| 2024 | A Brief Reflection on Trusted Platform Module Support. Martin Pirker, Robert Haas |
| 2024 | A Categorical Data Approach for Anomaly Detection in WebAssembly Applications. Tiago Heinrich, Newton Carlos Will, Rafael R. Obelheiro, Carlos Alberto Maziero |
| 2024 | A Decentralized Federated Learning Using Reputation. Olive Chakraborty, Aymen Boudguiga |
| 2024 | A Framework for E2E Audit Trails in System Architectures of Different Enterprise Classes. Luca Patzelt, Georg Neugebauer, Meik Döll, Sacha Hack, Tim Hoener, Marko Schuba |
| 2024 | A Recommender System to Detect Distributed Denial of Service Attacks with Network and Transport Layer Features. Kagan Özgün, Ayse Tosun, Mehmet Tahir Sandikkaya |
| 2024 | ADMIn: Attacks on Dataset, Model and Input: A Threat Model for AI Based Software. Vimal Kumar, Juliette Mayo, Khadija Bahiss |
| 2024 | APP-CEP: Adaptive Pattern-Level Privacy Protection in Complex Event Processing Systems. Majid Lotfian Delouee, Victoria Degeler, Peter Amthor, Boris Koldehofe |
| 2024 | An Automated Adaptive Security Framework for Cyber-Physical Systems. Elias Seid, Oliver Popov, Fredrik Blix |
| 2024 | An Empirical Study of Ransomware Vulnerabilities Descriptions. Claudia Lanza, Abdelkader Lahmadi, Fabian Osmond |
| 2024 | An Improved PUF-Based Privacy-Preserving IoT Protocol for Cloud Storage. Cédrick De Pauw, Jan Tobias Mühlberg, Jean-Michel Dricot |
| 2024 | An Open-Source Approach to OT Asset Management in Industrial Environments. Luca Pöhler, Marko Schuba, Tim Hoener, Sacha Hack, Georg Neugebauer |
| 2024 | Analysis of Payload Confidentiality for the IoT/ LPWAN Technology 'Lora'. Bernard McWeeney, Ilya Mudritskiy, Renaat Verbruggen |
| 2024 | AnonEmoFace: Emotion Preserving Facial Anonymization. Jan Hintz, Jacob Rühe, Ingo Siegert |
| 2024 | Anonymous Multi-Receiver Certificateless Hybrid Signcryption for Broadcast Communication. Alia Umrani, Apurva K. Vangujar, Paolo Palmieri |
| 2024 | Anywhere on Earth: A Look at Regional Characteristics of DRDoS Attacks. Tiago Heinrich, Newton Carlos Will, Rafael R. Obelheiro, Carlos Alberto Maziero |
| 2024 | ArkThor: Threat Categorization Based on Malware's C2 Communication. Mohammed Jawed, Sriram Parameshwaran, Nitesh Kumar, Anand Handa, Sandeep K. Shukla |
| 2024 | Attestation with Constrained Relying Party. Mariam Moustafa, Arto Niemi, Philip Ginzboorg, Jan-Erik Ekberg |
| 2024 | Automating IoT Security Standard Testing by Common Security Tools. Rauli Kaksonen, Kimmo Halunen, Marko Laakso, Juha Röning |
| 2024 | Banking Malware Detection: Leveraging Federated Learning with Conditional Model Updates and Client Data Heterogeneity. Nahid Ferdous Aurna, Md Delwar Hossain, Hideya Ochiai, Yuzo Taenaka, Latifur Khan, Youki Kadobayashi |
| 2024 | Blockchain for Privacy-Preserving Data Distribution in Healthcare. Amitesh Singh Rajput, Arnav Agrawal |
| 2024 | Botnet Detection by Integrating Multiple Machine Learning Models. Thanawat Tejapijaya, Prarinya Siritanawan, Karin Sumongkayothin, Kazunori Kotani |
| 2024 | Build a Computationally Efficient Strong Defense Against Adversarial Example Attacks. Changwei Liu, Louis DiValentin, Aolin Ding, Malek Ben Salem |
| 2024 | CPE-Identifier: Automated CPE Identification and CVE Summaries Annotation with Deep Learning and NLP. Wanyu Hu, Vrizlynn L. L. Thing |
| 2024 | Comparative Analysis of Feature Selection Algorithms for Automated IoT Device Fingerprinting. Ahmet Aksoy, Sundeep Varma, Ganesha Moorthy, Enya Pan, Gorkem Kar |
| 2024 | Comparing Phishing Training and Campaign Methods for Mitigating Malicious Emails in Organizations. Jackie Scott, Yair Levy, Wei Li, Ajoy Kumar |
