


default search action
13th ARES 2018: Hamburg, Germany
- Sebastian Doerr, Mathias Fischer, Sebastian Schrittwieser, Dominik Herrmann:

Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018. ACM 2018, ISBN 978-1-4503-6448-5
SAW 2018: SAW I - Software Security Testing and Cyber-Resilience
- Suneel Randhawa, Benjamin P. Turnbull

, Joseph Yuen, Jonathan Dean:
Mission-Centric Automated Cyber Red Teaming. 1:1-1:11 - Routa Moussaileb, Benjamin Bouget, Aurélien Palisse, Hélène Le Bouder, Nora Cuppens, Jean-Louis Lanet:

Ransomware's Early Mitigation Mechanisms. 2:1-2:10 - Otto Hellwig

, Gerald Quirchmayr
, Walter Hötzendorfer, Christof Tschohl, Edith Huber, Franz Vock, Florian Nentwich, Bettina Pospisil
, Matthias Gusenbauer, Gregor Langner
:
A GDPR compliance module for supporting the exchange of information between CERTs. 3:1-3:7
ARES Full Papers: ARES Full I - Machine Learning
- Huy H. Nguyen

, Ngoc-Dung T. Tieu, Hoang-Quoc Nguyen-Son, Vincent Nozick, Junichi Yamagishi, Isao Echizen:
Modular Convolutional Neural Network for Discriminating between Computer-Generated Images and Photographic Images. 1:1-1:10 - Alexander Aigner:

FALKE-MC: A Neural Network Based Approach to Locate Cryptographic Functions in Machine Code. 2:1-2:8
ARES Full Papers: ARES Full II - Best Paper Session
- Majid Nateghizad, Thijs Veugen, Zekeriya Erkin

, Reginald L. Lagendijk:
Secure Equality Testing Protocols in the Two-Party Setting. 3:1-3:10 - Vaibhavi Kalgutkar, Natalia Stakhanova, Paul Cook, Alina Matyukhina

:
Android authorship attribution through string analysis. 4:1-4:10 - Heng Zhang, Jesus Luna, Neeraj Suri

, Rubén Trapero:
Flashlight: A Novel Monitoring Path Identification Schema for Securing Cloud Services. 5:1-5:10
SAW 2018: SAW II - Secure Software Development
- Thomas Lorünser

, Henrich C. Pöhls, Leon Sell, Thomas Laenger:
CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle. 4:1-4:9 - Priya Anand, Jungwoo Ryoo:

Architectural Solutions to Mitigate Security Vulnerabilities in Software Systems. 5:1-5:5
ARES Full Papers: ARES Full III - Software Security
- Jorrit Kronjee, Arjen Hommersom

, Harald P. E. Vranken:
Discovering software vulnerabilities using data-flow analysis and machine learning. 6:1-6:10 - Ulf Kargén

, Nahid Shahmehri:
Speeding Up Bug Finding using Focused Fuzzing. 7:1-7:10 - Brett Benyo

, Shane S. Clark, Aaron Paulos, Partha P. Pal
:
HYDRA: Hypothesis Driven Repair Automation. 8:1-8:10
SSE 2018: SSE I - Secure software development and DevOps
- Kalle Rindell

, Jukka Ruohonen
, Sami Hyrynsalmi
:
Surveying Secure Software Development Practices in Finland. 6:1-6:7 - Pawel Rajba

:
Challenges and mitigation approaches for getting secured applications in an enterprise company. 7:1-7:6 - Martin Gilje Jaatun:

Software Security Activities that Support Incident Management in Secure DevOps. 8:1-8:6
CUING 2018: CUING I
- Martin Steinebach, Andre Ester, Huajian Liu:

Channel Steganalysis. 9:1-9:8 - Wojciech Mazurczyk

, Steffen Wendzel
, Krzysztof Cabaj
:
Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach. 10:1-10:10 - Christian Kraetzer, Jana Dittmann:

Steganography by synthesis: Can commonplace image manipulations like face morphing create plausible steganographic channels? 11:1-11:8
ARES Full Papers: ARES Full IV - Security and the User
- Mark Daniels, John R. Rose, Csilla Farkas:

Protecting Patients' Data: An Efficient Method for Health Data Privacy. 9:1-9:10 - Daniela Yabe, Caio Augusto Rodrigues dos Santos

