default search action
Search dblp for Publications
export results for "stream:journals/dtrap:"
@article{DBLP:journals/dtrap/0002AC24, author = {Ying Yuan and Giovanni Apruzzese and Mauro Conti}, title = {Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors Using Machine Learning}, journal = {{DTRAP}}, volume = {5}, number = {2}, pages = {16:1--16:51}, year = {2024}, url = {https://doi.org/10.1145/3638253}, doi = {10.1145/3638253}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/0002AC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/0003CJEF24, author = {Andreas Hammer and Christian Cerny and Christoph Jung and Christian Eichenm{\"{u}}ller and Felix C. Freiling}, title = {Increasing Street Credibility: Cartography-Aware Forensic Analysis of {GNSS} Trace Validity}, journal = {{DTRAP}}, volume = {5}, number = {3}, pages = {32:1--32:20}, year = {2024}, url = {https://doi.org/10.1145/3688809}, doi = {10.1145/3688809}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/0003CJEF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/0003GNSFF24, author = {Andreas Hammer and Julian Geus and Florian Nicolai and Philip Sch{\"{u}}tz and Christofer Fein and Felix C. Freiling}, title = {Fit for Forensics: Taxonomy and Common Model for Forensic Analysis of Fitness Trackers}, journal = {{DTRAP}}, volume = {5}, number = {3}, pages = {29:1--29:20}, year = {2024}, url = {https://doi.org/10.1145/3687271}, doi = {10.1145/3687271}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/0003GNSFF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/0005MLV24, author = {Yurong Chen and Yongsheng Mei and Tian Lan and Guru Venkataramani}, title = {Exploring Effective Fuzzing Strategies to Analyze Communication Protocols}, journal = {{DTRAP}}, volume = {5}, number = {1}, pages = {11:1--11:22}, year = {2024}, url = {https://doi.org/10.1145/3526088}, doi = {10.1145/3526088}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/0005MLV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/0028KP24, author = {Jing Xu and Stefanos Koffas and Stjepan Picek}, title = {Unveiling the Threat: Investigating Distributed and Centralized Backdoor Attacks in Federated Graph Neural Networks}, journal = {{DTRAP}}, volume = {5}, number = {2}, pages = {15:1--15:29}, year = {2024}, url = {https://doi.org/10.1145/3633206}, doi = {10.1145/3633206}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/0028KP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/AdrikoN24, author = {Rodney Adriko and Jason R. C. Nurse}, title = {Does Cyber Insurance Promote Cyber Security Best Practice? An Analysis Based on Insurance Application Forms}, journal = {{DTRAP}}, volume = {5}, number = {3}, pages = {25:1--25:39}, year = {2024}, url = {https://doi.org/10.1145/3676283}, doi = {10.1145/3676283}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/AdrikoN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Aladi24, author = {Clement Chimezie Aladi}, title = {Web Application Security: {A} Pragmatic Expos{\'{e}}}, journal = {{DTRAP}}, volume = {5}, number = {2}, pages = {20:1--20:9}, year = {2024}, url = {https://doi.org/10.1145/3644394}, doi = {10.1145/3644394}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Aladi24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/BaeB0P24, author = {Yechan Bae and Sarbartha Banerjee and Sangho Lee and Marcus Peinado}, title = {Spacelord: Private and Secure Smart Space Sharing}, journal = {{DTRAP}}, volume = {5}, number = {2}, pages = {14:1--14:27}, year = {2024}, url = {https://doi.org/10.1145/3637879}, doi = {10.1145/3637879}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/BaeB0P24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/BagozziGLKB24, author = {Benjamin E. Bagozzi and Rajni Goel and Brunilda Lugo{-}de{-}Fabritz and Kelly Knickmeier{-}Cummings and Karthik Balasubramanian}, title = {A Framework for Enhancing Social Media Misinformation Detection with Topical-Tactics}, journal = {{DTRAP}}, volume = {5}, number = {3}, pages = {24:1--24:29}, year = {2024}, url = {https://doi.org/10.1145/3670694}, doi = {10.1145/3670694}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/BagozziGLKB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/BaldryHSSG24, author = {Moya Kate Baldry and Jassim Happa and Anthony Steed and Simon Smith and Mashhuda Glencross}, title = {\emph{From Embodied Abuse to Mass Disruption}: Generative, Inter-Reality Threats in Social, Mixed-Reality Platforms}, journal = {Digit. Threat. Res. Pract.}, volume = {5}, number = {4}, pages = {38:1--38:36}, year = {2024}, url = {https://doi.org/10.1145/3696015}, doi = {10.1145/3696015}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/BaldryHSSG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Botacin24, author = {Marcus Botacin}, title = {Fuzzing and Symbolic Execution for Multipath Malware Tracing: Bridging Theory and Practice via Survey and Experiments}, journal = {Digit. Threat. Res. Pract.}, volume = {5}, number = {4}, pages = {41:1--41:33}, year = {2024}, url = {https://doi.org/10.1145/3700147}, doi = {10.1145/3700147}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Botacin24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/BuchtaGHK24, author = {Robin Buchta and Georgios Gkoktsis and Felix Heine and Carsten Kleiner}, title = {Advanced Persistent Threat Attack Detection Systems: {A} Review of Approaches, Challenges, and Trends}, journal = {Digit. Threat. Res. Pract.}, volume = {5}, number = {4}, pages = {39:1--39:37}, year = {2024}, url = {https://doi.org/10.1145/3696014}, doi = {10.1145/3696014}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/BuchtaGHK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/CeschinBBPOGG24, author = {Fabr{\'{\i}}cio Ceschin and Marcus Botacin and Albert Bifet and Bernhard Pfahringer and Luiz S. Oliveira and Heitor Murilo Gomes and Andr{\'{e}} Gr{\'{e}}gio}, title = {Machine Learning (In) Security: {A} Stream of Problems}, journal = {{DTRAP}}, volume = {5}, number = {1}, pages = {9:1--9:32}, year = {2024}, url = {https://doi.org/10.1145/3617897}, doi = {10.1145/3617897}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/CeschinBBPOGG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/DemmelGGB24, author = {Markus Demmel and Thomas G{\"{o}}bel and Patrik Gon{\c{c}}alves and Harald Baier}, title = {Data Synthesis Is Going Mobile - On Community-Driven Dataset Generation for Android Devices}, journal = {{DTRAP}}, volume = {5}, number = {3}, pages = {30:1--30:19}, year = {2024}, url = {https://doi.org/10.1145/3688807}, doi = {10.1145/3688807}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/DemmelGGB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Derbyshire0W024, author = {Richard Derbyshire and Benjamin Green and Charl van der Walt and David Hutchison}, title = {Dead Man's {PLC:} Towards Viable Cyber Extortion for Operational Technology}, journal = {{DTRAP}}, volume = {5}, number = {3}, pages = {23:1--23:24}, year = {2024}, url = {https://doi.org/10.1145/3670695}, doi = {10.1145/3670695}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Derbyshire0W024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/DewaldS24, author = {Andreas Dewald and Thomas Schreck}, title = {Introduction to the {IMF} 2024 Special Issue}, journal = {{DTRAP}}, volume = {5}, number = {3}, pages = {26:1--26:2}, year = {2024}, url = {https://doi.org/10.1145/3696016}, doi = {10.1145/3696016}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/DewaldS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/DomschotR024, author = {Eva Domschot and Ramyaa Ramyaa and Michael R. Smith}, title = {Improving Automated Labeling for ATT{\&}CK Tactics in Malware Threat Reports}, journal = {{DTRAP}}, volume = {5}, number = {1}, pages = {2:1--2:16}, year = {2024}, url = {https://doi.org/10.1145/3594553}, doi = {10.1145/3594553}, timestamp = {Wed, 20 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/DomschotR024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Everson024, author = {Douglas Everson and Long Cheng}, title = {A Survey on Network Attack Surface Mapping}, journal = {{DTRAP}}, volume = {5}, number = {2}, pages = {18:1--18:25}, year = {2024}, url = {https://doi.org/10.1145/3640019}, doi = {10.1145/3640019}, timestamp = {Wed, 20 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Everson024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/GaoAS24, author = {Yang Gao and Benjamin M. Ampel and Sagar Samtani}, title = {Evading Anti-Phishing Models: {A} Field Note Documenting an Experience in the Machine Learning Security Evasion Competition 2022}, journal = {{DTRAP}}, volume = {5}, number = {1}, pages = {7:1--7:8}, year = {2024}, url = {https://doi.org/10.1145/3603507}, doi = {10.1145/3603507}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/GaoAS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Ghadermazi0J24, author = {Jalal Ghadermazi and Ankit Shah and Sushil Jajodia}, title = {A Machine Learning and Optimization Framework for Efficient Alert Management in a Cybersecurity Operations Center}, journal = {{DTRAP}}, volume = {5}, number = {2}, pages = {19:1--19:23}, year = {2024}, url = {https://doi.org/10.1145/3644393}, doi = {10.1145/3644393}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Ghadermazi0J24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/GurabiNBPSMM24, author = {Mehdi Akbari Gurabi and Lasse Nitz and Andrej Bregar and Jan Popanda and Christian Siemers and Roman Matzutt and Avikarsha Mandal}, title = {Requirements for Playbook-Assisted Cyber Incident Response, Reporting and Automation}, journal = {{DTRAP}}, volume = {5}, number = {3}, pages = {34:1--34:11}, year = {2024}, url = {https://doi.org/10.1145/3688810}, doi = {10.1145/3688810}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/GurabiNBPSMM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/HarrisonBLH24, author = {Luke Harrison and Samiran Bag and Hang Luo and Feng Hao}, title = {{VERICONDOR:} End-to-End Verifiable Condorcet Voting with support for Strict Preference and Indifference}, journal = {Digit. Threat. Res. Pract.