default search action
CSR 2024: London, UK
- IEEE International Conference on Cyber Security and Resilience, CSR 2024, London, UK, September 2-4, 2024. IEEE 2024, ISBN 979-8-3503-7536-7
- Stavros Shiaeles, Nicholas Kolokotronis, Emanuele Bellini:
Message from the Chairs. xvii-xviii - Evangelos Dragonas, Costas Lambrinoudakis:
Forensic Analysis of Android Notifications' History. 1-6 - Verena Menzel, Jan Speckamp, Anne Remke:
Developing a Robust Communication Infrastructure for a Distributed Smart Grid IDS. 1-8 - Phongsathon Fongta, Sotirios Terzis:
A Trust Management Delegation Protocol for Fog Computing Applications. 1-6 - Guillaume Hutzler, Hanna Klaudel, Witold Klaudel, Franck Pommereau, Artur Rataj:
Automatic Discovery of Cyberattacks. 1-8 - A. Schroeder, Patrick McClure, Preetha Thulasiraman:
Anomaly Detection in Operational Technology Systems Using Non-Intrusive Load Monitoring Based on Supervised Learning. 1-6 - Charles M. R. Da Silva, Paulo André L. De Castro, Cecilia De A. C. Cesar:
Ransomware Detection: Ensemble Machine Learning Models Using Disjoint Data. 1-6 - Cyprien de la Vergne de Cerval, Eric Perret, Jonathan Sarrazin, Olivier Fichot, Vincent E. Urias, William M. S. Stout, Shadya B. Maldonado Rosado:
DIONYSUS - Deception Networks for the Cybersecurity of Physical Protection Systems. 1-6 - Rajesh Kalakoti, Hayretdin Bahsi, Sven Nõmm:
Explainable Federated Learning for Botnet Detection in IoT Networks. 1-8 - Muhammad Saad Sohail, Giancarlo Portamauro, Fabio Patrone, Mario Marchese:
An SDR-Based Framework for Cybersecurity Assessment of Vehicle-to-Everything (V2X) Systems. 1-8 - Rafail A. Ellinitakis, Konstantinos Fysarakis, Panagiotis Bountakas, George Spanoudakis:
Uncovering Hidden Threats: Automated, Machine Learning-based Discovery & Extraction of Cyber Threat Intelligence from Online Sources. 1-6 - Sven Glatzer, Stavros Shiaeles, Rinat Khusainov, Rahim Taheri:
Peer-to-Peer Meets Onion: The Veilid Framework. 1-6 - Sri Haritha Ambati, Norah Ridley, Enrico Branca, Natalia Stakhanova:
Navigating (in)Security of AI-Generated Code. 1-8 - Ruizhe Wang, Sarad Venugopalan, Sridhar Adepu:
Safety Analysis for Cyber-Physical Systems Under Cyber Attacks Using Digital Twin. 1-8 - Adrian Ramsingh, Pradeep Verma:
Understanding & Mitigating the Challenges of Securing Jupyter Notebooks Online. 1-7 - F. Z. Chriki, E. Simó, Francesc Aguiló, I. Garcia-Milà, X. Masip:
A Deep Learning Framework for Safety Monitoring of a Railway Section. 1-6 - Mohammed M. Alani, Ali Ismail Awad, Ezedin Barka:
A Hybrid Ensemble Learning-Based Intrusion Detection System for the Internet of Things. 1-8 - Ehsan Nowroozi, Rahim Taheri, Mehrdad Hajizadeh, Thomas Bauschert:
Verifying the Robustness of Machine Learning based Intrusion Detection Against Adversarial Perturbation. 9-15 - Shadi Sadeghpour, Natalija Vlajic:
ReBotDetector: A Detection Model with LSTM Feature Extractor for Session-Replay Web Bot Attacks. 16-21 - Myria Bouhaddi, Kamel Adi:
When Rewards Deceive: Counteracting Reward Poisoning on Online Deep Reinforcement Learning. 38-44 - Giovanni Battista Gaggero, Roberto Caviglia, Paola Girdinio, Mario Marchese:
Are IDS Violating Segmentation in Industrial Networks? 45-49 - Viet Anh Phan, Jan Jerabek, Dinh Khanh Le, Tomás Gotthans:
