


default search action
CSR 2023: Venice, Italy
- IEEE International Conference on Cyber Security and Resilience, CSR 2023, Venice, Italy, July 31 - Aug. 2, 2023. IEEE 2023, ISBN 979-8-3503-1170-9

- Orkhan Gasimov, Risto Vaarandi

, Mauno Pihelgas:
Comparative Analysis of Pattern Mining Algorithms for Event Logs. 1-7 - Yashovardhan Sharma

, Eleonora Giunchiglia
, Simon Birnbach, Ivan Martinovic:
To TTP or not to TTP?: Exploiting TTPs to Improve ML-based Malware Detection. 8-15 - Key-whan Chung, Phuong Cao

, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
stealthML: Data-driven Malware for Stealthy Data Exfiltration. 16-21 - Claudia Greco, Michele Ianni, Antonella Guzzo, Giancarlo Fortino:

Explaining Binary Obfuscation. 22-27 - Ann Marie Reinhold

, Travis Weber, Colleen Lemak, Derek Reimanis, Clemente Izurieta:
New Version, New Answer: Investigating Cybersecurity Static-Analysis Tool Findings. 28-35 - David Soler, Carlos Dafonte

, Francisco Javier Nóvoa
, Manuel Fernández-Veiga, Ana Fernández Vilas, Rebeca P. Díaz Redondo
:
Qerberos: A Protocol for Secure Distribution of QRNG Keys. 36-41 - Lorenzo Principi, Marco Baldi, Alessandro Cucchiarelli, Luca Spalazzi

:
Efficiency of Malware Detection Based on DNS Packet Analysis Over Real Network Traffic. 42-47 - Alexander Khalil Daou, Fudong Li

, Stavros Shiaeles
:
A Cost-Efficient Threat Intelligence Platform Powered by Crowdsourced OSINT. 48-53 - Fabio Martinelli, Francesco Mercaldo, Antonella Santone:

A Driver Detection Method by Means of Explainable Deep Learning. 54-59 - Ortal Dayan, Lior Wolf, Fang Wang, Yaniv Harel

:
Optimizing AI for Mobile Malware Detection by Self-Built-Dataset GAN Oversampling and LGBM. 60-65 - Felipe Moreno Vera

, Mateus Schulz Nogueira, Cainã Figueiredo, Daniel S. Menasché, Miguel Angelo Bicudo, Ashton Woiwood, Enrico Lovat, Anton Kocheturov, Leandro Pfleger de Aguiar:
Cream Skimming the Underground: Identifying Relevant Information Points from Online Forums. 66-71 - Jorge Casajús-Setién

, Concha Bielza
, Pedro Larrañaga:
Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models. 72-77 - Rikard Höglund, Marco Tiloca, Simon Bouget, Shahid Raza:

Key Update for the IoT Security Standard OSCORE. 78-85 - Chrysoula Oikonomou, Ilias Iliopoulos, Dimosthenis Ioannidis, Dimitrios Tzovaras:

A Multi-Class Intrusion Detection System Based on Continual Learning. 86-91 - Emanuele Bellini, Ernesto Damiani, Stefano Marrone:

Blockchain-Based Trustworthy O2O Interaction in the Next 6G Ecosystem. 92-98 - Francesco Palmarini, Leonardo Veronese, Matteo Busi

, Riccardo Focardi, Flaminia L. Luccio:
A Recipe for Cost-Effective Secure IoT: the Safe Place Project Case Study. 99-104 - Marwan Omar, Stavros Shiaeles

:
VulDetect: A novel technique for detecting software vulnerabilities using Language Models. 105-110 - Marcus L. Green, Priya Dozier

:
Understanding Human Factors of Cybersecurity: Drivers of Insider Threats. 111-116 - Khatereh Ahmadi, Reza Javidan:

DDoS Attack Detection in a Real Urban IoT Environment Using Federated Deep Learning. 117-122 - Jan von der Assen, Alberto Huertas Celdrán

, Nicolas Huber
, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller:
Moving Target Defense Strategy Selection against Malware in Resource-Constrained Devices. 123-129 - Jipeng Hou, Lei Xu, Liehuang Zhu, Peng Jiang

, Shaorui Song:
HSchain: Anonymous Permissioned Blockchain with Enhanced Auditability. 130-135 - Simon Paul Mönch, Hendrik Roth

