


default search action
CSR 2024: London, UK
- IEEE International Conference on Cyber Security and Resilience, CSR 2024, London, UK, September 2-4, 2024. IEEE 2024, ISBN 979-8-3503-7536-7

- Stavros Shiaeles

, Nicholas Kolokotronis, Emanuele Bellini:
Message from the Chairs. xvii-xviii - Evangelos Dragonas, Costas Lambrinoudakis:

Forensic Analysis of Android Notifications' History. 1-6 - Verena Menzel

, Jan Speckamp, Anne Remke:
Developing a Robust Communication Infrastructure for a Distributed Smart Grid IDS. 1-8 - Phongsathon Fongta, Sotirios Terzis:

A Trust Management Delegation Protocol for Fog Computing Applications. 1-6 - Guillaume Hutzler, Hanna Klaudel, Witold Klaudel, Franck Pommereau, Artur Rataj:

Automatic Discovery of Cyberattacks. 1-8 - A. Schroeder, Patrick McClure, Preetha Thulasiraman:

Anomaly Detection in Operational Technology Systems Using Non-Intrusive Load Monitoring Based on Supervised Learning. 1-6 - Charles M. R. Da Silva, Paulo André L. De Castro, Cecilia De A. C. Cesar:

Ransomware Detection: Ensemble Machine Learning Models Using Disjoint Data. 1-6 - Cyprien de la Vergne de Cerval, Eric Perret, Jonathan Sarrazin, Olivier Fichot, Vincent E. Urias, William M. S. Stout, Shadya B. Maldonado Rosado

:
DIONYSUS - Deception Networks for the Cybersecurity of Physical Protection Systems. 1-6 - Rajesh Kalakoti

, Hayretdin Bahsi, Sven Nõmm:
Explainable Federated Learning for Botnet Detection in IoT Networks. 1-8 - Muhammad Saad Sohail, Giancarlo Portamauro, Fabio Patrone, Mario Marchese:

An SDR-Based Framework for Cybersecurity Assessment of Vehicle-to-Everything (V2X) Systems. 1-8 - Rafail A. Ellinitakis, Konstantinos Fysarakis, Panagiotis Bountakas, George Spanoudakis:

Uncovering Hidden Threats: Automated, Machine Learning-based Discovery & Extraction of Cyber Threat Intelligence from Online Sources. 1-6 - Sven Glatzer, Stavros Shiaeles

, Rinat Khusainov
, Rahim Taheri
:
Peer-to-Peer Meets Onion: The Veilid Framework. 1-6 - Sri Haritha Ambati, Norah Ridley, Enrico Branca, Natalia Stakhanova:

Navigating (in)Security of AI-Generated Code. 1-8 - Ruizhe Wang, Sarad Venugopalan

, Sridhar Adepu:
Safety Analysis for Cyber-Physical Systems Under Cyber Attacks Using Digital Twin. 1-8 - Adrian Ramsingh, Pradeep Verma:

Understanding & Mitigating the Challenges of Securing Jupyter Notebooks Online. 1-7 - F. Z. Chriki, Ester Simó

, Francesc Aguiló, I. Garcia-Milà, X. Masip:
A Deep Learning Framework for Safety Monitoring of a Railway Section. 1-6 - Mohammed M. Alani, Ali Ismail Awad, Ezedin Barka:

A Hybrid Ensemble Learning-Based Intrusion Detection System for the Internet of Things. 1-8 - Ehsan Nowroozi, Rahim Taheri

, Mehrdad Hajizadeh, Thomas Bauschert:
Verifying the Robustness of Machine Learning based Intrusion Detection Against Adversarial Perturbation. 9-15 - Shadi Sadeghpour

, Natalija Vlajic:
ReBotDetector: A Detection Model with LSTM Feature Extractor for Session-Replay Web Bot Attacks. 16-21 - Myria Bouhaddi, Kamel Adi

:
When Rewards Deceive: Counteracting Reward Poisoning on Online Deep Reinforcement Learning. 38-44 - Giovanni Battista Gaggero, Roberto Caviglia, Paola Girdinio, Mario Marchese:

Are IDS Violating Segmentation in Industrial Networks? 45-49 - Viet Anh Phan

, Jan Jerabek, Dinh Khanh Le, Tomás Gotthans:
New Approach to Shorten Feature Set via TF-IDF for Machine Learning-Based Webshell Detection. 50-55 - Rachel Ladouceur, Abubakr Hassan, Mohamed Mejri, Fehmi Jaafar:

Can Deep Learning Detect Fake News Better when Adding Context Features? 56-61 - Ömer Sen, Christoph Pohl, Immanuel Hacker, Markus Stroot, Andreas Ulbig:

AI-Based Attacker Models for Enhancing Multi-Stage Cyberattack Simulations in Smart Grids Using Co-Simulation Environments. 68-75 - Silvia Bonomi, Marco Cuoci, Simone Lenti:

A Version-Based Algorithm for Quality Enhancement of Automatically Generated Vulnerability Inventories. 76-81 - August Karlsson, Rikard Höglund, Han Wang

, Alfonso Iacovazzi, Shahid Raza:
Enabling Cyber Threat Intelligence Sharing for Resource Constrained IoT. 82-89 - Daniel Brown

, Natalija Vlajic:
Novel Approach to Tor User De-Anonymization: Client-Side Generated Watermark. 90-95 - Braden J. Saunders, Robson E. De Grande, Glaucio H. S. Carvalho, Isaac Woungang:

Deep Graph Learning for DDoS Detection and Multi-Class Classification IDS. 96-100 - João Lopes

, Pedro Pinto, Alberto Partida, António Pinto:
Use of Visibility Graphs for the Early Detection of DoS Attacks. 101-106 - Onat Güngör, Tajana Rosing, Baris Aksanli:

A2HD: Adaptive Adversarial Training for Hyperdimensional Computing-Based Intrusion Detection Against Adversarial Attacks. 107-113 - Zihao Wang, Kar-Wai Fok, Vrizlynn L. L. Thing:

Emerging Trends in 5G Malicious Traffic Analysis: Enhancing Incremental Learning Intrusion Detection Strategies. 114-119 - Soraya Harding

, Mo Adda
:
Multi-Blockchain Model for IoT Devices Forensic Investigations on Spidernet. 120-126 - Claudia Greco, Michele Ianni, Giuseppe Seminara, Antonella Guzzo, Giancarlo Fortino:

A Forensic Framework for Screen Capture Validation in Legal Contexts. 127-132 - Danielle Hanson, Jeremy Straub:

A Systematic Review of Cybersecurity Audit Frameworks for the Internet of Things. 133-138 - Sthembile Ntshangase, Norman Nelufule

, David Mulihase, Mamello Mtshali, Chantel Mokoena, Palesa Moloi:
A Survey of Digital Forensic Tools for Android and iOS Smart Phones. 139-145 - Zhe Deng

, Arthur Hubert, Sadok Ben Yahia, Hayretdin Bahsi:
Active Learning-Based Mobile Malware Detection Utilizing Auto-Labeling and Data Drift Detection. 146-151 - Onat Güngör, Elvin Li, Zhengli Shang, Yutong Guo, Jing Chen, Johnathan Davis, Tajana Rosing:

Rigorous Evaluation of Machine Learning-Based Intrusion Detection Against Adversarial Attacks. 152-158 - Gerard Shu Fuhnwi, Matthew Revelle, Clemente Izurieta:

A Hybrid Anomaly Detection Approach for Obfuscated Malware. 159-165 - Luca Chianese, Daniele Granata, Paolo Palmiero, Massimiliano Rak:

Leveraging Threat Modelling for Effective Penetration Testing in 5G Systems. 180-185 - Jan von der Assen, Jasmin Hochuli, Thomas Grübl, Burkhard Stiller:

The Danger Within: Insider Threat Modeling Using Business Process Models. 186-192 - Natalija Vlajic, Gabriele Cianfarani, Robert Noce:

Data Siphoning in ICSs: Attack Tree and Role of Cryptoperiods. 193-199 - Kajal Patel, Zubair Shafiq, Mateus Schulz Nogueira, Daniel Sadoc Menasché, Enrico Lovat, Taimur Kashif, Ashton Woiwood, Matheus Martins:

Harnessing TI Feeds for Exploitation Detection. 200-207 - Vasudha Vedula, Rajendra V. Boppana, Palden Lama:

Attack-Specific Feature Construction to Detect Malicious TCP Flows. 208-215 - Raúl Reinosa Simón, Clara I. Valero, José A. Martínez Cadenas, Elisa R. Heymann, Ignacio Lacalle, Barton P. Miller, Carlos Enrique Palau:

Empirical Analysis and Practical Assessment of Ransomware Attacks to Data in Motion. 216-221 - Simone Orlando, Alessandro Barenghi

, Gerardo Pelosi
:
Investigating the Health State of X.509 Digital Certificates. 222-227 - Sumit Kumar Paul

, D. A. Knox:
ROT: Retention and Operation Limitation Using TEE. 228-234 - David Shur, Giovanni Di Crescenzo, T. Chen, Zahir Patni, Y.-J. Lin, Scott Alexander, Benjamin Flin, R. Levonas:

Energy-efficient Hardening of the SEDIMENT Methodology for Scalable IoT Network Security. 235-240 - Hrishikesh Karmarkar

, Vaibhavi Joshi, R. Venkatesh:
Detecting Covert Channels in Cloud Access Control Policies Using Large Language Models. 241-246 - Anna Kougioumtzidou

, Angelos Papoutsis, Dimitrios Kavallieros, Thanassis Mavropoulos, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris:
An End-to-End Framework for Cybersecurity Taxonomy and Ontology Generation and Updating. 247-254 - Jeremy Straub:

Application of Robotic Exploration Principles to the Challenge of Cybersecurity Penetration Testing. 255-261 - Cheng Wang, Christopher Redino, Ryan Clark, Abdul Rahman, Sal Aguiñaga, Sathvik Murli, Dhruv Nandakumar, Roland Rao, Lanxiao Huang, Daniel Radke, Edward Bowen:

Leveraging Reinforcement Learning in Red Teaming for Advanced Ransomware Attack Simulations. 262-269 - Jonathan Gregory, Qi Liao:

Autonomous Cyberattack with Security-Augmented Generative Artificial Intelligence. 270-275 - Daniele Bringhenti

, Francesco Pizzato, Riccardo Sisto, Fulvio Valenza:
A Looping Process for Cyberattack Mitigation. 276-281 - Jakob Nyberg, Pontus Johnson:

Structural Generalization in Autonomous Cyber Incident Response with Message-Passing Neural Networks and Reinforcement Learning. 282-289 - Salvatore Barone

, Valentina Casola, Salvatore Della Torca:
Ineffectiveness of Digital Transformations for Detecting Adversarial Attacks Against Quantized and Approximate CNNs. 290-295 - Norbert Tihanyi, Mohamed Amine Ferrag, Ridhi Jain, Tamás Bisztray, Mérouane Debbah:

CyberMetric: A Benchmark Dataset based on Retrieval-Augmented Generation for Evaluating LLMs in Cybersecurity Knowledge. 296-302 - Taylor Perkins, Brian Lachine:

A Time-Series and Density-Based Filter for DNS Log Reduction and Analysis. 303-308 - Dennis Song, Yuping Yan, George Shao, Feida Zhu

, Mason Song:
A Security Analysis of a Deterministic Key Generation Scheme. 309-314 - Pierre Mondon, Rogério de Lemos:

Detecting Cryptographic Functions for String Obfuscation. 315-320 - Francesco Settanni

, Alessandro Zamponi, Cataldo Basile:
Dynamic Security Provisioning for Cloud-Native Networks: An Intent-Based Approach. 321-328 - Fahad Ahmad

, Katerina Kanta
, Stavros Shiaeles
, Afia Naeem, Zarnab Khalid, Kainaat Mahboob:
Enhancing ATM Security Management in the Post-Quantum Era with Quantum Key Distribution. 329-334 - Sean McElroy