New Approach to Shorten Feature Set via TF-IDF for Machine Learning-Based Webshell Detection. 50-55 - Rachel Ladouceur, Abubakr Hassan, Mohamed Mejri, Fehmi Jaafar:
Can Deep Learning Detect Fake News Better when Adding Context Features? 56-61 - Ömer Sen, Christoph Pohl, Immanuel Hacker, Markus Stroot, Andreas Ulbig:
AI-Based Attacker Models for Enhancing Multi-Stage Cyberattack Simulations in Smart Grids Using Co-Simulation Environments. 68-75 - Silvia Bonomi, Marco Cuoci, Simone Lenti:
A Version-Based Algorithm for Quality Enhancement of Automatically Generated Vulnerability Inventories. 76-81 - August Karlsson, Rikard Höglund, Han Wang, Alfonso Iacovazzi, Shahid Raza:
Enabling Cyber Threat Intelligence Sharing for Resource Constrained IoT. 82-89 - Daniel Brown, Natalija Vlajic:
Novel Approach to Tor User De-Anonymization: Client-Side Generated Watermark. 90-95 - Braden J. Saunders, Robson E. De Grande, Glaucio H. S. Carvalho, Isaac Woungang:
Deep Graph Learning for DDoS Detection and Multi-Class Classification IDS. 96-100 - João Lopes, Pedro Pinto, Alberto Partida, António Pinto:
Use of Visibility Graphs for the Early Detection of DoS Attacks. 101-106 - Onat Güngör, Tajana Rosing, Baris Aksanli:
A2HD: Adaptive Adversarial Training for Hyperdimensional Computing-Based Intrusion Detection Against Adversarial Attacks. 107-113 - Zihao Wang, Kar-Wai Fok, Vrizlynn L. L. Thing:
Emerging Trends in 5G Malicious Traffic Analysis: Enhancing Incremental Learning Intrusion Detection Strategies. 114-119 - Soraya Harding, Mo Adda:
Multi-Blockchain Model for IoT Devices Forensic Investigations on Spidernet. 120-126 - Claudia Greco, Michele Ianni, Giuseppe Seminara, Antonella Guzzo, Giancarlo Fortino:
A Forensic Framework for Screen Capture Validation in Legal Contexts. 127-132 - Danielle Hanson, Jeremy Straub:
A Systematic Review of Cybersecurity Audit Frameworks for the Internet of Things. 133-138 - Sthembile Ntshangase, Norman Nelufule, David Mulihase, Mamello Mtshali, Chantel Mokoena, Palesa Moloi:
A Survey of Digital Forensic Tools for Android and iOS Smart Phones. 139-145 - Zhe Deng, Arthur Hubert, Sadok Ben Yahia, Hayretdin Bahsi:
Active Learning-Based Mobile Malware Detection Utilizing Auto-Labeling and Data Drift Detection. 146-151 - Onat Güngör, Elvin Li, Zhengli Shang, Yutong Guo, Jing Chen, Johnathan Davis, Tajana Rosing:
Rigorous Evaluation of Machine Learning-Based Intrusion Detection Against Adversarial Attacks. 152-158 - Gerard Shu Fuhnwi, Matthew Revelle, Clemente Izurieta:
A Hybrid Anomaly Detection Approach for Obfuscated Malware. 159-165 - Luca Chianese, Daniele Granata, Paolo Palmiero, Massimiliano Rak:
Leveraging Threat Modelling for Effective Penetration Testing in 5G Systems. 180-185 - Jan von der Assen, Jasmin Hochuli, Thomas Grübl, Burkhard Stiller:
The Danger Within: Insider Threat Modeling Using Business Process Models. 186-192 - Natalija Vlajic, Gabriele Cianfarani, Robert Noce:
Data Siphoning in ICSs: Attack Tree and Role of Cryptoperiods. 193-199 - Kajal Patel, Zubair Shafiq, Mateus Schulz Nogueira, Daniel Sadoc Menasché, Enrico Lovat, Taimur Kashif, Ashton Woiwood, Matheus Martins:
Harnessing TI Feeds for Exploitation Detection. 200-207 - Vasudha Vedula, Rajendra V. Boppana, Palden Lama:
Attack-Specific Feature Construction to Detect Malicious TCP Flows. 208-215 - Raúl Reinosa Simón, Clara I. Valero, José A. Martínez Cadenas, Elisa R. Heymann, Ignacio Lacalle, Barton P. Miller, Carlos Enrique Palau:
Empirical Analysis and Practical Assessment of Ransomware Attacks to Data in Motion. 216-221 - Simone Orlando, Alessandro Barenghi, Gerardo Pelosi:
Investigating the Health State of X.509 Digital Certificates. 222-227 - Sumit Kumar Paul, D. A. Knox:
ROT: Retention and Operation Limitation Using TEE. 228-234 - David Shur, Giovanni Di Crescenzo, T. Chen, Zahir Patni, Y.-J. Lin, Scott Alexander, Benjamin Flin, R. Levonas:
Energy-efficient Hardening of the SEDIMENT Methodology for Scalable IoT Network Security. 235-240 - Hrishikesh Karmarkar, Vaibhavi Joshi, R. Venkatesh:
Detecting Covert Channels in Cloud Access Control Policies Using Large Language Models. 241-246 - Anna Kougioumtzidou, Angelos Papoutsis, Dimitrios Kavallieros, Thanassis Mavropoulos, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris:
An End-to-End Framework for Cybersecurity Taxonomy and Ontology Generation and Updating. 247-254 - Jeremy Straub:
Application of Robotic Exploration Principles to the Challenge of Cybersecurity Penetration Testing. 255-261 - Cheng Wang, Christopher Redino, Ryan Clark, Abdul Rahman, Sal Aguinaga, Sathvik Murli, Dhruv Nandakumar, Roland Rao, Lanxiao Huang, Daniel Radke, Edward Bowen:
Leveraging Reinforcement Learning in Red Teaming for Advanced Ransomware Attack Simulations. 262-269 - Jonathan Gregory, Qi Liao:
Autonomous Cyberattack with Security-Augmented Generative Artificial Intelligence. 270-275 - Daniele Bringhenti, Francesco Pizzato, Riccardo Sisto, Fulvio Valenza:
A Looping Process for Cyberattack Mitigation. 276-281 - Jakob Nyberg, Pontus Johnson:
Structural Generalization in Autonomous Cyber Incident Response with Message-Passing Neural Networks and Reinforcement Learning. 282-289 - Salvatore Barone, Valentina Casola, Salvatore Della Torca:
Ineffectiveness of Digital Transformations for Detecting Adversarial Attacks Against Quantized and Approximate CNNs. 290-295 - Norbert Tihanyi, Mohamed Amine Ferrag, Ridhi Jain, Tamás Bisztray, Mérouane Debbah:
CyberMetric: A Benchmark Dataset based on Retrieval-Augmented Generation for Evaluating LLMs in Cybersecurity Knowledge. 296-302 - Taylor Perkins, Brian Lachine:
A Time-Series and Density-Based Filter for DNS Log Reduction and Analysis. 303-308 - Dennis Song, Yuping Yan, George Shao, Feida Zhu, Mason Song:
A Security Analysis of a Deterministic Key Generation Scheme. 309-314 - Pierre Mondon, Rogério de Lemos:
Detecting Cryptographic Functions for String Obfuscation. 315-320 - Francesco Settanni, Alessandro Zamponi, Cataldo Basile:
Dynamic Security Provisioning for Cloud-Native Networks: An Intent-Based Approach. 321-328 - Fahad Ahmad, Katerina Kanta, Stavros Shiaeles, Afia Naeem, Zarnab Khalid, Kainaat Mahboob:
Enhancing ATM Security Management in the Post-Quantum Era with Quantum Key Distribution. 329-334 - Sean McElroy:
Identifying Android Banking Malware Through Measurement of User Interface Complexity. 348-353 - Saeid Sheikhi, Panos Kostakos:
Advancing Security in 5G Core Networks Through Unsupervised Federated Time Series Modeling. 353-356 - Lanlan Pan, Ruonan Qiu, Chuan Zhang, Minghui Yang:
Building a Secure Cross-Device Communication Channel for Smart Devices Based on App Accounts. 360-366 - Mohammad Rasool Momeni, Abdollah Jabbari, Carol J. Fung:
A Privacy-Preserving and Secure Scheme for Online Payment in the Realm of Mobile Commerce. 367-372 - Nicholas Mayone, Pascal Kunz, Beytüllah Yigit, Wissem Soussi, Burkhard Stiller, Gürkan Gür:
IPv6 Connection Shuffling for Moving Target Defense (MTD) in SDN. 373-378 - Jarrod Ragsdale, Rajendra V. Boppana:
Evaluating Few-Shot Learning Generative Honeypots in A Live Deployment. 379-386 - Saul Johnson, Remco Hassing, Jeroen Pijpker, Rob Loves:
A Modular Generative Honeypot Shell. 387-394 - Claudio Curto, Daniela Giordano, Daniel Gustav Indelicato, Vladimiro Patatu:
Can a Llama Be a Watchdog? Exploring Llama 3 and Code Llama for Static Application Security Testing. 395-400 - Intissar Ziani, Gueltoum Bendiab, Mourad Bouzenada, Stavros Shiaeles:
Video-Based Abnormal Human Behaviour Detection for Video Forensics. 401-406 - Anastasiia Voitenko, Mourad Oussalah:
On Impact of Video Motion on Image Encryption/Decryption. Comparative Results. 407-412 - Sundas Munir, Walid Taha, Mirza Sanam Iqbal Baig:
Static Detection of Missing Validations in Solidity Smart Contracts. 413-420 - Panagiotis Leonis, Konstantinos Ntouros, Antonio I. Mazilu, Sotirios Brotsis, Nicholas Kolokotronis:
SEAGuard: A Blockchain-Based Security Framework for IoT Maritime Transportation Systems. 421-426 - Mohamed Amjath, Shagufta Henna:
Rényi Differential Privacy Analysis of Skellam Under Federated Learning in Internet of Health Things. 427-431 - Anupriya Pandey, Kamal Singh:
Software Security Testing Lifecycle for Automotive Products. 432-436 - Jan von der Assen, Jamo Sharif, Chao Feng, Christian Killer, Gérôme Bovet, Burkhard Stiller:
Asset-Centric Threat Modeling for AI-Based Systems. 437-444 - Breno Silva Pinto, Lucas Cioffi, Felipe Espósito:
Third-party Cloud Risk Management. 445-451 - Fatih Gey, Cédric Hébert, Holger Mack:
Zero to Trust? Bringing Application-Level Intelligence at Scale to Detection Engineering. 452-457 - Kumar Thummapudi, Rajendra V. Boppana, Palden Lama:
Towards Live Detection of Ransomware Attacks. 458-465 - Rajendra Shivaji Patil, Markus Dypbukt Källman, Viktoria Fodor:
DefenceRank - Ranking Based Attack Graph Analysis and Defence Prioritization. 466-473 - Maryam Zahid, Alessio Bucaioni, Francesco Flammini:
On the ISO Compliance of Model-Based Risk Assessment for Autonomous Cyber-Physical Production Systems. 474-479 - Sezen Acur, Teun Hendriks:
The Need for Cyber-Resilience in Complex Systems. 480-485 - Utku Budak, Fabrizio De Santis, Georg Sigl:
A Lightweight Firmware Resilience Engine for IoT Devices Leveraging Minimal Processor Features. 486-491 - Samin Moosavi, Isabel Moore, Swaminathan Gopalswamy:
Using a Sensor-Health-Aware Resilient Fusion for Localization in the Presence of GPS Spoofing Attacks. 498-505 - Joshua Sylvester, Rogério de Lemos:
Identifying Novelty in Network Traffic. 506-511 - Amalia Damianou, Mariana S. Mazi, Georgios Rizos, Antonis Voulgaridis, Konstantinos Votis:
Situational Awareness Scoring System in Cyber Range Platforms. 520-525 - Gohar Sargsyan:
Cybersecurity as a Backbone for Sustainability. 526-530 - Kushal Srivastava, Katja Faist, Benjamin Lickert, Karen Neville, Nora McCarthy, Mirjam Fehling-Kaschek, Alexander Stolz:
Assessment of the Impact of Cyber-Attacks and Security Breaches in Diagnostic Systems on the Healthcare Sector. 531-536 - Chinazunwa Uwaoma, Ayush Enkhtaivan:
The Affordability of Cybersecurity Costs in Developing Countries: A Systematic Review. 545-550 - Alexis Coca, Fudong Li, Stavros Shiaeles, Deha Wu, Fan Liu:
The Effect of Privacy Concerns, Interaction, Trust, Age, and Gender on Self-Disclosure Behaviours on Social Networking Sites. 551-556 - Matija Kikelj, Ivan Sabic:
Strengthening the Digital Ecosystem: Effects of the Cyber Resilience Act (CRA) on Open-Source Software. 557-561 - Lalita Jagadeesan, Shushu Liu, Lizette Velázquez:
Designing Trustworthy Decentralized Cross-Chain Marketplaces: A 6G Network of Networks Perspective. 562-569 - Jasmin Cosic, Admir Jukan, Miroslav Baca:
Strengthening Cybersecurity Certifications Through Robust Chain of Custody Practices. 570-574 - Mahdad Pourmadadkar, Marianna Lezzi, Ali Aghazedeh Ardebili:
Investigating Cyber Risks in a Surgical Process for Healthcare Cyber Resilience. 575-580 - Prodromos Kiriakidis, Efi Kafali, Georgios Rizos, Antonis Voulgaridis, Theodoros Semertzidis, Stephane Gazut, Petros Daras, Konstantinos Votis:
Building a Use Case-Driven Adversarial Threat Matrix: A Comprehensive Approach. 587-592 - George Lazaridis, Anastasios Drosou, Periklis Chatzimisios, Dimitrios Tzovaras:
Unraveling the Threat Landscape of CPS: Modbus TCP Vulnerabilities in the Era of I4.0. 593-598 - Mubashir Murshed, Afrin Jubaida, Robson E. De Grande, Glaucio H. S. Carvalho:
Vehicular Network Security Against RF Jamming: An LSTM Detection System. 599-604 - Shadi Sadeghpour, Farhath Zareen, William A. Johnson:
From Data to Defense: Real-Time Detection of Botnets in IoT Using LSTM Networks. 605-611 - Sani M. Abdullahi, Sanja Lazarova-Molnar:
Toward a Unified Security Framework for Digital Twin Architectures. 612-617 - Leyli Karaçay, Ahmet Cihat Baktir, Ramin Fuladi, Elham Dehghan Biyar, Ömer Faruk Tuna, Ipek Arikan:
Secure AI/ML-Based Control in Intent-Based Management System. 618-623 - Alì Aghazadeh Ardebili, Antonella Longo, Antonio Ficarella:
Enhancing Cyber-Physical Security: Integrating Virtual Fences Within Digital Twins. 630-637 - Gabor Visky, Sokratis Katsikas, Olaf Maennel:
Lightweight Testbed for IEC61162-450-Related Cyber Security Research. 638-643 - Gabor Visky, Aleksei Siganov, Muaan ur Rehman, Risto Vaarandi, Hayretdin Bahsi, Leonidas Tsiopoulos:
Hybrid Cybersecurity Research and Education Environment for Maritime Sector. 644-651 - Stefano Perone, Luca Faramondi, Simone Guarino, Roberto Setola, Martina Nobili, Francesco Flammini, Franca Corradini:
Cybersecurity for Safety: Risk Assessment of Autonomous Cyber-Physical Systems. 652-657 - Alexander Dalton, David Thomas, Peter Cheung:
DSCS: Towards an Extensible Secure Decentralised Distributed Computation Protocol. 658-663 - Giovanni Maria Cristiano, Salvatore D'Antonio, Federica Uccello:
