Search dblp for Publications

export results for "stream:journals/dtrap:"

 download as .bib file

@article{DBLP:journals/dtrap/0002AC24,
  author       = {Ying Yuan and
                  Giovanni Apruzzese and
                  Mauro Conti},
  title        = {Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks
                  against Phishing Website Detectors Using Machine Learning},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {2},
  pages        = {16:1--16:51},
  year         = {2024},
  url          = {https://doi.org/10.1145/3638253},
  doi          = {10.1145/3638253},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/0002AC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/0003CJEF24,
  author       = {Andreas Hammer and
                  Christian Cerny and
                  Christoph Jung and
                  Christian Eichenm{\"{u}}ller and
                  Felix C. Freiling},
  title        = {Increasing Street Credibility: Cartography-Aware Forensic Analysis
                  of {GNSS} Trace Validity},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {3},
  pages        = {32:1--32:20},
  year         = {2024},
  url          = {https://doi.org/10.1145/3688809},
  doi          = {10.1145/3688809},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/0003CJEF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/0003GNSFF24,
  author       = {Andreas Hammer and
                  Julian Geus and
                  Florian Nicolai and
                  Philip Sch{\"{u}}tz and
                  Christofer Fein and
                  Felix C. Freiling},
  title        = {Fit for Forensics: Taxonomy and Common Model for Forensic Analysis
                  of Fitness Trackers},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {3},
  pages        = {29:1--29:20},
  year         = {2024},
  url          = {https://doi.org/10.1145/3687271},
  doi          = {10.1145/3687271},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/0003GNSFF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/0005MLV24,
  author       = {Yurong Chen and
                  Yongsheng Mei and
                  Tian Lan and
                  Guru Venkataramani},
  title        = {Exploring Effective Fuzzing Strategies to Analyze Communication Protocols},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {1},
  pages        = {11:1--11:22},
  year         = {2024},
  url          = {https://doi.org/10.1145/3526088},
  doi          = {10.1145/3526088},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/0005MLV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/0028KP24,
  author       = {Jing Xu and
                  Stefanos Koffas and
                  Stjepan Picek},
  title        = {Unveiling the Threat: Investigating Distributed and Centralized Backdoor
                  Attacks in Federated Graph Neural Networks},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {2},
  pages        = {15:1--15:29},
  year         = {2024},
  url          = {https://doi.org/10.1145/3633206},
  doi          = {10.1145/3633206},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/0028KP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/AdrikoN24,
  author       = {Rodney Adriko and
                  Jason R. C. Nurse},
  title        = {Does Cyber Insurance Promote Cyber Security Best Practice? An Analysis
                  Based on Insurance Application Forms},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {3},
  pages        = {25:1--25:39},
  year         = {2024},
  url          = {https://doi.org/10.1145/3676283},
  doi          = {10.1145/3676283},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/AdrikoN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Aladi24,
  author       = {Clement Chimezie Aladi},
  title        = {Web Application Security: {A} Pragmatic Expos{\'{e}}},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {2},
  pages        = {20:1--20:9},
  year         = {2024},
  url          = {https://doi.org/10.1145/3644394},
  doi          = {10.1145/3644394},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Aladi24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/BaeB0P24,
  author       = {Yechan Bae and
                  Sarbartha Banerjee and
                  Sangho Lee and
                  Marcus Peinado},
  title        = {Spacelord: Private and Secure Smart Space Sharing},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {2},
  pages        = {14:1--14:27},
  year         = {2024},
  url          = {https://doi.org/10.1145/3637879},
  doi          = {10.1145/3637879},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/BaeB0P24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/BagozziGLKB24,
  author       = {Benjamin E. Bagozzi and
                  Rajni Goel and
                  Brunilda Lugo{-}de{-}Fabritz and
                  Kelly Knickmeier{-}Cummings and
                  Karthik Balasubramanian},
  title        = {A Framework for Enhancing Social Media Misinformation Detection with
                  Topical-Tactics},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {3},
  pages        = {24:1--24:29},
  year         = {2024},
  url          = {https://doi.org/10.1145/3670694},
  doi          = {10.1145/3670694},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/BagozziGLKB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/BaldryHSSG24,
  author       = {Moya Kate Baldry and
                  Jassim Happa and
                  Anthony Steed and
                  Simon Smith and
                  Mashhuda Glencross},
  title        = {\emph{From Embodied Abuse to Mass Disruption}: Generative, Inter-Reality
                  Threats in Social, Mixed-Reality Platforms},
  journal      = {Digit. Threat. Res. Pract.},
  volume       = {5},
  number       = {4},
  pages        = {38:1--38:36},
  year         = {2024},