}, volume = {5}, number = {4}, pages = {35:1--35:30}, year = {2024}, url = {https://doi.org/10.1145/3676267}, doi = {10.1145/3676267}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/HarrisonBLH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/HembergTRO24, author = {Erik Hemberg and Matthew J. Turner and Nick Rutar and Una{-}May O'Reilly}, title = {Enhancements to Threat, Vulnerability, and Mitigation Knowledge for Cyber Analytics, Hunting, and Simulations}, journal = {{DTRAP}}, volume = {5}, number = {1}, pages = {8:1--8:33}, year = {2024}, url = {https://doi.org/10.1145/3615668}, doi = {10.1145/3615668}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/HembergTRO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/HongMD24, author = {Andrew E. Hong and Peter P. Malinovsky and Suresh K. Damodaran}, title = {Towards Attack Detection in Multimodal Cyber-Physical Systems with Sticky {HDP-HMM} based Time Series Analysis}, journal = {{DTRAP}}, volume = {5}, number = {1}, pages = {5:1--5:21}, year = {2024}, url = {https://doi.org/10.1145/3604434}, doi = {10.1145/3604434}, timestamp = {Wed, 20 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/HongMD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/JoshiM24, author = {Rucha Bhalchandra Joshi and Subhankar Mishra}, title = {Locally and Structurally Private Graph Neural Networks}, journal = {{DTRAP}}, volume = {5}, number = {1}, pages = {10:1--10:23}, year = {2024}, url = {https://doi.org/10.1145/3624485}, doi = {10.1145/3624485}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/JoshiM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/LangehaugG24, author = {Tor J. Langehaug and Scott R. Graham}, title = {CuMONITOR: Continuous Monitoring of Microarchitecture for Software Task Identification and Classification}, journal = {{DTRAP}}, volume = {5}, number = {3}, pages = {22:1--22:22}, year = {2024}, url = {https://doi.org/10.1145/3652861}, doi = {10.1145/3652861}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/LangehaugG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/LindenmeierGF24, author = {Christian Lindenmeier and Jan Gruber and Felix C. Freiling}, title = {InvesTEE: {A} TEE-supported Framework for Lawful Remote Forensic Investigations}, journal = {{DTRAP}}, volume = {5}, number = {3}, pages = {27:1--27:20}, year = {2024}, url = {https://doi.org/10.1145/3680294}, doi = {10.1145/3680294}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/LindenmeierGF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/LindorferS24, author = {Martina Lindorfer and Gianluca Stringhini}, title = {Introduction to the ACSAC'22 Special Issue}, journal = {{DTRAP}}, volume = {5}, number = {2}, pages = {13:1--13:2}, year = {2024}, url = {https://doi.org/10.1145/3659210}, doi = {10.1145/3659210}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/LindorferS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/NadimpalliR24, author = {Aakash Varma Nadimpalli and Ajita Rattani}, title = {Social Media Authentication and Combating Deepfakes Using Semi-Fragile Invisible Image Watermarking}, journal = {Digit. Threat. Res. Pract.}, volume = {5}, number = {4}, pages = {40:1--40:30}, year = {2024}, url = {https://doi.org/10.1145/3700146}, doi = {10.1145/3700146}, timestamp = {Wed, 08 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/NadimpalliR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/PimentaCG24, author = {Thalita Scharr Rodrigues Pimenta and Fabricio Ceschin and Andre Gregio}, title = {{ANDROIDGYNY:} Reviewing Clustering Techniques for Android Malware Family Classification}, journal = {{DTRAP}}, volume = {5}, number = {1}, pages = {3:1--3:35}, year = {2024}, url = {https://doi.org/10.1145/3587471}, doi = {10.1145/3587471}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/PimentaCG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/PutrevuMMRVCPS24, author = {Venkata Sai Charan Putrevu and Subhasis Mukhopadhyay and Subhajit Manna and Nanda Rani and Ansh Vaid and Hrushikesh Chunduri and Mohan Anand Putrevu and Sandeep K. Shukla}, title = {{ADAPT:} Adaptive Camouflage Based Deception Orchestration For Trapping Advanced Persistent Threats}, journal = {{DTRAP}}, volume = {5}, number = {3}, pages = {21:1--21:35}, year = {2024}, url = {https://doi.org/10.1145/3651991}, doi = {10.1145/3651991}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/PutrevuMMRVCPS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/RaniSMS24, author = {Nanda Rani and Bikash Saha and Vikas Maurya and Sandeep Kumar Shukla}, title = {TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports}, journal = {Digit. Threat. Res. Pract.}, volume = {5}, number = {4}, pages = {37:1--37:19}, year = {2024}, url = {https://doi.org/10.1145/3696427}, doi = {10.1145/3696427}, timestamp = {Wed, 08 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/RaniSMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/RuddKCORH24, author = {Ethan M. Rudd and David Krisiloff and Scott E. Coull and Daniel Olszewski and Edward Raff and James Holt}, title = {Efficient Malware Analysis Using Metric Embeddings}, journal = {{DTRAP}}, volume = {5}, number = {1}, pages = {4:1--4:20}, year = {2024}, url = {https://doi.org/10.1145/3615669}, doi = {10.1145/3615669}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/RuddKCORH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/RzepkaOFB24, author = {Lisa Rzepka and Jenny Ottmann and Felix C. Freiling and Harald Baier}, title = {Causal Inconsistencies Are Normal in Windows Memory Dumps (Too)}, journal = {{DTRAP}}, volume = {5}, number = {3}, pages = {31:1--31:20}, year = {2024}, url = {https://doi.org/10.1145/3680293}, doi = {10.1145/3680293}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/RzepkaOFB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/SamtaniRA24, author = {Sagar Samtani and Edward Raff and Hyrum S. Anderson}, title = {Applied Machine Learning for Information Security}, journal = {{DTRAP}}, volume = {5}, number = {1}, pages = {1:1--1:5}, year = {2024}, url = {https://doi.org/10.1145/3652029}, doi = {10.1145/3652029}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/SamtaniRA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/StuhnHL24, author = {Jakob St{\"{u}}hn and Jan{-}Niclas Hilgert and Martin Lambertz}, title = {The Hidden Threat: Analysis of Linux Rootkit Techniques and Limitations of Current Detection Tools}, journal = {{DTRAP}}, volume = {5}, number = {3}, pages = {28:1--28:24}, year = {2024}, url = {https://doi.org/10.1145/3688808}, doi = {10.1145/3688808}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/StuhnHL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Subbagari24, author = {Saikiran Subbagari}, title = {Counter Measures to Combat Money Laundering in the New Digital Age}, journal = {{DTRAP}}, volume = {5}, number = {2}, pages = {17:1--17:13}, year = {2024}, url = {https://doi.org/10.1145/3626826}, doi = {10.1145/3626826}, timestamp = {Wed, 20 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Subbagari24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/TavissDZCA24, author = {Scarlett Taviss and Steven H. H. Ding and Mohammad Zulkernine and Philippe Charland and Sudipta Acharya}, title = {Asm2Seq: Explainable Assembly Code Functional Summary Generation for Reverse Engineering and Vulnerability Analysis}, journal = {{DTRAP}}, volume = {5}, number = {1}, pages = {6:1--6:25}, year = {2024}, url = {https://doi.org/10.1145/3592623}, doi = {10.1145/3592623}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/TavissDZCA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Tsunoda24, author = {Akaki Tsunoda}, title = {Demonstrating Spoofability of an Originating Number when Sending an {SMS} using {SMPP}}, journal = {{DTRAP}}, volume = {5}, number = {1}, pages = {12:1--12:13}, year = {2024}, url = {https://doi.org/10.1145/3615667}, doi = {10.1145/3615667}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Tsunoda24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Tsunoda24a, author = {Akaki Tsunoda}, title = {Investigating Threats Posed by {SMS} Origin Spoofing to IoT Devices}, journal = {Digit. Threat. Res. Pract.}, volume = {5}, number = {4}, pages = {36:1--36:12}, year = {2024}, url = {https://doi.org/10.1145/3696011}, doi = {10.1145/3696011}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Tsunoda24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/WunderC0B24, author = {Julia Wunder and Alan Corona and Andreas Hammer and Zinaida Benenson}, title = {On {NVD} Users' Attitudes, Experiences, Hopes, and Hurdles}, journal = {{DTRAP}}, volume = {5}, number = {3}, pages = {33:1--33:19}, year = {2024}, url = {https://doi.org/10.1145/3688806}, doi = {10.1145/3688806}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/WunderC0B24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/00010F0023, author = {Mengfei Ren and Xiaolei Ren and Huadong Feng and Jiang Ming and Yu Lei}, title = {Security Analysis of Zigbee Protocol Implementation via Device-agnostic Fuzzing}, journal = {{DTRAP}}, volume = {4}, number = {1}, pages = {9:1--9:24}, year = {2023}, url = {https://doi.org/10.1145/3551894}, doi = {10.1145/3551894}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/00010F0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/0001C23, author = {Anna Cartwright and Edward J. Cartwright}, title = {The Economics of Ransomware Attacks on Integrated Supply Chain Networks}, journal = {{DTRAP}}, volume = {4}, number = {4}, pages = {56:1--56:14}, year = {2023}, url = {https://doi.org/10.1145/3579647}, doi = {10.1145/3579647}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/0001C23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/0001CTC23, author = {Michael Lang and Lena Yuryna Connolly and Paul Taylor and Phillip J. Corner}, title = {The Evolving Menace of Ransomware: {A} Comparative Analysis of Pre-pandemic and Mid-pandemic Attacks}, journal = {{DTRAP}}, volume = {4}, number = {4}, pages = {52:1--52:22}, year = {2023}, url = {https://doi.org/10.1145/3558006}, doi = {10.1145/3558006}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/0001CTC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/0001TZ23, author = {S. S. Iyengar and Bhavani Thuraisingham and Marek Zmuda}, title = {Special Issue on Actionable Information for Digital Threat Discovery Using Contextualized Data or Multi Sensor Data Fusion}, journal = {{DTRAP}}, volume = {4}, number = {2}, pages = {23:1--23:2}, year = {2023}, url = {https://doi.org/10.1145/3585079}, doi = {10.1145/3585079}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/0001TZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/0001W0BOSO23, author = {Jonathan Oakley and Carl R. Worley and Lu Yu and Richard R. Brooks and Ilker {\"{O}}z{\c{c}}elik and Anthony Skjellum and Jihad S. Obeid}, title = {Scrybe: {A} Secure Audit Trail for Clinical Trial Data Fusion}, journal = {{DTRAP}}, volume = {4}, number = {2}, pages = {24:1--24:20}, year = {2023}, url = {https://doi.org/10.1145/3491258}, doi = {10.1145/3491258}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/0001W0BOSO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/0003OGF23, author = {Andreas Hammer and Mathis Ohlig and Julian Geus and Felix C. Freiling}, title = {A Functional Classification of Forensic Access to Storage and its Legal Implications}, journal = {{DTRAP}}, volume = {4}, number = {3}, pages = {32:1--32:14}, year = {2023}, url = {https://doi.org/10.1145/3609231}, doi = {10.1145/3609231}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/0003OGF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/0007MPS23, author = {Saurabh Kumar and Debadatta Mishra and Biswabandan Panda and Sandeep Kumar Shukla}, title = {InviSeal: {A} Stealthy Dynamic Analysis Framework for Android Systems}, journal = {{DTRAP}}, volume = {4}, number = {1}, pages = {13:1--13:31}, year = {2023}, url = {https://doi.org/10.1145/3567599}, doi = {10.1145/3567599}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/0007MPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/AdaneBY23, author = {Kibreab Adane and Berhanu Beyene and Mohammed Abebe Yimer}, title = {Single and Hybrid-Ensemble Learning-Based Phishing Website Detection: Examining Impacts of Varied Nature Datasets and Informative Feature Selection Technique}, journal = {{DTRAP}}, volume = {4}, number = {3}, pages = {46:1--46:27}, year = {2023}, url = {https://doi.org/10.1145/3611392}, doi = {10.1145/3611392}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/AdaneBY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/AlbasirNM23, author = {Abdurhman Albasir and Kshirasagar Naik and Ricardo Manzano}, title = {Toward Improving the Security of IoT and {CPS} Devices: An {AI} Approach}, journal = {{DTRAP}}, volume = {4}, number = {2}, pages = {22:1--22:30}, year = {2023}, url = {https://doi.org/10.1145/3497862}, doi = {10.1145/3497862}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/AlbasirNM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/AllisonM023, author = {David Allison and Kieran McLaughlin and Paul Smith}, title = {Goosewolf: An Embedded Intrusion Detection System