| 2018 | 16th Annual Conference on Privacy, Security and Trust, PST 2018, Belfast, Northern Ireland, Uk, August 28-30, 2018 Kieran McLaughlin, Ali A. Ghorbani, Sakir Sezer, Rongxing Lu, Liqun Chen, Robert H. Deng, Paul Miller, Stephen Marsh, Jason R. C. Nurse |
| 2018 | A Family of Droids-Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis. Lucky Onwuzurike, Mário Almeida, Enrico Mariconti, Jeremy Blackburn, Gianluca Stringhini, Emiliano De Cristofaro |
| 2018 | A Power Analysis of Cryptocurrency Mining: A Mobile Device Perspective. James Clay, Alexander Hargrave, Ramalingam Sridhar |
| 2018 | A Twofold Group Key Agreement Protocol for NoC based MPSoCs. Gaurav Sharma, Veronika Kuchta, Rajeev Anand Sahu, Soultana Ellinidou, Olivier Markowitch, Jean-Michel Dricot |
| 2018 | An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks. William Aiken, Hyoungshick Kim, Jungwoo Ryoo, Mary Beth Rosson |
| 2018 | Analysis and Evaluation of Syntactic Privacy Notions and Games. Robin Ankele, Andrew Simpson |
| 2018 | Andro-Simnet: Android Malware Family Classification using Social Network Analysis. Hye Min Kim, Hyun Min Song, Jae Woo Seo, Huy Kang Kim |
| 2018 | Approximating Robust Linear Regression With An Integral Privacy Guarantee. Navoda Senavirathne, Vicenç Torra |
| 2018 | At Your Own Risk: Shaping Privacy Heuristics for Online Self-disclosure. Nicolás E. Díaz Ferreyra, Rene Meis, Maritta Heisel |
| 2018 | Automated Proofs of Signatures using Bilinear Pairings. Guruprasad Eswaraiah, Roopa Vishwanathan, Douglas Nedza |
| 2018 | CHARIOT: Cloud-Assisted Access Control for the Internet of Things. Clémentine Gritti, Melek Önen, Refik Molva |
| 2018 | Coalition-Resistant Peer Rating for Long-Term Confidentiality. Giulia Traverso, Denis Butin, Johannes Buchmann, Alex Palesandro |
| 2018 | Comprehensible Categorization and Visualization of Orchestrated Malicious Domain Names using Linkage Analysis. Shin-Ying Huang, Tzu-Hsien Chuang, Shi-Meng Huang, Tao Ban |
| 2018 | Crossing Cross-Domain Paths in the Current Web. Jukka Ruohonen, Joonas Salovaara, Ville Leppänen |
| 2018 | Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart Grid. Rafiullah Khan, Kieran McLaughlin, John Hastings, David M. Laverty, Sakir Sezer |
| 2018 | Detecting Cryptomining Using Dynamic Analysis. Domhnall Carlin, Philip O'Kane, Sakir Sezer, Jonah Burgess |
| 2018 | Digitized Trust in Human-in-the-Loop Health Research. Andrew Sutton, Reza Samavi, Thomas E. Doyle, David Koff |
| 2018 | EagleEye: A Novel Visual Anomaly Detection Method. Iman Sharafaldin, Ali A. Ghorbani |
| 2018 | Enabling Users to Balance Social Benefit and Privacy in Online Social Networks. Sourya Joyee De, Abdessamad Imine |
| 2018 | Enforcing Privacy and Security in Public Cloud Storage. João S. Resende, Rolando Martins, Luis Antunes |
| 2018 | Evaluation and Development of Onomatopoeia CAPTCHAs. Michihiro Yamada, Riko Shigeno, Hiroaki Kikuchi, Maki Sakamoto |
| 2018 | Exploring User Behavior and Cybersecurity Knowledge - An experimental study in Online Shopping. Ghada El Haddad, Amin Shahab, Esma Aïmeur |
| 2018 | Exploring the Impact of Password Dataset Distribution on Guessing. Hazel Murray, David Malone |
| 2018 | Extended Abstract: A Review of Biometric Traits with Insight into Vein Pattern Recognition. Soheil Varastehpour, Hamid R. Sharifzadeh, Iman Ardekani, Abdolhossein Sarrafzadeh |
| 2018 | Extended Abstract: Ethical and Privacy Considerations in Cybersecurity. Brittany Davis, Christopher Whitfield, Mohd Anwar |
| 2018 | GIDS: GAN based Intrusion Detection System for In-Vehicle Network. Eunbi Seo, Hyun Min Song, Huy Kang Kim |