A Novel Approach for Securing Federated Learning: Detection and Defense Against Model Poisoning Attacks. 664-669 - Roberto Nardone, Alfredo Petruolo, Federica Uccello:
Secure and Transparent Data Sharing Among Connected Devices: Integrating Data Spaces and Provenance. 670-675 - Salvatore D'Antonio, Jonah Giglio, Giovanni Mazzeo, Federica Uccello, Teresa Mannarino:
Enhancing Healthcare Data Confidentiality through Decentralized TEE Attestation. 676-681 - Stelios Erotokritou, Ioannis Giannoulakis, Emmanouil Kafetzakis, Konstantinos Kaltakis:
Simplifying Differential Privacy for Non-Experts: The ENCRYPT Project Approach. 682-687 - Stefano Perone, Luca Faramondi, Simone Guarino, Martina Nobili, Roberto Setola, Ernesto Del Prete, Giovanni Patruno, Luca Piccirillo, Annunziata Laurenda:
ZADIG: A novel Extended Detection and Response System. 688-693 - Orion Papadakis, Michail Papadimitriou, Athanasios Stratikopoulos, Maria Xekalaki, Juan Fumero, Nikos Foutris, Christos Kotselidis:
Towards GPU Accelerated FHE Computations. 694-699 - Christina Karalka, Georgios Meditskos, Maria Papoutsoglou, Nick Bassiliades:
Towards a Generic Knowledge Graph Construction Framework for Privacy Awareness. 700-705 - Ioannis Stamelos, George Hatzivasilis, Sotiris Ioannidis:
Active Honey Files for Ransomware Encryption Mitigation. 706-713 - Fatimah Aloraini, Amir Javed:
Adversarial Attacks in Intrusion Detection Systems: Triggering False Alarms in Connected and Autonomous Vehicles. 714-719 - Yazeed Alrowaili, Neetesh Saxena, Pete Burnap:
Towards Developing an Asset-Criticality Identification Framework in Smart Grids. 720-725 - Nigel Davies, Huseyin Dogan, Duncan Ki-Aries, Nan Jiang, Chris Williams:
Foundations for Modelling Conscientious Attacking in Electromagnetic Cyberspace. 726-731 - Vasilis Ieropoulos:
The Impact of GPS Interference in the Middle East. 732-736 - Tommaso Romano, Fatemeh Mohammadi, Paolo Ceravolo:
Synthetic Data for Identifying Inclusive Language (Case Study: Job Descriptions in Italian). 737-742 - Paolo Ceravolo, Fatemeh Mohammadi, Marta Annamaria Tamborini:
Active Learning Methodology in LLMs Fine-Tuning. 743-749 - Marius Cotiga, Jens Myrup Pedersen, Edlira Dushku:
Cyber Resilience in OT: Characteristics and Security Challenges. 750-756 - Mark R. Weimar:
Framework for Quantitative Evaluation of Resilience Solutions: An Approach to Determine the Value of Resilience for a Particular Site. 757-762 - Stanislas G. Bianou, Rodrigue G. Batogna:
PENTEST-AI, an LLM-Powered Multi-Agents Framework for Penetration Testing Automation Leveraging Mitre Attack. 763-770 - Yvonne Hwei-Syn Kam, Kevin D. Jones, Kimberly Tam, Robert Rawlinson-Smith:
Taxonomy of Cyber Risk Mitigation Cost Benefit Analysis Methods for Energy Infrastructure. 771-776 - Georgios Andronikidis, Charis Eleftheriadis, Zisis Batzos, Konstantinos Kyranou, Nikolaos Maropoulos, Gohar Sargsyan, Panagiotis I. Radoglou-Grammatikis, Panagiotis G. Sarigiannidis:
AI-Driven Anomaly and Intrusion Detection in Energy Systems: Current Trends and Future Direction. 777-782 - Christos Dalamagkas, Dimitrios Christos Asimopoulos, Panagiotis I. Radoglou-Grammatikis, Nikolaos Maropoulos, Thomas Lagkas, Vasileios Argyriou, Gohar Sargsyan, Panagiotis G. Sarigiannidis:
AI4COLLAB: An AI-based Threat Information Sharing Platform. 783-788 - Aurélie Kpoze, Abdelkader Lahmadi, Isabelle Chrisment, Jules Degila:
SDN-Based Reconfiguration of Distributed and Cooperative Microgrid Control Systems for Mitigating Synchronization Attacks. 789-794 - Margherita Bottoni, Emanuele Bellini, Emeri Farinetti:
Towards a Reputational-Based Trustworthy Archaeological Information System. 795-800 - Emanuele Bellini, Emiliano Degl'Innocenti:
Transitioning SSH European Research Infrastructures to Critical Infrastructure Through Resilience. 801-806 - Christopher Rouff, Ali Tekeoglu:
SoK: Autonomic Computing Based Mehods for ICS/SCADA and IIoT Security. 807-812 - Benny Rubin, Ali Tekeoglu, Christopher Rouff:
Autonomic Passive IT-OT Device Classification in ICS/SCADA Networks. 813-818 - Christos Spyridakis, Angeliki Aktypi, Thomas Kyriakakis, Sotiris Ioannidis:
SecureExecutor: An Automated Way to Leverage SCONE to Enhance Application Security. 827-832 - Spyridon Papastergiou, Shareeful Islam, Eleni-Maria Kalogeraki, Argyro Chatzopoulou, Panagiotis Bountakas, Konstantinos Pournaras, Sreedevi Beena, Nineta Polemi:
Composite Inspection and Certification (CIC) System for Cybersecuity Assessment of ICT Products, Services, and Processes. 833-838 - Paul Tavolato, Robert Luh, Sebastian Eresheim, Simon Gmeiner, Sebastian Schrittwieser:
Quantifying the Odds in Real World Attack Scenarios. 845-852 - Robert Andrew Chetwyn, Martin Eian, Audun Jøsang:
Onto Hunt - A Semantic Reasoning Approach to Cyber Threat Hunting with Indicators of Behaviour. 853-859 - Dimitrios Kasimatis, Sam Grierson, William J. Buchanan, Chris Eckl, Pavlos Papadopoulos, Nikolaos Pitropakis, Christos Chrysoulas, Craig Thomson, Baraq Ghaleb:
DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof. 866-871 - Daniel Spiekermann, Jörg Keller:
Challenges of Digital Investigations in Nowadays Communication Networks. 872-877 - Jian Xi, Lukas Jaeckel, Michael Spranger, Melanie Siegel, Dirk Labudde:
Forensic Communication Analysis: Challenges and Opportunities. 878-883 - Ievgen Kabin, Zoya Dyka, Alkistis Aikaterini Sigourou, Peter Langendoerfer:
Static Power Consumption as a New Side-Channel Analysis Threat to Elliptic Curve Cryptography Implementations. 884-889 - Hongwei Zhao, Vianney Lapôtre, Guy Gogniat:
Communication Architecture Under Siege: An In-depth Analysis of Fault Attack Vulnerabilities and Countermeasures. 890-896 - Cesare Caratozzolo, Valeria Rossi, Kamil Witek, Alberto Trombetta, Massimo Caccia:
On-line Anomaly Detection and Qualification of Random Bit Streams. 897-904 - Ievgen Kabin, Jan Schäffner, Alkistis Aikaterini Sigourou, Dmytro Petryk, Zoya Dyka, Dominik Klein, Sven Freud, Peter Langendoerfer:
Stealth Attacks on PCBs: An Experimental Plausibility Analysis. 905-912 - Marios Papadopoulos, Kostas Lampropoulos, Paris Kitsos:
FPGA-Based Cloud Security Solutions for 5G Networks. 913-918 - Evangelia Konstantopoulou, George S. Athanasiou, Nicolas Sklavos:
Minimizing Area Footprint of UAV Communication Security Using FPGAs. 919-924
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.