


default search action
Digital Threats: Research and Practice, Volume 2
Volume 2, Number 1, March 2021
- Roberto Perdisci, Martina Lindorfer, Adam Doupé, Andrea Lanzi, Alexandros Kapravelos, Gianluca Stringhini:
Introduction to the ACSAC'19 Special Issue - Vol. 2. 1:1-1:2 - Lieven Desmet
, Jan Spooren, Thomas Vissers, Peter Janssen, Wouter Joosen:
Premadoma: An Operational Solution to Prevent Malicious Domain Name Registrations in the .eu TLD. 2:1-2:24 - Yoshimichi Nakatsuka, Andrew Paverd, Gene Tsudik:
PDoT: Private DNS-over-TLS with TEE Support. 3:1-3:22 - Ziya Alper Genç, Gabriele Lenzini, Daniele Sgandurra:
Cut-and-Mouse and Ghost Control: Exploiting Antivirus Software with Synthesized Inputs. 4:1-4:23 - Toshinori Usui, Yuto Otsuki, Tomonori Ikuse, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Kanta Matsuura
:
Automatic Reverse Engineering of Script Engine Binaries for Building Script API Tracers. 5:1-5:31 - Amit Kumar Sikder, Leonardo Babun, A. Selcuk Uluagac:
Aegis+: A Context-aware Platform-independent Security Framework for Smart Home Systems. 6:1-6:33 - Pritam Dash, Mehdi Karimibiuki, Karthik Pattabiraman:
Stealthy Attacks against Robotic Vehicles Protected by Control-based Intrusion Detection Techniques. 7:1-7:25
Volume 2, Number 2, June 2021
- Nils Amiet:
Blockchain Vulnerabilities in Practice. 8:1-8:7 - Li Wang, S. Sitharama Iyengar
, Amith K. Belman
, Pawel Sniatala, Vir V. Phoha
, Changsheng Wan:
Game Theory based Cyber-Insurance to Cover Potential Loss from Mobile Malware Exploitation. 9:1-9:24 - Daniel W. Woods, Tyler Moore
, Andrew C. Simpson
:
The County Fair Cyber Loss Distribution: Drawing Inferences from Insurance Prices. 10:1-10:21 - Jonathan M. Spring
, Phyllis Illari:
Review of Human Decision-making during Computer Security Incident Analysis. 11:1-11:47 - Shubhra Tewari, Renos Zabounidis, Ammina Kothari
, Reynold Bailey, Cecilia Ovesdotter Alm:
Perceptions of Human and Machine-Generated Articles. 12:1-12:16 - Reza Zafarani, Huan Liu, Vir V. Phoha, Javad Azimi:
Inroduction on Recent Trends and Perspectives in Fake News Research. 13:1-13:3 - Lev Konstantinovskiy, Oliver Price, Mevan Babakar, Arkaitz Zubiaga:
Toward Automated Factchecking: Developing an Annotation Schema and Benchmark for Consistent Automated Claim Detection. 14:1-14:16 - Pratim Datta, Mark Whitmore, Joseph K. Nwankpa
:
A Perfect Storm: Social Media News, Psychological Biases, and AI. 15:1-15:21 - Rohit Valecha, Srikrishna Krishnarao Srinivasan, Tejaswi Volety, K. Hazel Kwon, Manish Agrawal, H. Raghav Rao:
Fake News Sharing: An Investigation of Threat and Coping Cues in the Context of the Zika Virus. 16:1-16:16 - Teng-Chieh Huang, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
Identifying Real-world Credible Experts in the Financial Domain. 17:1-17:14
Volume 2, Number 3, September 2021
- Jeroen van der Ham
:
Toward a Better Understanding of "Cybersecurity". 18:1-18:3
- Leigh Metcalf, Jonathan M. Spring
:
The Ecosystem of Detection and Blocklisting of Domain Generation. 19:1-19:22 - Jay Jacobs, Sasha Romanosky, Benjamin Edwards, Idris Adjerid
, Michael Roytman:
Exploit Prediction Scoring System (EPSS). 20:1-20:17 - Josephine Lamp, Carlos E. Rubio-Medrano
, Ziming Zhao, Gail-Joon Ahn:
ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems. 21:1-21:23 - Jassim Happa, Ioannis Agrafiotis, Martin Helmhout, Thomas Bashford-Rogers, Michael Goldsmith, Sadie Creese:
Assessing a Decision Support Tool for SOC Analysts. 22:1-22:35 - Rajesh Kumar
, Can Isik, Vir V. Phoha
:
Treadmill Assisted Gait Spoofing (TAGS): An Emerging Threat to Wearable Sensor-based Gait Authentication. 23:1-23:17 - Christos Iliou
, Theodoros Kostoulas, Theodora Tsikrika
, Vasilis Katos
, Stefanos Vrochidis, Ioannis Kompatsiaris:
Detection of Advanced Web Bots by Combining Web Logs with Mouse Behavioural Biometrics. 24:1-24:26
Volume 2, Number 4, December 2021
- Josiah Dykstra, Neil C. Rowe, Timothy J. Shimeall, Angela Horneman, Marisa Midler:
Introduction: On the Nature of Situational Awareness. 25:1-25:3 - John H. Ring, Colin Michael Van Oort, Samson Durst, Vanessa White, Joseph P. Near, Christian Skalka
:
Methods for Host-based Intrusion Detection with Deep Learning. 26:1-26:29 - Sagar Samtani
, Weifeng Li
, Victor A. Benjamin, Hsinchun Chen:
Informing Cyber Threat Intelligence through Dark Web Situational Awareness: The AZSecure Hacker Assets Portal. 27:1-27:10 - Sinan G. Aksoy, Emilie Purvine
, Stephen J. Young
:
Directional Laplacian Centrality for Cyber Situational Awareness. 28:1-28:28 - Jassim Happa, Thomas Bashford-Rogers, Alastair Janse van Rensburg, Michael Goldsmith, Sadie Creese:
Deception in Network Defences Using Unpredictability. 29:1-29:26 - Ahmed Aleroud
, Fan Yang, Sai C. Pallaprolu, Zhiyuan Chen, George Karabatis:
Anonymization of Network Traces Data through Condensation-based Differential Privacy. 30:1-30:23
- Leigh Metcalf:
Editorial on the Special Issue on Election Security. 31:1 - Amanda K. Glazer, Jacob V. Spertus, Philip B. Stark
:
More Style, Less Work: Card-style Data Decrease Risk-limiting Audit Sample Sizes. 32:1-32:15 - Patrick McCorry, Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, Feng Hao
:
On Secure E-Voting over Blockchain. 33:1-33:13

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.