  url          = {https://doi.org/10.1145/3696015},
  doi          = {10.1145/3696015},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/BaldryHSSG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Botacin24,
  author       = {Marcus Botacin},
  title        = {Fuzzing and Symbolic Execution for Multipath Malware Tracing: Bridging
                  Theory and Practice via Survey and Experiments},
  journal      = {Digit. Threat. Res. Pract.},
  volume       = {5},
  number       = {4},
  pages        = {41:1--41:33},
  year         = {2024},
  url          = {https://doi.org/10.1145/3700147},
  doi          = {10.1145/3700147},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Botacin24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/BuchtaGHK24,
  author       = {Robin Buchta and
                  Georgios Gkoktsis and
                  Felix Heine and
                  Carsten Kleiner},
  title        = {Advanced Persistent Threat Attack Detection Systems: {A} Review of
                  Approaches, Challenges, and Trends},
  journal      = {Digit. Threat. Res. Pract.},
  volume       = {5},
  number       = {4},
  pages        = {39:1--39:37},
  year         = {2024},
  url          = {https://doi.org/10.1145/3696014},
  doi          = {10.1145/3696014},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/BuchtaGHK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/CeschinBBPOGG24,
  author       = {Fabr{\'{\i}}cio Ceschin and
                  Marcus Botacin and
                  Albert Bifet and
                  Bernhard Pfahringer and
                  Luiz S. Oliveira and
                  Heitor Murilo Gomes and
                  Andr{\'{e}} Gr{\'{e}}gio},
  title        = {Machine Learning (In) Security: {A} Stream of Problems},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {1},
  pages        = {9:1--9:32},
  year         = {2024},
  url          = {https://doi.org/10.1145/3617897},
  doi          = {10.1145/3617897},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/CeschinBBPOGG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/DemmelGGB24,
  author       = {Markus Demmel and
                  Thomas G{\"{o}}bel and
                  Patrik Gon{\c{c}}alves and
                  Harald Baier},
  title        = {Data Synthesis Is Going Mobile - On Community-Driven Dataset Generation
                  for Android Devices},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {3},
  pages        = {30:1--30:19},
  year         = {2024},
  url          = {https://doi.org/10.1145/3688807},
  doi          = {10.1145/3688807},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/DemmelGGB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Derbyshire0W024,
  author       = {Richard Derbyshire and
                  Benjamin Green and
                  Charl van der Walt and
                  David Hutchison},
  title        = {Dead Man's {PLC:} Towards Viable Cyber Extortion for Operational Technology},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {3},
  pages        = {23:1--23:24},
  year         = {2024},
  url          = {https://doi.org/10.1145/3670695},
  doi          = {10.1145/3670695},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Derbyshire0W024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/DewaldS24,
  author       = {Andreas Dewald and
                  Thomas Schreck},
  title        = {Introduction to the {IMF} 2024 Special Issue},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {3},
  pages        = {26:1--26:2},
  year         = {2024},
  url          = {https://doi.org/10.1145/3696016},
  doi          = {10.1145/3696016},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/DewaldS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/DomschotR024,
  author       = {Eva Domschot and
                  Ramyaa Ramyaa and
                  Michael R. Smith},
  title        = {Improving Automated Labeling for ATT{\&}CK Tactics in Malware
                  Threat Reports},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {1},
  pages        = {2:1--2:16},
  year         = {2024},
  url          = {https://doi.org/10.1145/3594553},
  doi          = {10.1145/3594553},
  timestamp    = {Wed, 20 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/DomschotR024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Everson024,
  author       = {Douglas Everson and
                  Long Cheng},
  title        = {A Survey on Network Attack Surface Mapping},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {2},
  pages        = {18:1--18:25},
  year         = {2024},
  url          = {https://doi.org/10.1145/3640019},
  doi          = {10.1145/3640019},
  timestamp    = {Wed, 20 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Everson024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/GaoAS24,
  author       = {Yang Gao and
                  Benjamin M. Ampel and
                  Sagar Samtani},
  title        = {Evading Anti-Phishing Models: {A} Field Note Documenting an Experience
                  in the Machine Learning Security Evasion Competition 2022},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {1},
  pages        = {7:1--7:8},
  year         = {2024},
  url          = {https://doi.org/10.1145/3603507},
  doi          = {10.1145/3603507},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/GaoAS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Ghadermazi0J24,
  author       = {Jalal Ghadermazi and
                  Ankit Shah and
                  Sushil Jajodia},
  title        = {A Machine Learning and Optimization Framework for Efficient Alert
                  Management in a Cybersecurity Operations Center},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {2},
  pages        = {19:1--19:23},
  year         = {2024},
  url          = {https://doi.org/10.1145/3644393},