| 2024 | Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process. Paul Tavolato, Robert Luh, Sebastian Eresheim, Simon Gmeiner, Sebastian Schrittwieser |
| 2024 | Conceptualising an Anti-Digital Forensics Kill Chain for Smart Homes. Mario Raciti |
| 2024 | Covert & Side Stories: Threats Evolution in Traditional and Modern Technologies. Mauro Conti |
| 2024 | Cybersecurity Incident Response Readiness in Organisations. Aseel Aldabjan, Steven Furnell, Xavier Carpent, Maria Papadaki |
| 2024 | Cybersecurity-Related Tweet Classification by Explainable Deep Learning. Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Luca Petrillo, Antonella Santone |
| 2024 | Deep Q-Networks for Imbalanced Multi-Class Malware Classification. Antonio Maci, Giuseppe Urbano, Antonio Coscia |
| 2024 | Desktop Crypto Wallets: A Digital Forensic Investigation and Analysis of Remnants and Traces on end-User Machines. David Debono, Aleandro Sultana |
| 2024 | Detecting eBPF Rootkits Using Virtualization and Memory Forensics. Nezer Jacob Zaidenberg, Michael Kiperberg, Eliav Menachi, Asaf Eitani |
| 2024 | Differential Privacy for Distributed Traffic Monitoring in Smart Cities. Marcus Gelderie, Maximilian Luff, Lukas Brodschelm |
| 2024 | EMplifier: Hybrid Electromagnetic Probe for Side Channel and Fault Injection Analysis. Fabrizia Marrucco, Mosabbah Mushir Ahmed, Bechir Bouali, Alieeldin Mady |
| 2024 | Effectiveness of Malware Incident Management in Security Operations Centres: Trends, Challenges and Research Directions. Dakouri Gazo, Asma Patel, Mohammad Hasan |
| 2024 | Efficient Secure Computation of Edit Distance on Genomic Data. Andrea Migliore, Stelvio Cimato, Gabriella Trucco |
| 2024 | Enclave Management Models for Safe Execution of Software Components. Newton Carlos Will, Carlos Alberto Maziero |
| 2024 | Enhancing Cybersecurity Through Comparative Analysis of Deep Learning Models for Anomaly Detection. Katerina Macková, Dominik Benk, Martin Srotýr |
| 2024 | Ethical Design for Data Privacy and User Privacy Awareness in the Metaverse. Ophelia Prillard, Costas Boletsis, Shukun Tokas |
| 2024 | Evaluating the Influence of Multi-Factor Authentication and Recovery Settings on the Security and Accessibility of User Accounts. Andre Büttner, Nils Gruschka |
| 2024 | Evaluating the Security and Privacy Risk Postures of Virtual Assistants. Borna Kalhor, Sanchari Das |
| 2024 | Exploring BERT for Predicting Vulnerability Categories in Device Configurations. Dmitry Levshun, Dmitry Vesnin |
| 2024 | Exploring Errors in Binary-Level CFG Recovery. Anjali Pare, Prasad A. Kulkarni |
| 2024 | Feasibility of Privacy Preserving Minutiae-Based Fingerprint Matching. Julia Mader, Thomas Lorünser |
| 2024 | Feasibility of Random Forest with Fully Homomorphic Encryption Applied to Network Data. Shusaku Uemura, Kazuhide Fukushima |
| 2024 | Federated Learning with Differential Privacy and an Untrusted Aggregator. Kunlong Liu, Trinabh Gupta |
| 2024 | FeedMeter: Evaluating the Quality of Community-Driven Threat Intelligence. Andreas Rüedlinger, Rebecca Klauser, Pavlos Lamprakis, Markus Happe, Bernhard Tellenbach, Onur Veyisoglu, Ariane Trammell |
| 2024 | Forgery Resistance of User Authentication Methods Using Location, Wi-Fi and Their Correlation. Ryosuke Kobayashi, Rie Shigetomi Yamaguchi |
| 2024 | Fuzzing Matter(s): A White Paper for Fuzzing the Matter Protocol. Marcello Maugeri |
| 2024 | GPU-Based Brute Force Cryptanalysis of KLEIN. Cihangir Tezcan |
| 2024 | Gradient-Based Clean Label Backdoor Attack to Graph Neural Networks. Ryo Meguro, Hiroya Kato, Shintaro Narisada, Seira Hidano, Kazuhide Fukushima, Takuo Suganuma, Masahiro Hiji |
