


default search action
24th NordSec 2019: Aalborg, Denmark
- Aslan Askarov, René Rydhof Hansen

, Willard Rafnsson:
Secure IT Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings. Lecture Notes in Computer Science 11875, Springer 2019, ISBN 978-3-030-35054-3
Privacy
- Tamás Bisztray

, Nils Gruschka
:
Privacy Impact Assessment: Comparing Methodologies with a Focus on Practicality. 3-19 - Florian Dehling

, Tobias Mengel, Luigi Lo Iacono
:
Rotten Cellar: Security and Privacy of the Browser Cache Revisited. 20-36 - Frederik Goovaerts, Gunes Acar, Rafael Galvez

, Frank Piessens, Mathy Vanhoef
:
Improving Privacy Through Fast Passive Wi-Fi Scanning. 37-52 - Thomas Haines:

Cronus: Everlasting Privacy with Audit and Cast. 53-68
Network Security
- Zeeshan Afzal

, Johan Garcia, Stefan Lindskog, Anna Brunström:
Using Partial Signatures in Intrusion Detection for Multipath TCP. 71-86 - Thanh Bui

, Markku Antikainen, Tuomas Aura
:
Analysis of Topology Poisoning Attacks in Software-Defined Networking. 87-102 - Thanh Bui

, Siddharth Prakash Rao
, Markku Antikainen, Tuomas Aura
:
Client-Side Vulnerabilities in Commercial VPNs. 103-119 - Joo Yeon Cho:

Securing Optical Networks by Modern Cryptographic Techniques. 120-133
Platform Security and Malware
- Jamie Pont

, Osama Abu Oun
, Calvin Brierley
, Budi Arief
, Julio C. Hernandez-Castro
:
A Roadmap for Improving the Impact of Anti-ransomware Research. 137-154 - Per Håkon Meland

, Bent Heier Johansen
, Guttorm Sindre
:
An Experimental Analysis of Cryptojacking Attacks. 155-170 - Christian Roth, Mirja Nitschke

, Christian Hutzler, Maximilian Koller, Rolf Küffner, Marc Roßberger, Dogan Kesdogan:
My Smartwatch Is Mine - Machine Learning Based Theft Detection of Smartwatches. 171-187 - Stephan Wiefling

, Nils Gruschka
, Luigi Lo Iacono
:
Even Turing Should Sometimes Not Be Able to Tell: Mimicking Humanoid Usage Behavior for Exploratory Studies of Online Services. 188-203 - Wenjun Xiong

, Melek Gülsever, Koray Mustafa Kaya, Robert Lagerström:
A Study of Security Vulnerabilities and Software Weaknesses in Vehicles. 204-218
System and Software Security
- Jean-Max Dutertre, Timothée Riom, Olivier Potin, Jean-Baptiste Rigaud

:
Experimental Analysis of the Laser-Induced Instruction Skip Fault Model. 221-237 - Gunnar Grimsdal, Patrik Lundgren, Christian Vestlund

, Felipe Boeira, Mikael Asplund
:
Can Microkernels Mitigate Microarchitectural Attacks? 238-253 - Antonis Michalas

, Alexandros Bakas, Hai-Van Dang, Alexandr Zalitko:
MicroSCOPE: Enabling Access Control in Searchable Encryption with the Use of Attribute-Based Encryption and SGX. 254-270 - Stewart Sentanoe, Benjamin Taubmann, Hans P. Reiser

:
VMIGuard: Detecting and Preventing Service Integrity Violations by Malicious Insiders Using Virtual Machine Introspection. 271-282

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