:
Real-Time APT Detection Technologies: A Literature Review. 136-141 - Sevasti Grigoriadou, Panagiotis I. Radoglou-Grammatikis

, Panagiotis G. Sarigiannidis, Ioannis Makris
, Thomas Lagkas, Vasileios Argyriou, Anastasios Lytos, Eleftherios Fountoukidis:
Hunting IoT Cyberattacks With AI - Powered Intrusion Detection. 142-147 - Massinissa Chelghoum, Gueltoum Bendiab, Mohamed Benmohammed, Stavros Shiaeles

, Emanuele Bellini:
BTV2P: Blockchain-based Trust Model for Secure Vehicles and Pedestrians Networks. 148-153 - Tanwir Ahmad

, Dragos Truscan
:
Efficient Early Anomaly Detection of Network Security Attacks Using Deep Learning. 154-159 - Abubakr Ibrahim, Mohamed Mejri, Fehmi Jaafar:

An Explainable Artificial Intelligence Approach for a Trustworthy Spam Detection. 160-167 - Luís Oliveira, Andrzej Chmielewski, Paulina Rutecka

, Karina Cicha
, Mariia Rizun, Nuno Torres, Pedro Pinto
:
Assessing Cybersecurity Hygiene and Cyber Threats Awareness in the Campus - A Case Study of Higher Education Institutions in Portugal and Poland. 168-173 - Alessandro Bellini

, Emanuele Bellini
, Massimo Bertini, Doaa Almhaithawi
, Stefano Cuomo:
Multi-party Computation for Privacy and Security in Machine Learning: a Practical Review. 174-179 - Nahid Ferdous Aurna

, Md Delwar Hossain
, Yuzo Taenaka, Youki Kadobayashi:
Federated Learning-Based Credit Card Fraud Detection: Performance Analysis with Sampling Methods and Deep Learning Algorithms. 180-186 - Prathibha Keshavamurthy, Sarvesh Kulkarni:

Early Detection of Reconnaissance Attacks on IoT Devices by Analyzing Performance and Traffic Characteristics. 187-193 - Mohamed Amine Ben Farah, M. Omar Al-Kadri, Yussuf Ahmed

, Raouf Abouzariba, Xavier J. A. Bellekens:
Cyber Incident Scenarios in the Maritime Industry: Risk Assessment and Mitigation Strategies. 194-199 - Didem Genç, Mustafa Özuysal, Emrah Tomur:

A Taxonomic Survey of Model Extraction Attacks. 200-205 - Hadi El Karhani, Riad Al Jamal, Yorgo Bou Samra, Imad H. Elhajj, Ayman I. Kayssi:

Phishing and Smishing Detection Using Machine Learning. 206-211 - Katsuyuki Umezawa, Sven Wohlgemuth, Keisuke Hasegawa, Kazuo Takaragi:

Evaluation of Applying LDA to Redacted Documents in Security and Safety Analysis. 212-218 - Omer Subasi, Joseph B. Manzano, Kevin J. Barker

:
Denial of Service Attack Detection via Differential Analysis of Generalized Entropy Progressions. 219-226 - Aman Srivastava

, Nitesh Kumar
, Anand Handa
, Sandeep K. Shukla
:
Ransomware Detection based on Network Behavior using Machine Learning and Hidden Markov Model with Gaussian Emission. 227-233 - Gonçalo Lima, Vitor Hugo Gonçalves, Pedro Pinto

:
A Taxonomy for Tsunami Security Scanner Plugins. 234-239 - Waldemar Cruz, Laurent D. Michel, Benjamin Drozdenko, Steven Roodbeen:

ML and Network Traces to M.A.R.S. 240-245 - Vrizlynn L. L. Thing:

Deepfake Detection with Deep Learning: Convolutional Neural Networks versus Transformers. 246-253 - Daniel Machooka, Xiaohong Yuan, Albert C. Esterline:

A Survey of Attacks and Defenses for Deep Neural Networks. 254-261 - Myria Bouhaddi

, Kamel Adi
:
Mitigating Membership Inference Attacks in Machine Learning as a Service. 262-268 - Daniele Granata, Massimiliano Rak, Francesco Grimaldi

:
Attacking a packet Analyzer: Caronte case study. 269-274 - Zaynab Lamoyero, Oluwatobi Fajana

:
Exposed: Critical Vulnerabilities in USSD Banking Authentication Protocols. 275-280 - Pandu Ranga Reddy Konala, Vimal Kumar