| 2024 | High Throughput Neural Network for Network Intrusion Detection on FPGAs: An Algorithm-Architecture Interaction. Muhammad Ali Farooq, Syed Muhammad Fasih Ul Hassan, Muhammad Umer Farooq, Abid Rafique |
| 2024 | Implementation and Analysis of Covert Channel Using iBeacon. Ye-Sol Oh, Yeon-Ji Lee, Jiwon Jang, Hyunwoo Choi, Il-Gu Lee |
| 2024 | Integrating Post-Quantum Cryptography into Trusted Computing Group Standards. Thorsten P. Stremlau |
| 2024 | Interpretable Android Malware Detection Based on Dynamic Analysis. Arunab Singh, Maryam Tanha, Yashsvi Girdhar, Aaron Hunter |
| 2024 | IoT Device Classification Using Link-Level Features for Traditional Machine Learning and Large Language Models. Gabriel A. Morales, Farhan Tajwar Romit, Adam Bienek-Parrish, Patrick Jenkins, Rocky Slavin |
| 2024 | KAIME: Central Bank Digital Currency with Realistic and Modular Privacy. Ali Dogan, Kemal Bicakci |
| 2024 | LSTM Autoencoder-Based Insider Abnormal Behavior Detection Using De-Identified Data. Seo-Yi Kim, Il-Gu Lee |
| 2024 | Learning from the Dark Side About How (not) to Engineer Privacy: Analysis of Dark Patterns Taxonomies from an ISO 29100 Perspective. Philippe Valoggia, Anastasia Sergeeva, Arianna Rossi, Marietjie Botes |
| 2024 | Machine Learning-Based Classification of Hardware Trojans in FPGAs Implementing RISC-V Cores. Stefano Ribes, Fabio Malatesta, Grazia Garzo, Alessandro Palumbo |
| 2024 | Merging Policy and Practice: Crafting Effective Social Engineering Awareness-Raising Policies. Eliana Stavrou, Andriani Piki, Panayiotis Varnava |
| 2024 | Off-Chaining Approaches for Cost-Efficiency in Threshold-Based Elliptic Curve Systems over Blockchains. Visakh K. Vijayan, Maria Francis, Kotaro Kataoka |
| 2024 | PETRIoT - A Privacy Enhancing Technology Recommendation Framework for IoT Computing. Fatema Rashid, Ali Miri, Atefeh Mashatan |
| 2024 | PenGym: Pentesting Training Framework for Reinforcement Learning Agents. Huynh Phuong Thanh Nguyen, Zhi Chen, Kento Hasegawa, Kazuhide Fukushima, Razvan Beuran |
| 2024 | Perceptions of Cyber Security Risk of the Norwegian Advanced Metering Infrastructure. Eirik Lien, Karl Magnus Grønning Bergh, Sokratis K. Katsikas |
| 2024 | Performance Evaluation of Polynomial Commitments for Erasure Code Based Information Dispersal. Antoine Stevan, Thomas Lavaur, Jérôme Lacan, Jonathan Detchart, Tanguy Pérennou |
| 2024 | Policy-Driven XACML-Based Architecture for Dynamic Enforcement of Multiparty Computation. Arghavan Hosseinzadeh, Jessica Chwalek, Robin Brandstädter |
| 2024 | Preserving Privacy in High-Dimensional Data Publishing. Narges Alipourjeddi, Ali Miri |
| 2024 | Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode. William J. Buchanan, Sam Grierson, Daniel Uribe |
| 2024 | Proceedings of the 10th International Conference on Information Systems Security and Privacy, ICISSP 2024, Rome, Italy, February 26-28, 2024. Gabriele Lenzini, Paolo Mori, Steven Furnell |
| 2024 | Pure Multi Key BGV Implementation. Justine Paillet, Olive Chakraborty, Marina Checri |
| 2024 | Revolutionizing Board Cyber-Risk Management Using Collaborative Gaming. Tony Delvecchio, Sander Zeijlemaker, Giancarlo De Bernardis, Michael Siegel |
| 2024 | Robust Image Deepfake Detection with Perceptual Hashing. Chun-Shien Lu, Chao-Hsuan Lin |
| 2024 | RoomKey: Extracting a Volatile Key with Information from the Local WiFi Environment Reconstructable Within a Designated Area. Philipp Jakubeit, Andreas Peter, Maarten van Steen |
| 2024 | Safeguarding Industry 5.0 Ecosystems Through Digital Twins. Cristina Alcaraz |
