default search action
EICC 2023: Stavanger, Norway
- Aleksandra Mileva, Steffen Wendzel, Virginia N. L. Franqueira:
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, EICC 2023, Stavanger, Norway, June 14-15, 2023. ACM 2023, ISBN 978-1-4503-9829-9
Main track
- Elvira Castillo-Fernández, Jesús Esteban Díaz Verdejo, Rafael M. Estepa-Alonso, Antonio Jose Estepa Alonso, Javier Muñoz-Calle, Germán Madinabeitia:
Multistep Cyberattacks Detection using a Flexible Multilevel System for Alerts and Events Correlation. 1-6 - Frédéric Tronnier, Patrick Biker, Erik Baur, Sascha Löbner:
An Evaluation of Information Flows in Digital Euro Transactions Using Contextual Integrity Theory. 7-12 - Omer Said Ozturk, Emre Ekmekcioglu, Orçun Çetin, Budi Arief, Julio C. Hernandez-Castro:
New Tricks to Old Codes: Can AI Chatbots Replace Static Code Analysis Tools? 13-18 - Sidra Aslam, Ala Altaweel, Ibrahim Kamel:
Exposed-mode of Wormhole Attack in Opportunistic Mobile Networks: Impact Study and Analysis. 19-25 - Peter Hamm, Sebastian Pape, David Harborth:
Acceptance Factors and Obstacles for Cryptocurrency Adoption. 26-33 - Venkata Sai Charan Putrevu, Hrushikesh Chunduri, Mohan Anand Putrevu, Sandeep K. Shukla:
A Framework for Advanced Persistent Threat Attribution using Zachman Ontology. 34-41 - Chia-Mei Chen, Fang-Hsuan Hsu, Jenq-Neng Hwang:
Useful Cyber Threat Intelligence Relation Retrieval Using Transfer Learning. 42-46 - Chibuzo Ukegbu, Ramesh Neupane, Hoda Mehrpouyan:
Ontology-based Framework for Boundary Verification of Safety and Security Properties in Industrial Control Systems. 47-52 - Robin Duraz, David Espes, Julien Francq, Sandrine Vaton:
Cyber Informedness: A New Metric using CVSS to Increase Trust in Intrusion Detection Systems. 53-58 - Yichao Wang, Budi Arief, Virginia Nunes Leal Franqueira, Anna Grace Coates, Caoilte Ó Ciardha:
Investigating the Availability of Child Sexual Abuse Materials in Dark Web Markets: Evidence Gathered and Lessons Learned. 59-64 - Agustín Walabonso Lara Romero, Juan Antonio Ternero Muñiz, Rafael M. Estepa-Alonso, Antonio Jose Estepa Alonso, Fernando Ruiz Robles, Jesús Esteban Díaz Verdejo:
HTTP Cyberattacks Detection through Automatic Signature Generation in multi-site IoT Deployments. 65-70 - Patrick Himler, Max Landauer, Florian Skopik, Markus Wurzenberger:
Towards Detecting Anomalies in Log-Event Sequences with Deep Learning: Open Research Challenges. 71-77 - Kris Heid, Vincent Andrae, Jens Heider:
Towards detecting device fingerprinting on iOS with API function hooking. 78-84 - Sascha Löbner, Christian Gartner, Frédéric Tronnier:
Privacy Preserving Data Analysis with the Encode, Shuffle, Analyse Architecture in Vehicular Data Sharing. 85-91 - Ciaran Reilly, Stephen O'Shaughnessy, Christina Thorpe:
Robustness of Image-Based Malware Classification Models trained with Generative Adversarial Networks. 92-99 - Mordechai Guri:
CLOUDOSCOPE: Detecting Anti-Forensic Malware using Public Cloud Environments. 100-107 - Venkata Satya Sai Ajay Daliparthi, Nurul Momen, Kurt Tutschku, Miguel de Prado:
ViSDM: A Liquid Democracy based Visual Data Marketplace for Sovereign Crowdsourcing Data Collection. 108-115 - Lasse Nitz, Avikarsha Mandal:
DGA Detection Using Similarity-Preserving Bloom Encodings. 116-120 - Fariborz Lohrabi Pour, Dong Sam Ha:
Effect of Power Conversion Efficiency of the RF Energy Harvester on the Security and Data Rate of the Self-Sustainable IoT Devices. 121-124 - Jörg Keller, Carina Heßeling:
Improving Covert Channel Bandwidth by Variable-Length Exponent Re-Coding in Floating-Point Representations. 125-128 - Alvhild Skjelvik, Arnstein Vestad:
Digital safety alarms - Exploring the understandings of the cybersecurity practice in Norwegian municipalities. 129-133 - Petra Grd, Ena Barcic, Igor Tomicic, Bogdan Okresa Duric:
Analysing the Impact of Gender Classification on Age Estimation. 134-137
COSH Special Session
- Vahiny Gnanasekaran, Katrien De Moor:
Usability, Security, and Privacy Recommendations for Mobile Parental Control. 138-143 - Matteo Curcio:
Cybercrime and Video Games: Exploring children's safety in the gaming environment. 144-148 - Farzana Quayyum:
Collaboration between parents and children to raise cybersecurity awareness. 149-152
CNACYS Special Session
- Martin Atzmueller, Sophia Sylvester, Rushed Kanawati:
Exploratory and Explanation-Aware Network Intrusion Profiling using Subgroup Discovery and Complex Network Analysis. 153-158 - Yashovardhan Sharma, Simon Birnbach, Ivan Martinovic:
RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection. 159-166
DP4I Special Session
- Umit Cali, Marthe Fogstad Dynge, Ahmed Idries, Sambeet Mishra, Dmytro Ivanko, Naser Hashemipour, Murat Kuzlu:
Digital Energy Platforms Considering Digital Privacy and Security by Design Principles. 167-173 - Umit Cali, Murat Kuzlu, Onur Elma, Osman Gazi Gucluturk, Ahmet Kilic, Ferhat Özgür Çatak:
Cybersecurity and Digital Privacy Aspects of V2X in the EV Charging Structure. 174-180 - Umit Cali, Ferhat Özgür Çatak, Zsolt György Balogh, Rita Maria Ugarelli, Martin Gilje Jaatun:
Cyber-physical Hardening of the Digital Water Infrastructure. 181-188
Poster Session
- Anze Mihelic, Igor Bernik, Simon Vrhovec:
Older adults and tablet computers: Adoption and the role of perceived threat of cyber attacks. 189-190 - Johanna Henrich, Andreas Heinemann, Martin Stiemerling, Fabian Seidl:
Crypto-agile Design and Testbed for QKD-Networks. 191-192 - Georgios Agrafiotis, Eftychia Makri, Antonios Lalas, Konstantinos Votis, Dimitrios Tzovaras, Nikolaos Tsampieris:
A Deep Learning-based Malware Traffic Classifier for 5G Networks Employing Protocol-Agnostic and PCAP-to-Embeddings Techniques. 193-194 - Allison Wylde:
In Alice and Bob, I trust? 195-196
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.