


default search action
SEC 2024: Edinburgh, UK
- Nikolaos Pitropakis

, Sokratis K. Katsikas
, Steven Furnell
, Konstantinos Markantonakis
:
ICT Systems Security and Privacy Protection - 39th IFIP International Conference, SEC 2024, Edinburgh, UK, June 12-14, 2024, Proceedings. IFIP Advances in Information and Communication Technology 710, Springer 2024, ISBN 978-3-031-65174-8 - Abeer Almutairi, Xavier Carpent, Steven Furnell:

Towards a Mobility-Aware Trust Model for the Internet of Underwater Things. 1-15 - Fahad M. Alotaibi

, Sergio Maffeis:
Rasd: Semantic Shift Detection and Adaptation for Network Intrusion Detection. 16-30 - Johanna Ansohn McDougall

, Alessandro Brighente
, Anne Kunstmann
, Niklas Zapatka, Hannes Federrath:
Reduce to the MACs - Privacy Friendly Generic Probe Requests. 31-45 - Beyza Bozdemir, Betül Askin Özdemir, Melek Önen:

PRIDA: PRIvacy-Preserving Data Aggregation with Multiple Data Customers. 46-60 - Efstratios Chatzoglou

, Vyron Kampourakis
, Zisis Tsiatsikas
, Georgios Karopoulos
, Georgios Kambourakis
:
Keep Your Memory Dump Shut: Unveiling Data Leaks in Password Managers. 61-75 - Minseong Choi

, Yubin Im
, Steven Y. Ko
, Yonghwi Kwon
, Yuseok Jeon
, Haehyun Cho
:
DryJIN: Detecting Information Leaks in Android Applications. 76-90 - Valerio Coletti

, Emil Müller
, Frederik Meyer Lehmann Lundsbjerg, Nicola Dragoni
:
Bruteware: A Novel Family of Cryptoviral Attacks. 91-104 - Michael Eckel

, Florian Fenzl
, Lukas Jäger
:
Towards Practical Hardware Fingerprinting for Remote Attestation. 105-118 - William Fraser, Matthew Broadbent

, Nikolaos Pitropakis
, Christos Chrysoulas
:
Examining the Strength of Three Word Passwords. 119-133 - Sonakshi Garg

, Vicenç Torra
:
Can Synthetic Data Preserve Manifold Properties? 134-147 - Luca Hernández Acosta, Delphine Reinhardt

:
"Alexa, How Do You Protect My Privacy?" A Quantitative Study of User Preferences and Requirements About Smart Speaker Privacy Settings. 148-161 - Masato Hirai

, Daisuke Kotani
, Yasuo Okabe
:
Putting Authorization Servers on User-Owned Devices in User-Managed Access. 162-176 - Martin Gilje Jaatun

, Jørn Foros, Maren Istad
:
Identification of Cyber Threats and Vulnerabilities in Norwegian Distribution Networks. 177-190 - Adam Janovsky, Lukasz Chmielewski, Petr Svenda, Jan Jancar

, Vashek Matyas:
Chain of Trust: Unraveling References Among Common Criteria Certified Products. 191-205 - Nan Jiang

, Qihang Zhou
, Xiaoqi Jia
, Jiayun Chen
, Qingjia Huang
, Haichao Du
:
LightArmor: A Lightweight Trusted Operating System Isolation Approach for Mobile Systems. 206-220 - Hongjoo Jin

, Sumin Yang, Moon Chan Park, Haehyun Cho
, Dong Hoon Lee:
Satellite: Effective and Efficient Stack Memory Protection Scheme for Unsafe Programming Languages. 221-235 - Chathuranga Sampath Kalutharage

, Xiaodong Liu
, Christos Chrysoulas
, Oluwaseun Bamgboye:
Neurosymbolic Learning in the XAI Framework for Enhanced Cyberattack Detection with Expert Knowledge Integration. 236-249 - Dimitrios Kasimatis

, William J. Buchanan
, Mwrwan Abubakar, Owen Lo
, Christos Chrysoulas
, Nikolaos Pitropakis
, Pavlos Papadopoulos
, Sarwar Sayeed
, Marc Sel
:
Transforming EU Governance: The Digital Integration Through EBSI and GLASS. 250-263 - Matt Kenny, Nikolaos Pitropakis

, Sarwar Sayeed
, Christos Chrysoulas
, Alexios Mylonas
:
Malicious Insider Threat Detection Using Sentiment Analysis of Social Media Topics. 264-278 - Irshad Khan

, Young-Woo Kwon:
A Structural-Semantic Approach Integrating Graph-Based and Large Language Models Representation to Detect Android Malware. 279-293 - Donghyun Kim

, Seungmin Kim
, Gwonsang Ryu
, Daeseon Choi
:
Session Replication Attack Through QR Code Sniffing in Passkey CTAP Registration. 294-307 - Ming-Chang Lee

, Jia-Chun Lin
, Sokratis K. Katsikas
:
GAD: A Real-Time Gait Anomaly Detection System with Online Adaptive Learning. 308-322 - Gaurav Madkaikar, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:

Queuing Theoretic Analysis of Dynamic Attribute-Based Access Control Systems. 323-337 - Marin Matsumoto, Tsubasa Takahashi, Masato Oguchi:

IPEQ: Querying Multi-attribute Records with Inner Product Encryption. 338-352 - Shibam Mukherjee, Roman Walch, Fredrik Meisingseth, Elisabeth Lex, Christian Rechberger:

Hiding Your Awful Online Choices Made More Efficient and Secure: A New Privacy-Aware Recommender System. 353-366 - Denis Obrezkov

:
Cognition Behind Access Control: A Usability Comparison of Rule- and Category-Based Mechanisms. 367-380 - Francesco Pagano, Luca Verderame, Alessio Merlo:

Obfuscating Code Vulnerabilities Against Static Analysis in Android Apps. 381-395 - Florian Rascoussier, Lise Lahoche

:
Large Scale Heap Dump Embedding for Machine Learning: Predicting OpenSSH Key Locations. 396-409 - Mehdi Saadallah

, Abbas Shahim, Svetlana Khapova
:
Multi-method Approach to Human Expertise, Automation, and Artificial Intelligence for Vulnerability Management - Investigation of Challenges and Emerging Tensions. 410-422 - August See

, Adrian Westphal, Cornelius Weber, Mathias Fischer:
Detecting Web Bots via Keystroke Dynamics. 423-436 - André Waltoft-Olsen, Phillip Johnson

, Lasse Øverlier, Geir Olav Dyrkolbotn:
Exploring a Low-Cost Hardware Reverse Engineering Approach: A Use Case Experiment. 437-450 - Tharindu Lakshan Yasarathna

, Lankeshwara Munasinghe
, Harsha Kalutarage
, Nhien-An Le-Khac
:
Cross-Validation for Detecting Label Poisoning Attacks: A Study on Random Forest Algorithm. 451-464 - Xinwei Yong, Jiaojiao Wu, Jianfeng Wang

:
Xproofs: New Aggregatable and Maintainable Matrix Commitment with Optimal Proof Size. 465-480 - Eloise Zhang, Zoltán Ádám Mann:

Predicting the Execution Time of Secure Neural Network Inference. 481-494

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