for Advanced Programmable Logic Controllers}, journal = {{DTRAP}}, volume = {4}, number = {4}, pages = {59:1--59:19}, year = {2023}, url = {https://doi.org/10.1145/3617692}, doi = {10.1145/3617692}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/AllisonM023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/AnandCS23, author = {P. Mohan Anand and P. V. Sai Charan and Sandeep K. Shukla}, title = {HiPeR - Early Detection of a Ransomware Attack using Hardware Performance Counters}, journal = {{DTRAP}}, volume = {4}, number = {3}, pages = {43:1--43:24}, year = {2023}, url = {https://doi.org/10.1145/3608484}, doi = {10.1145/3608484}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/AnandCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/ApruzzeseLOMRGF23, author = {Giovanni Apruzzese and Pavel Laskov and Edgardo Montes de Oca and Wissam Mallouli and Luis Burdalo Rapa and Athanasios Vasileios Grammatopoulos and Fabio Di Franco}, title = {The Role of Machine Learning in Cybersecurity}, journal = {{DTRAP}}, volume = {4}, number = {1}, pages = {8:1--8:38}, year = {2023}, url = {https://doi.org/10.1145/3545574}, doi = {10.1145/3545574}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/ApruzzeseLOMRGF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/AriefCHLR23, author = {Budi Arief and Lena Yuryna Connolly and Julio C. Hernandez{-}Castro and Allan Liska and Peter Y. A. Ryan}, title = {Introduction to the Special Issue on Ransomware}, journal = {{DTRAP}}, volume = {4}, number = {4}, pages = {51:1--51:3}, year = {2023}, url = {https://doi.org/10.1145/3629999}, doi = {10.1145/3629999}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/AriefCHLR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/AxonEAUGC23, author = {Louise Axon and Arnau Erola and Ioannis Agrafiotis and Ganbayar Uuganbayar and Michael Goldsmith and Sadie Creese}, title = {Ransomware as a Predator: Modelling the Systemic Risk to Prey}, journal = {{DTRAP}}, volume = {4}, number = {4}, pages = {55:1--55:38}, year = {2023}, url = {https://doi.org/10.1145/3579648}, doi = {10.1145/3579648}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/AxonEAUGC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/AysuG23, author = {Aydin Aysu and Scott R. Graham}, title = {Introduction to the Special Issue on the Digital Threats of Hardware Security}, journal = {{DTRAP}}, volume = {4}, number = {2}, pages = {16:1--16:2}, year = {2023}, url = {https://doi.org/10.1145/3585011}, doi = {10.1145/3585011}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/AysuG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/BajpaiE23, author = {Pranshu Bajpai and Richard J. Enbody}, title = {Know Thy Ransomware Response: {A} Detailed Framework for Devising Effective Ransomware Response Strategies}, journal = {{DTRAP}}, volume = {4}, number = {4}, pages = {57:1--57:19}, year = {2023}, url = {https://doi.org/10.1145/3606022}, doi = {10.1145/3606022}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/BajpaiE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/BajramovicFFRF23, author = {Edita Bajramovic and Christofer Fein and Marius Frinken and Paul R{\"{o}}sler and Felix C. Freiling}, title = {{LAVA:} Log Authentication and Verification Algorithm}, journal = {{DTRAP}}, volume = {4}, number = {3}, pages = {35:1--35:17}, year = {2023}, url = {https://doi.org/10.1145/3609233}, doi = {10.1145/3609233}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/BajramovicFFRF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/BauschD23, author = {Florian Bausch and Andreas Dewald}, title = {Forensic Examination of Ceph}, journal = {{DTRAP}}, volume = {4}, number = {3}, pages = {37:1--37:18}, year = {2023}, url = {https://doi.org/10.1145/3609862}, doi = {10.1145/3609862}, timestamp = {Tue, 19 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/BauschD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/BhowmickIGPS23, author = {Rajat Subhra Bhowmick and Rahul Indra and Isha Ganguli and Jayanta Paul and Jaya Sil}, title = {Breaking Captcha System with Minimal Exertion through Deep Learning: Real-time Risk Assessment on Indian Government Websites}, journal = {{DTRAP}}, volume = {4}, number = {2}, pages = {28:1--28:24}, year = {2023}, url = {https://doi.org/10.1145/3584974}, doi = {10.1145/3584974}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/BhowmickIGPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/BotacinKS23, author = {Marcus Botacin and Uriel Kosayev and Ruimin Sun}, title = {Introduction to the Special Issue on Memory-Based Malware and Other Unconventional Threats}, journal = {{DTRAP}}, volume = {4}, number = {3}, pages = {39:1}, year = {2023}, url = {https://doi.org/10.1145/3627521}, doi = {10.1145/3627521}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/BotacinKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/BoyarchukMOV23, author = {Oleg Boyarchuk and Sebastiano Mariani and Stefano Ortolani and Giovanni Vigna}, title = {Keeping Up with the Emotets: Tracking a Multi-infrastructure Botnet}, journal = {{DTRAP}}, volume = {4}, number = {3}, pages = {41:1--41:29}, year = {2023}, url = {https://doi.org/10.1145/3594554}, doi = {10.1145/3594554}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/BoyarchukMOV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/BridgesOIHJNWVS23, author = {Robert A. Bridges and Sean Oesch and Michael D. Iannacone and Kelly M. T. Huffer and Brian Jewell and Jeffrey A. Nichols and Brian Weber and Miki E. Verma and Daniel Scofield and Craig Miles and Thomas Plummer and Mark Daniell and Anne M. Tall and Justin M. Beaver and Jared M. Smith}, title = {Beyond the Hype: An Evaluation of Commercially Available Machine Learning-based Malware Detectors}, journal = {{DTRAP}}, volume = {4}, number = {2}, pages = {27:1--27:22}, year = {2023}, url = {https://doi.org/10.1145/3567432}, doi = {10.1145/3567432}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/BridgesOIHJNWVS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/CarnaFQ023, author = {Stefano Carn{\`{a}} and Serena Ferracci and Francesco Quaglia and Alessandro Pellegrini}, title = {Fight Hardware with Hardware: Systemwide Detection and Mitigation of Side-channel Attacks Using Performance Counters}, journal = {{DTRAP}}, volume = {4}, number = {1}, pages = {5:1--5:24}, year = {2023}, url = {https://doi.org/10.1145/3519601}, doi = {10.1145/3519601}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/CarnaFQ023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/CasinoTALP23, author = {Fran Casino and Nikolaos Totosis and Theodoros Apostolopoulos and Nikolaos Lykousas and Constantinos Patsakis}, title = {Analysis and Correlation of Visual Evidence in Campaigns of Malicious Office Documents}, journal = {{DTRAP}}, volume = {4}, number = {2}, pages = {26:1--26:19}, year = {2023}, url = {https://doi.org/10.1145/3513025}, doi = {10.1145/3513025}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/CasinoTALP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/ChenFZK23, author = {Huili Chen and Cheng Fu and Jishen Zhao and Farinaz Koushanfar}, title = {{GALU:} {A} Genetic Algorithm Framework for Logic Unlocking}, journal = {{DTRAP}}, volume = {4}, number = {2}, pages = {21:1--21:30}, year = {2023}, url = {https://doi.org/10.1145/3491256}, doi = {10.1145/3491256}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/ChenFZK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/ConnollyKMB23, author = {Kate Connolly and Anna Klempay and Mary McCann and Paul R. Brenner}, title = {Dark Web Marketplaces: Data for Collaborative Threat Intelligence}, journal = {{DTRAP}}, volume = {4}, number = {4}, pages = {49:1--49:12}, year = {2023}, url = {https://doi.org/10.1145/3615666}, doi = {10.1145/3615666}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/ConnollyKMB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/DewaldS23, author = {Andreas Dewald and Thomas Schreck}, title = {Introduction to the {IMF} 2023 Special Issue}, journal = {{DTRAP}}, volume = {4}, number = {3}, pages = {31:1--31:2}, year = {2023}, url = {https://doi.org/10.1145/3626105}, doi = {10.1145/3626105}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/DewaldS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/ErenMSMBCA23, author = {Maksim Ekin Eren and Juston S. Moore and Erik Skau and Elisabeth Moore and Manish Bhattarai and Gopinath Chennupati and Boian S. Alexandrov}, title = {General-purpose Unsupervised Cyber Anomaly Detection via Non-negative Tensor Factorization}, journal = {{DTRAP}}, volume = {4}, number = {1}, pages = {6:1--6:28}, year = {2023}, url = {https://doi.org/10.1145/3519602}, doi = {10.1145/3519602}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/ErenMSMBCA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/FaldutiT23, author = {Mattia Falduti and Sergio Tessaris}, title = {Mapping the Interdisciplinary Research on Non-consensual Pornography: Technical and Quantitative Perspectives}, journal = {{DTRAP}}, volume = {4}, number = {3}, pages = {44:1--44:22}, year = {2023}, url = {https://doi.org/10.1145/3608483}, doi = {10.1145/3608483}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/FaldutiT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/GeorgouliasPFV23, author = {Dimitrios Georgoulias and Jens Myrup Pedersen and Morten Falch and Emmanouil Vasilomanolakis}, title = {{COVID-19} Vaccination Certificates in the Darkweb}, journal = {{DTRAP}}, volume = {4}, number = {1}, pages = {7:1--7:17}, year = {2023}, url = {https://doi.org/10.1145/3530877}, doi = {10.1145/3530877}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/GeorgouliasPFV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/GobelBB23, author = {Thomas G{\"{o}}bel and Harald Baier and Frank Breitinger}, title = {Data for Digital Forensics: Why a Discussion on "How Realistic is Synthetic Data" is Dispensable}, journal = {{DTRAP}}, volume = {4}, number = {3}, pages = {38:1--38:18}, year = {2023}, url = {https://doi.org/10.1145/3609863}, doi = {10.1145/3609863}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/GobelBB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/GrauxLTW23, author = {Pierre Graux and Jean{-}Fran{\c{c}}ois Lalande and Val{\'{e}}rie Viet Triem Tong and Pierre Wilke}, title = {\emph{OATs'inside}: Retrieving Object Behaviors From Native-based Obfuscated Android Applications}, journal = {{DTRAP}}, volume = {4}, number = {2}, pages = {30:1--30:27}, year = {2023}, url = {https://doi.org/10.1145/3584975}, doi = {10.1145/3584975}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/GrauxLTW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/GruberH23, author = {Jan Gruber and Merlin Humml}, title = {A Formal Treatment of Expressiveness and Relevanceof Digital Evidence}, journal = {{DTRAP}}, volume = {4}, number = {3}, pages = {33:1--33:16}, year = {2023}, url = {https://doi.org/10.1145/3608485}, doi = {10.1145/3608485}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/GruberH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/HilbigGKS23, author = {Tobias Hilbig and Thomas Geras and Erwin Kupris and Thomas Schreck}, title = {security.txt Revisited: Analysis of Prevalence and Conformity in 2022}, journal = {{DTRAP}}, volume = {4}, number = {3}, pages = {36:1--36:17}, year = {2023}, url = {https://doi.org/10.1145/3609234}, doi = {10.1145/3609234}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/HilbigGKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/HoveVR23, author = {Koen van Hove and Jeroen van der Ham{-}de Vos and Roland van Rijswijk{-}Deij}, title = {rpkiller: Threat Analysis