


default search action
20th ARES 2025: Ghent, Belgium - EU Projects Symposium Workshops Part II
- Florian Skopik

, Vincent Naessens
, Bjorn De Sutter
:
Availability, Reliability and Security - ARES 2025 EU Projects Symposium Workshops, Ghent, Belgium, August 11-14, 2025, Proceedings, Part II. Lecture Notes in Computer Science 15999, Springer 2025, ISBN 978-3-032-00646-2
Proceedings of the Fifth Workshop on Education, Training and Awareness in Cybersecurity (ETACS 2025)
- Margherita Renieri

, Alessandra Renieri
, Letterio Galletta
:
WalkthroughCyber: Teaching Cyber-Awareness in Montessori Middle Schools. 5-22 - Marc Ohm

, Yannik Börgener, Timo Pohl:
An Exploratory Study on Teaching Software Supply Chain Security Concepts to High School Students. 23-39 - Stéphane Paul, Jamal El Hachem, Guy Gogniat:

Challenges in Adapting an Industrial Training Course for Academia a Cybersecurity Risk Management Course Case Study. 40-58 - José Manuel Castillo

, Nicolas Louveton
, Marc Parenthoën
:
Psychological and Behavioral Aspects and System Dynamics: Insights from Exercises Using a Cyber Range. 59-76 - Sara Ricci

, Petr Dzurenda
, Carmel Somers
, Horacio González-Vélez
, Lisa Janine Moravek:
Cybersecurity Micro-credentials and Career Path Design: The Digital4Security Good Practices. 77-95 - Ryder Selikow

, Jens Mache
, Jack Cook
, Joseph Granville, Richard Weiss, Hsiao-An Wang
:
EDURange Cloud: On Demand Cybersecurity Sandboxes Through Kubernetes. 96-112 - Marko Zivanovic, Imre Lendák, Ranko Popovic:

Enhancing Cybersecurity Curriculum Development Through European Cybersecurity Framework and Transformer Models. 113-129
Proceedings of the Fifth International Workshop on Security Testing and Monitoring (STAM 2025)
- Vincenzo Carletti, Pasquale Foggia, Carlo Mazzocca, Giuseppe Parrella, Mario Vento:

Evaluating Large Language Models for Vulnerability Detection Under Realistic Conditions. 135-152 - Luong Nguyen

, Manh-Dung Nguyen
, Anh Hao Bui, Ana Rosa Cavalli
, Edgardo Montes de Oca
:
LLMs in Security Testing and Monitoring: An Initial Study. 153-166 - Mario Barbareschi

, Antonio Emmanuele
, Daniele Lombardi
:
A Decentralized PUF-Based Scheme for Remote Attestation. 167-180 - Ilnar Khasanov

, Andrey Sadovykh
:
Evaluating DAVS Approach for Docker Images Static Analysis. 181-195 - Raffaele Elia

, Daniele Granata
, Massimiliano Rak
:
SAM-CyFra: A System for the Automated Management of Cybersecurity Frameworks. 196-212 - Manh-Dung Nguyen

, Huu Nghia Nguyen
, Lethycia Maia de Souza
, Stylianos Karagiannis
, Ana Rosa Cavalli
, Edgardo Montes de Oca
:
An Intelligent Network Fuzzer for Protocol Testing in Healthcare Systems. 213-231 - Marta Catillo

, Antonio Pecchia
, Umberto Villano
:
Detection of Adversarial Examples by Adversarial Training: A Study on the Suitability of FGSM for Hardening NIDS Against Problem-Space Attacks. 232-249 - Pedro R. Tomás

, Diogo Fevereiro, Tiago Cruz
, Luís Cordeiro
:
NERO Training Methodology and Initial Results. 250-259
Proceedings of the Eighth International Workshop on Emerging Network Security (ENS 2025)
- Krishna Chandramouli, Rafal Kozik, Marcin Przybyszewski, Dominika Grunwald, Michal Choras:

Proposition of IT Platform for Combating Wildfires with Decision Support System. 265-280 - Markus Walter, Jörg Keller

:
Steganographic Channels in Body Area Networks. 281-291 - Marek Pawlicki, Sebastian Szelest, Rafal Kozik, Michal Choras:

SHAP Insights into Domain Adaptation in Netflow-Based Network Intrusion Detection Powered by Deep Learning. 292-309 - Pawel Rajba

, Natan Orzechowski
, Dawid Nastaj
:
Real-World Identity and Access Management Scenarios Simulations in the SILVANUS Project. 310-325 - Richard Riedel

, Stefan Köpsell:
5G-Pentest-UE: A Penetration Testing Framework for Identifying 5G System Vulnerabilities. 326-339

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