  doi          = {10.1145/3644393},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Ghadermazi0J24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/GurabiNBPSMM24,
  author       = {Mehdi Akbari Gurabi and
                  Lasse Nitz and
                  Andrej Bregar and
                  Jan Popanda and
                  Christian Siemers and
                  Roman Matzutt and
                  Avikarsha Mandal},
  title        = {Requirements for Playbook-Assisted Cyber Incident Response, Reporting
                  and Automation},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {3},
  pages        = {34:1--34:11},
  year         = {2024},
  url          = {https://doi.org/10.1145/3688810},
  doi          = {10.1145/3688810},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/GurabiNBPSMM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/HarrisonBLH24,
  author       = {Luke Harrison and
                  Samiran Bag and
                  Hang Luo and
                  Feng Hao},
  title        = {{VERICONDOR:} End-to-End Verifiable Condorcet Voting with support
                  for Strict Preference and Indifference},
  journal      = {Digit. Threat. Res. Pract.},
  volume       = {5},
  number       = {4},
  pages        = {35:1--35:30},
  year         = {2024},
  url          = {https://doi.org/10.1145/3676267},
  doi          = {10.1145/3676267},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/HarrisonBLH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/HembergTRO24,
  author       = {Erik Hemberg and
                  Matthew J. Turner and
                  Nick Rutar and
                  Una{-}May O'Reilly},
  title        = {Enhancements to Threat, Vulnerability, and Mitigation Knowledge for
                  Cyber Analytics, Hunting, and Simulations},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {1},
  pages        = {8:1--8:33},
  year         = {2024},
  url          = {https://doi.org/10.1145/3615668},
  doi          = {10.1145/3615668},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/HembergTRO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/HongMD24,
  author       = {Andrew E. Hong and
                  Peter P. Malinovsky and
                  Suresh K. Damodaran},
  title        = {Towards Attack Detection in Multimodal Cyber-Physical Systems with
                  Sticky {HDP-HMM} based Time Series Analysis},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {1},
  pages        = {5:1--5:21},
  year         = {2024},
  url          = {https://doi.org/10.1145/3604434},
  doi          = {10.1145/3604434},
  timestamp    = {Wed, 20 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/HongMD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/JoshiM24,
  author       = {Rucha Bhalchandra Joshi and
                  Subhankar Mishra},
  title        = {Locally and Structurally Private Graph Neural Networks},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {1},
  pages        = {10:1--10:23},
  year         = {2024},
  url          = {https://doi.org/10.1145/3624485},
  doi          = {10.1145/3624485},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/JoshiM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/LangehaugG24,
  author       = {Tor J. Langehaug and
                  Scott R. Graham},
  title        = {CuMONITOR: Continuous Monitoring of Microarchitecture for Software
                  Task Identification and Classification},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {3},
  pages        = {22:1--22:22},
  year         = {2024},
  url          = {https://doi.org/10.1145/3652861},
  doi          = {10.1145/3652861},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/LangehaugG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/LindenmeierGF24,
  author       = {Christian Lindenmeier and
                  Jan Gruber and
                  Felix C. Freiling},
  title        = {InvesTEE: {A} TEE-supported Framework for Lawful Remote Forensic Investigations},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {3},
  pages        = {27:1--27:20},
  year         = {2024},
  url          = {https://doi.org/10.1145/3680294},
  doi          = {10.1145/3680294},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/LindenmeierGF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/LindorferS24,
  author       = {Martina Lindorfer and
                  Gianluca Stringhini},
  title        = {Introduction to the ACSAC'22 Special Issue},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {2},
  pages        = {13:1--13:2},
  year         = {2024},
  url          = {https://doi.org/10.1145/3659210},
  doi          = {10.1145/3659210},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/LindorferS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/NadimpalliR24,
  author       = {Aakash Varma Nadimpalli and
                  Ajita Rattani},
  title        = {Social Media Authentication and Combating Deepfakes Using Semi-Fragile
                  Invisible Image Watermarking},
  journal      = {Digit. Threat. Res. Pract.},
  volume       = {5},
  number       = {4},
  pages        = {40:1--40:30},
  year         = {2024},
  url          = {https://doi.org/10.1145/3700146},
  doi          = {10.1145/3700146},
  timestamp    = {Wed, 08 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/NadimpalliR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/PimentaCG24,
  author       = {Thalita Scharr Rodrigues Pimenta and
                  Fabricio Ceschin and
                  Andre Gregio},
  title        = {{ANDROIDGYNY:} Reviewing Clustering Techniques for Android Malware
                  Family Classification},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {1},
  pages        = {3:1--3:35},
  year         = {2024},
  url          = {https://doi.org/10.1145/3587471},
