default search action
13th ARES 2018: Hamburg, Germany
- Sebastian Doerr, Mathias Fischer, Sebastian Schrittwieser, Dominik Herrmann:
Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018. ACM 2018, ISBN 978-1-4503-6448-5
SAW 2018: SAW I - Software Security Testing and Cyber-Resilience
- Suneel Randhawa, Benjamin P. Turnbull, Joseph Yuen, Jonathan Dean:
Mission-Centric Automated Cyber Red Teaming. 1:1-1:11 - Routa Moussaileb, Benjamin Bouget, Aurélien Palisse, Hélène Le Bouder, Nora Cuppens, Jean-Louis Lanet:
Ransomware's Early Mitigation Mechanisms. 2:1-2:10 - Otto Hellwig, Gerald Quirchmayr, Walter Hötzendorfer, Christof Tschohl, Edith Huber, Franz Vock, Florian Nentwich, Bettina Pospisil, Matthias Gusenbauer, Gregor Langner:
A GDPR compliance module for supporting the exchange of information between CERTs. 3:1-3:7
ARES Full Papers: ARES Full I - Machine Learning
- Huy H. Nguyen, Ngoc-Dung T. Tieu, Hoang-Quoc Nguyen-Son, Vincent Nozick, Junichi Yamagishi, Isao Echizen:
Modular Convolutional Neural Network for Discriminating between Computer-Generated Images and Photographic Images. 1:1-1:10 - Alexander Aigner:
FALKE-MC: A Neural Network Based Approach to Locate Cryptographic Functions in Machine Code. 2:1-2:8
ARES Full Papers: ARES Full II - Best Paper Session
- Majid Nateghizad, Thijs Veugen, Zekeriya Erkin, Reginald L. Lagendijk:
Secure Equality Testing Protocols in the Two-Party Setting. 3:1-3:10 - Vaibhavi Kalgutkar, Natalia Stakhanova, Paul Cook, Alina Matyukhina:
Android authorship attribution through string analysis. 4:1-4:10 - Heng Zhang, Jesus Luna, Neeraj Suri, Rubén Trapero:
Flashlight: A Novel Monitoring Path Identification Schema for Securing Cloud Services. 5:1-5:10
SAW 2018: SAW II - Secure Software Development
- Thomas Lorünser, Henrich C. Pöhls, Leon Sell, Thomas Laenger:
CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle. 4:1-4:9 - Priya Anand, Jungwoo Ryoo:
Architectural Solutions to Mitigate Security Vulnerabilities in Software Systems. 5:1-5:5
ARES Full Papers: ARES Full III - Software Security
- Jorrit Kronjee, Arjen Hommersom, Harald P. E. Vranken:
Discovering software vulnerabilities using data-flow analysis and machine learning. 6:1-6:10 - Ulf Kargén, Nahid Shahmehri:
Speeding Up Bug Finding using Focused Fuzzing. 7:1-7:10 - Brett Benyo, Shane S. Clark, Aaron Paulos, Partha P. Pal:
HYDRA: Hypothesis Driven Repair Automation. 8:1-8:10
SSE 2018: SSE I - Secure software development and DevOps
- Kalle Rindell, Jukka Ruohonen, Sami Hyrynsalmi:
Surveying Secure Software Development Practices in Finland. 6:1-6:7 - Pawel Rajba:
Challenges and mitigation approaches for getting secured applications in an enterprise company. 7:1-7:6 - Martin Gilje Jaatun:
Software Security Activities that Support Incident Management in Secure DevOps. 8:1-8:6
CUING 2018: CUING I
- Martin Steinebach, Andre Ester, Huajian Liu:
Channel Steganalysis. 9:1-9:8 - Wojciech Mazurczyk, Steffen Wendzel, Krzysztof Cabaj:
Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach. 10:1-10:10 - Christian Kraetzer, Jana Dittmann:
Steganography by synthesis: Can commonplace image manipulations like face morphing create plausible steganographic channels? 11:1-11:8
ARES Full Papers: ARES Full IV - Security and the User
- Mark Daniels, John R. Rose, Csilla Farkas:
Protecting Patients' Data: An Efficient Method for Health Data Privacy. 9:1-9:10 - Daniela Yabe, Caio Augusto Rodrigues dos Santos, Lucas Miranda Assuncao, Rivalino Matias Jr.:
Influence Factors on the Quality of User Experience in OS Reliability: A Qualitative Experimental Study. 10:1-10:10
ARES Full Papers: ARES Full V - Cryptography
- Nina Gerber, Verena Zimmermann, Birgit Henhapl, Sinem Emeröz, Melanie Volkamer:
Finally Johnny Can Encrypt: But Does This Make Him Feel More Secure? 11:1-11:10 - Masoomeh Sepehri, Alberto Trombetta, Maryam Sepehri, Ernesto Damiani:
An Efficient Cryptography-Based Access Control Using Inner-Product Proxy Re-Encryption Scheme. 12:1-12:10 - Olivier Blazy, Céline Chevalier:
Non-Interactive Key Exchange from Identity-Based Encryption. 13:1-13:10
CUING 2018: CUING II
- Krzysztof Cabaj, Wojciech Mazurczyk, Piotr Nowakowski, Piotr Zórawski:
Towards Distributed Network Covert Channels Detection Using Data Mining-based Approach. 12:1-12:10 - Steffen Wendzel:
Get Me Cited, Scotty!: Analysis of Citations in Covert Channel/Steganography Research. 13:1-13:8
CUING 2018: CUING III
- Daniel Geisler, Wojciech Mazurczyk, Jörg Keller:
Towards Utilization of Covert Channels as a Green Networking Technique. 14:1-14:10 - Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon:
Accuracy Enhancement of Electromagnetic Side-Channel Attacks on Computer Monitors. 15:1-15:9
ARES Full Papers: ARES Full VI - Anomaly Detection
- Martin Pirker, Patrick Kochberger, Stefan Schwandter:
Behavioural Comparison of Systems for Anomaly Detection. 14:1-14:10 - Zongze Li, Matthew Davidson, Song Fu, Sean Blanchard, Michael Lang:
Converting Unstructured System Logs into Structured Event List for Anomaly Detection. 15:1-15:10 - Sarita Paudel, Paul Smith, Tanja Zseby:
Stealthy Attacks on Smart Grid PMU State Estimation. 16:1-16:10
IoT-SECFOR 2018: IoT-SECFOR I- Security Assessment & Analysis
- Musa G. Samaila, João B. F. Sequeiros, Mário M. Freire, Pedro R. M. Inácio:
Security Threats and Possible Countermeasures in IoT Applications Covering Different Industry Domains. 16:1-16:9
ARES Full Papers: ARES Full VII - Network Security and Monitoring I
- Wilfried Mayer, Thomas Schreiber, Edgar R. Weippl:
A Framework for Monitoring Net Neutrality. 17:1-17:10 - Julian Rauchberger, Sebastian Schrittwieser, Tobias Dam, Robert Luh, Damjan Buhov, Gerhard Pötzelsberger, Hyoungshick Kim:
The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns. 18:1-18:10
IoT-SECFOR 2018: IoT-SECFOR II - Security Attacks & Solutions
- Eef van Es, Harald P. E. Vranken, Arjen Hommersom:
Denial-of-Service Attacks on LoRaWAN. 17:1-17:6 - Martin Serror, Martin Henze, Sacha Hack, Marko Schuba, Klaus Wehrle:
Towards In-Network Security for Smart Homes. 18:1-18:8 - Radek Fujdiak, Petr Blazek, Konstantin Mikhaylov, Lukas Malina, Petr Mlynek, Jiri Misurec, Vojtech Blazek:
On Track of Sigfox Confidentiality with End-to-End Encryption. 19:1-19:6 - Alan J. Michaels:
Improved RNS-based PRNGs. 20:1-20:5
ARES Full Papers: ARES Full VIII - Network Security and Monitoring II
- Gustavo Gonzalez Granadillo, Jose Rubio-Hernan, Joaquín García-Alfaro:
A Pyramidal-based Model to Compute the Impact of Cyber Security Events. 19:1-19:10 - ElMouatez Billah Karbab, Mourad Debbabi:
ToGather: Automatic Investigation of Android Malware Cyber-Infrastructures. 20:1-20:10
ARES Full Papers: ARES Full IX - Automotive
- Martin Salfer, Claudia Eckert:
Attack Graph-Based Assessment of Exploitability Risks in Automotive On-Board Networks. 21:1-21:10 - Daniel Zelle, Markus Springer, Maria Zhdanova, Christoph Krauß:
Anonymous Charging and Billing of Electric Vehicles. 22:1-22:10 - Venu Babu Thati, Jens Vankeirsbilck, Niels Penneman, Davy Pissoort, Jeroen Boydens:
CDFEDT: Comparison of Data Flow Error Detection Techniques in Embedded Systems: an Empirical Study. 23:1-23:9
IoT-SECFOR 2018: IoT-SECFOR III- Security Assessment & Analysis
- Owen Lo, William J. Buchanan, Douglas Carson:
Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device. 21:1-21:6 - Alberto Giaretta, Michele De Donno, Nicola Dragoni:
Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot. 22:1-22:8 - Henri Ruotsalainen, Stepan Grebeniuk:
Towards Wireless Secret key Agreement with LoRa Physical Layer. 23:1-23:6
iPAT 2018: iPAT I
- Jonas Walter, Bettina Abendroth, Thilo Von Pape, Christian Plappert, Daniel Zelle, Christoph Krauß, G. Gagzow, Hendrik Decke:
The user-centered privacy-aware control system PRICON: An interdisciplinary evaluation. 24:1-24:10 - Håkan Jonsson, Carl Magnus Olsson:
User privacy attitudes regarding proximity sensing. 25:1-25:5 - Armin Gerl, Dirk Pohl:
Critical Analysis of LPL according to Articles 12 - 14 of the GDPR. 26:1-26:9 - Vida Ahmadi Mehri, Dragos Ilie, Kurt Tutschku:
Privacy and DRM Requirements for Collaborative Development of AI Applications. 27:1-27:8
ARES Full Papers: ARES Full X - Cloud Security
- Ferdaous Kamoun-Abid, Amel Meddeb-Makhlouf, Faouzi Zarai, Mohsen Guizani:
Distributed and Cooperative firewall/controller in cloud environments. 24:1-24:10 - Johannes Blömer, Nils Löken:
Cloud Architectures for Searchable Encryption. 25:1-25:10
ARES Short Papers: ARES Short I - Malware
- Mohit Sewak, Sanjay K. Sahay, Hemant Rathore:
An investigation of a deep learning based malware detection system. 26:1-26:5 - Marius Musch, Martin Härterich, Martin Johns:
Towards an Automatic Generation of Low-Interaction Web Application Honeypots. 27:1-27:6 - Khanh-Huu-The Dam, Tayssir Touili:
Learning Malware Using Generalized Graph Kernels. 28:1-28:6
IWSECC 2018: IWSECC I - Security Implementations for Cloud Computing
- Tanja Hanauer, Wolfgang Hommel, Stefan Metzger, Daniela Pöhn:
A Process Framework for Stakeholder-specific Visualization of Security Metrics. 28:1-28:10 - Aapo Kalliola, Shankar Lal, Kimmo Ahola, Ian Oliver, Yoan Miche, Tuomas Aura:
Security Wrapper Orchestration in Cloud. 29:1-29:6 - Thomas Grafenauer, Sandra König, Stefan Rass, Stefan Schauer:
A Simulation Tool for Cascading Effects in Interdependent Critical Infrastructures. 30:1-30:8
ARES Short Papers: ARES Short II - Monitoring
- Martin Husák, Nataliia Neshenko, Morteza Safaei Pour, Elias Bou-Harb, Pavel Celeda:
Assessing Internet-wide Cyber Situational Awareness of Critical Sectors. 29:1-29:6 - Olivier Blazy, Céline Chevalier:
Spreading Alerts Quietly: New Insights from Theory and Practice. 30:1-30:6 - Nafiseh Kahani, Mehran S. Fallah:
A Reactive Defense Against Bandwidth Attacks Using Learning Automata. 31:1-31:6
IWSECC 2018: IWSECC II - Security Engineering Solutions for Cloud Computing
- Madiha H. Syed, Eduardo B. Fernández:
A reference architecture for the container ecosystem. 31:1-31:6 - Jamal Toutouh, Antonio Muñoz, Sergio Nesmachnow:
Evolution Oriented Monitoring oriented to Security Properties for Cloud Applications. 32:1-32:7
ARES Short Papers: ARES Short III - Embedded Systems
- Tianxiang Huang, Jianying Zhou, Andrei Bytes:
ATG: An Attack Traffic Generation Tool for Security Testing of In-vehicle CAN Bus. 32:1-32:6 - Sébanjila Kevin Bukasa, Ronan Lashermes, Jean-Louis Lanet, Axel Legay:
Let's shock our IoT's heart: ARMv7-M under (fault) attacks. 33:1-33:6 - Mohamed A. Abo-Soliman, Marianne A. Azer:
Enterprise WLAN Security Flaws: Current Attacks and relative Mitigations. 34:1-34:8
SPEBD 2018: SPEBD I
- Chibuike Ugwuoke, Zekeriya Erkin, Reginald L. Lagendijk:
Secure Fixed-point Division for Homomorphically Encrypted Operands. 33:1-33:10 - Nurefsan Sertbas, Samet Aytaç, Orhan Ermis, Fatih Alagöz, Gürkan Gür:
Attribute Based Content Security and Caching in Information Centric IoT. 34 - Hussam Jasim Mohammed, Nathan L. Clarke, Fudong Li:
Evidence Identification in Heterogeneous Data Using Clustering. 35
ARES Short Papers: ARES Short IV - Security Practices
- Anika Behrens:
What are Security Patterns?: A Formal Model for Security and Design of Software. 35 - Gerardo Canfora, Andrea Di Sorbo, Enrico Emanuele, Sara Forootani, Corrado Aaron Visaggio:
A Nlp-based Solution to Prevent from Privacy Leaks in Social Network Posts. 36:1-36:6 - Alberto Bartoli, Eric Medvet, Andrea De Lorenzo, Fabiano Tarlao:
(In)Secure Configuration Practices of WPA2 Enterprise Supplicants. 37:1-37:6
WCTI 2018: WCTI I
- Jana Komárková, Martin Husák, Martin Lastovicka, Daniel Tovarnák:
CRUSOE: Data Model for Cyber Situational Awareness. 36:1-36:10 - Mathias Gschwandtner, Lukas Demetz, Matthias Gander, Ronald Maier:
Integrating Threat Intelligence to Enhance an Organization's Information Security Management. 37:1-37:8 - Pontus Johnson, Robert Lagerström, Mathias Ekstedt:
A Meta Language for Threat Modeling and Attack Simulations. 38:1-38:8
FARES 2018: FARES I - Protection and Detection
- Omid Mir, René Mayrhofer, Michael Hölzl, Thanh-Binh Nguyen:
Recovery of Encrypted Mobile Device Backups from Partially Trusted Cloud Servers. 38:1-38:10 - Francis N. Nwebonyi, Rolando Martins, Manuel Eduardo Correia:
Reputation-Based Security System For Edge Computing. 39:1-39:8 - Paul J. E. Velthuis, Marcel Schäfer, Martin Steinebach:
New authentication concept using certificates for big data analytic tools. 40:1-40:7 - Simon Duque Antón, Suneetha Kanoor, Daniel Fraunholz, Hans Dieter Schotten:
Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set. 41:1-41:9
SECPID 2018: SECPID I
- Farzaneh Karegar, John Sören Pettersson, Simone Fischer-Hübner:
Fingerprint Recognition on Mobile Devices: Widely Deployed, Rarely Understood. 39:1-39:9 - Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan:
Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials. 40:1-40:10 - Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani:
Definitions for Plaintext-Existence Hiding in Cloud Storage. 41:1-41:7 - Kai Bemmann, Johannes Blömer, Jan Bobolz, Henrik Bröcher, Denis Diemert, Fabian Eidens, Lukas Eilers, Jan Haltermann, Jakob Juhnke, Burhan Otour, Laurens Porzenheim, Simon Pukrop, Erik Schilling, Michael Schlichtig, Marcel Stienemeier:
Fully-Featured Anonymous Credentials with Reputation System. 42:1-42:10
FARES 2018: FARES II - Measurement and Robust Design
- David McLuskie, X. Belleken:
X.509 Certificate Error Testing. 42:1-42:8 - Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki:
Evaluating the degree of security of a system built using security patterns. 43:1-43:8 - Preetam Mukherjee, Chandan Mazumdar:
Attack Difficulty Metric for Assessment of Network Security. 44:1-44:10 - Sebastian Wandelt, Xiaoqian Sun:
Robustness Estimation of Infrastructure Networks: On the Usage of Degree Centrality. 45:1-45:7
5G-NS 2018: 5G-NS I
- Robert Annessi, Joachim Fabini, Tanja Zseby:
To Trust or Not to Trust: Data Origin Authentication for Group Communication in 5G Networks. 43:1-43:7 - Vincent Lefebvre, Gianni Santinelli, Tilo Müller, Johannes Götzfried:
Universal Trusted Execution Environments for Securing SDN/NFV Operations. 44:1-44:9 - Florian Wendland, Christian Banse:
Enhancing NFV Orchestration with Security Policies. 45:1-45:6 - Daniel Guija, Muhammad Shuaib Siddiqui:
Identity and Access Control for micro-services based 5G NFV platforms. 46:1-46:10
WSDF 2018: WSDF I
- Laoise Luciano, Ibrahim M. Baggili, Mateusz Topor, Peter Casey, Frank Breitinger:
Digital Forensics in the Next Five Years. 46:1-46:14
5G-NS 2018: 5G-NS II
- Gregory Blanc, Nizar Kheir, Dhouha Ayed, Vincent Lefebvre, Edgardo Montes de Oca, Pascal Bisson:
Towards a 5G Security Architecture: Articulating Software-Defined Security and Security as a Service. 47:1-47:8 - Marco Antonio Sotelo Monge, Jorge Maestre Vidal, Luis Javier García-Villalba:
A novel Self-Organizing Network solution towards Crypto-ransomware Mitigation. 48:1-48:10 - Krzysztof Cabaj, Marcin Gregorczyk, Wojciech Mazurczyk, Piotr Nowakowski, Piotr Zórawski:
SDN-based Mitigation of Scanning Attacks for the 5G Internet of Radio Light System. 49
WSDF 2018: WSDF II
- Jonas Plum, Andreas Dewald:
Forensic APFS File Recovery. 47:1-47:10 - Jacob Taylor, Benjamin P. Turnbull, Gideon Creech:
Volatile Memory Forensics Acquisition Efficacy: A Comparative Study Towards Analysing Firmware-Based Rootkits. 48:1-48:11 - Gokila Dorai, Shiva Houshmand, Ibrahim M. Baggili:
I Know What You Did Last Summer: Your Smart Home Internet of Things and Your iPhone Forensically Ratting You Out. 49:1-49:10
5G-NS 2018: 5G-NS III
- Jorge Maestre Vidal, Marco Antonio Sotelo Monge, Luis Javier García-Villalba:
Detecting Workload-based and Instantiation-based Economic Denial of Sustainability on 5G environments. 50:1-50:8 - I. Adam, J. Ping:
Framework for Security Event Management in 5G. 51:1-51:7
WSDF 2018: WSDF III
- Bruno Malveira Peixoto, Sandra Avila, Zanoni Dias, Anderson Rocha:
Breaking down violence: A deep-learning strategy to model and classify violence in videos. 50:1-50:7 - Patrício Domingues, Miguel Frade:
Digitally Signed and Permission Restricted PDF Files: a Case Study on Digital Forensics. 51:1-51:8 - Yi-Ching Liao:
Investigating the Use of Online Open Source Information as Evidence in European Courts. 52:1-52:6
CyberTIM 2018: CyberTIM I - Attack Detection and Mitigation
- Christos M. Mathas, Olga E. Segou, Georgios Xilouris, Dimitris Christinakis, Michail-Alexandros Kourtis, Costas Vassilakis, Anastasios Kourtis:
Evaluation of Apache Spot's machine learning capabilities in an SDN/NFV enabled environment. 52:1-52:10 - Nikolaos Tsinganos, Georgios Sakellariou, Panagiotis E. Fouliras, Ioannis Mavridis:
Towards an Automated Recognition System for Chat-based Social Engineering Attacks in Enterprise Environments. 53:1-53:10 - Tomás Jánský, Tomás Cejka, Martin Zádník, Václav Bartos:
Augmented DDoS Mitigation with Reputation Scores. 54:1-54:7 - Olusola Akinrolabu, Ioannis Agrafiotis, Arnau Erola:
The challenge of detecting sophisticated attacks: Insights from SOC Analysts. 55:1-55:9
