default search action
EICC 2020: Rennes, France
- Luca Caviglione, Aleksandra Mileva, Steffen Wendzel:
EICC 2020: European Interdisciplinary Cybersecurity Conference, Rennes, France, November 18, 2020. ACM 2020, ISBN 978-1-4503-7599-3 - Kris Heid, Jens Heider, Kasra Qasempour:
Raising Security Awareness on Mobile Systems through Gamification. 1:1-1:6 - Maria Leitner, Maximilian Frank, Wolfgang Hotwagner, Gregor Langner, Oliver Maurhart, Timea Pahi, Lenhard Reuter, Florian Skopik, Paul Smith, Manuel Warum:
AIT Cyber Range: Flexible Cyber Security Environment for Exercises, Training and Research. 2:1-2:6 - Sayar Karmakar, Sanchari Das:
Evaluating the Impact of COVID-19 on Cyberbullying through Bayesian Trend Analysis. 3:1-3:6 - Saffija Kasem-Madani, Timo Malderle, Felix Boes, Michael Meier:
Privacy-Preserving Warning Management for an Identity Leakage Warning Network. 4:1-4:6 - Johannes Bouché, Lukas Atkinson, Martin Kappes:
Shadow-Heap: Preventing Heap-based Memory Corruptions by Metadata Validation. 5:1-5:6 - Corinna Heinz, Wojciech Mazurczyk, Luca Caviglione:
Covert Channels in Transport Layer Security. 6:1-6:6 - Daniel Spiekermann:
FAP: Design of an Architecture of a Forensic Access Point to Perform Online Access in a Forensically Sound Manner. 7:1-7:6 - Jongho Shin:
Cross-domain meta-learning for bug finding in the source codes with a small dataset. 8:1-8:6 - Hilde G. Corneliussen:
What Brings Women to Cybersecurity?: A Qualitative Study of Women's Pathways to Cybersecurity in Norway. 9:1-9:2 - Luka Jelovcan, Damjan Fujs, Simon Vrhovec, Anze Mihelic:
The role of information sensitivity in adoption of E2EE communication software. 10:1-10:2 - Mario Kahlhofer, Michael Hölzl, Andreas Berger:
Towards Reconstructing Multi-Step Cyber Attacks in Modern Cloud Environments with Tripwires. 11:1-11:2 - Damjan Fujs, Simon Vrhovec, Damjan Vavpotic:
A Novel Approach for Acquiring Training and Software Security Requirements. 12:1-12:2 - Jörg Keller, Steffen Wendzel:
Covert Channels in One-Time Passwords Based on Hash Chains. 13:1-13:2 - Laura Hartmann, Steffen Wendzel:
Anomaly Detection in ICS based on Data-history Analysis. 14:1-14:2 - David Megías:
Data hiding: New opportunities for security and privacy? 15:1-15:6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.