, Lucas Miranda Assuncao, Rivalino Matias Jr.:
Influence Factors on the Quality of User Experience in OS Reliability: A Qualitative Experimental Study. 10:1-10:10
ARES Full Papers: ARES Full V - Cryptography
- Nina Gerber

, Verena Zimmermann, Birgit Henhapl, Sinem Emeröz, Melanie Volkamer:
Finally Johnny Can Encrypt: But Does This Make Him Feel More Secure? 11:1-11:10 - Masoomeh Sepehri

, Alberto Trombetta
, Maryam Sepehri, Ernesto Damiani:
An Efficient Cryptography-Based Access Control Using Inner-Product Proxy Re-Encryption Scheme. 12:1-12:10 - Olivier Blazy

, Céline Chevalier:
Non-Interactive Key Exchange from Identity-Based Encryption. 13:1-13:10
CUING 2018: CUING II
- Krzysztof Cabaj

, Wojciech Mazurczyk
, Piotr Nowakowski
, Piotr Zórawski
:
Towards Distributed Network Covert Channels Detection Using Data Mining-based Approach. 12:1-12:10 - Steffen Wendzel

:
Get Me Cited, Scotty!: Analysis of Citations in Covert Channel/Steganography Research. 13:1-13:8
CUING 2018: CUING III
- Daniel Geisler, Wojciech Mazurczyk

, Jörg Keller:
Towards Utilization of Covert Channels as a Green Networking Technique. 14:1-14:10 - Asanka P. Sayakkara

, Nhien-An Le-Khac
, Mark Scanlon
:
Accuracy Enhancement of Electromagnetic Side-Channel Attacks on Computer Monitors. 15:1-15:9
ARES Full Papers: ARES Full VI - Anomaly Detection
- Martin Pirker

, Patrick Kochberger
, Stefan Schwandter:
Behavioural Comparison of Systems for Anomaly Detection. 14:1-14:10 - Zongze Li

, Matthew Davidson, Song Fu, Sean Blanchard, Michael Lang:
Converting Unstructured System Logs into Structured Event List for Anomaly Detection. 15:1-15:10 - Sarita Paudel

, Paul Smith
, Tanja Zseby:
Stealthy Attacks on Smart Grid PMU State Estimation. 16:1-16:10
IoT-SECFOR 2018: IoT-SECFOR I- Security Assessment & Analysis
- Musa G. Samaila

, João B. F. Sequeiros, Mário M. Freire
, Pedro R. M. Inácio
:
Security Threats and Possible Countermeasures in IoT Applications Covering Different Industry Domains. 16:1-16:9
ARES Full Papers: ARES Full VII - Network Security and Monitoring I
- Wilfried Mayer, Thomas Schreiber, Edgar R. Weippl:

A Framework for Monitoring Net Neutrality. 17:1-17:10 - Julian Rauchberger, Sebastian Schrittwieser, Tobias Dam

, Robert Luh, Damjan Buhov, Gerhard Pötzelsberger, Hyoungshick Kim:
The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns. 18:1-18:10
IoT-SECFOR 2018: IoT-SECFOR II - Security Attacks & Solutions
- Eef van Es, Harald P. E. Vranken, Arjen Hommersom

:
Denial-of-Service Attacks on LoRaWAN. 17:1-17:6 - Martin Serror

, Martin Henze
, Sacha Hack, Marko Schuba, Klaus Wehrle
:
Towards In-Network Security for Smart Homes. 18:1-18:8 - Radek Fujdiak, Petr Blazek, Konstantin Mikhaylov

, Lukas Malina
, Petr Mlynek
, Jiri Misurec, Vojtech Blazek:
On Track of Sigfox Confidentiality with End-to-End Encryption. 19:1-19:6 - Alan J. Michaels:

Improved RNS-based PRNGs. 20:1-20:5
ARES Full Papers: ARES Full VIII - Network Security and Monitoring II
- Gustavo Gonzalez Granadillo, Jose Rubio-Hernan

, Joaquín García-Alfaro
:
A Pyramidal-based Model to Compute the Impact of Cyber Security Events. 19:1-19:10 - ElMouatez Billah Karbab, Mourad Debbabi

:
ToGather: Automatic Investigation of Android Malware Cyber-Infrastructures. 20:1-20:10
ARES Full Papers: ARES Full IX - Automotive
- Martin Salfer

