| 2020 | A Subjective Network Approach for Cybersecurity Risk Assessment. Nasser Al-Hadhrami, Matthew Collinson, Nir Oren |
| 2020 | A Survey on Malware Detection with Deep Learning. Muhammet Sahin, Serif Bahtiyar |
| 2020 | AI-based Security for the Smart Networks. Maxim O. Kalinin, Peter D. Zegzhda |
| 2020 | An Approach to Discover and Assess Vulnerability Severity Automatically in Cyber-Physical Systems. Yuning Jiang, Yacine Atif |
| 2020 | Characteristics of a two-stage synchronization algorithm in the system of quantum key distribution with dividing a fiber-optic line into sections with decreasing length. Yakov Mironov, Polina Mironova, Konstantin E. Rumyantsev |
| 2020 | Creating Graphical Passwords on a Mobile Phone: Graphical Passwords on a Mobile. Jessica Fong, Ron Poet |
| 2020 | Credit Card Fraud Detection with NCA Dimensionality Reduction. Beyazit Bestami Yuksel, Serif Bahtiyar, Ayse Yilmazer |
| 2020 | CyberSecurity Attack Prediction: A Deep Learning Approach. Ouissem Ben Fredj, Alaeddine Mihoub, Moez Krichen, Omar Cheikhrouhou, Abdelouahid Derhab |
| 2020 | Detecting Malicious Signal Manipulation in Smart Grids Using Intelligent Analysis of Contextual Data. Farzan Majdani, Lynne Batik, Andrei Petrovski, Sergey Petrovski |
| 2020 | Detection of False Command and Response Injection Attacks for Cyber Physical Systems Security and Resilience. Hope Nkiruka Eke, Andrei Petrovski, Hatem Ahriz |
| 2020 | Detection of attacks on the Internet of Things based on intelligent analysis of devices functioning indicators. Tigran Ovasapyan, Dmitry A. Moskvin, Artem Tsvetkov |
| 2020 | Development of the mathematic model of disymmetric bigram cryptosystem based on a parametric solution family of multi-degree system of Diophantine equations✱. Valeriy O. Osipyan, Kirill I. Litvinov |
| 2020 | Exploiting Race Condition for Wi-Fi Denial of Service Attacks. Karim Lounis, Mohammad Zulkernine |
| 2020 | Eye Gaze-Based Human Error Prevention System: Experts vs. Non-Experts. Oksana Kilik, Abdulaziz Almehmadi, Khalil El-Khatib |
| 2020 | Hacking Passwords that Satisfy Common Password Policies: Hacking Passwords. Richard Beno, Ron Poet |
| 2020 | Intelligent support for network administrator decisions based on combined neural networks. Igor V. Kotenko, Igor Saenko, Fadey Skorik |
| 2020 | Malicious URL Detection Using Supervised Machine Learning Techniques. Vara Vundavalli, Farhat Lamia Barsha, Mohammad Masum, Hossain Shahriar, Hisham Haddad |
| 2020 | Modeling replay and integrity violations attacks for cryptographic protocols source codes verification of e-voting system based on blind intermediaries. Liudmila Babenko, Ilya Pisarev |
| 2020 | Neural network approach to assessing cybersecurity risks in large-scale dynamic networks. Vasiliy M. Krundyshev |
| 2020 | Permission Management and User Privacy Based On Android: Permission Management On Android. Jiyou Wang, Ron Poet |
| 2020 | PoliceChain: Blockchain-Based Smart Policing System for Smart Cities. Arnab Mukherjee, Raju Halder |
| 2020 | Power Analysis Side-Channel Attacks on Symmetric Block Cipher Magma. Stanislav Zhdanov, Ekaterina Maro |
| 2020 | RPM: Additive Stream Ciphers for Lightweight Communication Security. Giovanni Di Crescenzo, Glenn Veach |
| 2020 | SIN 2020: 13th International Conference on Security of Information and Networks, Virtual Event / Istanbul, Turkey, November 4-6, 2020 Siddika Berna Örs, Atilla Elçi |
| 2020 | SMART Citizen Cyber Resilience (SC2R) Ontology. Mamello Thinyane, Debora Irene Christine |
| 2020 | Secure and Privacy-Aware Gateway for Home Automation Systems. Sinem Gur, Simge Demir, Sevval Simsek, Albert Levi |
| 2020 | Social networks bot detection using Benford's law. Maksim Kalameyets, Dmitry Levshun, Sergei Soloviev, Andrey Chechulin, Igor V. Kotenko |
| 2020 | SpotCheck: On-Device Anomaly Detection for Android. Mark Vella, Christian Colombo |
| 2020 | Tension between GDPR and Public Blockchains: A Data-Driven Analysis of Online Discussions. Zeynep Chousein, Haci Yakup Tetik, Rahime Belen Saglam, Abdullah Bülbül, Shujun Li |
| 2020 | Threat Modeling based Penetration Testing: The Open Energy Monitor Case study. Giovanni Salzillo, Massimiliano Rak, Felice Moretta |
| 2020 | Towards a user-centric IAM entitlement shop - Learnings from the e-commerce. Markus Hornsteiner, Sebastian Groll, Alexander Puchta |
| 2020 | Towards systematic honeytoken fingerprinting. Shreyas Srinivasa, Jens Myrup Pedersen, Emmanouil Vasilomanolakis |
| 2020 | Unconventional Mechanisms for Biometric Data Acquisition via Side-Channels. Jonathan Francis Roscoe, Max Smith-Creasey |
| 2020 | Visual spoofing in content-based spam detection. Mark Sokolov, Kehinde Olufowobi, Nic Herndon |
| 2020 | When GDPR Meets CRAs (Credit Reference Agencies): Looking through the Lens of Twitter. Kubra Aydin, Rahime Belen Saglam, Shujun Li, Abdullah Bulbul |