:
Identifying Android Banking Malware Through Measurement of User Interface Complexity. 348-353 - Saeid Sheikhi, Panos Kostakos:

Advancing Security in 5G Core Networks Through Unsupervised Federated Time Series Modeling. 353-356 - Lanlan Pan

, Ruonan Qiu, Chuan Zhang, Minghui Yang:
Building a Secure Cross-Device Communication Channel for Smart Devices Based on App Accounts. 360-366 - Mohammad Rasool Momeni

, Abdollah Jabbari, Carol J. Fung:
A Privacy-Preserving and Secure Scheme for Online Payment in the Realm of Mobile Commerce. 367-372 - Nicholas Mayone, Pascal Kunz, Beytüllah Yigit, Wissem Soussi, Burkhard Stiller, Gürkan Gür:

IPv6 Connection Shuffling for Moving Target Defense (MTD) in SDN. 373-378 - Jarrod Ragsdale

, Rajendra V. Boppana:
Evaluating Few-Shot Learning Generative Honeypots in A Live Deployment. 379-386 - Saul Johnson, Remco Hassing

, Jeroen Pijpker
, Rob Loves:
A Modular Generative Honeypot Shell. 387-394 - Claudio Curto, Daniela Giordano, Daniel Gustav Indelicato, Vladimiro Patatu:

Can a Llama Be a Watchdog? Exploring Llama 3 and Code Llama for Static Application Security Testing. 395-400 - Intissar Ziani

, Gueltoum Bendiab, Mourad Bouzenada
, Stavros Shiaeles
:
Video-Based Abnormal Human Behaviour Detection for Video Forensics. 401-406 - Anastasiia Voitenko, Mourad Oussalah:

On Impact of Video Motion on Image Encryption/Decryption. Comparative Results. 407-412 - Sundas Munir, Walid Taha, Mirza Sanam Iqbal Baig:

Static Detection of Missing Validations in Solidity Smart Contracts. 413-420 - Panagiotis Leonis

, Konstantinos Ntouros
, Antonio I. Mazilu
, Sotirios Brotsis, Nicholas Kolokotronis:
SEAGuard: A Blockchain-Based Security Framework for IoT Maritime Transportation Systems. 421-426 - Mohamed Amjath, Shagufta Henna

:
Rényi Differential Privacy Analysis of Skellam Under Federated Learning in Internet of Health Things. 427-431 - Anupriya Pandey, Kamal Singh:

Software Security Testing Lifecycle for Automotive Products. 432-436 - Jan von der Assen, Jamo Sharif, Chao Feng, Christian Killer, Gérôme Bovet, Burkhard Stiller:

Asset-Centric Threat Modeling for AI-Based Systems. 437-444 - Breno Silva Pinto, Lucas Cioffi, Felipe Espósito:

Third-party Cloud Risk Management. 445-451 - Fatih Gey, Cédric Hébert, Holger Mack:

Zero to Trust? Bringing Application-Level Intelligence at Scale to Detection Engineering. 452-457 - Kumar Thummapudi

, Rajendra V. Boppana, Palden Lama:
Towards Live Detection of Ransomware Attacks. 458-465 - Rajendra Shivaji Patil, Markus Dypbukt Källman, Viktoria Fodor:

DefenceRank - Ranking Based Attack Graph Analysis and Defence Prioritization. 466-473 - Maryam Zahid, Alessio Bucaioni, Francesco Flammini:

On the ISO Compliance of Model-Based Risk Assessment for Autonomous Cyber-Physical Production Systems. 474-479 - Sezen Acur, Teun Hendriks:

The Need for Cyber-Resilience in Complex Systems. 480-485 - Utku Budak, Fabrizio De Santis, Georg Sigl:

A Lightweight Firmware Resilience Engine for IoT Devices Leveraging Minimal Processor Features. 486-491 - Samin Moosavi, Isabel Moore, Swaminathan Gopalswamy:

Using a Sensor-Health-Aware Resilient Fusion for Localization in the Presence of GPS Spoofing Attacks. 498-505 - Joshua Sylvester, Rogério de Lemos:

Identifying Novelty in Network Traffic. 506-511 - Amalia Damianou, Mariana S. Mazi, Georgios Rizos