| 2024 | Secure Multiparty Computation of the Laplace Mechanism. Amir Zarei, Staal Amund Vinterbo |
| 2024 | Security Analysis of an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map. George Teseleanu |
| 2024 | Security Analysis of an Image Encryption Scheme Based on a New Secure Variant of Hill Cipher and 1D Chaotic Maps. George Teseleanu |
| 2024 | Security Contracts a Property-Based Approach to Support Security Patterns. Sylvain Guérin, Joël Champeau, Salvador Martínez, Raúl Mazo |
| 2024 | Security Evaluation of Decision Tree Meets Data Anonymization. Ryousuke Wakabayashi, Lihua Wang, Ryo Nojima, Atsushi Waseda |
| 2024 | Security, Privacy and the "Human Factor": Making Sense of the Paradoxes of Security and Privacy Behaviour. Spyros Kokolakis |
| 2024 | Silicon-Integrated Security Solutions Driving IoT Security. Stephan Spitz, Alexander Lawall |
| 2024 | Smart Home Privacy: A Scoping Review. Ali Ahmed, Victor Ungureanu, Tarek Gaber, Craig A. Watterson, Fatma Masmoudi |
| 2024 | Smart Homes as Digital Ecosystems: Exploring Privacy in IoT Contexts. Sally Bagheri, Andreas Jacobsson, Paul Davidsson |
| 2024 | Supporting CAN Bus Anomaly Detection with Correlation Data. Beatrix Koltai, András Gazdag, Gergely Ács |
| 2024 | The Classification and Impact of Cyber Attacks Targeting Critical Service Providers. Josefin Andersson, Elias Seid |
| 2024 | The Design and Implementation of a Semantic Web Framework for the Event-Centric Digital Forensics Analysis. Pavel Chikul, Hayretdin Bahsi, Olaf Maennel |
| 2024 | The Right Tool for the Job: Contextualization of Cybersecurity Education and Assessment Methods. Daniel Köhler, Christoph Meinel |
| 2024 | The Role of Heuristics and Biases in Linux Server Administrators' Information Security Policy Compliance at Healthcare Organizations. John McConnell, Yair Levy, Marti Snyder, Ling Wang |
| 2024 | The Status and Management of Web-Related Security at Higher Education Institutions in Poland. Jackson Barreto, Paulina Rutecka, Karina Cicha, Pedro Pinto |
| 2024 | Towards Automated Information Security Governance. Ariane Trammell, Benjamin Gehring, Marco Isele, Yvo Spielmann, Valentin Zahnd |
| 2024 | Towards Generalized Diffie-Hellman-esque Key Agreement via Generic Split KEM Construction. Brian Goncalves, Atefeh Mashatan |
| 2024 | UPSS: A Global, Least-Privileged Storage System with Stronger Security and Better Performance. Arastoo Bozorgi, Mahya Soleimani Jadidi, Jonathan Anderson |
| 2024 | User Re-Authentication via Mouse Movements and Recurrent Neural Networks. Paul R. B. Houssel, Luis A. Leiva |
| 2024 | Using ILP to Learn AppArmor Policies. Lukas Brodschelm, Marcus Gelderie |
| 2024 | Vision Based Malware Classification Using Deep Neural Network with Hybrid Data Augmentation. Md. Mahbubur Rahman, Md Delwar Hossain, Hideya Ochiai, Youki Kadobayashi, Tanjim Sakib, Syed Taha Yeasin Ramadan |
| 2024 | Visual Attention and Privacy Indicators in Android: Insights from Eye Tracking. Michele Guerra, Roberto Milanese, Michele Deodato, Vittorio Perozzi, Fausto Fasano |
| 2024 | Vulnerability Information Sharing Platform for Securing Hardware Supply Chains. Kento Hasegawa, Katsutoshi Hanahara, Hiroshi Sugisaki, Minoru Kozu, Kazuhide Fukushima, Yosuke Murakami, Shinsaku Kiyomoto |
| 2024 | What's Your Purpose? An Approach to Incorporating GDPR Purposes into Requirements Analysis. Evangelia Vanezi, Georgia M. Kapitsaki, Anna Philippou |
| 2024 | Your Robot Might Be Inadvertently or Deliberately Spying on You: A Critical Analysis of Privacy Practices in the Robotics Industry. Farida Eleshin, Patrick Iradukunda, David Ishimwe Ruberamitwe, Eric Ishimwe |