, Claudia Eckert:
Attack Graph-Based Assessment of Exploitability Risks in Automotive On-Board Networks. 21:1-21:10 - Daniel Zelle

, Markus Springer, Maria Zhdanova
, Christoph Krauß
:
Anonymous Charging and Billing of Electric Vehicles. 22:1-22:10 - Venu Babu Thati

, Jens Vankeirsbilck
, Niels Penneman, Davy Pissoort
, Jeroen Boydens
:
CDFEDT: Comparison of Data Flow Error Detection Techniques in Embedded Systems: an Empirical Study. 23:1-23:9
IoT-SECFOR 2018: IoT-SECFOR III- Security Assessment & Analysis
- Owen Lo, William J. Buchanan

, Douglas Carson:
Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device. 21:1-21:6 - Alberto Giaretta

, Michele De Donno, Nicola Dragoni
:
Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot. 22:1-22:8 - Henri Ruotsalainen, Stepan Grebeniuk:

Towards Wireless Secret key Agreement with LoRa Physical Layer. 23:1-23:6
iPAT 2018: iPAT I
- Jonas Walter

, Bettina Abendroth, Thilo Von Pape, Christian Plappert
, Daniel Zelle
, Christoph Krauß
, G. Gagzow, Hendrik Decke:
The user-centered privacy-aware control system PRICON: An interdisciplinary evaluation. 24:1-24:10 - Håkan Jonsson, Carl Magnus Olsson

:
User privacy attitudes regarding proximity sensing. 25:1-25:5 - Armin Gerl, Dirk Pohl

:
Critical Analysis of LPL according to Articles 12 - 14 of the GDPR. 26:1-26:9 - Vida Ahmadi Mehri, Dragos Ilie, Kurt Tutschku

:
Privacy and DRM Requirements for Collaborative Development of AI Applications. 27:1-27:8
ARES Full Papers: ARES Full X - Cloud Security
- Ferdaous Kamoun-Abid, Amel Meddeb-Makhlouf

, Faouzi Zarai
, Mohsen Guizani:
Distributed and Cooperative firewall/controller in cloud environments. 24:1-24:10 - Johannes Blömer, Nils Löken:

Cloud Architectures for Searchable Encryption. 25:1-25:10
ARES Short Papers: ARES Short I - Malware
- Mohit Sewak, Sanjay K. Sahay, Hemant Rathore:

An investigation of a deep learning based malware detection system. 26:1-26:5 - Marius Musch, Martin Härterich, Martin Johns

:
Towards an Automatic Generation of Low-Interaction Web Application Honeypots. 27:1-27:6 - Khanh-Huu-The Dam

, Tayssir Touili:
Learning Malware Using Generalized Graph Kernels. 28:1-28:6
IWSECC 2018: IWSECC I - Security Implementations for Cloud Computing
- Tanja Hanauer, Wolfgang Hommel, Stefan Metzger, Daniela Pöhn

:
A Process Framework for Stakeholder-specific Visualization of Security Metrics. 28:1-28:10 - Aapo Kalliola, Shankar Lal, Kimmo Ahola

, Ian Oliver, Yoan Miche, Tuomas Aura
:
Security Wrapper Orchestration in Cloud. 29:1-29:6 - Thomas Grafenauer, Sandra König

, Stefan Rass
, Stefan Schauer:
A Simulation Tool for Cascading Effects in Interdependent Critical Infrastructures. 30:1-30:8
ARES Short Papers: ARES Short II - Monitoring
- Martin Husák

, Nataliia Neshenko
, Morteza Safaei Pour
, Elias Bou-Harb, Pavel Celeda
:
Assessing Internet-wide Cyber Situational Awareness of Critical Sectors. 29:1-29:6 - Olivier Blazy

, Céline Chevalier:
Spreading Alerts Quietly: New Insights from Theory and Practice. 30:1-30:6 - Nafiseh Kahani, Mehran S. Fallah:

A Reactive Defense Against Bandwidth Attacks Using Learning Automata. 31:1-31:6
IWSECC 2018: IWSECC II - Security Engineering Solutions for Cloud Computing
- Madiha H. Syed, Eduardo B. Fernández

:
A reference architecture for the container ecosystem. 31:1-31:6 - Jamal Toutouh, Antonio Muñoz

, Sergio Nesmachnow:
Evolution Oriented Monitoring oriented to Security Properties for Cloud Applications. 32:1-32:7
ARES Short Papers: ARES Short III - Embedded Systems
- Tianxiang Huang, Jianying Zhou