  doi          = {10.1145/3587471},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/PimentaCG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/PutrevuMMRVCPS24,
  author       = {Venkata Sai Charan Putrevu and
                  Subhasis Mukhopadhyay and
                  Subhajit Manna and
                  Nanda Rani and
                  Ansh Vaid and
                  Hrushikesh Chunduri and
                  Mohan Anand Putrevu and
                  Sandeep K. Shukla},
  title        = {{ADAPT:} Adaptive Camouflage Based Deception Orchestration For Trapping
                  Advanced Persistent Threats},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {3},
  pages        = {21:1--21:35},
  year         = {2024},
  url          = {https://doi.org/10.1145/3651991},
  doi          = {10.1145/3651991},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/PutrevuMMRVCPS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/RaniSMS24,
  author       = {Nanda Rani and
                  Bikash Saha and
                  Vikas Maurya and
                  Sandeep Kumar Shukla},
  title        = {TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from
                  Finished Cyber Threat Reports},
  journal      = {Digit. Threat. Res. Pract.},
  volume       = {5},
  number       = {4},
  pages        = {37:1--37:19},
  year         = {2024},
  url          = {https://doi.org/10.1145/3696427},
  doi          = {10.1145/3696427},
  timestamp    = {Wed, 08 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/RaniSMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/RuddKCORH24,
  author       = {Ethan M. Rudd and
                  David Krisiloff and
                  Scott E. Coull and
                  Daniel Olszewski and
                  Edward Raff and
                  James Holt},
  title        = {Efficient Malware Analysis Using Metric Embeddings},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {1},
  pages        = {4:1--4:20},
  year         = {2024},
  url          = {https://doi.org/10.1145/3615669},
  doi          = {10.1145/3615669},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/RuddKCORH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/RzepkaOFB24,
  author       = {Lisa Rzepka and
                  Jenny Ottmann and
                  Felix C. Freiling and
                  Harald Baier},
  title        = {Causal Inconsistencies Are Normal in Windows Memory Dumps (Too)},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {3},
  pages        = {31:1--31:20},
  year         = {2024},
  url          = {https://doi.org/10.1145/3680293},
  doi          = {10.1145/3680293},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/RzepkaOFB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/SamtaniRA24,
  author       = {Sagar Samtani and
                  Edward Raff and
                  Hyrum S. Anderson},
  title        = {Applied Machine Learning for Information Security},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {1},
  pages        = {1:1--1:5},
  year         = {2024},
  url          = {https://doi.org/10.1145/3652029},
  doi          = {10.1145/3652029},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/SamtaniRA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/StuhnHL24,
  author       = {Jakob St{\"{u}}hn and
                  Jan{-}Niclas Hilgert and
                  Martin Lambertz},
  title        = {The Hidden Threat: Analysis of Linux Rootkit Techniques and Limitations
                  of Current Detection Tools},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {3},
  pages        = {28:1--28:24},
  year         = {2024},
  url          = {https://doi.org/10.1145/3688808},
  doi          = {10.1145/3688808},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/StuhnHL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Subbagari24,
  author       = {Saikiran Subbagari},
  title        = {Counter Measures to Combat Money Laundering in the New Digital Age},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {2},
  pages        = {17:1--17:13},
  year         = {2024},
  url          = {https://doi.org/10.1145/3626826},
  doi          = {10.1145/3626826},
  timestamp    = {Wed, 20 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Subbagari24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/TavissDZCA24,
  author       = {Scarlett Taviss and
                  Steven H. H. Ding and
                  Mohammad Zulkernine and
                  Philippe Charland and
                  Sudipta Acharya},
  title        = {Asm2Seq: Explainable Assembly Code Functional Summary Generation for
                  Reverse Engineering and Vulnerability Analysis},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {1},
  pages        = {6:1--6:25},
  year         = {2024},
  url          = {https://doi.org/10.1145/3592623},
  doi          = {10.1145/3592623},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/TavissDZCA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Tsunoda24,
  author       = {Akaki Tsunoda},
  title        = {Demonstrating Spoofability of an Originating Number when Sending an
                  {SMS} using {SMPP}},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {1},
  pages        = {12:1--12:13},
  year         = {2024},
  url          = {https://doi.org/10.1145/3615667},
  doi          = {10.1145/3615667},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Tsunoda24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Tsunoda24a,
  author       = {Akaki Tsunoda},
  title        = {Investigating Threats Posed by {SMS} Origin Spoofing to IoT Devices},
  journal      = {Digit. Threat. Res. Pract.},
  volume       = {5},
  number       = {4},
  pages        = {36:1--36:12},
  year         = {2024},
  url          = {https://doi.org/10.1145/3696011},
