PST C

54 papers

YearTitle / Authors
201816th Annual Conference on Privacy, Security and Trust, PST 2018, Belfast, Northern Ireland, Uk, August 28-30, 2018
Kieran McLaughlin, Ali A. Ghorbani, Sakir Sezer, Rongxing Lu, Liqun Chen, Robert H. Deng, Paul Miller, Stephen Marsh, Jason R. C. Nurse
2018A Family of Droids-Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis.
Lucky Onwuzurike, Mário Almeida, Enrico Mariconti, Jeremy Blackburn, Gianluca Stringhini, Emiliano De Cristofaro
2018A Power Analysis of Cryptocurrency Mining: A Mobile Device Perspective.
James Clay, Alexander Hargrave, Ramalingam Sridhar
2018A Twofold Group Key Agreement Protocol for NoC based MPSoCs.
Gaurav Sharma, Veronika Kuchta, Rajeev Anand Sahu, Soultana Ellinidou, Olivier Markowitch, Jean-Michel Dricot
2018An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks.
William Aiken, Hyoungshick Kim, Jungwoo Ryoo, Mary Beth Rosson
2018Analysis and Evaluation of Syntactic Privacy Notions and Games.
Robin Ankele, Andrew Simpson
2018Andro-Simnet: Android Malware Family Classification using Social Network Analysis.
Hye Min Kim, Hyun Min Song, Jae Woo Seo, Huy Kang Kim
2018Approximating Robust Linear Regression With An Integral Privacy Guarantee.
Navoda Senavirathne, Vicenç Torra
2018At Your Own Risk: Shaping Privacy Heuristics for Online Self-disclosure.
Nicolás E. Díaz Ferreyra, Rene Meis, Maritta Heisel
2018Automated Proofs of Signatures using Bilinear Pairings.
Guruprasad Eswaraiah, Roopa Vishwanathan, Douglas Nedza
2018CHARIOT: Cloud-Assisted Access Control for the Internet of Things.
Clémentine Gritti, Melek Önen, Refik Molva
2018Coalition-Resistant Peer Rating for Long-Term Confidentiality.
Giulia Traverso, Denis Butin, Johannes Buchmann, Alex Palesandro
2018Comprehensible Categorization and Visualization of Orchestrated Malicious Domain Names using Linkage Analysis.
Shin-Ying Huang, Tzu-Hsien Chuang, Shi-Meng Huang, Tao Ban
2018Crossing Cross-Domain Paths in the Current Web.
Jukka Ruohonen, Joonas Salovaara, Ville Leppänen
2018Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart Grid.
Rafiullah Khan, Kieran McLaughlin, John Hastings, David M. Laverty, Sakir Sezer
2018Detecting Cryptomining Using Dynamic Analysis.
Domhnall Carlin, Philip O'Kane, Sakir Sezer, Jonah Burgess
2018Digitized Trust in Human-in-the-Loop Health Research.
Andrew Sutton, Reza Samavi, Thomas E. Doyle, David Koff
2018EagleEye: A Novel Visual Anomaly Detection Method.
Iman Sharafaldin, Ali A. Ghorbani
2018Enabling Users to Balance Social Benefit and Privacy in Online Social Networks.
Sourya Joyee De, Abdessamad Imine
2018Enforcing Privacy and Security in Public Cloud Storage.
João S. Resende, Rolando Martins, Luis Antunes
2018Evaluation and Development of Onomatopoeia CAPTCHAs.
Michihiro Yamada, Riko Shigeno, Hiroaki Kikuchi, Maki Sakamoto
2018Exploring User Behavior and Cybersecurity Knowledge - An experimental study in Online Shopping.
Ghada El Haddad, Amin Shahab, Esma Aïmeur
2018Exploring the Impact of Password Dataset Distribution on Guessing.
Hazel Murray, David Malone
2018Extended Abstract: A Review of Biometric Traits with Insight into Vein Pattern Recognition.
Soheil Varastehpour, Hamid R. Sharifzadeh, Iman Ardekani, Abdolhossein Sarrafzadeh
2018Extended Abstract: Ethical and Privacy Considerations in Cybersecurity.
Brittany Davis, Christopher Whitfield, Mohd Anwar
2018GIDS: GAN based Intrusion Detection System for In-Vehicle Network.