, Andrei Bytes:
ATG: An Attack Traffic Generation Tool for Security Testing of In-vehicle CAN Bus. 32:1-32:6 - Sébanjila Kevin Bukasa, Ronan Lashermes, Jean-Louis Lanet, Axel Legay:

Let's shock our IoT's heart: ARMv7-M under (fault) attacks. 33:1-33:6 - Mohamed A. Abo-Soliman

, Marianne A. Azer:
Enterprise WLAN Security Flaws: Current Attacks and relative Mitigations. 34:1-34:8
SPEBD 2018: SPEBD I
- Chibuike Ugwuoke, Zekeriya Erkin

, Reginald L. Lagendijk:
Secure Fixed-point Division for Homomorphically Encrypted Operands. 33:1-33:10 - Nurefsan Sertbas, Samet Aytaç, Orhan Ermis, Fatih Alagöz, Gürkan Gür

:
Attribute Based Content Security and Caching in Information Centric IoT. 34 - Hussam Jasim Mohammed

, Nathan L. Clarke
, Fudong Li
:
Evidence Identification in Heterogeneous Data Using Clustering. 35
ARES Short Papers: ARES Short IV - Security Practices
- Anika Behrens:

What are Security Patterns?: A Formal Model for Security and Design of Software. 35 - Gerardo Canfora, Andrea Di Sorbo

, Enrico Emanuele, Sara Forootani, Corrado Aaron Visaggio:
A Nlp-based Solution to Prevent from Privacy Leaks in Social Network Posts. 36:1-36:6 - Alberto Bartoli, Eric Medvet, Andrea De Lorenzo

, Fabiano Tarlao:
(In)Secure Configuration Practices of WPA2 Enterprise Supplicants. 37:1-37:6
WCTI 2018: WCTI I
- Jana Komárková, Martin Husák

, Martin Lastovicka
, Daniel Tovarnák:
CRUSOE: Data Model for Cyber Situational Awareness. 36:1-36:10 - Mathias Gschwandtner, Lukas Demetz, Matthias Gander, Ronald Maier:

Integrating Threat Intelligence to Enhance an Organization's Information Security Management. 37:1-37:8 - Pontus Johnson, Robert Lagerström

, Mathias Ekstedt:
A Meta Language for Threat Modeling and Attack Simulations. 38:1-38:8
FARES 2018: FARES I - Protection and Detection
- Omid Mir, René Mayrhofer

, Michael Hölzl, Thanh-Binh Nguyen:
Recovery of Encrypted Mobile Device Backups from Partially Trusted Cloud Servers. 38:1-38:10 - Francis N. Nwebonyi

, Rolando Martins
, Manuel Eduardo Correia
:
Reputation-Based Security System For Edge Computing. 39:1-39:8 - Paul J. E. Velthuis, Marcel Schäfer, Martin Steinebach:

New authentication concept using certificates for big data analytic tools. 40:1-40:7 - Simon Duque Antón

, Suneetha Kanoor, Daniel Fraunholz, Hans Dieter Schotten:
Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set. 41:1-41:9
SECPID 2018: SECPID I
- Farzaneh Karegar, John Sören Pettersson, Simone Fischer-Hübner:

Fingerprint Recognition on Mobile Devices: Widely Deployed, Rarely Understood. 39:1-39:9 - Arseny Kurnikov, Andrew Paverd

, Mohammad Mannan, N. Asokan
:
Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials. 40:1-40:10 - Colin Boyd, Gareth T. Davies

, Kristian Gjøsteen, Håvard Raddum
, Mohsen Toorani
:
Definitions for Plaintext-Existence Hiding in Cloud Storage. 41:1-41:7 - Kai Bemmann, Johannes Blömer, Jan Bobolz, Henrik Bröcher, Denis Diemert, Fabian Eidens

, Lukas Eilers, Jan Haltermann
, Jakob Juhnke, Burhan Otour, Laurens Porzenheim, Simon Pukrop
, Erik Schilling, Michael Schlichtig
, Marcel Stienemeier:
Fully-Featured Anonymous Credentials with Reputation System. 42:1-42:10
FARES 2018: FARES II - Measurement and Robust Design
- David McLuskie

