


default search action
Digital Threats: Research and Practice, Volume 2
Volume 2, Number 1, March 2021
- Roberto Perdisci, Martina Lindorfer, Adam Doupé, Andrea Lanzi, Alexandros Kapravelos, Gianluca Stringhini:

Introduction to the ACSAC'19 Special Issue - Vol. 2. 1:1-1:2 - Lieven Desmet

, Jan Spooren, Thomas Vissers, Peter Janssen, Wouter Joosen:
Premadoma: An Operational Solution to Prevent Malicious Domain Name Registrations in the .eu TLD. 2:1-2:24 - Yoshimichi Nakatsuka, Andrew Paverd

, Gene Tsudik:
PDoT: Private DNS-over-TLS with TEE Support. 3:1-3:22 - Ziya Alper Genç, Gabriele Lenzini, Daniele Sgandurra:

Cut-and-Mouse and Ghost Control: Exploiting Antivirus Software with Synthesized Inputs. 4:1-4:23 - Toshinori Usui, Yuto Otsuki, Tomonori Ikuse, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Kanta Matsuura

:
Automatic Reverse Engineering of Script Engine Binaries for Building Script API Tracers. 5:1-5:31 - Amit Kumar Sikder, Leonardo Babun, A. Selcuk Uluagac:

Aegis+: A Context-aware Platform-independent Security Framework for Smart Home Systems. 6:1-6:33 - Pritam Dash, Mehdi Karimibiuki, Karthik Pattabiraman:

Stealthy Attacks against Robotic Vehicles Protected by Control-based Intrusion Detection Techniques. 7:1-7:25
Volume 2, Number 2, June 2021
- Nils Amiet:

Blockchain Vulnerabilities in Practice. 8:1-8:7 - Li Wang, S. Sitharama Iyengar

, Amith K. Belman
, Pawel Sniatala, Vir V. Phoha
, Changsheng Wan:
Game Theory based Cyber-Insurance to Cover Potential Loss from Mobile Malware Exploitation. 9:1-9:24 - Daniel W. Woods, Tyler Moore

, Andrew C. Simpson
:
The County Fair Cyber Loss Distribution: Drawing Inferences from Insurance Prices. 10:1-10:21 - Jonathan M. Spring

, Phyllis Illari:
Review of Human Decision-making during Computer Security Incident Analysis. 11:1-11:47 - Shubhra Tewari, Renos Zabounidis, Ammina Kothari

, Reynold Bailey, Cecilia Ovesdotter Alm:
Perceptions of Human and Machine-Generated Articles. 12:1-12:16 - Reza Zafarani, Huan Liu, Vir V. Phoha, Javad Azimi:

Inroduction on Recent Trends and Perspectives in Fake News Research. 13:1-13:3 - Lev Konstantinovskiy, Oliver Price, Mevan Babakar, Arkaitz Zubiaga:

Toward Automated Factchecking: Developing an Annotation Schema and Benchmark for Consistent Automated Claim Detection. 14:1-14:16 - Pratim Datta, Mark Whitmore, Joseph K. Nwankpa

:
A Perfect Storm: Social Media News, Psychological Biases, and AI. 15:1-15:21 - Rohit Valecha, Srikrishna Krishnarao Srinivasan, Tejaswi Volety, K. Hazel Kwon, Manish Agrawal, H. Raghav Rao:

Fake News Sharing: An Investigation of Threat and Coping Cues in the Context of the Zika Virus. 16:1-16:16 - Teng-Chieh Huang, Razieh Nokhbeh Zaeem, K. Suzanne Barber:

Identifying Real-world Credible Experts in the Financial Domain. 17:1-17:14
Volume 2, Number 3, September 2021
- Jeroen van der Ham

:
Toward a Better Understanding of "Cybersecurity". 18:1-18:3
- Leigh Metcalf, Jonathan M. Spring

:
The Ecosystem of Detection and Blocklisting of Domain Generation. 19:1-19:22 - Jay Jacobs, Sasha Romanosky, Benjamin Edwards, Idris Adjerid

, Michael Roytman:
Exploit Prediction Scoring System (EPSS). 20:1-20:17 - Josephine Lamp, Carlos E. Rubio-Medrano

, Ziming Zhao, Gail-Joon Ahn
:
ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems. 21:1-21:23 - Jassim Happa, Ioannis Agrafiotis, Martin Helmhout, Thomas Bashford-Rogers, Michael Goldsmith, Sadie Creese:

Assessing a Decision Support Tool for SOC Analysts. 22:1-22:35 - Rajesh Kumar

, Can Isik, Vir V. Phoha
:
Treadmill Assisted Gait Spoofing (TAGS): An Emerging Threat to Wearable Sensor-based Gait Authentication. 23:1-23:17 - Christos Iliou

, Theodoros Kostoulas, Theodora Tsikrika
, Vasilis Katos
, Stefanos Vrochidis, Ioannis Kompatsiaris:
Detection of Advanced Web Bots by Combining Web Logs with Mouse Behavioural Biometrics. 24:1-24:26
Volume 2, Number 4, December 2021
- Josiah Dykstra, Neil C. Rowe, Timothy J. Shimeall, Angela Horneman, Marisa Midler:

Introduction: On the Nature of Situational Awareness. 25:1-25:3 - John H. Ring, Colin Michael Van Oort, Samson Durst, Vanessa White, Joseph P. Near, Christian Skalka

:
Methods for Host-based Intrusion Detection with Deep Learning. 26:1-26:29 - Sagar Samtani

, Weifeng Li
, Victor A. Benjamin, Hsinchun Chen:
Informing Cyber Threat Intelligence through Dark Web Situational Awareness: The AZSecure Hacker Assets Portal. 27:1-27:10 - Sinan G. Aksoy, Emilie Purvine

, Stephen J. Young
:
Directional Laplacian Centrality for Cyber Situational Awareness. 28:1-28:28 - Jassim Happa, Thomas Bashford-Rogers, Alastair Janse van Rensburg, Michael Goldsmith, Sadie Creese:

Deception in Network Defences Using Unpredictability. 29:1-29:26 - Ahmed Aleroud

, Fan Yang, Sai C. Pallaprolu, Zhiyuan Chen, George Karabatis:
Anonymization of Network Traces Data through Condensation-based Differential Privacy. 30:1-30:23
- Leigh Metcalf:

Editorial on the Special Issue on Election Security. 31:1 - Amanda K. Glazer

, Jacob V. Spertus, Philip B. Stark
:
More Style, Less Work: Card-style Data Decrease Risk-limiting Audit Sample Sizes. 32:1-32:15 - Patrick McCorry, Maryam Mehrnezhad

, Ehsan Toreini, Siamak F. Shahandashti, Feng Hao
:
On Secure E-Voting over Blockchain. 33:1-33:13

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