Eunbi Seo, Hyun Min Song, Huy Kang Kim
2018Hide-and-Seek with Website Identity Information.
Milica Stojmenovic, Robert Biddle
2018How-to Express Explicit and Auditable Consent.
Ana C. Carvalho, Rolando Martins, Luis Antunes
2018Industry-Wide Analysis of Open Source Security.
Yiming Zhang, Baljeet Malhotra, Cheng Chen
2018Location Privacy and Utility in Geo-social Networks: Survey and Research Challenges.
Zohaib Riaz, Frank Dürr, Kurt Rothermel
2018Managing Publicly Known Security Vulnerabilities in Software Systems.
Hesham Mahrous, Baljeet Malhotra
2018Mining Sequential Patterns from Outsourced Data via Encryption Switching.
Gamze Tillem, Zekeriya Erkin, Reginald L. Lagendijk
2018Mitigating CSRF attacks on OAuth 2.0 Systems.
Wanpeng Li, Chris J. Mitchell, Thomas M. Chen
2018Mitigating Client Subnet Leakage in DNS Queries.
Lanlan Pan, Xin Zhang, Anlei Hu, Xuebiao Yuchi, Jian Wang
2018Mutual Authentication in Electronic Voting Schemes.
Voke Augoye, Allan Tomlinson
2018On Sybil Classification in Online Social Networks Using Only Structural Features.
Dieudonne Mulamba, Indrajit Ray, Indrakshi Ray
2018Parallel Linear Regression on Encrypted Data.
Toufique Morshed, Dima Alhadidi, Noman Mohammed
2018Peer Based Tracking using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection.
Matthew Hagan, BooJoong Kang, Kieran McLaughlin, Sakir Sezer
2018Poster: Agent-based (BDI) modeling for automation of penetration testing.
Ge Chu, Alexei Lisitsa
2018Privacy Preserving Probabilistic Record Linkage Without Trusted Third Party.
Ibrahim Lazrig, Toan C. Ong, Indrajit Ray, Indrakshi Ray, Xiaoqian Jiang, Jaideep Vaidya
2018Privacy-Preserving Architectures with Probabilistic Guaranties.
Kai Bavendiek, Robin Adams, Sibylle Schupp
2018Privacy-Preserving Subgraph Checking.
Stefan Wüller, Benjamin Assadsolimani, Ulrike Meyer, Susanne Wetzel
2018Problem-based Derivation of Trustworthiness Requirements from Users' Trust Concerns.
Nazila Gol Mohammadi, Nelufar Ulfat-Bunyadi, Maritta Heisel
2018Secure Compression and Pattern Matching Based on Burrows-Wheeler Transform.
Gongxian Zeng, Meiqi He, Linru Zhang, Jun Zhang, Yuechen Chen, Siu-Ming Yiu
2018The Possibility of Matrix Decomposition as Anonymization and Evaluation for Time-sequence Data.
Tomoaki Mimoto, Shinsaku Kiyomoto, Seira Hidano, Anirban Basu, Atsuko Miyaji
2018The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from Japan.
Nissy Sombatruang, Youki Kadobayashi, M. Angela Sasse, Michelle Baddeley, Daisuke Miyamoto
2018Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks.
Jeman Park, DaeHun Nyang, Aziz Mohaisen
2018Towards Improving Privacy Control for Smart Homes: A Privacy Decision Framework.
Mahsa Keshavarz, Mohd Anwar
2018Trust-driven, Decentralized Data Access Control for Open Network of Autonomous Data Providers.
Lukasz Opiola, Lukasz Dutka, Renata G. Slota, Jacek Kitowski
2018Unmasking Android Obfuscation Tools Using Spatial Analysis.
Ratinder Kaur, Ye Ning, Hugo Gonzalez, Natalia Stakhanova
2018Usability and Security Effects of Code Examples on Crypto APIs.
Kai Mindermann, Stefan Wagner
2018Using AP-TED to Detect Phishing Attack Variations.
Sophie Le Page, Gregor von Bochmann, Qian Cui, Jason Flood, Guy-Vincent Jourdan, Iosif-Viorel Onut
2018Weak and Strong Deniable Authenticated Encryption: On their Relationship and Applications.
Kasper Bonne Rasmussen, Paolo Gasti
2018xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDs.
Mordechai Guri, Boris Zadov, Andrey Daidakulov, Yuval Elovici