| 2018 | Hide-and-Seek with Website Identity Information. Milica Stojmenovic, Robert Biddle |
| 2018 | How-to Express Explicit and Auditable Consent. Ana C. Carvalho, Rolando Martins, Luis Antunes |
| 2018 | Industry-Wide Analysis of Open Source Security. Yiming Zhang, Baljeet Malhotra, Cheng Chen |
| 2018 | Location Privacy and Utility in Geo-social Networks: Survey and Research Challenges. Zohaib Riaz, Frank Dürr, Kurt Rothermel |
| 2018 | Managing Publicly Known Security Vulnerabilities in Software Systems. Hesham Mahrous, Baljeet Malhotra |
| 2018 | Mining Sequential Patterns from Outsourced Data via Encryption Switching. Gamze Tillem, Zekeriya Erkin, Reginald L. Lagendijk |
| 2018 | Mitigating CSRF attacks on OAuth 2.0 Systems. Wanpeng Li, Chris J. Mitchell, Thomas M. Chen |
| 2018 | Mitigating Client Subnet Leakage in DNS Queries. Lanlan Pan, Xin Zhang, Anlei Hu, Xuebiao Yuchi, Jian Wang |
| 2018 | Mutual Authentication in Electronic Voting Schemes. Voke Augoye, Allan Tomlinson |
| 2018 | On Sybil Classification in Online Social Networks Using Only Structural Features. Dieudonne Mulamba, Indrajit Ray, Indrakshi Ray |
| 2018 | Parallel Linear Regression on Encrypted Data. Toufique Morshed, Dima Alhadidi, Noman Mohammed |
| 2018 | Peer Based Tracking using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection. Matthew Hagan, BooJoong Kang, Kieran McLaughlin, Sakir Sezer |
| 2018 | Poster: Agent-based (BDI) modeling for automation of penetration testing. Ge Chu, Alexei Lisitsa |
| 2018 | Privacy Preserving Probabilistic Record Linkage Without Trusted Third Party. Ibrahim Lazrig, Toan C. Ong, Indrajit Ray, Indrakshi Ray, Xiaoqian Jiang, Jaideep Vaidya |
| 2018 | Privacy-Preserving Architectures with Probabilistic Guaranties. Kai Bavendiek, Robin Adams, Sibylle Schupp |
| 2018 | Privacy-Preserving Subgraph Checking. Stefan Wüller, Benjamin Assadsolimani, Ulrike Meyer, Susanne Wetzel |
| 2018 | Problem-based Derivation of Trustworthiness Requirements from Users' Trust Concerns. Nazila Gol Mohammadi, Nelufar Ulfat-Bunyadi, Maritta Heisel |
| 2018 | Secure Compression and Pattern Matching Based on Burrows-Wheeler Transform. Gongxian Zeng, Meiqi He, Linru Zhang, Jun Zhang, Yuechen Chen, Siu-Ming Yiu |
| 2018 | The Possibility of Matrix Decomposition as Anonymization and Evaluation for Time-sequence Data. Tomoaki Mimoto, Shinsaku Kiyomoto, Seira Hidano, Anirban Basu, Atsuko Miyaji |
| 2018 | The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from Japan. Nissy Sombatruang, Youki Kadobayashi, M. Angela Sasse, Michelle Baddeley, Daisuke Miyamoto |
| 2018 | Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks. Jeman Park, DaeHun Nyang, Aziz Mohaisen |
| 2018 | Towards Improving Privacy Control for Smart Homes: A Privacy Decision Framework. Mahsa Keshavarz, Mohd Anwar |
| 2018 | Trust-driven, Decentralized Data Access Control for Open Network of Autonomous Data Providers. Lukasz Opiola, Lukasz Dutka, Renata G. Slota, Jacek Kitowski |
| 2018 | Unmasking Android Obfuscation Tools Using Spatial Analysis. Ratinder Kaur, Ye Ning, Hugo Gonzalez, Natalia Stakhanova |
| 2018 | Usability and Security Effects of Code Examples on Crypto APIs. Kai Mindermann, Stefan Wagner |
| 2018 | Using AP-TED to Detect Phishing Attack Variations. Sophie Le Page, Gregor von Bochmann, Qian Cui, Jason Flood, Guy-Vincent Jourdan, Iosif-Viorel Onut |
| 2018 | Weak and Strong Deniable Authenticated Encryption: On their Relationship and Applications. Kasper Bonne Rasmussen, Paolo Gasti |
| 2018 | xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDs. Mordechai Guri, Boris Zadov, Andrey Daidakulov, Yuval Elovici |