, Antonis Voulgaridis, Konstantinos Votis:
Situational Awareness Scoring System in Cyber Range Platforms. 520-525 - Gohar Sargsyan:

Cybersecurity as a Backbone for Sustainability. 526-530 - Kushal Srivastava, Katja Faist, Benjamin Lickert, Karen Neville, Nora McCarthy

, Mirjam Fehling-Kaschek
, Alexander Stolz:
Assessment of the Impact of Cyber-Attacks and Security Breaches in Diagnostic Systems on the Healthcare Sector. 531-536 - Chinazunwa Uwaoma, Ayush Enkhtaivan:

The Affordability of Cybersecurity Costs in Developing Countries: A Systematic Review. 545-550 - Alexis Coca, Fudong Li

, Stavros Shiaeles
, Deha Wu, Fan Liu:
The Effect of Privacy Concerns, Interaction, Trust, Age, and Gender on Self-Disclosure Behaviours on Social Networking Sites. 551-556 - Matija Kikelj, Ivan Sabic:

Strengthening the Digital Ecosystem: Effects of the Cyber Resilience Act (CRA) on Open-Source Software. 557-561 - Lalita Jagadeesan, Shushu Liu, Lizette Velázquez:

Designing Trustworthy Decentralized Cross-Chain Marketplaces: A 6G Network of Networks Perspective. 562-569 - Jasmin Cosic, Admir Jukan, Miroslav Baca:

Strengthening Cybersecurity Certifications Through Robust Chain of Custody Practices. 570-574 - Mahdad Pourmadadkar

, Marianna Lezzi
, Alì Aghazadeh Ardebili
:
Investigating Cyber Risks in a Surgical Process for Healthcare Cyber Resilience. 575-580 - Prodromos Kiriakidis

, Efi Kafali
, Georgios Rizos
, Antonis Voulgaridis, Theodoros Semertzidis, Stephane Gazut, Petros Daras, Konstantinos Votis:
Building a Use Case-Driven Adversarial Threat Matrix: A Comprehensive Approach. 587-592 - George Lazaridis, Anastasios Drosou, Periklis Chatzimisios, Dimitrios Tzovaras:

Unraveling the Threat Landscape of CPS: Modbus TCP Vulnerabilities in the Era of I4.0. 593-598 - Mubashir Murshed, Afrin Jubaida, Robson E. De Grande, Glaucio H. S. Carvalho:

Vehicular Network Security Against RF Jamming: An LSTM Detection System. 599-604 - Shadi Sadeghpour

, Farhath Zareen, William A. Johnson:
From Data to Defense: Real-Time Detection of Botnets in IoT Using LSTM Networks. 605-611 - Sani M. Abdullahi

, Sanja Lazarova-Molnar
:
Toward a Unified Security Framework for Digital Twin Architectures. 612-617 - Leyli Karaçay, Ahmet Cihat Baktir, Ramin Fuladi, Elham Dehghan Biyar, Ömer Faruk Tuna, Ipek Arikan:

Secure AI/ML-Based Control in Intent-Based Management System. 618-623 - Alì Aghazadeh Ardebili

, Antonella Longo
, Antonio Ficarella
:
Enhancing Cyber-Physical Security: Integrating Virtual Fences Within Digital Twins. 630-637 - Gábor Visky, Sokratis K. Katsikas, Olaf Maennel:

Lightweight Testbed for IEC61162-450-Related Cyber Security Research. 638-643 - Gábor Visky, Aleksei Siganov, Muaan ur Rehman, Risto Vaarandi

, Hayretdin Bahsi, Leonidas Tsiopoulos:
Hybrid Cybersecurity Research and Education Environment for Maritime Sector. 644-651 - Stefano Perone

, Luca Faramondi, Simone Guarino, Roberto Setola, Martina Nobili, Francesco Flammini, Franca Corradini:
Cybersecurity for Safety: Risk Assessment of Autonomous Cyber-Physical Systems. 652-657 - Alexander Dalton, David Thomas, Peter Cheung:

DSCS: Towards an Extensible Secure Decentralised Distributed Computation Protocol. 658-663 - Giovanni Maria Cristiano

, Salvatore D'Antonio, Federica Uccello:
A Novel Approach for Securing Federated Learning: Detection and Defense Against Model Poisoning Attacks. 664-669 - Roberto Nardone, Alfredo Petruolo, Federica Uccello:

Secure and Transparent Data Sharing Among Connected Devices: Integrating Data Spaces and Provenance. 670-675 - Salvatore D'Antonio, Jonah Giglio, Giovanni Mazzeo, Federica Uccello, Teresa Mannarino:

Enhancing Healthcare Data Confidentiality through Decentralized TEE Attestation. 676-681 - Stelios Erotokritou, Ioannis Giannoulakis, Emmanouil Kafetzakis, Konstantinos Kaltakis:

Simplifying Differential Privacy for Non-Experts: The ENCRYPT Project Approach. 682-687 - Stefano Perone

, Luca Faramondi, Simone Guarino, Martina Nobili, Roberto Setola, Ernesto Del Prete, Giovanni Patruno, Luca Piccirillo, Annunziata Laurenda:
ZADIG: A novel Extended Detection and Response System. 688-693 - Orion Papadakis, Michail Papadimitriou, Athanasios Stratikopoulos, Maria Xekalaki, Juan Fumero, Nikos Foutris, Christos Kotselidis:

Towards GPU Accelerated FHE Computations. 694-699 - Christina Karalka, Georgios Meditskos, Maria Papoutsoglou, Nick Bassiliades:

Towards a Generic Knowledge Graph Construction Framework for Privacy Awareness. 700-705 - Ioannis Stamelos, George Hatzivasilis

, Sotiris Ioannidis:
Active Honey Files for Ransomware Encryption Mitigation. 706-713 - Fatimah Aloraini

, Amir Javed:
Adversarial Attacks in Intrusion Detection Systems: Triggering False Alarms in Connected and Autonomous Vehicles. 714-719 - Yazeed Alrowaili, Neetesh Saxena

, Pete Burnap:
Towards Developing an Asset-Criticality Identification Framework in Smart Grids. 720-725 - Nigel Davies, Huseyin Dogan, Duncan Ki-Aries, Nan Jiang, Chris Williams:

Foundations for Modelling Conscientious Attacking in Electromagnetic Cyberspace. 726-731 - Vasilis Ieropoulos

:
The Impact of GPS Interference in the Middle East. 732-736 - Tommaso Romano, Fatemeh Mohammadi

, Paolo Ceravolo:
Synthetic Data for Identifying Inclusive Language (Case Study: Job Descriptions in Italian). 737-742 - Paolo Ceravolo

, Fatemeh Mohammadi
, Marta Annamaria Tamborini
:
Active Learning Methodology in LLMs Fine-Tuning. 743-749 - Marius Cotiga

, Jens Myrup Pedersen
, Edlira Dushku:
Cyber Resilience in OT: Characteristics and Security Challenges. 750-756 - Mark R. Weimar:

Framework for Quantitative Evaluation of Resilience Solutions: An Approach to Determine the Value of Resilience for a Particular Site. 757-762 - Stanislas G. Bianou, Rodrigue G. Batogna:

PENTEST-AI, an LLM-Powered Multi-Agents Framework for Penetration Testing Automation Leveraging Mitre Attack. 763-770 - Yvonne Hwei-Syn Kam, Kevin D. Jones, Kimberly Tam

, Robert Rawlinson-Smith:
Taxonomy of Cyber Risk Mitigation Cost Benefit Analysis Methods for Energy Infrastructure. 771-776 - Georgios Andronikidis, Charis Eleftheriadis, Zisis Batzos, Konstantinos Kyranou, Nikolaos Maropoulos, Gohar Sargsyan, Panagiotis I. Radoglou-Grammatikis, Panagiotis G. Sarigiannidis:

AI-Driven Anomaly and Intrusion Detection in Energy Systems: Current Trends and Future Direction. 777-782 - Christos Dalamagkas, Dimitrios Christos Asimopoulos