  doi          = {10.1145/3696011},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Tsunoda24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/WunderC0B24,
  author       = {Julia Wunder and
                  Alan Corona and
                  Andreas Hammer and
                  Zinaida Benenson},
  title        = {On {NVD} Users' Attitudes, Experiences, Hopes, and Hurdles},
  journal      = {{DTRAP}},
  volume       = {5},
  number       = {3},
  pages        = {33:1--33:19},
  year         = {2024},
  url          = {https://doi.org/10.1145/3688806},
  doi          = {10.1145/3688806},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/WunderC0B24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/00010F0023,
  author       = {Mengfei Ren and
                  Xiaolei Ren and
                  Huadong Feng and
                  Jiang Ming and
                  Yu Lei},
  title        = {Security Analysis of Zigbee Protocol Implementation via Device-agnostic
                  Fuzzing},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {1},
  pages        = {9:1--9:24},
  year         = {2023},
  url          = {https://doi.org/10.1145/3551894},
  doi          = {10.1145/3551894},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/00010F0023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/0001C23,
  author       = {Anna Cartwright and
                  Edward J. Cartwright},
  title        = {The Economics of Ransomware Attacks on Integrated Supply Chain Networks},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {4},
  pages        = {56:1--56:14},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579647},
  doi          = {10.1145/3579647},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/0001C23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/0001CTC23,
  author       = {Michael Lang and
                  Lena Yuryna Connolly and
                  Paul Taylor and
                  Phillip J. Corner},
  title        = {The Evolving Menace of Ransomware: {A} Comparative Analysis of Pre-pandemic
                  and Mid-pandemic Attacks},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {4},
  pages        = {52:1--52:22},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558006},
  doi          = {10.1145/3558006},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/0001CTC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/0001TZ23,
  author       = {S. S. Iyengar and
                  Bhavani Thuraisingham and
                  Marek Zmuda},
  title        = {Special Issue on Actionable Information for Digital Threat Discovery
                  Using Contextualized Data or Multi Sensor Data Fusion},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {2},
  pages        = {23:1--23:2},
  year         = {2023},
  url          = {https://doi.org/10.1145/3585079},
  doi          = {10.1145/3585079},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/0001TZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/0001W0BOSO23,
  author       = {Jonathan Oakley and
                  Carl R. Worley and
                  Lu Yu and
                  Richard R. Brooks and
                  Ilker {\"{O}}z{\c{c}}elik and
                  Anthony Skjellum and
                  Jihad S. Obeid},
  title        = {Scrybe: {A} Secure Audit Trail for Clinical Trial Data Fusion},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {2},
  pages        = {24:1--24:20},
  year         = {2023},
  url          = {https://doi.org/10.1145/3491258},
  doi          = {10.1145/3491258},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/0001W0BOSO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/0003OGF23,
  author       = {Andreas Hammer and
                  Mathis Ohlig and
                  Julian Geus and
                  Felix C. Freiling},
  title        = {A Functional Classification of Forensic Access to Storage and its
                  Legal Implications},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {3},
  pages        = {32:1--32:14},
  year         = {2023},
  url          = {https://doi.org/10.1145/3609231},
  doi          = {10.1145/3609231},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/0003OGF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/0007MPS23,
  author       = {Saurabh Kumar and
                  Debadatta Mishra and
                  Biswabandan Panda and
                  Sandeep Kumar Shukla},
  title        = {InviSeal: {A} Stealthy Dynamic Analysis Framework for Android Systems},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {1},
  pages        = {13:1--13:31},
  year         = {2023},
  url          = {https://doi.org/10.1145/3567599},
  doi          = {10.1145/3567599},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/0007MPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/AdaneBY23,
  author       = {Kibreab Adane and
                  Berhanu Beyene and
                  Mohammed Abebe Yimer},
  title        = {Single and Hybrid-Ensemble Learning-Based Phishing Website Detection:
                  Examining Impacts of Varied Nature Datasets and Informative Feature
                  Selection Technique},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {3},
  pages        = {46:1--46:27},
  year         = {2023},
  url          = {https://doi.org/10.1145/3611392},
  doi          = {10.1145/3611392},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/AdaneBY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/AlbasirNM23,
  author       = {Abdurhman Albasir and
                  Kshirasagar Naik and
                  Ricardo Manzano},
  title        = {Toward Improving the Security of IoT and {CPS} Devices: An {AI} Approach},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {2},
  pages        = {22:1--22:30},
  year         = {2023},
  url          = {https://doi.org/10.1145/3497862},
