro |
| 2023 | Data Leakage in Isolated Virtualized Enterprise Computing Systems. Zechariah Wolf, Eric Larson, Mitchell A. Thornton |
| 2023 | Design Rationale for Symbiotically Secure Key Management Systems in IoT and Beyond. Witali Bartsch, Prosanta Gope, Elif Bilge Kavun, Owen Millwood, Andriy Panchenko, Aryan Mohammadi Pasikhani, Ilia Polian |
| 2023 | Differential Privacy: Toward a Better Tuning of the Privacy Budget (ε) Based on Risk. Mahboobeh Dorafshanian, Mohamed Mejri |
| 2023 | Efficient Aggregation of Face Embeddings for Decentralized Face Recognition Deployments. Philipp Hofer, Michael Roland, Philipp Schwarz, René Mayrhofer |
| 2023 | Evading Detection During Network Reconnaissance. Ilias Belalis, Georgios P. Spathoulas, Ioannis Anagnostopoulos |
| 2023 | Evaluating the Fork-Awareness of Coverage-Guided Fuzzers. Marcello Maugeri, Cristian Daniele, Giampaolo Bella, Erik Poll |
| 2023 | Evaluation Scheme to Analyze Keystroke Dynamics Methods. Anastasia Dimaratos, Daniela Pöhn |
| 2023 | Evaluation of DoS/DDoS Attack Detection with ML Techniques on CIC-IDS2017 Dataset. Saida Farhat, Manel Abdelkader, Amel Meddeb-Makhlouf, Faouzi Zarai |
| 2023 | Evaluation of Persistence Methods Used by Malware on Microsoft Windows Systems. Amélie Dieterich, Matthias Schopp, Lars Stiemert, Christoph Steininger, Daniela Pöhn |
| 2023 | Evaluation of a Tool to Increase Cybersecurity Awareness Among Non-experts (SME Employees). Kaiying Luan, Ragnhild Halvorsrud, Costas Boletsis |
| 2023 | Exploring False Demand Attacks in Power Grids with High PV Penetration. Ashish Neupane, Weiqing Sun |
| 2023 | Fast-Flux Malicious Domain Name Detection Method Based on Domain Resolution Spatial Features. Shaojie Chen, Bo Lang, Chong Xie |
| 2023 | Forecasting Cyber-Attacks to Destination Ports Using Machine Learning. Kostas Loumponias, Sotiris Raptis, Eleni Darra, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris |
| 2023 | Group Privacy for Personalized Federated Learning. Filippo Galli, Sayan Biswas, Kangsoo Jung, Tommaso Cucinotta, Catuscia Palamidessi |
| 2023 | How to Design a Blue Team Scenario for Beginners on the Example of Brute-Force Attacks on Authentications. Andreas Eipper, Daniela Pöhn |
| 2023 | Human Factors for Cybersecurity Awareness in a Remote Work Environment. César Vásquez Flores, José Gonzales, Miranda Kajtazi, Joseph Bugeja, Bahtijar Vogel |
| 2023 | IVNPROTECT: Isolable and Traceable Lightweight CAN-Bus Kernel-Level Protection for Securing in-Vehicle Communication. Shuji Ohira, Araya Kibrom Desta, Ismail Arai, Kazutoshi Fujikawa |
| 2023 | Identifying Personal Data Processing for Code Review. Feiyang Tang, Bjarte M. Østvold, Magiel Bruntink |
| 2023 | Improving Unlinkability in C-ITS: A Methodology For Optimal Obfuscation. Yevhen Zolotavkin, Yurii Baryshev, Vitalii Lukichov, Jannik Mähn, Stefan Köpsell |
| 2023 | Machine Learning Based Prediction of Vulnerability Information Subject to a Security Alert. Ryu Watanabe, Takashi Matsunaka, Ayumu Kubota, Jumpei Urakawa |
| 2023 | Measurements of Cross-Border Quantum Key Distribution Link. Filip Lauterbach, Libor Michalek, Piotr Rydlichowski, Patrik Burdiak, Jaroslav Zdralek, Miroslav Voznák |
| 2023 | On the Design of GDPR Compliant Workflows for Responsible Neuroimage Data Sharing. Alexandros Karakasidis, Vassilios Vassalos |
| 2023 | On the Feasibility of Fully Homomorphic Encryption of Minutiae-Based Fingerprint Representations. Pia Bauspieß, Lasse Vad, Håvard Myrekrok, Anamaria Costache, Jascha Kolberg, Christian Rathgeb |
| 2023 | On the Use of Multiple Approximations in the Linear Cryptanalysis of Baby Rijndael. Josef Kokes, Róbert Lórencz |
| 2023 | Online Transition-Based Feature Generation for Anomaly Detection in Concurrent Data Streams. Yinzheng Zhong, Alexei Lisitsa |
| 2023 | P2BAC: Privacy Policy Based Access Control Using P-LPL. Jens Leicht, Maritta Heisel |
| 2023 | PDIFT: A Practical Dynamic Information-Flow Tracker. Michael Kiperberg, Aleksei Rozman, Aleksei Kuraev, Nezer Zaidenberg |
| 2023 | Privacy-Aware IoT: State-of-the-Art and Challenges. Shukun Tokas, Gencer Erdogan, Ketil Stølen |
| 2023 | Proceedings of the 9th International Conference on Information Systems Security and Privacy, ICISSP 2023, Lisbon, Portugal, February 22-24, 2023 Paolo Mori, Gabriele Lenzini, Steven Furnell |
| 2023 | Protecting IoT Ecosystems and AI Leveraging TCG Standards. Thorsten P. Stremlau |
| 2023 | Query Log Analysis for SQL Injection Detection. Alexandra Rocha, Rui Alves, Tiago Pedrosa |