, Panagiotis I. Radoglou-Grammatikis
, Nikolaos Maropoulos, Thomas Lagkas, Vasileios Argyriou, Gohar Sargsyan, Panagiotis G. Sarigiannidis:
AI4COLLAB: An AI-based Threat Information Sharing Platform. 783-788 - Aurélie Kpoze, Abdelkader Lahmadi, Isabelle Chrisment, Jules Degila:

SDN-Based Reconfiguration of Distributed and Cooperative Microgrid Control Systems for Mitigating Synchronization Attacks. 789-794 - Margherita Bottoni, Emanuele Bellini, Emeri Farinetti:

Towards a Reputational-Based Trustworthy Archaeological Information System. 795-800 - Emanuele Bellini, Emiliano Degl'Innocenti:

Transitioning SSH European Research Infrastructures to Critical Infrastructure Through Resilience. 801-806 - Christopher Rouff, Ali Tekeoglu:

SoK: Autonomic Computing Based Mehods for ICS/SCADA and IIoT Security. 807-812 - Benny Rubin, Ali Tekeoglu, Christopher Rouff:

Autonomic Passive IT-OT Device Classification in ICS/SCADA Networks. 813-818 - Christos Spyridakis

, Angeliki Aktypi, Thomas Kyriakakis
, Sotiris Ioannidis:
SecureExecutor: An Automated Way to Leverage SCONE to Enhance Application Security. 827-832 - Spyridon Papastergiou, Shareeful Islam, Eleni-Maria Kalogeraki, Argyro Chatzopoulou, Panagiotis Bountakas, Konstantinos Pournaras, Sreedevi Beena, Nineta Polemi:

Composite Inspection and Certification (CIC) System for Cybersecuity Assessment of ICT Products, Services, and Processes. 833-838 - Paul Tavolato, Robert Luh, Sebastian Eresheim

, Simon Gmeiner, Sebastian Schrittwieser
:
Quantifying the Odds in Real World Attack Scenarios. 845-852 - Robert Andrew Chetwyn

, Martin Eian
, Audun Jøsang
:
Onto Hunt - A Semantic Reasoning Approach to Cyber Threat Hunting with Indicators of Behaviour. 853-859 - Dimitrios Kasimatis

, Sam Grierson, William J. Buchanan, Chris Eckl, Pavlos Papadopoulos, Nikolaos Pitropakis
, Christos Chrysoulas
, Craig Thomson, Baraq Ghaleb:
DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof. 866-871 - Daniel Spiekermann, Jörg Keller:

Challenges of Digital Investigations in Nowadays Communication Networks. 872-877 - Jian Xi

, Lukas Jaeckel
, Michael Spranger, Melanie Siegel, Dirk Labudde:
Forensic Communication Analysis: Challenges and Opportunities. 878-883 - Ievgen Kabin

, Zoya Dyka
, Alkistis Aikaterini Sigourou, Peter Langendoerfer
:
Static Power Consumption as a New Side-Channel Analysis Threat to Elliptic Curve Cryptography Implementations. 884-889 - Hongwei Zhao, Vianney Lapôtre, Guy Gogniat:

Communication Architecture Under Siege: An In-depth Analysis of Fault Attack Vulnerabilities and Countermeasures. 890-896 - Cesare Caratozzolo, Valeria Rossi, Kamil Witek, Alberto Trombetta, Massimo Caccia:

On-line Anomaly Detection and Qualification of Random Bit Streams. 897-904 - Ievgen Kabin

, Jan Schäffner, Alkistis Aikaterini Sigourou, Dmytro Petryk
, Zoya Dyka
, Dominik Klein, Sven Freud, Peter Langendoerfer
:
Stealth Attacks on PCBs: An Experimental Plausibility Analysis. 905-912 - Marios Papadopoulos, Kostas Lampropoulos, Paris Kitsos:

FPGA-Based Cloud Security Solutions for 5G Networks. 913-918 - Evangelia Konstantopoulou

, George S. Athanasiou
, Nicolas Sklavos:
Minimizing Area Footprint of UAV Communication Security Using FPGAs. 919-924

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