of the {BGP} Resource Public Key Infrastructure}, journal = {{DTRAP}}, volume = {4}, number = {4}, pages = {58:1--58:24}, year = {2023}, url = {https://doi.org/10.1145/3617182}, doi = {10.1145/3617182}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/HoveVR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Howland23, author = {Henry Howland}, title = {{CVSS:} Ubiquitous and Broken}, journal = {{DTRAP}}, volume = {4}, number = {1}, pages = {1:1--1:12}, year = {2023}, url = {https://doi.org/10.1145/3491263}, doi = {10.1145/3491263}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Howland23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/HuecaMS23, author = {Angel Hueca and Sharon Mudd and Timothy J. Shimeall}, title = {Introduction to the Special Issue on Information Sharing}, journal = {{DTRAP}}, volume = {4}, number = {4}, pages = {47:1--47:2}, year = {2023}, url = {https://doi.org/10.1145/3635391}, doi = {10.1145/3635391}, timestamp = {Tue, 19 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/HuecaMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/HusakSZBH23, author = {Martin Hus{\'{a}}k and Pavol Sokol and Martin Z{\'{a}}dn{\'{\i}}k and V{\'{a}}clav Bartos and Martin Hor{\'{a}}k}, title = {Lessons Learned from Automated Sharing of Intrusion Detection Alerts: The Case of the {SABU} Platform}, journal = {{DTRAP}}, volume = {4}, number = {4}, pages = {48:1--48:11}, year = {2023}, url = {https://doi.org/10.1145/3611391}, doi = {10.1145/3611391}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/HusakSZBH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/KassimLA23, author = {Sharifah Roziah Binti Mohd Kassim and Shujun Li and Budi Arief}, title = {Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions}, journal = {{DTRAP}}, volume = {4}, number = {3}, pages = {45:1--45:24}, year = {2023}, url = {https://doi.org/10.1145/3609230}, doi = {10.1145/3609230}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/KassimLA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/KlierVB23, author = {Samantha Klier and Jan Varenkamp and Harald Baier}, title = {Back and Forth - On Automatic Exposure of Origin and Dissemination of Files on Windows}, journal = {{DTRAP}}, volume = {4}, number = {3}, pages = {34:1--34:17}, year = {2023}, url = {https://doi.org/10.1145/3609232}, doi = {10.1145/3609232}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/KlierVB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/LandauerWSHH23, author = {Max Landauer and Markus Wurzenberger and Florian Skopik and Wolfgang Hotwagner and Georg H{\"{o}}ld}, title = {AMiner: {A} Modular Log Data Analysis Pipeline for Anomaly-based Intrusion Detection}, journal = {{DTRAP}}, volume = {4}, number = {1}, pages = {12:1--12:16}, year = {2023}, url = {https://doi.org/10.1145/3567675}, doi = {10.1145/3567675}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/LandauerWSHH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/LangehaugBG23, author = {Tor J. Langehaug and Brett J. Borghetti and Scott R. Graham}, title = {Classifying Co-resident Computer Programs Using Information Revealed by Resource Contention}, journal = {{DTRAP}}, volume = {4}, number = {2}, pages = {17:1--17:29}, year = {2023}, url = {https://doi.org/10.1145/3464306}, doi = {10.1145/3464306}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/LangehaugBG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/LevineT23, author = {Alan Levine and Brett Alan Tucker}, title = {Zero Trust Architecture: Risk Discussion}, journal = {{DTRAP}}, volume = {4}, number = {1}, pages = {15:1--15:6}, year = {2023}, url = {https://doi.org/10.1145/3573892}, doi = {10.1145/3573892}, timestamp = {Tue, 19 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/LevineT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/LounisZ23, author = {Karim Lounis and Mohammad Zulkernine}, title = {Lessons Learned: Analysis of PUF-based Authentication Protocols for IoT}, journal = {{DTRAP}}, volume = {4}, number = {2}, pages = {19:1--19:33}, year = {2023}, url = {https://doi.org/10.1145/3487060}, doi = {10.1145/3487060}, timestamp = {Tue, 19 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/LounisZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/MahmoudMY23, author = {Moustafa Mahmoud and Mohammad Mannan and Amr M. Youssef}, title = {APTHunter: Detecting Advanced Persistent Threats in Early Stages}, journal = {{DTRAP}}, volume = {4}, number = {1}, pages = {11:1--11:31}, year = {2023}, url = {https://doi.org/10.1145/3559768}, doi = {10.1145/3559768}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/MahmoudMY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/MorelCH23, author = {Lionel Morel and Damien Courouss{\'{e}} and Thomas Hiscock}, title = {Code Polymorphism Meets Code Encryption: Confidentiality and Side-channel Protection of Software Components}, journal = {{DTRAP}}, volume = {4}, number = {2}, pages = {18:1--18:27}, year = {2023}, url = {https://doi.org/10.1145/3487058}, doi = {10.1145/3487058}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/MorelCH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/MundtB23, author = {Michael Mundt and Harald Baier}, title = {Threat-Based Simulation of Data Exfiltration Toward Mitigating Multiple Ransomware Extortions}, journal = {{DTRAP}}, volume = {4}, number = {4}, pages = {54:1--54:23}, year = {2023}, url = {https://doi.org/10.1145/3568993}, doi = {10.1145/3568993}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/MundtB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/RondonBAAU23, author = {Luis Puche Rondon and Leonardo Babun and Ahmet Aris and Kemal Akkaya and A. Selcuk Uluagac}, title = {LGuard: Securing Enterprise-IoT Systems against Serial-Based Attacks via Proprietary Communication Buses}, journal = {{DTRAP}}, volume = {4}, number = {1}, pages = {10:1--10:26}, year = {2023}, url = {https://doi.org/10.1145/3555721}, doi = {10.1145/3555721}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/RondonBAAU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/RoseGK23, author = {Anthony Rose and Scott R. Graham and Jacob J. Krasnov}, title = {IronNetInjector: Weaponizing .NET Dynamic Language Runtime Engines}, journal = {{DTRAP}}, volume = {4}, number = {3}, pages = {40:1--40:23}, year = {2023}, url = {https://doi.org/10.1145/3603506}, doi = {10.1145/3603506}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/RoseGK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/SanchezNAZG23, author = {Ricardo Alejandro Manzano Sanchez and Kshirasagar Naik and Abdurhman Albasir and Marzia Zaman and Nishith Goel}, title = {Detection of Anomalous Behavior of Smartphone Devices using Changepoint Analysis and Machine Learning Techniques}, journal = {{DTRAP}}, volume = {4}, number = {1}, pages = {2:1--2:28}, year = {2023}, url = {https://doi.org/10.1145/3492327}, doi = {10.1145/3492327}, timestamp = {Tue, 19 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/SanchezNAZG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Sengupta0M23, author = {Poushali Sengupta and Sudipta Paul and Subhankar Mishra}, title = {{BUDS+:} Better Privacy with Converger and Noisy Shuffling}, journal = {{DTRAP}}, volume = {4}, number = {2}, pages = {25:1--25:23}, year = {2023}, url = {https://doi.org/10.1145/3491259}, doi = {10.1145/3491259}, timestamp = {Tue, 19 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Sengupta0M23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/ShobiriMY23, author = {Behnam Shobiri and Mohammad Mannan and Amr M. Youssef}, title = {CDNs' Dark Side: Security Problems in CDN-to-Origin Connections}, journal = {{DTRAP}}, volume = {4}, number = {1}, pages = {3:1--3:22}, year = {2023}, url = {https://doi.org/10.1145/3499428}, doi = {10.1145/3499428}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/ShobiriMY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/SrinivasaPV23, author = {Shreyas Srinivasa and Jens Myrup Pedersen and Emmanouil Vasilomanolakis}, title = {Gotta Catch 'em All: {A} Multistage Framework for Honeypot Fingerprinting}, journal = {{DTRAP}}, volume = {4}, number = {3}, pages = {42:1--42:28}, year = {2023}, url = {https://doi.org/10.1145/3584976}, doi = {10.1145/3584976}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/SrinivasaPV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/StavesG023, author = {Alexander Staves and Antonios Gouglidis and David Hutchison}, title = {An Analysis of Adversary-Centric Security Testing within Information and Operational Technology Environments}, journal = {{DTRAP}}, volume = {4}, number = {1}, pages = {14:1--14:29}, year = {2023}, url = {https://doi.org/10.1145/3569958}, doi = {10.1145/3569958}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/StavesG023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Vaidya0GSN23, author = {Girish Vaidya and T. V. Prabhakar and Nithish K. Gnani and Ryan Shah and Shishir Nagaraja}, title = {Sensor Identification via Acoustic Physically Unclonable Function}, journal = {{DTRAP}}, volume = {4}, number = {2}, pages = {20:1--20:25}, year = {2023}, url = {https://doi.org/10.1145/3488306}, doi = {10.1145/3488306}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Vaidya0GSN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Walshe023, author = {Thomas Walshe and Andrew Simpson}, title = {Towards a Greater Understanding of Coordinated Vulnerability Disclosure Policy Documents}, journal = {{DTRAP}}, volume = {4}, number = {2}, pages = {29:1--29:36}, year = {2023}, url = {https://doi.org/10.1145/3586180}, doi = {10.1145/3586180}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Walshe023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/XenakisN0KAA23, author = {Antonios Xenakis and Sabrina Mamtaz Nourin and Zhiyuan Chen and George Karabatis and Ahmed Aleroud and Jhancy Amarsingh}, title = {A Self-adaptive and Secure Approach to Share Network Trace Data}, journal = {{DTRAP}}, volume = {4}, number = {4}, pages = {50:1--50:20}, year = {2023}, url = {https://doi.org/10.1145/3617181}, doi = {10.1145/3617181}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/XenakisN0KAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/XiaoZAKYC23, author = {Ya Xiao and Yang Zhao and Nicholas Allen and Nathan Keynes and Danfeng (Daphne) Yao and Cristina Cifuentes}, title = {Industrial Experience of Finding Cryptographic Vulnerabilities in Large-scale Codebases}, journal = {{DTRAP}}, volume = {4}, number = {1}, pages = {4:1--4:18}, year = {2023}, url = {https://doi.org/10.1145/3507682}, doi = {10.1145/3507682}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/XiaoZAKYC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/YilmazCGAH23, author = {Yagiz Yilmaz and Or{\c{c}}un {\c{C}}etin and Claudia Grigore and Budi Arief and Julio C. Hernandez{-}Castro}, title = {Personality Types and Ransomware Victimisation}, journal = {{DTRAP}}, volume = {4}, number = {4}, pages = {53:1--53:25}, year = {2023}, url = {https://doi.org/10.1145/3568994}, doi = {10.1145/3568994}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/YilmazCGAH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/0001SKEMW22, author = {Jinxin Liu and Murat Simsek and Burak Kantarci and Melike Erol{-}Kantarci and Andrew J. Malton and Andrew Walenstein}, title = {Risk-aware Fine-grained Access Control in Cyber-physical Contexts}, journal = {{DTRAP}}, volume = {3}, number = {4}, pages = {43:1--43:29}, year = {2022}, url = {https://doi.org/10.1145/3480468}, doi = {10.1145/3480468}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/0001SKEMW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/AlderBSOP22, author = {Fritz Alder and Jo Van Bulck and Jesse Spielman and David F. Oswald and Frank Piessens}, title = {Faulty Point Unit: {ABI} Poisoning Attacks on Trusted Execution Environments}, journal = {{DTRAP}}, volume = {3}, number = {2}, pages = {13:1--13:26}, year = {2022}, url = {https://doi.org/10.1145/3491264}, doi = {10.1145/3491264}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/AlderBSOP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/ApruzzeseAFMC22, author = {Giovanni Apruzzese and Mauro Andreolini and Luca Ferretti and Mirco Marchetti and Michele Colajanni}, title = {Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems}, journal = {{DTRAP}}, volume = {3}, number = {3}, pages = {31:1--31:19}, year = {2022}, url = {https://doi.org/10.1145/3469659}, doi = {10.1145/3469659}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/ApruzzeseAFMC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/AxonFSSHKGC22, author = {Louise Axon and Katherine Fletcher and Arianna Schuler Scott and Marcel Stolz and Robert Hannigan and Ali {El Kaafarani} and Michael Goldsmith and Sadie Creese}, title = {Emerging Cybersecurity Capability Gaps in the Industrial Internet of Things: Overview and Research Agenda}, journal = {{DTRAP}}, volume = {3}, number = {4}, pages = {34:1--34:27}, year = {2022}, url = {https://doi.org/10.1145/3503920}, doi = {10.1145/3503920}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/AxonFSSHKGC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/BajicPP22, author = {Mila Bajic and Andrej Petrovski and Bojan Perkov}, title = {Field Note on Doing Digital Rights: Central and Southeast Europe Monitoring Project}, journal = {{DTRAP}}, volume = {3}, number = {3}, pages = {23:1--23:7}, year = {2022}, url = {https://doi.org/10.1145/3513024}, doi = {10.1145/3513024}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/BajicPP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/BoutetCCLRBR22, author = {Antoine Boutet and Claude Castelluccia and Mathieu Cunche and C{\'{e}}dric Lauradoux and Vincent Roca and Adrien Baud and Pierre{-}Guillaume Raverdy}, title = {Desire: Leveraging the Best of Centralized and Decentralized Contact Tracing Systems}, journal = {{DTRAP}}, volume = {3}, number = {3}, pages = {28:1--28:20}, year = {2022}, url = {https://doi.org/10.1145/3480467}, doi = {10.1145/3480467}, timestamp = {Thu, 21 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/BoutetCCLRBR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/BromanderSMJESB22, author = {Siri Bromander and Morton Swimmer and Lilly Pijnenburg Muller and Audun J{\o}sang and Martin Eian and Geir Skj{\o}tskift and Fredrik Borg}, title = {Investigating Sharing of Cyber Threat Intelligence and Proposing {A} New Data Model for Enabling Automation in Knowledge Representation and Exchange}, journal = {{DTRAP}}, volume = {3}, number = {1}, pages = {6:1--6:22}, year = {2022}, url = {https://doi.org/10.1145/3458027}, doi = {10.1145/3458027}, timestamp = {Thu, 21 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/BromanderSMJESB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/ChenLHCLH22, author = {Chung{-}Kuan Chen and Si{-}Chen Lin and Szu{-}Chun Huang and Yung{-}Tien Chu and Chin{-}Laung Lei and Chun{-}Ying Huang}, title = {Building Machine Learning-based Threat Hunting System from Scratch}, journal = {{DTRAP}}, volume = {3}, number = {3}, pages = {20:1--20:21}, year = {2022}, url = {https://doi.org/10.1145/3491260}, doi = {10.1145/3491260}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/ChenLHCLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Cotton22, author = {Chase Cotton}, title = {"Off-Label" Use of {DNS}}, journal = {{DTRAP}}, volume = {3}, number = {3}, pages = {21:1--21:13}, year = {2022}, url = {https://doi.org/10.1145/3491261}, doi = {10.1145/3491261}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Cotton22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/DEliaIPQ22, author = {Daniele Cono D'Elia and Lorenzo Invidia and Federico Palmaro and Leonardo Querzoni}, title = {Evaluating Dynamic Binary Instrumentation Systems for Conspicuous Features and Artifacts}, journal = {{DTRAP}}, volume = {3}, number = {2}, pages = {10:1--10:13}, year = {2022}, url = {https://doi.org/10.1145/3478520}, doi = {10.1145/3478520}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/DEliaIPQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/DesideraH22, author = {Lucimara Desider{\'{a}} and Jeroen van der Ham}, title = {Introduction to the Special Issue on the 2020 {FIRST} Conference}, journal = {{DTRAP}}, volume = {3}, number = {3}, pages = {18:1}, year = {2022}, url = {https://doi.org/10.1145/3549069}, doi = {10.1145/3549069}, timestamp = {Thu, 21 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/DesideraH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/DulaunoyHT22, author = {Alexandre Dulaunoy and Jean{-}Louis Huynen and Aurelien Thirion}, title = {Active and Passive Collection of {SSH} Key Material for Cyber Threat Intelligence}, journal = {{DTRAP}}, volume = {3}, number = {3}, pages = {19:1--19:5}, year = {2022}, url = {https://doi.org/10.1145/3491262}, doi = {10.1145/3491262}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/DulaunoyHT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/DusingH22, author = {Johannes D{\"{u}}sing and Ben Hermann}, title = {Analyzing the Direct and Transitive Impact of Vulnerabilities onto Different Artifact Repositories}, journal = {{DTRAP}}, volume = {3}, number = {4}, pages = {38:1--38:25}, year = {2022}, url = {https://doi.org/10.1145/3472811}, doi = {10.1145/3472811}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/DusingH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/FilhoRF22, author = {Ailton Santos Filho and Ricardo J. Rodr{\'{\i}}guez and Eduardo L. Feitosa}, title = {Evasion and Countermeasures Techniques to Detect Dynamic Binary Instrumentation Frameworks}, journal = {{DTRAP}}, volume = {3}, number = {2}, pages = {11:1--11:28}, year = {2022}, url = {https://doi.org/10.1145/3480463}, doi = {10.1145/3480463}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/FilhoRF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/HouseholderS22, author = {Allen D. Householder and Jonathan M. Spring}, title = {Are We Skillful or Just Lucky? Interpreting the Possible Histories of Vulnerability Disclosures}, journal = {{DTRAP}}, volume = {3}, number = {4}, pages = {39:1--39:28}, year = {2022}, url = {https://doi.org/10.1145/3477431}, doi = {10.1145/3477431}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/HouseholderS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/HusakLP22, author = {Martin Hus{\'{a}}k and Martin Lastovicka and Tom{\'{a}}s Plesn{\'{\i}}k}, title = {Handling Internet Activism During the Russian Invasion of Ukraine: {A} Campus Network Perspective}, journal = {{DTRAP}}, volume = {3}, number = {3}, pages = {17:1--17:5}, year = {2022}, url = {https://doi.org/10.1145/3534566}, doi = {10.1145/3534566}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/HusakLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/HussainNDBFMK22, author = {Shehzeen Hussain and Paarth Neekhara and Brian Dolhansky and Joanna Bitton and Cristian Canton Ferrer and Julian J. McAuley and Farinaz Koushanfar}, title = {Exposing Vulnerabilities of Deepfake Detection Systems with Robust Attacks}, journal = {{DTRAP}}, volume = {3}, number = {3}, pages = {30:1--30:23}, year = {2022}, url = {https://doi.org/10.1145/3464307}, doi = {10.1145/3464307}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/HussainNDBFMK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/JarvisDCK22, author = {Paul{-}David Jarvis and Amalia Damianou and Cosmin Ciobanu and Vasilis Katos}, title = {Vulnerability Exposure Driven Intelligence in Smart, Circular Cities}, journal = {{DTRAP}}, volume = {3}, number = {4}, pages = {40:1--40:18}, year = {2022}, url = {https://doi.org/10.1145/3487059}, doi = {10.1145/3487059}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/JarvisDCK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/JelesnianskiYMJ22, author = {Christopher Jelesnianski and Jinwoo Yom and Changwoo Min and Yeongjin Jang}, title = {Securely Sharing Randomized Code That Flies}, journal = {{DTRAP}}, volume = {3}, number = {3}, pages = {32:1--32:25}, year = {2022}, url = {https://doi.org/10.1145/3474558}, doi = {10.1145/3474558}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/JelesnianskiYMJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/KaptchukGHHR22, author = {Gabriel Kaptchuk and Daniel G. Goldstein and Eszter Hargittai and Jake M. Hofman and Elissa M. Redmiles}, title = {How Good is Good Enough? Quantifying the Impact of Benefits, Accuracy, and Privacy on Willingness to Adopt {COVID-19} Decision Aids}, journal = {{DTRAP}}, volume = {3}, number = {3}, pages = {27:1--27:18}, year = {2022}, url = {https://doi.org/10.1145/3488307}, doi = {10.1145/3488307}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/KaptchukGHHR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/KaptchukMMR22, author = {Gabriel Kaptchuk and Fabio Massacci and Sara Nieves Matheu{-}Garc{\'{\i}}a and Elissa M. Redmiles}, title = {Introduction to the Special Issue on Security and Privacy for {COVID-19}}, journal = {{DTRAP}}, volume = {3}, number = {3}, pages = {24:1--24:2}, year = {2022}, url = {https://doi.org/10.1145/3549070}, doi = {10.1145/3549070}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/KaptchukMMR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/LeverettRW22, author = {{\'{E}}ireann Leverett and Matilda Rhode and Adam Wedgbury}, title = {Vulnerability Forecasting: Theory and Practice}, journal = {{DTRAP}}, volume = {3}, number = {4}, pages = {42:1--42:27}, year = {2022}, url = {https://doi.org/10.1145/3492328}, doi = {10.1145/3492328}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/LeverettRW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/LiHH22, author = {Ming Li and Peter J. Hawrylak and John Hale}, title = {Strategies for Practical Hybrid Attack Graph Generation and Analysis}, journal = {{DTRAP}}, volume = {3}, number = {4}, pages = {41:1--41:24}, year = {2022}, url = {https://doi.org/10.1145/3491257}, doi = {10.1145/3491257}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/LiHH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/MadaniVM22, author = {Pooria Madani and Natalija Vlajic and Ivo Maljevic}, title = {Randomized Moving Target Approach for MAC-Layer Spoofing Detection and Prevention in IoT Systems}, journal = {{DTRAP}}, volume = {3}, number = {4}, pages = {35:1--35:24}, year = {2022}, url = {https://doi.org/10.1145/3477403}, doi = {10.1145/3477403}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/MadaniVM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/MainardiBP22, author = {Nicholas Mainardi and Alessandro Barenghi and Gerardo Pelosi}, title = {Privacy-aware Character Pattern Matching over Outsourced Encrypted Data}, journal = {{DTRAP}}, volume = {3}, number = {1}, pages = {7:1--7:38}, year = {2022}, url = {https://doi.org/10.1145/3462333}, doi = {10.1145/3462333}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/MainardiBP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/MassacciNPSW22, author = {Fabio Massacci and Nick Nikiforakis and Ivan Pashchenko and Antonino Sabetta and Victoria Wang}, title = {Introduction to the Special Issue on Vulnerabilities}, journal = {{DTRAP}}, volume = {3}, number = {4}, pages = {37:1}, year = {2022}, url = {https://doi.org/10.1145/3580605}, doi = {10.1145/3580605}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/MassacciNPSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Mozurkewich22, author = {Karl Mozurkewich}, title = {Field Note on IoT Security: Novel {JIT} Security for Large-Scale Heterogeneous IoT Deployments}, journal = {{DTRAP}}, volume = {3}, number = {4}, pages = {36:1--36:5}, year = {2022}, url = {https://doi.org/10.1145/3503919}, doi = {10.1145/3503919}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Mozurkewich22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/OeschADKSWR22, author = {Sean Oesch and Ruba Abu{-}Salma and Oumar Diallo and Juliane Kr{\"{a}}mer and James Simmons and Justin Wu and Scott Ruoti}, title = {User Perceptions of Security and Privacy for Group Chat}, journal = {{DTRAP}}, volume = {3}, number = {2}, pages = {15:1--15:29}, year = {2022}, url = {https://doi.org/10.1145/3491265}, doi = {10.1145/3491265}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/OeschADKSWR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/PerdisciLS22, author = {Roberto Perdisci and Martina Lindorfer and Gianluca Stringhini}, title = {Introduction to the ACSAC'20 Special Issue}, journal = {{DTRAP}}, volume = {3}, number = {2}, pages = {12:1--12:2}, year = {2022}, url = {https://doi.org/10.1145/3534708}, doi = {10.1145/3534708}, timestamp = {Thu, 21 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/PerdisciLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/RodriguezUT22, author = {Ricardo J. Rodr{\'{\i}}guez and Xabier Ugarte{-}Pedrero and Juan Tapiador}, title = {Introduction to the Special Issue on Challenges and Trends in Malware Analysis}, journal = {{DTRAP}}, volume = {3}, number = {2}, pages = {8:1--8:2}, year = {2022}, url = {https://doi.org/10.1145/3536319}, doi = {10.1145/3536319}, timestamp = {Thu, 21 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/RodriguezUT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/RossoCGA22, author = {Martin Rosso and Michele Campobasso and Ganduulga Gankhuyag and Luca Allodi}, title = {{SAIBERSOC:} {A} Methodology and Tool for Experimenting with Security Operation Centers}, journal = {{DTRAP}}, volume = {3}, number = {2}, pages = {14:1--14:29}, year = {2022}, url = {https://doi.org/10.1145/3491266}, doi = {10.1145/3491266}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/RossoCGA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Sacher-Boldewin22, author = {Desiree Sacher{-}Boldewin and {\'{E}}ireann Leverett}, title = {The Intelligent Process Lifecycle of Active Cyber Defenders}, journal = {{DTRAP}}, volume = {3}, number = {3}, pages = {22:1--22:17}, year = {2022}, url = {https://doi.org/10.1145/3499427}, doi = {10.1145/3499427}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Sacher-Boldewin22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/ShomoES22, author = {Paul Shomo and Sebasti{\'{a}}n Echeverr{\'{\i}}a and Jesse Sowell}, title = {Introduction to the Special Issue on the Lifecycle of IoT (In)security}, journal = {{DTRAP}}, volume = {3}, number = {4}, pages = {33:1--33:2}, year = {2022}, url = {https://doi.org/10.1145/3569901}, doi = {10.1145/3569901}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/ShomoES22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/SimkoCJCRK22, author = {Lucy Simko and Jack Lucas Chang and Maggie Jiang and Ryan Calo and Franziska Roesner and Tadayoshi Kohno}, title = {{COVID-19} Contact Tracing and Privacy: {A} Longitudinal Study of Public Opinion}, journal = {{DTRAP}}, volume = {3}, number = {3}, pages = {25:1--25:36}, year = {2022}, url = {https://doi.org/10.1145/3480464}, doi = {10.1145/3480464}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/SimkoCJCRK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/StichaDAVB22, author = {Paul J. Sticha and Tirso E. Diaz and Elise T. Axelrad and Sean D. Vermillion and Dennis M. Buede}, title = {Simulating Organizational Data from Redacted Input for Inference Enterprise Modeling}, journal = {{DTRAP}}, volume = {3}, number = {1}, pages = {4:1--4:30}, year = {2022}, url = {https://doi.org/10.1145/3457910}, doi = {10.1145/3457910}, timestamp = {Thu, 21 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/StichaDAVB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/StojkovskiATL22, author = {Borce Stojkovski and Ruba Abu{-}Salma and Karen Triquet and Gabriele Lenzini}, title = {"Unless One Does the Research, It May Seem as Just a Useless Battery-consuming App" - Field Notes on {COVID-19} Contact Tracing Applications}, journal = {{DTRAP}}, volume = {3}, number = {3}, pages = {26:1--26:17}, year = {2022}, url = {https://doi.org/10.1145/3480466}, doi = {10.1145/3480466}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/StojkovskiATL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Sun22, author = {Sheng Sun}, title = {A Chosen Random Value Attack on {WPA3} {SAE} Authentication Protocol}, journal = {{DTRAP}}, volume = {3}, number = {2}, pages = {16:1--16:8}, year = {2022}, url = {https://doi.org/10.1145/3468526}, doi = {10.1145/3468526}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Sun22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/VaudenayV22, author = {Serge Vaudenay and Martin Vuagnoux}, title = {SwissCovid in the Perspective of Its Goals}, journal = {{DTRAP}}, volume = {3}, number = {3}, pages = {29:1--29:17}, year = {2022}, url = {https://doi.org/10.1145/3480465}, doi = {10.1145/3480465}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/VaudenayV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/WilliamsASC22, author = {Adam D. Williams and Shannon N. Abbott and Nathan Shoman and William S. Charlton}, title = {Results From Invoking Artificial Neural Networks to Measure Insider Threat Detection {\&} Mitigation}, journal = {{DTRAP}}, volume = {3}, number = {1}, pages = {3:1--3:20}, year = {2022}, url = {https://doi.org/10.1145/3457909}, doi = {10.1145/3457909}, timestamp = {Thu, 21 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/WilliamsASC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/WitBH22, author = {J. S. Panman de Wit and Doina Bucur and J. van der Ham}, title = {Dynamic Detection of Mobile Malware Using Smartphone Data and Machine Learning}, journal = {{DTRAP}}, volume = {3}, number = {2}, pages = {9:1--9:24}, year = {2022}, url = {https://doi.org/10.1145/3484246}, doi = {10.1145/3484246}, timestamp = {Thu, 21 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/WitBH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/X22, title = {Introduction to the Special Issue on Insider Threats}, journal = {{DTRAP}}, volume = {3}, number = {1}, pages = {1:1--1:3}, year = {2022}, url = {https://doi.org/10.1145/3477501}, doi = {10.1145/3477501}, timestamp = {Thu, 21 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/X22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/ZhengYW22, author = {Panpan Zheng and Shuhan Yuan and Xintao Wu}, title = {Using Dirichlet Marked Hawkes Processes for Insider Threat Detection}, journal = {{DTRAP}}, volume = {3}, number = {1}, pages = {5:1--5:19}, year = {2022}, url = {https://doi.org/10.1145/3457908}, doi = {10.1145/3457908}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/ZhengYW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/ZibakSS22, author = {Adam Zibak and Clemens Sauerwein and Andrew C. Simpson}, title = {Threat Intelligence Quality Dimensions for Research and Practice}, journal = {{DTRAP}}, volume = {3}, number = {4}, pages = {44:1--44:22}, year = {2022}, url = {https://doi.org/10.1145/3484202}, doi = {10.1145/3484202}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/ZibakSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/ZimmerBF22, author = {Ephraim Zimmer and Christian Burkert and Hannes Federrath}, title = {Insiders Dissected: New Foundations and a Systematisation of the Research on Insiders}, journal = {{DTRAP}}, volume = {3}, number = {1}, pages = {2:1--2:35}, year = {2022}, url = {https://doi.org/10.1145/3473674}, doi = {10.1145/3473674}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/ZimmerBF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/0001WN21, author = {Pratim Datta and Mark Whitmore and Joseph K. Nwankpa}, title = {A Perfect Storm: Social Media News, Psychological Biases, and {AI}}, journal = {{DTRAP}}, volume = {2}, number = {2}, pages = {15:1--15:21}, year = {2021}, url = {https://doi.org/10.1145/3428157}, doi = {10.1145/3428157}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/0001WN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/AksoyPY21, author = {Sinan G. Aksoy and Emilie Purvine and Stephen J. Young}, title = {Directional Laplacian Centrality for Cyber Situational Awareness}, journal = {{DTRAP}}, volume = {2}, number = {4}, pages = {28:1--28:28}, year = {2021}, url = {https://doi.org/10.1145/3450286}, doi = {10.1145/3450286}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/AksoyPY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/AleroudYP0K21, author = {Ahmed Aleroud and Fan Yang and Sai C. Pallaprolu and Zhiyuan Chen and George Karabatis}, title = {Anonymization of Network Traces Data through Condensation-based Differential Privacy}, journal = {{DTRAP}}, volume = {2}, number = {4}, pages = {30:1--30:23}, year = {2021}, url = {https://doi.org/10.1145/3425401}, doi = {10.1145/3425401}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/AleroudYP0K21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Amiet21, author = {Nils Amiet}, title = {Blockchain Vulnerabilities in Practice}, journal = {{DTRAP}}, volume = {2}, number = {2}, pages = {8:1--8:7}, year = {2021}, url = {https://doi.org/10.1145/3407230}, doi = {10.1145/3407230}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Amiet21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/DashKP21, author = {Pritam Dash and Mehdi Karimibiuki and Karthik Pattabiraman}, title = {Stealthy Attacks against Robotic Vehicles Protected by Control-based Intrusion Detection Techniques}, journal = {{DTRAP}}, volume = {2}, number = {1}, pages = {7:1--7:25}, year = {2021}, url = {https://doi.org/10.1145/3419474}, doi = {10.1145/3419474}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/DashKP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/DesmetSVJJ21, author = {Lieven Desmet and Jan Spooren and Thomas Vissers and Peter Janssen and Wouter Joosen}, title = {Premadoma: An Operational Solution to Prevent Malicious Domain Name Registrations in the .eu {TLD}}, journal = {{DTRAP}}, volume = {2}, number = {1}, pages = {2:1--2:24}, year = {2021}, url = {https://doi.org/10.1145/3419476}, doi = {10.1145/3419476}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/DesmetSVJJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/DykstraRSHM21, author = {Josiah Dykstra and Neil C. Rowe and Timothy J. Shimeall and Angela Horneman and Marisa Midler}, title = {Introduction: On the Nature of Situational Awareness}, journal = {{DTRAP}}, volume = {2}, number = {4}, pages = {25:1--25:3}, year = {2021}, url = {https://doi.org/10.1145/3462334}, doi = {10.1145/3462334}, timestamp = {Fri, 22 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/DykstraRSHM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/GencLS21, author = {Ziya Alper Gen{\c{c}} and Gabriele Lenzini and Daniele Sgandurra}, title = {Cut-and-Mouse and Ghost Control: Exploiting Antivirus Software with Synthesized Inputs}, journal = {{DTRAP}}, volume = {2}, number = {1}, pages = {4:1--4:23}, year = {2021}, url = {https://doi.org/10.1145/3431286}, doi = {10.1145/3431286}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/GencLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/GlazerSS21, author = {Amanda K. Glazer and Jacob V. Spertus and Philip B. Stark}, title = {More Style, Less Work: Card-style Data Decrease Risk-limiting Audit Sample Sizes}, journal = {{DTRAP}}, volume = {2}, number = {4}, pages = {32:1--32:15}, year = {2021}, url = {https://doi.org/10.1145/3457907}, doi = {10.1145/3457907}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/GlazerSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Ham21, author = {Jeroen van der Ham}, title = {Toward a Better Understanding of "Cybersecurity"}, journal = {{DTRAP}}, volume = {2}, number = {3}, pages = {18:1--18:3}, year = {2021}, url = {https://doi.org/10.1145/3442445}, doi = {10.1145/3442445}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Ham21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/HappaAHBGC21, author = {Jassim Happa and Ioannis Agrafiotis and Martin Helmhout and Thomas Bashford{-}Rogers and Michael Goldsmith and Sadie Creese}, title = {Assessing a Decision Support Tool for {SOC} Analysts}, journal = {{DTRAP}}, volume = {2}, number = {3}, pages = {22:1--22:35}, year = {2021}, url = {https://doi.org/10.1145/3430753}, doi = {10.1145/3430753}, timestamp = {Fri, 22 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/HappaAHBGC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/HappaBRGC21, author = {Jassim Happa and Thomas Bashford{-}Rogers and Alastair Janse van Rensburg and Michael Goldsmith and Sadie Creese}, title = {Deception in Network Defences Using Unpredictability}, journal = {{DTRAP}}, volume = {2}, number = {4}, pages = {29:1--29:26}, year = {2021}, url = {https://doi.org/10.1145/3450973}, doi = {10.1145/3450973}, timestamp = {Fri, 22 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/HappaBRGC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/HuangZB21, author = {Teng{-}Chieh Huang and Razieh Nokhbeh Zaeem and K. Suzanne Barber}, title = {Identifying Real-world Credible Experts in the Financial Domain}, journal = {{DTRAP}}, volume = {2}, number = {2}, pages = {17:1--17:14}, year = {2021}, url = {https://doi.org/10.1145/3446783}, doi = {10.1145/3446783}, timestamp = {Fri, 22 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/HuangZB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/IliouKTKVK21, author = {Christos Iliou and Theodoros Kostoulas and Theodora Tsikrika and Vasilis Katos and Stefanos Vrochidis and Ioannis Kompatsiaris}, title = {Detection of Advanced Web Bots by Combining Web Logs with Mouse Behavioural Biometrics}, journal = {{DTRAP}}, volume = {2}, number = {3}, pages = {24:1--24:26}, year = {2021}, url = {https://doi.org/10.1145/3447815}, doi = {10.1145/3447815}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/IliouKTKVK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/JacobsREAR21, author = {Jay Jacobs and Sasha Romanosky and Benjamin Edwards and Idris Adjerid and Michael Roytman}, title = {Exploit Prediction Scoring System {(EPSS)}}, journal = {{DTRAP}}, volume = {2}, number = {3}, pages = {20:1--20:17}, year = {2021}, url = {https://doi.org/10.1145/3436242}, doi = {10.1145/3436242}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/JacobsREAR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Konstantinovskiy21, author = {Lev Konstantinovskiy and Oliver Price and Mevan Babakar and Arkaitz Zubiaga}, title = {Toward Automated Factchecking: Developing an Annotation Schema and Benchmark for Consistent Automated Claim Detection}, journal = {{DTRAP}}, volume = {2}, number = {2}, pages = {14:1--14:16}, year = {2021}, url = {https://doi.org/10.1145/3412869}, doi = {10.1145/3412869}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Konstantinovskiy21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/KumarIP21, author = {Rajesh Kumar and Can Isik and Vir V. Phoha}, title = {Treadmill Assisted Gait Spoofing {(TAGS):} An Emerging Threat to Wearable Sensor-based Gait Authentication}, journal = {{DTRAP}}, volume = {2}, number = {3}, pages = {23:1--23:17}, year = {2021}, url = {https://doi.org/10.1145/3442151}, doi = {10.1145/3442151}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/KumarIP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/LampR0A21, author = {Josephine Lamp and Carlos E. Rubio{-}Medrano and Ziming Zhao and Gail{-}Joon Ahn}, title = {\emph{ExSol}: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems}, journal = {{DTRAP}}, volume = {2}, number = {3}, pages = {21:1--21:23}, year = {2021}, url = {https://doi.org/10.1145/3428156}, doi = {10.1145/3428156}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/LampR0A21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/McCorryMTS021, author = {Patrick McCorry and Maryam Mehrnezhad and Ehsan Toreini and Siamak F. Shahandashti and Feng Hao}, title = {On Secure E-Voting over Blockchain}, journal = {{DTRAP}}, volume = {2}, number = {4}, pages = {33:1--33:13}, year = {2021}, url = {https://doi.org/10.1145/3461461}, doi = {10.1145/3461461}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/McCorryMTS021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Metcalf21, author = {Leigh Metcalf}, title = {Editorial on the Special Issue on Election Security}, journal = {{DTRAP}}, volume = {2}, number = {4}, pages = {31:1}, year = {2021}, url = {https://doi.org/10.1145/3471534}, doi = {10.1145/3471534}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Metcalf21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/MetcalfS21, author = {Leigh Metcalf and Jonathan M. Spring}, title = {The Ecosystem of Detection and Blocklisting of Domain Generation}, journal = {{DTRAP}}, volume = {2}, number = {3}, pages = {19:1--19:22}, year = {2021}, url = {https://doi.org/10.1145/3423951}, doi = {10.1145/3423951}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/MetcalfS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/NakatsukaPT21, author = {Yoshimichi Nakatsuka and Andrew Paverd and Gene Tsudik}, title = {PDoT: Private DNS-over-TLS with {TEE} Support}, journal = {{DTRAP}}, volume = {2}, number = {1}, pages = {3:1--3:22}, year = {2021}, url = {https://doi.org/10.1145/3431171}, doi = {10.1145/3431171}, timestamp = {Fri, 22 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/NakatsukaPT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/PerdisciLDLKS21, author = {Roberto Perdisci and Martina Lindorfer and Adam Doup{\'{e}} and Andrea Lanzi and Alexandros Kapravelos and Gianluca Stringhini}, title = {Introduction to the ACSAC'19 Special Issue - Vol. 2}, journal = {{DTRAP}}, volume = {2}, number = {1}, pages = {1:1--1:2}, year = {2021}, url = {https://doi.org/10.1145/3437253}, doi = {10.1145/3437253}, timestamp = {Fri, 22 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/PerdisciLDLKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/RingODWNS21, author = {John H. Ring and Colin Michael Van Oort and Samson Durst and Vanessa White and Joseph P. Near and Christian Skalka}, title = {Methods for Host-based Intrusion Detection with Deep Learning}, journal = {{DTRAP}}, volume = {2}, number = {4}, pages = {26:1--26:29}, year = {2021}, url = {https://doi.org/10.1145/3461462}, doi = {10.1145/3461462}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/RingODWNS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Samtani0BC21, author = {Sagar Samtani and Weifeng Li and Victor A. Benjamin and Hsinchun Chen}, title = {Informing Cyber Threat Intelligence through Dark Web Situational Awareness: The AZSecure Hacker Assets Portal}, journal = {{DTRAP}}, volume = {2}, number = {4}, pages = {27:1--27:10}, year = {2021}, url = {https://doi.org/10.1145/3450972}, doi = {10.1145/3450972}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Samtani0BC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/SikderBU21, author = {Amit Kumar Sikder and Leonardo Babun and A. Selcuk Uluagac}, title = {Aegis+: {A} Context-aware Platform-independent Security Framework for Smart Home Systems}, journal = {{DTRAP}}, volume = {2}, number = {1}, pages = {6:1--6:33}, year = {2021}, url = {https://doi.org/10.1145/3428026}, doi = {10.1145/3428026}, timestamp = {Fri, 22 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/SikderBU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/SpringI21, author = {Jonathan M. Spring and Phyllis Illari}, title = {Review of Human Decision-making during Computer Security Incident Analysis}, journal = {{DTRAP}}, volume = {2}, number = {2}, pages = {11:1--11:47}, year = {2021}, url = {https://doi.org/10.1145/3427787}, doi = {10.1145/3427787}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/SpringI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/TewariZKBA21, author = {Shubhra Tewari and Renos Zabounidis and Ammina Kothari and Reynold Bailey and Cecilia Ovesdotter Alm}, title = {Perceptions of Human and Machine-Generated Articles}, journal = {{DTRAP}}, volume = {2}, number = {2}, pages = {12:1--12:16}, year = {2021}, url = {https://doi.org/10.1145/3428158}, doi = {10.1145/3428158}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/TewariZKBA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/UsuiOIKIMM21, author = {Toshinori Usui and Yuto Otsuki and Tomonori Ikuse and Yuhei Kawakoya and Makoto Iwamura and Jun Miyoshi and Kanta Matsuura}, title = {Automatic Reverse Engineering of Script Engine Binaries for Building Script {API} Tracers}, journal = {{DTRAP}}, volume = {2}, number = {1}, pages = {5:1--5:31}, year = {2021}, url = {https://doi.org/10.1145/3416126}, doi = {10.1145/3416126}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/UsuiOIKIMM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/ValechaSVKAR21, author = {Rohit Valecha and Srikrishna Krishnarao Srinivasan and Tejaswi Volety and K. Hazel Kwon and Manish Agrawal and H. Raghav Rao}, title = {Fake News Sharing: An Investigation of Threat and Coping Cues in the Context of the Zika Virus}, journal = {{DTRAP}}, volume = {2}, number = {2}, pages = {16:1--16:16}, year = {2021}, url = {https://doi.org/10.1145/3410025}, doi = {10.1145/3410025}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/ValechaSVKAR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/WangIBSPW21, author = {Li Wang and S. Sitharama Iyengar and Amith K. Belman and Pawel Sniatala and Vir V. Phoha and Changsheng Wan}, title = {Game Theory based Cyber-Insurance to Cover Potential Loss from Mobile Malware Exploitation}, journal = {{DTRAP}}, volume = {2}, number = {2}, pages = {9:1--9:24}, year = {2021}, url = {https://doi.org/10.1145/3409959}, doi = {10.1145/3409959}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/WangIBSPW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Woods0S21, author = {Daniel W. Woods and Tyler Moore and Andrew C. Simpson}, title = {The County Fair Cyber Loss Distribution: Drawing Inferences from Insurance Prices}, journal = {{DTRAP}}, volume = {2}, number = {2}, pages = {10:1--10:21}, year = {2021}, url = {https://doi.org/10.1145/3434403}, doi = {10.1145/3434403}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Woods0S21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Zafarani0PA21, author = {Reza Zafarani and Huan Liu and Vir V. Phoha and Javad Azimi}, title = {Inroduction on Recent Trends and Perspectives in Fake News Research}, journal = {{DTRAP}}, volume = {2}, number = {2}, pages = {13:1--13:3}, year = {2021}, url = {https://doi.org/10.1145/3448634}, doi = {10.1145/3448634}, timestamp = {Fri, 22 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Zafarani0PA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/0001JPZ20, author = {Xinyi Zhou and Atishay Jain and Vir V. Phoha and Reza Zafarani}, title = {Fake News Early