  doi          = {10.1145/3497862},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/AlbasirNM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/AllisonM023,
  author       = {David Allison and
                  Kieran McLaughlin and
                  Paul Smith},
  title        = {Goosewolf: An Embedded Intrusion Detection System for Advanced Programmable
                  Logic Controllers},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {4},
  pages        = {59:1--59:19},
  year         = {2023},
  url          = {https://doi.org/10.1145/3617692},
  doi          = {10.1145/3617692},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/AllisonM023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/AnandCS23,
  author       = {P. Mohan Anand and
                  P. V. Sai Charan and
                  Sandeep K. Shukla},
  title        = {HiPeR - Early Detection of a Ransomware Attack using Hardware Performance
                  Counters},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {3},
  pages        = {43:1--43:24},
  year         = {2023},
  url          = {https://doi.org/10.1145/3608484},
  doi          = {10.1145/3608484},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/AnandCS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/ApruzzeseLOMRGF23,
  author       = {Giovanni Apruzzese and
                  Pavel Laskov and
                  Edgardo Montes de Oca and
                  Wissam Mallouli and
                  Luis Burdalo Rapa and
                  Athanasios Vasileios Grammatopoulos and
                  Fabio Di Franco},
  title        = {The Role of Machine Learning in Cybersecurity},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {1},
  pages        = {8:1--8:38},
  year         = {2023},
  url          = {https://doi.org/10.1145/3545574},
  doi          = {10.1145/3545574},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/ApruzzeseLOMRGF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/AriefCHLR23,
  author       = {Budi Arief and
                  Lena Yuryna Connolly and
                  Julio C. Hernandez{-}Castro and
                  Allan Liska and
                  Peter Y. A. Ryan},
  title        = {Introduction to the Special Issue on Ransomware},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {4},
  pages        = {51:1--51:3},
  year         = {2023},
  url          = {https://doi.org/10.1145/3629999},
  doi          = {10.1145/3629999},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/AriefCHLR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/AxonEAUGC23,
  author       = {Louise Axon and
                  Arnau Erola and
                  Ioannis Agrafiotis and
                  Ganbayar Uuganbayar and
                  Michael Goldsmith and
                  Sadie Creese},
  title        = {Ransomware as a Predator: Modelling the Systemic Risk to Prey},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {4},
  pages        = {55:1--55:38},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579648},
  doi          = {10.1145/3579648},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/AxonEAUGC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/AysuG23,
  author       = {Aydin Aysu and
                  Scott R. Graham},
  title        = {Introduction to the Special Issue on the Digital Threats of Hardware
                  Security},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {2},
  pages        = {16:1--16:2},
  year         = {2023},
  url          = {https://doi.org/10.1145/3585011},
  doi          = {10.1145/3585011},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/AysuG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/BajpaiE23,
  author       = {Pranshu Bajpai and
                  Richard J. Enbody},
  title        = {Know Thy Ransomware Response: {A} Detailed Framework for Devising
                  Effective Ransomware Response Strategies},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {4},
  pages        = {57:1--57:19},
  year         = {2023},
  url          = {https://doi.org/10.1145/3606022},
  doi          = {10.1145/3606022},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/BajpaiE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/BajramovicFFRF23,
  author       = {Edita Bajramovic and
                  Christofer Fein and
                  Marius Frinken and
                  Paul R{\"{o}}sler and
                  Felix C. Freiling},
  title        = {{LAVA:} Log Authentication and Verification Algorithm},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {3},
  pages        = {35:1--35:17},
  year         = {2023},
  url          = {https://doi.org/10.1145/3609233},
  doi          = {10.1145/3609233},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/BajramovicFFRF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/BauschD23,
  author       = {Florian Bausch and
                  Andreas Dewald},
  title        = {Forensic Examination of Ceph},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {3},
  pages        = {37:1--37:18},
  year         = {2023},
  url          = {https://doi.org/10.1145/3609862},
  doi          = {10.1145/3609862},
  timestamp    = {Tue, 19 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/BauschD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/BhowmickIGPS23,
  author       = {Rajat Subhra Bhowmick and
                  Rahul Indra and
                  Isha Ganguli and
                  Jayanta Paul and
                  Jaya Sil},
  title        = {Breaking Captcha System with Minimal Exertion through Deep Learning:
                  Real-time Risk Assessment on Indian Government Websites},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {2},
  pages        = {28:1--28:24},
  year         = {2023},
  url          = {https://doi.org/10.1145/3584974},
  doi          = {10.1145/3584974},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/BhowmickIGPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/BotacinKS23,