, David Bainbridge:
SoK: Static Configuration Analysis in Infrastructure as Code Scripts. 281-288 - Luke Vandenberghe, Hari Manassery Koduvely, Maria Pospelova:

Detecting Internal Reconnaissance Behavior Through Classification of Command Collections. 289-294 - Nishanth Laxman, Daniel Krohmer, Markus Damm, Reinhard Schwarz, Pablo Oliveira Antonino:

Understanding Resilience: Looking at Frameworks & Standards - A Systematic Study from Cyber Perspective. 295-300 - Lelio Campanile, Maria Stella de Biase

, Roberta De Fazio
, Michele Di Giovanni
, Fiammetta Marulli, Laura Verde:
Merging Model-Based and Data-Driven Approaches for Resilient Systems Digital Twins Design. 301-306 - Silvia Bonomi, Marco Cuoci, Simone Lenti:

A Semi-automatic Approach for Enhancing the Quality of Automatically Generated Inventories. 307-314 - Saeid Sheikhi, Panos Kostakos:

Cyber threat hunting using unsupervised federated learning and adversary emulation. 315-320 - Vida Ahmadi Mehri, Patrik Arlos, Emiliano Casalicchio

:
Automated Patch Management: An Empirical Evaluation Study. 321-328 - Ekzhin Ear, Jose L. C. Remy, Shouhuai Xu:

Towards Automated Cyber Range Design: Characterizing and Matching Demands to Supplies. 329-334 - Midori Inaba, Takeaki Terada:

Nudge to Promote Employees' Information Security Compliance Behavior: A Field Study. 335-340 - Simone Bussa, Riccardo Sisto, Fulvio Valenza

:
Formal Verification of a V2X Privacy Preserving Scheme Using Proverif. 341-346 - Valeria Bonagura

, Stefano Panzieri, Federica Pascucci, Leonardo Badia
:
A Game of Age of Incorrect Information Against an Adversary Injecting False Data. 347-352 - Kamal Taha:

Proactive Measures for Cyber-Physical Systems Cybersecurity. 353-358 - Randolph Loh

, Vrizlynn L. L. Thing
:
Enhancing Cyber-Resilience in Self-Healing Cyber-Physical Systems with Implicit Guarantees. 359-366 - Khaled Alotaibi, Rafat Rob, Dana Nour, Doaa Zamzami:

Detecting Subspace Malicious Vectors Attack Against Smart Grid Using Sequence-Alignment Method. 367-372 - Kyle Murbach, Tommy Morris, Fred Wiersig, Jeffery Golden:

Small Satellite System Modeling for Vulnerability Analysis. 373-380 - Roberto Caviglia, Giovanni Battista Gaggero, Nicola Vincis, Omar Morando, Alessio Aceti, Mario Marchese:

SPAT: A Testbed for Automotive Cybersecurity Training. 381-386 - Valeria Bonagura

, Chiara Foglietta, Stefano Panzieri, Federica Pascucci:
Enhancing Industrial Cyber-Physical Systems Security with Smart Probing Approach. 387-393 - Sandip Roy, Benjamin Drozdenko:

Control-Implications-Based Side-Channel Monitoring for Embedded Systems. 394-399 - Konstantinos Ntafloukas

, Liliana Pasquale, Beatriz Martinez-Pastor, Daniel P. McCrum:
Identification of Vulnerable IoT Enabled Transportation Infrastructure into a Cyber-Physical Transportation Network. 400-405 - Stefano Perone

, Luca Faramondi, Roberto Setola:
Default Credentials Vulnerability: The Case Study of Exposed IP Cams. 406-411 - Luca Faramondi, Francesco Flammini, Simone Guarino, Roberto Setola:

Evaluating Machine Learning Approaches for Cyber and Physical Anomalies in SCADA Systems. 412-417 - Verena Menzel

, Kai Oliver Großhanten, Anne Remke:
Evaluating a Process-Aware IDS for Smart Grids on Distributed Hardware. 418-425 - Kabid Hassan Shibly, Md Delwar Hossain

, Hiroyuki Inoue, Yuzo Taenaka, Youki Kadobayashi:
A Feature-Aware Semi-Supervised Learning Approach for Automotive Ethernet. 426-431 - Mohammed Mynuddin