Detection: {A} Theory-driven Model}, journal = {{DTRAP}}, volume = {1}, number = {2}, pages = {12:1--12:25}, year = {2020}, url = {https://doi.org/10.1145/3377478}, doi = {10.1145/3377478}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/0001JPZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/AgadakosDJWASWK20, author = {Ioannis Agadakos and Nicholas DeMarinis and Di Jin and Kent Williams{-}King and Jearson Alfajardo and Benjamin Shteinfeld and David Williams{-}King and Vasileios P. Kemerlis and Georgios Portokalidis}, title = {Large-scale Debloating of Binary Shared Libraries}, journal = {{DTRAP}}, volume = {1}, number = {4}, pages = {19:1--19:28}, year = {2020}, url = {https://doi.org/10.1145/3414997}, doi = {10.1145/3414997}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/AgadakosDJWASWK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Burton20, author = {Ren{\'{e}}e Burton}, title = {Unsupervised Learning Techniques for Malware Characterization: Understanding Certain DNS-based DDoS Attacks}, journal = {{DTRAP}}, volume = {1}, number = {3}, pages = {14:1--14:26}, year = {2020}, url = {https://doi.org/10.1145/3377869}, doi = {10.1145/3377869}, timestamp = {Tue, 26 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Burton20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/ChevalierPDH20, author = {Ronny Chevalier and David Plaquin and Chris I. Dalton and Guillaume Hiet}, title = {Intrusion Survivability for Commodity Operating Systems}, journal = {{DTRAP}}, volume = {1}, number = {4}, pages = {21:1--21:30}, year = {2020}, url = {https://doi.org/10.1145/3419471}, doi = {10.1145/3419471}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/ChevalierPDH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/ChuaYGL20, author = {Mark Yep{-}Kui Chua and George O. M. Yee and Yuan Xiang Gu and Chung{-}Horng Lung}, title = {Threats to Online Advertising and Countermeasures: {A} Technical Survey}, journal = {{DTRAP}}, volume = {1}, number = {2}, pages = {11:1--11:27}, year = {2020}, url = {https://doi.org/10.1145/3374136}, doi = {10.1145/3374136}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/ChuaYGL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/CormackH20, author = {Andrew Cormack and Jeroen van der Ham}, title = {Introduction to the {FIRST} Special Issue}, journal = {{DTRAP}}, volume = {1}, number = {1}, pages = {2:1--2:3}, year = {2020}, url = {https://doi.org/10.1145/3380746}, doi = {10.1145/3380746}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/CormackH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/DurvauxD20, author = {Fran{\c{c}}ois Durvaux and Marc Durvaux}, title = {SCA-Pitaya: {A} Practical and Affordable Side-Channel Attack Setup for Power Leakage-Based Evaluations}, journal = {{DTRAP}}, volume = {1}, number = {1}, pages = {3:1--3:16}, year = {2020}, url = {https://doi.org/10.1145/3371393}, doi = {10.1145/3371393}, timestamp = {Tue, 26 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/DurvauxD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/GajraniTL0ZG20, author = {Jyoti Gajrani and Meenakshi Tripathi and Vijay Laxmi and Gaurav Somani and Akka Zemmari and Manoj Singh Gaur}, title = {\emph{Vulvet}: Vetting of Vulnerabilities in Android Apps to Thwart Exploitation}, journal = {{DTRAP}}, volume = {1}, number = {2}, pages = {10:1--10:25}, year = {2020}, url = {https://doi.org/10.1145/3376121}, doi = {10.1145/3376121}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/GajraniTL0ZG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/GutzwillerDP20, author = {Robert S. Gutzwiller and Josiah Dykstra and Bryan D. Payne}, title = {Gaps and Opportunities in Situational Awareness for Cybersecurity}, journal = {{DTRAP}}, volume = {1}, number = {3}, pages = {18:1--18:6}, year = {2020}, url = {https://doi.org/10.1145/3384471}, doi = {10.1145/3384471}, timestamp = {Tue, 26 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/GutzwillerDP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/KarimCHCB20, author = {Imtiaz Karim and Fabrizio Cicala and Syed Rafiul Hussain and Omar Chowdhury and Elisa Bertino}, title = {ATFuzzer: Dynamic Analysis Framework of {AT} Interface for Android Smartphones}, journal = {{DTRAP}}, volume = {1}, number = {4}, pages = {23:1--23:29}, year = {2020}, url = {https://doi.org/10.1145/3416125}, doi = {10.1145/3416125}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/KarimCHCB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/KohlrauschB20, author = {Jan Kohlrausch and Eugene A. Brin}, title = {{ARIMA} Supplemented Security Metrics for Quality Assurance and Situational Awareness}, journal = {{DTRAP}}, volume = {1}, number = {1}, pages = {6:1--6:21}, year = {2020}, url = {https://doi.org/10.1145/3376926}, doi = {10.1145/3376926}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/KohlrauschB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Koot20, author = {Matthijs R. Koot}, title = {Field Note on {CVE-2019-11510:} Pulse Connect Secure {SSL-VPN} in the Netherlands}, journal = {{DTRAP}}, volume = {1}, number = {2}, pages = {13:1--13:7}, year = {2020}, url = {https://doi.org/10.1145/3382765}, doi = {10.1145/3382765}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Koot20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/LakhotiaM20, author = {Arun Lakhotia and Leigh Metcalf}, title = {Digital Threats: Research and Practice Inaugural Issue Editorial}, journal = {{DTRAP}}, volume = {1}, number = {1}, pages = {1:1--1:3}, year = {2020}, url = {https://doi.org/10.1145/3380320}, doi = {10.1145/3380320}, timestamp = {Tue, 26 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/LakhotiaM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/LaurenzaLM20, author = {Giuseppe Laurenza and Riccardo Lazzeretti and Luca Mazzotti}, title = {Malware Triage for Early Identification of Advanced Persistent Threat Activities}, journal = {{DTRAP}}, volume = {1}, number = {3}, pages = {16:1--16:17}, year = {2020}, url = {https://doi.org/10.1145/3386581}, doi = {10.1145/3386581}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/LaurenzaLM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/OsmanMHY20, author = {Tousif Osman and Mohammad Mannan and Urs Hengartner and Amr M. Youssef}, title = {Securing Applications against Side-channel Attacks through Resource Access Veto}, journal = {{DTRAP}}, volume = {1}, number = {4}, pages = {22:1--22:29}, year = {2020}, url = {https://doi.org/10.1145/3416124}, doi = {10.1145/3416124}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/OsmanMHY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/PalitMP20, author = {Tapti Palit and Fabian Monrose and Michalis Polychronakis}, title = {Mitigating Data-only Attacks by Protecting Memory-resident Sensitive Data}, journal = {{DTRAP}}, volume = {1}, number = {4}, pages = {20:1--20:26}, year = {2020}, url = {https://doi.org/10.1145/3419475}, doi = {10.1145/3419475}, timestamp = {Tue, 26 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/PalitMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/PerdisciLDLKS20, author = {Roberto Perdisci and Martina Lindorfer and Adam Doup{\'{e}} and Andrea Lanzi and Alexandros Kapravelos and Gianluca Stringhini}, title = {Introduction to the ACSAC'19 Special Issue - Part 1}, journal = {{DTRAP}}, volume = {1}, number = {4}, pages = {19e:1--19e:3}, year = {2020}, url = {https://doi.org/10.1145/3437251}, doi = {10.1145/3437251}, timestamp = {Tue, 26 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/PerdisciLDLKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Sacher20, author = {Desiree Sacher}, title = {Fingerpointing False Positives: How to Better Integrate Continuous Improvement into Security Monitoring}, journal = {{DTRAP}}, volume = {1}, number = {1}, pages = {7:1--7:7}, year = {2020}, url = {https://doi.org/10.1145/3370084}, doi = {10.1145/3370084}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Sacher20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Sanchez-RolaBS20, author = {Iskander S{\'{a}}nchez{-}Rola and Davide Balzarotti and Igor Santos}, title = {Cookies from the Past: Timing Server-side Request Processing Code for History Sniffing}, journal = {{DTRAP}}, volume = {1}, number = {4}, pages = {24:1--24:24}, year = {2020}, url = {https://doi.org/10.1145/3419473}, doi = {10.1145/3419473}, timestamp = {Tue, 26 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Sanchez-RolaBS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/ScofieldMK20, author = {Daniel Scofield and Craig Miles and Stephen Kuhn}, title = {Automated Model Learning for Accurate Detection of Malicious Digital Documents}, journal = {{DTRAP}}, volume = {1}, number = {3}, pages = {15:1--15:21}, year = {2020}, url = {https://doi.org/10.1145/3379505}, doi = {10.1145/3379505}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/ScofieldMK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/ShuklaKMPJP20, author = {Diksha Shukla and Partha Pratim Kundu and Ravichandra Malapati and Sujit Poudel and Zhanpeng Jin and Vir V. Phoha}, title = {Thinking Unveiled: An Inference and Correlation Model to Attack {EEG} Biometrics}, journal = {{DTRAP}}, volume = {1}, number = {2}, pages = {9:1--9:29}, year = {2020}, url = {https://doi.org/10.1145/3374137}, doi = {10.1145/3374137}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/ShuklaKMPJP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Steinhauser020, author = {Anton{\'{\i}}n Steinhauser and Petr Tuma}, title = {Database Traffic Interception for Graybox Detection of Stored and Context-sensitive {XSS}}, journal = {{DTRAP}}, volume = {1}, number = {3}, pages = {17:1--17:23}, year = {2020}, url = {https://doi.org/10.1145/3399668}, doi = {10.1145/3399668}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Steinhauser020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/TienCBK20, author = {Chin{-}Wei Tien and Shang{-}Wen Chen and Tao Ban and Sy{-}Yen Kuo}, title = {Machine Learning Framework to Analyze IoT Malware Using {ELF} and Opcode Features}, journal = {{DTRAP}}, volume = {1}, number = {1}, pages = {5:1--5:19}, year = {2020}, url = {https://doi.org/10.1145/3378448}, doi = {10.1145/3378448}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/TienCBK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/ToornS20, author = {Olivier van der Toorn and Anna Sperotto}, title = {Looking Beyond the Horizon: Thoughts on Proactive Detection of Threats}, journal = {{DTRAP}}, volume = {1}, number = {1}, pages = {4:1--4:13}, year = {2020}, url = {https://doi.org/10.1145/3373639}, doi = {10.1145/3373639}, timestamp = {Tue, 26 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/ToornS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/UkropKM20, author = {Martin Ukrop and Lydia Kraus and Vashek Matyas}, title = {Will You Trust This {TLS} Certificate?: Perceptions of People Working in {IT} (Extended Version)}, journal = {{DTRAP}}, volume = {1}, number = {4}, pages = {25:1--25:29}, year = {2020}, url = {https://doi.org/10.1145/3419472}, doi = {10.1145/3419472}, timestamp = {Tue, 26 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/UkropKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/WakedMY20, author = {Louis Waked and Mohammad Mannan and Amr M. Youssef}, title = {The Sorry State of {TLS} Security in Enterprise Interception Appliances}, journal = {{DTRAP}}, volume = {1}, number = {2}, pages = {8:1--8:26}, year = {2020}, url = {https://doi.org/10.1145/3372802}, doi = {10.1145/3372802}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/WakedMY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.