, X. Belleken:
X.509 Certificate Error Testing. 42:1-42:8 - Eduardo B. Fernández

, Nobukazu Yoshioka, Hironori Washizaki:
Evaluating the degree of security of a system built using security patterns. 43:1-43:8 - Preetam Mukherjee

, Chandan Mazumdar:
Attack Difficulty Metric for Assessment of Network Security. 44:1-44:10 - Sebastian Wandelt, Xiaoqian Sun:

Robustness Estimation of Infrastructure Networks: On the Usage of Degree Centrality. 45:1-45:7
5G-NS 2018: 5G-NS I
- Robert Annessi, Joachim Fabini, Tanja Zseby:

To Trust or Not to Trust: Data Origin Authentication for Group Communication in 5G Networks. 43:1-43:7 - Vincent Lefebvre, Gianni Santinelli, Tilo Müller, Johannes Götzfried:

Universal Trusted Execution Environments for Securing SDN/NFV Operations. 44:1-44:9 - Florian Wendland

, Christian Banse
:
Enhancing NFV Orchestration with Security Policies. 45:1-45:6 - Daniel Guija, Muhammad Shuaib Siddiqui

:
Identity and Access Control for micro-services based 5G NFV platforms. 46:1-46:10
WSDF 2018: WSDF I
- Laoise Luciano, Ibrahim M. Baggili

, Mateusz Topor, Peter Casey, Frank Breitinger
:
Digital Forensics in the Next Five Years. 46:1-46:14
5G-NS 2018: 5G-NS II
- Gregory Blanc, Nizar Kheir, Dhouha Ayed, Vincent Lefebvre, Edgardo Montes de Oca

, Pascal Bisson:
Towards a 5G Security Architecture: Articulating Software-Defined Security and Security as a Service. 47:1-47:8 - Marco Antonio Sotelo Monge

, Jorge Maestre Vidal, Luis Javier García-Villalba:
A novel Self-Organizing Network solution towards Crypto-ransomware Mitigation. 48:1-48:10 - Krzysztof Cabaj

, Marcin Gregorczyk, Wojciech Mazurczyk
, Piotr Nowakowski
, Piotr Zórawski
:
SDN-based Mitigation of Scanning Attacks for the 5G Internet of Radio Light System. 49
WSDF 2018: WSDF II
- Jonas Plum, Andreas Dewald:

Forensic APFS File Recovery. 47:1-47:10 - Jacob Taylor, Benjamin P. Turnbull

, Gideon Creech:
Volatile Memory Forensics Acquisition Efficacy: A Comparative Study Towards Analysing Firmware-Based Rootkits. 48:1-48:11 - Gokila Dorai

, Shiva Houshmand
, Ibrahim M. Baggili
:
I Know What You Did Last Summer: Your Smart Home Internet of Things and Your iPhone Forensically Ratting You Out. 49:1-49:10
5G-NS 2018: 5G-NS III
- Jorge Maestre Vidal, Marco Antonio Sotelo Monge

, Luis Javier García-Villalba:
Detecting Workload-based and Instantiation-based Economic Denial of Sustainability on 5G environments. 50:1-50:8 - I. Adam, J. Ping:

Framework for Security Event Management in 5G. 51:1-51:7
WSDF 2018: WSDF III
- Bruno Malveira Peixoto

, Sandra Avila, Zanoni Dias, Anderson Rocha:
Breaking down violence: A deep-learning strategy to model and classify violence in videos. 50:1-50:7 - Patrício Domingues

, Miguel Frade
:
Digitally Signed and Permission Restricted PDF Files: a Case Study on Digital Forensics. 51:1-51:8 - Yi-Ching Liao:

Investigating the Use of Online Open Source Information as Evidence in European Courts. 52:1-52:6
CyberTIM 2018: CyberTIM I - Attack Detection and Mitigation
- Christos M. Mathas, Olga E. Segou, Georgios Xilouris, Dimitris Christinakis, Michail-Alexandros Kourtis

, Costas Vassilakis
, Anastasios Kourtis:
Evaluation of Apache Spot's machine learning capabilities in an SDN/NFV enabled environment. 52:1-52:10 - Nikolaos Tsinganos

, Georgios Sakellariou
, Panagiotis E. Fouliras
, Ioannis Mavridis:
Towards an Automated Recognition System for Chat-based Social Engineering Attacks in Enterprise Environments. 53:1-53:10 - Tomás Jánský, Tomás Cejka