, Sultan Uddin Khan, Mahmoud Nabil Mahmoud:
Trojan Triggers for Poisoning Unmanned Aerial Vehicles Navigation: A Deep Learning Approach. 432-439 - Maryam Zahid, Alessio Bucaioni, Francesco Flammini

:
Trustworthiness-Related Risks in Autonomous Cyber-Physical Production Systems - A Survey. 440-445 - Evangelos Dragonas

, Costas Lambrinoudakis:
IoT Forensics: Analysis of Ajax Systems' mobile app for the end user. 446-451 - Evangelos Dragonas

, Costas Lambrinoudakis, Michael Kotsis:
IoT Forensics: Investigating the Mobile App of Dahua Technology. 452-457 - Rob Van Kranenburg, Rohit Bohara

, Raphael Yahalom, Mirko Ross:
Cyber Resilience, Societal Situational Awareness for SME. 458-463 - George Hatzivasilis

, Sotiris Ioannidis, Grigoris Kalogiannis, Manolis Chatzimpyrros, George Spanoudakis, Guillermo Jiménez Prieto, Araceli Rojas Morgan, Miguel Juaniz Lopez, Cataldo Basile, José Francisco Ruiz:
Continuous Security Assurance of Modern Supply-Chain Ecosystems with Application in Autonomous Driving: The FISHY approach for the secure autonomous driving domain. 464-469 - Arnd Weber, Sylvain Guilley, René Rathfelder, Marc Stöttinger

, Christoph Lüth, Maja Malenko, Torsten Grawunder, Steffen Reith, Armand Puccetti, Jean-Pierre Seifert, Norbert Herfurth, Hagen Sankowski, Gernot Heiser:
Verified Value Chains, Innovation and Competition. 470-476 - Beny Nugraha, Krishna Yadav, Parag Patil, Thomas Bauschert:

Improving the Detection of Unknown DDoS Attacks through Continual Learning. 477-483 - Sotirios Nikoletos, Stefanos Vlachos, Efstathios Zaragkas, Costas Vassilakis, Christos Tryfonopoulos, Paraskevi Raftopoulou

:
RoG§: A Pipeline for Automated Sensitive Data Identification and Anonymisation. 484-489 - Mateusz D. Zych, Vasileios Mavroeidis, Konstantinos Fysarakis, Manos Athanatos:

Reviewing BPMN as a Modeling Notation for CACAO Security Playbooks. 490-495 - Panagiotis Sotiropoulos, Christos-Minas Mathas, Costas Vassilakis, Nicholas Kolokotronis:

Minimizing Software-Rooted Risk through Library Implementation Selection. 496-502 - Breno Tostes, Leonardo Ventura, Enrico Lovat, Matheus Martins, Daniel S. Menasché:

Learning When to Say Goodbye: What Should be the Shelf Life of an Indicator of Compromise? 503-510 - Jiali Zhu, Zhenxin Wu:

An Open Sharing Method for Digital Heritage Assets Based on Self-Sovereign Identity Technology. 511-515 - Alba Amato

, Dario Branco
, Salvatore Venticinque, Giuseppina Renda, Sabrina Mataluna:
Metadata and Semantic Annotation of Digital Heritage Assets: a case study. 516-522 - Mohamed Faisal Elrawy, Lenos Hadjidemetriou, Christos Laoudias, Maria K. Michael:

Modelling and Analysing Security Threats Targeting Protective Relay Operations in Digital Substations. 523-529 - Maria Nintsiou, Elisavet Grigoriou, Paris-Alexandros Karypidis, Theocharis Saoulidis, Eleftherios Fountoukidis, Panagiotis G. Sarigiannidis

:
Threat intelligence using Digital Twin honeypots in Cybersecurity. 530-537 - Konstantinos Fysarakis, Alexios Lekidis

, Vasileios Mavroeidis, Konstantinos Lampropoulos
, George L. Lyberopoulos, Ignasi Garcia-Milà Vidal
, José Carles Terés i Casals, Eva Rodriguez Luna
, Alejandro Antonio Moreno Sancho, Antonios Mavrelos, Marinos Tsantekidis, Sebastian Pape, Argyro Chatzopoulou, Christina Nanou, George Drivas, Vangelis Photiou, George Spanoudakis, Odysseas G. Koufopavlou:
PHOENI2X - A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation & Response Capabilities for Business Continuity and Recovery, Incident Response, and Information Exchange. 538-545 - Panagiotis Savvidis, Nikolaos Vakakis