| 2023 | RPCDroid: Runtime Identification of Permission Usage Contexts in Android Applications. Michele Guerra, Roberto Milanese, Rocco Oliveto, Fausto Fasano |
| 2023 | Revisiting the DFT Test in the NIST SP 800-22 Randomness Test Suite. Hiroki Okada, Kazuhide Fukushima |
| 2023 | SCANTRAP: Protecting Content Management Systems from Vulnerability Scanners with Cyber Deception and Obfuscation. Daniel Reti, Karina Elzer, Hans Dieter Schotten |
| 2023 | SHOID: A Secure Herd of IoT Devices Firmware Update Protocol. Frédéric Ruellé, Quentin Guellaën, Arnaud Rosay |
| 2023 | SPA Attack on NTRU Protected Implementation with Sparse Representation of Private Key. Tomás Rabas, Jirí Bucek, Róbert Lórencz |
| 2023 | SWaTEval: An Evaluation Framework for Stateful Web Application Testing. Anne Borcherding, Nikolay Penkov, Mark Giraud, Jürgen Beyerer |
| 2023 | SeCloud: Computer-Aided Support for Selecting Security Measures for Cloud Architectures. Yuri Gil Dantas, Ulrich Schöpp |
| 2023 | Secure Joint Querying Over Federated Graph Databases Utilising SMPC Protocols. Nouf Al-Juaid, Alexei Lisitsa, Sven Schewe |
| 2023 | Secure Software Updates for IoT Based on Industry Requirements. Ludwig Seitz, Marco Tiloca, Martin Gunnarsson, Rikard Höglund |
| 2023 | Security Analysis of a Color Image Encryption Scheme Based on Dynamic Substitution and Diffusion Operations. George Teseleanu |
| 2023 | Security Aspects of Digital Twins in IoT. Vitomir Pavlov, Florian Hahn, Mohammad El-Hajj |
| 2023 | StegWare: A Novel Malware Model Exploiting Payload Steganography and Dynamic Compilation. Daniele Albanese, Rosangela Casolare, Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Marco Russodivito, Antonella Santone |
| 2023 | Systematic Literature Review of Threat Modeling Concepts. Pedro A. Lohmann, Carlos Albuquerque, Raphael Machado |
| 2023 | Systematically Searching for Identity-Related Information in the Internet with OSINT Tools. Marcus Walkow, Daniela Pöhn |
| 2023 | TTP-Aided Searchable Encryption of Documents Using Threshold Secret Sharing. Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura |
| 2023 | Temporal Constraints in Online Dating Fraud Classification. Harrison Bullock, Matthew Edwards |
| 2023 | The Story of Safety Snail and Her e-Mail: A Digital Wellness and Cybersecurity Serious Game for Pre-School Children. Günther R. Drevin, Dirk P. Snyman, Lynette Drevin, Hennie A. Kruger, Johann Allers |
| 2023 | Towards Audit Requirements for AI-Based Systems in Mobility Applications. Devi Padmavathi Alagarswamy, Christian Berghoff, Vasilios Danos, Fabian Langer, Thora Markert, Georg Schneider, Arndt von Twickel, Fabian Woitschek |
| 2023 | Towards Long-Term Continuous Tracing of Internet-Wide Scanning Campaigns Based on Darknet Analysis. Chansu Han, Akira Tanaka, Jun'ichi Takeuchi, Takeshi Takahashi, Tomohiro Morikawa, Tsung-Nan Lin |
| 2023 | Towards Security Attack Event Monitoring for Cyber Physical-Systems. Elias Seid, Oliver Popov, Fredrik Blix |
| 2023 | Towards a Rust SDK for Keystone Enclave Application Development. Jukka Julku, Markku Kylänpää |
| 2023 | Tracing Cryptographic Agility in Android and iOS Apps. Kris Heid, Jens Heider, Matthias Ritscher, Jan-Peter Stotz |
| 2023 | Usable Security: Security 'Warnings' 2.0. Melanie Volkamer |
| 2023 | Use-Case Denial of Service Attack on Actual Quantum Key Distribution Nodes. Patrik Burdiak, Emir Dervisevic, Amina Tankovic, Filip Lauterbach, Jan Rozhon, Lukas Kapicak, Libor Michalek, Dzana Pivac, Merima Fehric, Enio Kaljic, Mirza Hamza, Miralem Mehic, Miroslav Voznák |
| 2023 | Using Infrastructure-Based Agents to Enhance Forensic Logging of Third-Party Applications. Jennifer Bellizzi, Mark Vella, Christian Colombo, Julio C. Hernandez-Castro |
| 2023 | Vehicle Data Collection: A Privacy Policy Analysis and Comparison. Chiara Bodei, Gianpiero Costantino, Marco De Vincenzi, Ilaria Matteucci, Anna Monreale |
| 2023 | Veto: Prohibit Outdated Edge System Software from Booting. Jonas Röckl, Adam Wagenhäuser, Tilo Müller |
| 2023 | Vulnerabilities in IoT Devices, Backends, Applications, and Components. Rauli Kaksonen, Kimmo Halunen, Juha Röning |
| 2023 | XMeDNN: An Explainable Deep Neural Network System for Intrusion Detection in Internet of Medical Things. Mohammed M. Alani, Atefeh Mashatan, Ali Miri |
| 2023 | t.ex-Graph: Automated Web Tracker Detection Using Centrality Metrics and Data Flow Characteristics. Philip Raschke, Patrick Herbke, Henry Schwerdtner |