  author       = {Marcus Botacin and
                  Uriel Kosayev and
                  Ruimin Sun},
  title        = {Introduction to the Special Issue on Memory-Based Malware and Other
                  Unconventional Threats},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {3},
  pages        = {39:1},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627521},
  doi          = {10.1145/3627521},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/BotacinKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/BoyarchukMOV23,
  author       = {Oleg Boyarchuk and
                  Sebastiano Mariani and
                  Stefano Ortolani and
                  Giovanni Vigna},
  title        = {Keeping Up with the Emotets: Tracking a Multi-infrastructure Botnet},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {3},
  pages        = {41:1--41:29},
  year         = {2023},
  url          = {https://doi.org/10.1145/3594554},
  doi          = {10.1145/3594554},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/BoyarchukMOV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/BridgesOIHJNWVS23,
  author       = {Robert A. Bridges and
                  Sean Oesch and
                  Michael D. Iannacone and
                  Kelly M. T. Huffer and
                  Brian Jewell and
                  Jeffrey A. Nichols and
                  Brian Weber and
                  Miki E. Verma and
                  Daniel Scofield and
                  Craig Miles and
                  Thomas Plummer and
                  Mark Daniell and
                  Anne M. Tall and
                  Justin M. Beaver and
                  Jared M. Smith},
  title        = {Beyond the Hype: An Evaluation of Commercially Available Machine Learning-based
                  Malware Detectors},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {2},
  pages        = {27:1--27:22},
  year         = {2023},
  url          = {https://doi.org/10.1145/3567432},
  doi          = {10.1145/3567432},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/BridgesOIHJNWVS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/CarnaFQ023,
  author       = {Stefano Carn{\`{a}} and
                  Serena Ferracci and
                  Francesco Quaglia and
                  Alessandro Pellegrini},
  title        = {Fight Hardware with Hardware: Systemwide Detection and Mitigation
                  of Side-channel Attacks Using Performance Counters},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {1},
  pages        = {5:1--5:24},
  year         = {2023},
  url          = {https://doi.org/10.1145/3519601},
  doi          = {10.1145/3519601},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/CarnaFQ023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/CasinoTALP23,
  author       = {Fran Casino and
                  Nikolaos Totosis and
                  Theodoros Apostolopoulos and
                  Nikolaos Lykousas and
                  Constantinos Patsakis},
  title        = {Analysis and Correlation of Visual Evidence in Campaigns of Malicious
                  Office Documents},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {2},
  pages        = {26:1--26:19},
  year         = {2023},
  url          = {https://doi.org/10.1145/3513025},
  doi          = {10.1145/3513025},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/CasinoTALP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/ChenFZK23,
  author       = {Huili Chen and
                  Cheng Fu and
                  Jishen Zhao and
                  Farinaz Koushanfar},
  title        = {{GALU:} {A} Genetic Algorithm Framework for Logic Unlocking},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {2},
  pages        = {21:1--21:30},
  year         = {2023},
  url          = {https://doi.org/10.1145/3491256},
  doi          = {10.1145/3491256},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/ChenFZK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/ConnollyKMB23,
  author       = {Kate Connolly and
                  Anna Klempay and
                  Mary McCann and
                  Paul R. Brenner},
  title        = {Dark Web Marketplaces: Data for Collaborative Threat Intelligence},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {4},
  pages        = {49:1--49:12},
  year         = {2023},
  url          = {https://doi.org/10.1145/3615666},
  doi          = {10.1145/3615666},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/ConnollyKMB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/DewaldS23,
  author       = {Andreas Dewald and
                  Thomas Schreck},
  title        = {Introduction to the {IMF} 2023 Special Issue},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {3},
  pages        = {31:1--31:2},
  year         = {2023},
  url          = {https://doi.org/10.1145/3626105},
  doi          = {10.1145/3626105},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/DewaldS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/ErenMSMBCA23,
  author       = {Maksim Ekin Eren and
                  Juston S. Moore and
                  Erik Skau and
                  Elisabeth Moore and
                  Manish Bhattarai and
                  Gopinath Chennupati and
                  Boian S. Alexandrov},
  title        = {General-purpose Unsupervised Cyber Anomaly Detection via Non-negative
                  Tensor Factorization},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {1},
  pages        = {6:1--6:28},
  year         = {2023},
  url          = {https://doi.org/10.1145/3519602},
  doi          = {10.1145/3519602},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/ErenMSMBCA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/FaldutiT23,
  author       = {Mattia Falduti and
                  Sergio Tessaris},
