| 2018 | A Conceptual Framework To Identify Cyber Risks Associated With The Use Of Public Cloud Computing. David Bird |
| 2018 | A mathematical model of the cryptosystem based on the linear Diophantine equation. Valeriy O. Osipyan, Kirill I. Litvinov |
| 2018 | Anonymity in Secure Access to Integrated Touristic Services Including Payment. María Magdalena Payeras Capellà, Macià Mut Puigserver, Llorenç Huguet i Rotger |
| 2018 | Applying Deep Learning and Vector Representation for Software Vulnerabilities Detection. Alexander I. Pechenkin, Roman Demidov |
| 2018 | Applying deep learning techniques for Android malware detection. Peter D. Zegzhda, Dmitry P. Zegzhda, Evgeny Pavlenko, Gleb Ignatev |
| 2018 | Architecture of the Software System for Adaptive Protection of Network Infrastructure. Dmitriy K. Levonevskiy, Ludmila N. Fedorchenko, Irina Afanasieva, Fedor Novikov |
| 2018 | Big Data Analytics Architecture for Security Intelligence. Ahmed Dauda, Scott McLean, Abdulaziz Almehmadi, Khalil El-Khatib |
| 2018 | Bypass Biometric Lock Systems With Gelatin Artificial Fingerprint. Ekaterina Maro, Maksim Kovalchuk |
| 2018 | Detection of packaged and encrypted PE files with the use of machine-learning algorithm. R. A. Gevorgyan, E. S. Abramov |
| 2018 | Development of a Protection System for a Group of Mobile Robots, Taking into Account the Requirements of Foreign and Russian Legislation. Maxim Pismensky, Elena Basan, Oleg B. Makarevich |
| 2018 | Development of method for malware classification based on statistical methods and an extended set of system calls data. Ludmila K. Babenko, Alexey Kirillov |
| 2018 | Development of the Anomaly Detection Method for a Group of Mobile Robots. Elena Basan, Oleg B. Makarevich, Alexandr S. Basan |
| 2018 | Development of the Methodology for Testing the Security of Group Management System for Mobile Robots. Elena Basan, Oleg B. Makarevich, Andrew Stepenkin |
| 2018 | Developments in State Level Cyber Wargaming. John Curry, Nick Drage |
| 2018 | Distributed E-Voting System Based On Blind Intermediaries Using Homomorphic Encryption. Liudmila Babenko, Ilya Pisarev |
| 2018 | Efficient Strong Key Indistinguishable Access Control in Dynamic Hierarchies with Constant Decryption Cost. Gaurav Pareek, B. R. Purushothama |
| 2018 | Floating Genesis Block Enhancement for Blockchain Based Routing Between Connected Vehicles and Software-defined VANET Security Services. Alexey G. Busygin, Artem S. Konoplev, Maxim O. Kalinin, Dmitry P. Zegzhda |
| 2018 | How Dangerous Permissions are Described in Android Apps' Privacy Policies? Rawan Baalous, Ronald Poet |
| 2018 | Implementation of Intelligent Agents for Network Traffic and Security Risk Analysis in Cyber-Physical Systems. Igor V. Kotenko, Sergey Ageev, Igor Saenko |
| 2018 | Linear and Differential Analysis of Simplified Kuznyechik Cipher. Evgeniya Ishchukova, Maxim Anikeev, Vyacheslav Salmanov, Oksana Shamilyan |
| 2018 | Proceedings of the 11th International Conference on Security of Information and Networks, SIN 2018, Cardiff, United Kingdom, September 10-12, 2018 Philipp Reinecke, Naghmeh Moradpoor, George Theodorakopoulos |
| 2018 | SCADA Networks Anomaly-based Intrusion Detection System. Abdulaziz Almehmadi |
| 2018 | Secure Data Aggregation in WSNs: A Two Level Framework. Vishnu Kumar, Rajveer Singh Shekhawat, Manoj Kumar Bohra |
| 2018 | Software Tool for Testing the Packet Analyzer of Network Attack Detection Systems. Alexander Branitskiy, Igor V. Kotenko |
| 2018 | Solving the trust issues in the process of transportation of dangerous goods by using blockchain technology. Adnan Imeri, Christophe Feltus, Djamel Khadraoui, Nazim Agoulmine, Damien Nicolas |
| 2018 | Synthetic datasets generation for intrusion detection in VANET. Viacheslav Belenko, Vasiliy M. Krundyshev, Maxim O. Kalinin |
| 2018 | Towards Profiling Program Instances in Host-Based Intrusion Detection Systems by Recognizing Software Update Patterns. Lauri Koivunen, Sampsa Rauti, Ville Leppänen |
| 2018 | Trapdoor-indistinguishable Secure Channel Free Public Key Encryption with Multi-Keywords Search (Student Contributions). Yang Ma, Hassan B. Kazemian |
| 2018 | Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things. Felisberto Semedo, Naghmeh Moradpoor, Majid Rafiq |