default search action
EICC 2024: Xanthi, Greece
- Shujun Li, Kovila P. L. Coopamootoo, Michael Sirivianos:
European Interdisciplinary Cybersecurity Conference, EICC 2024, Xanthi, Greece, June 5-6, 2024. ACM 2024
Main track
- Ellie Prosser, Matthew Edwards:
Helpful or Harmful? Exploring the Efficacy of Large Language Models for Online Grooming Prevention. 1-10 - Kris Heid, Jens Heider:
Haven't we met before? - Detecting Device Fingerprinting Activity on Android Apps. 11-18 - Brooke Kidmose, Weizhi Meng:
can-sleuth: Investigating and Evaluating Automotive Intrusion Detection Datasets. 19-28 - Vasileios Perifanis, Efstathios Karypidis, Nikos Komodakis, Pavlos S. Efraimidis:
SFTC: Machine Unlearning via Selective Fine-tuning and Targeted Confusion. 29-36 - Tobias Pfaller, Florian Skopik, Paul Smith, Maria Leitner:
Towards Customized Cyber Exercises using a Process-based Lifecycle Model. 37-45 - Tomas Bueno Momcilovic, Dian Balta:
Emergent Needs in Assuring Security-Relevant Compliance of Information Systems. 46-49 - Xinchuchu Gao, Xuechen Chen:
Understanding the Evolution of Transatlantic Data Privacy Regimes: Ideas, Interests, and Institutions. 50-56 - Recep Yildirim, Kerem Aydin, Orçun Çetin:
Evaluating the Impact of Conventional Code Analysis Against Large Language Models in API Vulnerability Detection. 57-64 - Satoshi Okada, Houda Jmila, Kunio Akashi, Takuho Mitsunaga, Yuji Sekiya, Hideki Takase, Gregory Blanc, Hiroshi Nakamura:
XAI-driven Adversarial Attacks on Network Intrusion Detectors. 65-73 - Pascal Memmesheimer, Stefan Machmeier, Vincent Heuveline:
Increasing Detection Rate for Imbalanced Malicious Traffic using Generative Adversarial Networks. 74-81 - Jesús Esteban Díaz Verdejo, Rafael Estepa, Antonio Estepa Alonso, Javier Muñoz-Calle:
Insights into anomaly-based intrusion detection systems usability. A case study using real http requests. 82-89 - Matthew Levy, Froylan Maldonado:
Attack Surface Measurement: A Weird Machines Perspective. 90-94 - Robert Andrew Chetwyn, Martin Eian, Audun Jøsang:
Modelling Indicators of Behaviour for Cyber Threat Hunting via Sysmon. 95-104 - Leon Twenning, Harald Baier:
Towards arbitrating in a dispute - on responsible usage of client-side perceptual hashing against illegal content distribution. 105-114 - Roman Matzutt, Eric Wagner:
Towards Improving Accountability in Sensitive-Disclosure Scenarios. 115-119 - Yichao Wang, Budi Arief, Julio C. Hernandez-Castro:
Analysis of Security Mechanisms of Dark Web Markets. 120-127 - Meryem Berfin Ozkok, Baturay Birinci, Orçun Çetin, Budi Arief, Julio C. Hernandez-Castro:
Honeypot's Best Friend? Investigating ChatGPT's Ability to Evaluate Honeypot Logs. 128-135 - Tanya Koohpayeh Araghi, David Megías, Victor Garcia-Font, Minoru Kuribayashi, Wojciech Mazurczyk:
Disinformation detection and source tracking using semi-fragile watermarking and blockchain. 136-143 - Nils von Nethen, Alexander Wiesmaier, Nouri Alnahawi, Johanna Henrich:
PMMP-PQC Migration Management Process✱. 144-154
Medical Device Security and Privacy - MeDSec 2024 special session
- Karin Bernsmed, Martin Gilje Jaatun:
Security-by-design challenges for medical device manufacturers. 155-160
Complex Network Analysis for Cybersecurity - CNACYS special session
- Juan Manuel Matalobos Veiga, Regino Criado, Miguel Romance Del Rio, Sergio Iglesias Perez, Alberto Partida Rodriguez, Karan Kabbur Hanumanthappa Manjunatha:
A Hypergraph-based Model for Cyberincident-related Data Analysis. 161-162
Digital Privacy for Industrial Applications - DP4I special session
- Umit Cali, Sri Nikhil Gupta Gourisetti, David Jonathan Sebastian Cardenas, Ferhat Özgür Çatak, Annabelle Lee, Linda M. Zeger, Taha Selim Ustun, Marthe Fogstad Dynge, Sreedhar Rao, Javier E. Ramirez:
Emerging Technologies for Privacy Preservation in Energy Systems. 163-170
Federated Learning Applications in the Real World - FLARW special session
- Xiangyu Ma, Wei Shi, Junfeng Wen:
An Enhanced Combinatorial Contextual Neural Bandit Approach for Client Selection in Federated Learning. 171-178 - Dmitrii Usynin, Daniel Rueckert, Georgios Kaissis:
Incentivising the federation: gradient-based metrics for data selection and valuation in private decentralised training. 179-185 - Jeroen Klein Brinke, Martijn van der Linden, Paul J. M. Havinga:
Using Federated Learning and Channel State Information-Based Sensing for Scalable and Realistic At-Home Healthcare. 186-193 - Eleni Briola, Christos Chrysanthos Nikolaidis, Vasileios Perifanis, Nikolaos Pavlidis, Pavlos S. Efraimidis:
A Federated Explainable AI Model for Breast Cancer Classification. 194-201
Advances in Interdisciplinary Cybersecurity: Insights from Funded Research Projects - CyFRP 2024 special session
- Rei Yamagishi, Shota Fujii:
Survey and Analysis of User Perceptions of Security Icons. 202-209 - Alexander Lawall, Petra Beenken:
A Threat-Led Approach to Mitigating Ransomware Attacks: Insights from a Comprehensive Analysis of the Ransomware Ecosystem. 210-216 - Jesús Esteban Díaz Verdejo, Rafael M. Estepa-Alonso, Antonio Estepa Alonso, Javier Muñoz-Calle, Germán Madinabeitia:
Biblio-US17: A labeled real URL dataset for anomaly-based intrusion detection systems development. 217-218 - Roman Matzutt:
Towards Access Control for Machine Learning Embeddings. 219-220
Poster session
- Simon Vrhovec, Igor Bernik, Damjan Fujs, Damjan Vavpotic:
Cybersecurity competence of older adult users of mobile devices. 221-223
Keynotes
- Steven Furnell:
Cyber Security for SMEs - Clear, Consistent and Complete? 224 - Christos Douligeris:
Cybersecurity awareness and training: The CyberSecPro and NERO approaches. 225
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.