, Martin Zádník, Václav Bartos
:
Augmented DDoS Mitigation with Reputation Scores. 54:1-54:7 - Olusola Akinrolabu, Ioannis Agrafiotis, Arnau Erola:

The challenge of detecting sophisticated attacks: Insights from SOC Analysts. 55:1-55:9
IWSMA 2018: IWSMA I
- Amira Kchaou, Ryma Abassi, Sihem Guemara El Fatmi:

Toward a Distributed Trust Management scheme for VANET. 53:1-53:6 - David Berend, Shivam Bhasin, Bernhard Jungk:

There Goes Your PIN: Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting. 54:1-54:10 - Ons Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:

Towards a Privacy Preserving and Flexible Scheme for Assessing the Credibility and the Accuracy of Safety Messages Exchanged in VANETs. 55:1-55:9
CyberTIM 2018: CyberTIM II - Threat Intelligence Sharing
- F. R. L. Silva

, P. Jacob:
Mission-Centric Risk Assessment to Improve Cyber Situational Awareness. 56:1-56:8 - Antonio Pastor, Alberto Mozo, Diego R. López, Jesús Folgueira, Angeliki Kapodistria:

The Mouseworld, a security traffic analysis lab based on NFV/SDN. 57:1-57:6 - Adham Albakri, Eerke A. Boiten, Rogério de Lemos:

Risks of Sharing Cyber Incident Information. 58:1-58:10 - Arnold Sykosch, Marc Ohm

, Michael Meier
:
Hunting Observable Objects for Indication of Compromise. 59:1-59:8
IWSMA 2018: IWSMA II
- William Klieber, Lori Flynn, Will Snavely, Michael Zheng:

Practical Precise Taint-flow Static Analysis for Android App Sets. 56:1-56:7 - Alessandro Bacci, Alberto Bartoli, Fabio Martinelli, Eric Medvet, Francesco Mercaldo:

Detection of Obfuscation Techniques in Android Applications. 57:1-57:9 - Anatoli Kalysch, Oskar Milisterfer, Mykolai Protsenko, Tilo Müller:

Tackling Androids Native Library Malware with Robust, Efficient and Accurate Similarity Measures. 58:1-58:10
IWOCCTN 2018: IWOCCTN I - Cyber Organized Crime and Terrorism
- Florian Huber:

Conceptualizing the digital TAKEDOWN platforms for supporting first-line-practitioners and law enforcement agencies. 60:1-60:6 - Václav Jirovský

, Andrej Pastorek, Max Mühlhäuser, Andrea Tundis
:
Cybercrime and Organized Crime. 61:1-61:5 - Diana Silvestru, Karin Rainer, Mario Springnagel:

The AWID prevention approach: The generation of a holistic good practice model for prevention of radicalization in youth work. 62:1-62:5
IWCC 2018: IWCC I
- York Yannikos

, Annika Schäfer, Martin Steinebach:
Monitoring Product Sales in Darknet Shops. 59:1-59:7 - François Bouchaud, Gilles Grimaud, Thomas Vantroys:

IoT Forensic: identification and classification of evidence in criminal investigations. 60:1-60:9
IWCC 2018: IWCC II
- Marek Pawlicki

, Michal Choras, Rafal Kozik
:
Recent Granular Computing Implementations and its Feasibility in Cybersecurity Domain. 61:1-61:6 - Elena Doynikova

, Andrey Fedorchenko
, Igor V. Kotenko
:
Determination of Security Threat Classes on the basis of Vulnerability Analysis for Automated Countermeasure Selection. 62:1-62:8 - Ghada Elbez

, Hubert B. Keller, Veit Hagenmeyer:
A New Classification of Attacks against the Cyber-Physical Security of Smart Grids. 63:1-63:6
IWOCCTN 2018: IWOCCTN II - Cyber Security
- Syed Naqvi:

Challenges of Cryptocurrencies Forensics: A Case Study of Investigating, Evidencing and Prosecuting Organised Cybercriminals. 63:1-63:5 - Matteo E. Bonfanti:

Enhancing Cybersecurity by Safeguarding Information Privacy: The European Union and the Implementation of the "Data Protection by Design" Approach. 64:1-64:6 - Andrea Tundis

, Wojciech Mazurczyk
, Max Mühlhäuser:
A review of network vulnerabilities scanning tools: types, capabilities and functioning. 65:1-65:10

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