, Antonis Voulgaridis, Emanuele Bellini, Dimosthenis Ioannidis, Konstantinos Votis, Dimitrios Tzovaras:
Towards a Hybrid Multi-Layer Blockchain-Based Energy Trading Market for Microgrids. 546-551 - Kyriaki Tsantikidou, Dimitrios Boufeas, Nicolas Sklavos:

Area-Delay Efficient Security Scheme for Smart Hospital Systems. 552-557 - Callum Aitchison, Basel Halak

, Alexander Serb, Themis Prodromakis:
A PUF Based on the Non-Linearity of Memristors. 558-563 - Sara Tehranipoor, Nima Karimian, Jack Edmonds:

Breaking AES-128: Machine Learning-Based SCA Under Different Scenarios and Devices. 564-571 - Marco Macchetti, Hervé Pelletier, Cédric Groux:

A New Fast and Side-Channel Resistant AES Hardware Architecture. 572-579 - Ievgen Kabin

, Zoya Dyka
, Peter Langendoerfer
:
Randomized Addressing Countermeasures are Inefficient Against Address-Bit SCA. 580-585 - Shailesh Rajput, Jaya Dofe:

Counteracting Modeling Attacks Using Hardware-Based Dynamic Physical Unclonable Function. 586-591 - Andrey I. Plotnikov, Alla Levina:

Algorithm for simplifying the SHA-256 operations tree. 592-597 - Nikos Avgerinos, Salvatore D'Antonio, Irene Kamara, Christos Kotselidis

, Ioannis Lazarou
, Teresa Mannarino, Georgios Meditskos, Konstantina Papachristopoulou
, Angelos Papoutsis, Paolo Roccetti, Martin Zuber:
A Practical and Scalable Privacy-preserving Framework. 598-603 - Alberto Pedrouzo-Ulloa

, Jan Ramon, Fernando Pérez-González, Siyanna Lilova, Patrick Duflot, Zakaria Chihani, Nicola Gentili
, Paola Ulivi, Mohammad Ashadul Hoque, Twaha Mukammel, Zeev Pritzker, Augustin Lemesle, Jaime Loureiro-Acuña, Xavier Martínez Luaña, Gonzalo Jiménez-Balsa:
Introducing the TRUMPET project: TRUstworthy Multi-site Privacy Enhancing Technologies. 604-611 - Alberto Pedrouzo-Ulloa

, Aymen Boudguiga, Olive Chakraborty, Renaud Sirdey, Oana Stan, Martin Zuber:
Practical Multi-Key Homomorphic Encryption for More Flexible and Efficient Secure Federated Average Aggregation. 612-617 - Judith Sáinz-Pardo Díaz

, Álvaro López García
:
Comparison of machine learning models applied on anonymized data with different techniques. 618-623 - Mohammadreza Mohammadi

, Roberto Allocca, David Eklund
, Rakesh Shrestha, Sima Sinaei:
Privacy-preserving Federated Learning System for Fatigue Detection. 624-629 - Souhila Badra Guendouzi, Samir Ouchani

, Hiba El Assaad, Madeleine El Zaher:
FedGA-Meta: Federated Learning Framework using Genetic Algorithms and Meta-Learning for Aggregation in Industrial Cyber- Physical Systems. 630-635 - Aleksandra Pawlicka, Damian Puchalski, Marek Pawlicki, Rafal Kozik, Michal Choras:

How to secure the IoT-based surveillance systems in an ELEGANT way. 636-640 - Salvatore D'Antonio, Giannis Lazarou, Giovanni Mazzeo, Oana Stan, Martin Zuber, Ioannis Tsavdaridis:

The Alliance of HE and TEE to Enhance their Performance and Security. 641-647 - Luigi Coppolino, Salvatore D'Antonio, Federica Uccello

, Anastasios Lyratzis, Constantinos Bakalis, Souzana Touloumtzi, Ioannis Papoutsis
:
Detection of Radio Frequency Interference in Satellite Ground Segments. 648-653 - Ioannis Siachos

, Konstantinos Kaltakis, Konstantina Papachristopoulou
, Ioannis Giannoulakis, Emmanouil Kafetzakis:
Comparison of Machine Learning Algorithms Trained Under Differential Privacy for Intrusion Detection Systems. 654-658

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