IWSMA 2018: IWSMA I
- Amira Kchaou, Ryma Abassi, Sihem Guemara El Fatmi:
Toward a Distributed Trust Management scheme for VANET. 53:1-53:6 - David Berend, Shivam Bhasin, Bernhard Jungk:
There Goes Your PIN: Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting. 54:1-54:10 - Ons Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
Towards a Privacy Preserving and Flexible Scheme for Assessing the Credibility and the Accuracy of Safety Messages Exchanged in VANETs. 55:1-55:9
CyberTIM 2018: CyberTIM II - Threat Intelligence Sharing
- F. R. L. Silva, P. Jacob:
Mission-Centric Risk Assessment to Improve Cyber Situational Awareness. 56:1-56:8 - Antonio Pastor, Alberto Mozo, Diego R. López, Jesús Folgueira, Angeliki Kapodistria:
The Mouseworld, a security traffic analysis lab based on NFV/SDN. 57:1-57:6 - Adham Albakri, Eerke A. Boiten, Rogério de Lemos:
Risks of Sharing Cyber Incident Information. 58:1-58:10 - Arnold Sykosch, Marc Ohm, Michael Meier:
Hunting Observable Objects for Indication of Compromise. 59:1-59:8
IWSMA 2018: IWSMA II
- William Klieber, Lori Flynn, Will Snavely, Michael Zheng:
Practical Precise Taint-flow Static Analysis for Android App Sets. 56:1-56:7 - Alessandro Bacci, Alberto Bartoli, Fabio Martinelli, Eric Medvet, Francesco Mercaldo:
Detection of Obfuscation Techniques in Android Applications. 57:1-57:9 - Anatoli Kalysch, Oskar Milisterfer, Mykolai Protsenko, Tilo Müller:
Tackling Androids Native Library Malware with Robust, Efficient and Accurate Similarity Measures. 58:1-58:10
IWOCCTN 2018: IWOCCTN I - Cyber Organized Crime and Terrorism
- Florian Huber:
Conceptualizing the digital TAKEDOWN platforms for supporting first-line-practitioners and law enforcement agencies. 60:1-60:6 - Václav Jirovský, Andrej Pastorek, Max Mühlhäuser, Andrea Tundis:
Cybercrime and Organized Crime. 61:1-61:5 - Diana Silvestru, Karin Rainer, Mario Springnagel:
The AWID prevention approach: The generation of a holistic good practice model for prevention of radicalization in youth work. 62:1-62:5
IWCC 2018: IWCC I
- York Yannikos, Annika Schäfer, Martin Steinebach:
Monitoring Product Sales in Darknet Shops. 59:1-59:7 - François Bouchaud, Gilles Grimaud, Thomas Vantroys:
IoT Forensic: identification and classification of evidence in criminal investigations. 60:1-60:9
IWCC 2018: IWCC II
- Marek Pawlicki, Michal Choras, Rafal Kozik:
Recent Granular Computing Implementations and its Feasibility in Cybersecurity Domain. 61:1-61:6 - Elena Doynikova, Andrey Fedorchenko, Igor V. Kotenko:
Determination of Security Threat Classes on the basis of Vulnerability Analysis for Automated Countermeasure Selection. 62:1-62:8 - Ghada Elbez, Hubert B. Keller, Veit Hagenmeyer:
A New Classification of Attacks against the Cyber-Physical Security of Smart Grids. 63:1-63:6
IWOCCTN 2018: IWOCCTN II - Cyber Security
- Syed Naqvi:
Challenges of Cryptocurrencies Forensics: A Case Study of Investigating, Evidencing and Prosecuting Organised Cybercriminals. 63:1-63:5 - Matteo E. Bonfanti:
Enhancing Cybersecurity by Safeguarding Information Privacy: The European Union and the Implementation of the "Data Protection by Design" Approach. 64:1-64:6 - Andrea Tundis, Wojciech Mazurczyk, Max Mühlhäuser:
A review of network vulnerabilities scanning tools: types, capabilities and functioning. 65:1-65:10
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.