  title        = {Mapping the Interdisciplinary Research on Non-consensual Pornography:
                  Technical and Quantitative Perspectives},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {3},
  pages        = {44:1--44:22},
  year         = {2023},
  url          = {https://doi.org/10.1145/3608483},
  doi          = {10.1145/3608483},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/FaldutiT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/GeorgouliasPFV23,
  author       = {Dimitrios Georgoulias and
                  Jens Myrup Pedersen and
                  Morten Falch and
                  Emmanouil Vasilomanolakis},
  title        = {{COVID-19} Vaccination Certificates in the Darkweb},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {1},
  pages        = {7:1--7:17},
  year         = {2023},
  url          = {https://doi.org/10.1145/3530877},
  doi          = {10.1145/3530877},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/GeorgouliasPFV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/GobelBB23,
  author       = {Thomas G{\"{o}}bel and
                  Harald Baier and
                  Frank Breitinger},
  title        = {Data for Digital Forensics: Why a Discussion on "How Realistic is
                  Synthetic Data" is Dispensable},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {3},
  pages        = {38:1--38:18},
  year         = {2023},
  url          = {https://doi.org/10.1145/3609863},
  doi          = {10.1145/3609863},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/GobelBB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/GrauxLTW23,
  author       = {Pierre Graux and
                  Jean{-}Fran{\c{c}}ois Lalande and
                  Val{\'{e}}rie Viet Triem Tong and
                  Pierre Wilke},
  title        = {\emph{OATs'inside}: Retrieving Object Behaviors From Native-based
                  Obfuscated Android Applications},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {2},
  pages        = {30:1--30:27},
  year         = {2023},
  url          = {https://doi.org/10.1145/3584975},
  doi          = {10.1145/3584975},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/GrauxLTW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/GruberH23,
  author       = {Jan Gruber and
                  Merlin Humml},
  title        = {A Formal Treatment of Expressiveness and Relevanceof Digital Evidence},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {3},
  pages        = {33:1--33:16},
  year         = {2023},
  url          = {https://doi.org/10.1145/3608485},
  doi          = {10.1145/3608485},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/GruberH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/HilbigGKS23,
  author       = {Tobias Hilbig and
                  Thomas Geras and
                  Erwin Kupris and
                  Thomas Schreck},
  title        = {security.txt Revisited: Analysis of Prevalence and Conformity in 2022},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {3},
  pages        = {36:1--36:17},
  year         = {2023},
  url          = {https://doi.org/10.1145/3609234},
  doi          = {10.1145/3609234},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/HilbigGKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/HoveVR23,
  author       = {Koen van Hove and
                  Jeroen van der Ham{-}de Vos and
                  Roland van Rijswijk{-}Deij},
  title        = {rpkiller: Threat Analysis of the {BGP} Resource Public Key Infrastructure},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {4},
  pages        = {58:1--58:24},
  year         = {2023},
  url          = {https://doi.org/10.1145/3617182},
  doi          = {10.1145/3617182},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/HoveVR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Howland23,
  author       = {Henry Howland},
  title        = {{CVSS:} Ubiquitous and Broken},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {1},
  pages        = {1:1--1:12},
  year         = {2023},
  url          = {https://doi.org/10.1145/3491263},
  doi          = {10.1145/3491263},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Howland23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/HuecaMS23,
  author       = {Angel Hueca and
                  Sharon Mudd and
                  Timothy J. Shimeall},
  title        = {Introduction to the Special Issue on Information Sharing},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {4},
  pages        = {47:1--47:2},
  year         = {2023},
  url          = {https://doi.org/10.1145/3635391},
  doi          = {10.1145/3635391},
  timestamp    = {Tue, 19 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/HuecaMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/HusakSZBH23,
  author       = {Martin Hus{\'{a}}k and
                  Pavol Sokol and
                  Martin Z{\'{a}}dn{\'{\i}}k and
                  V{\'{a}}clav Bartos and
                  Martin Hor{\'{a}}k},
  title        = {Lessons Learned from Automated Sharing of Intrusion Detection Alerts:
                  The Case of the {SABU} Platform},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {4},
  pages        = {48:1--48:11},
  year         = {2023},
  url          = {https://doi.org/10.1145/3611391},
  doi          = {10.1145/3611391},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/HusakSZBH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/KassimLA23,
  author       = {Sharifah Roziah Binti Mohd Kassim and
                  Shujun Li and
                  Budi Arief},
  title        = {Understanding How National CSIRTs Evaluate Cyber Incident Response
                  Tools and Data: Findings from Focus Group Discussions},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {3},
  pages        = {45:1--45:24},
  year         = {2023},
  url          = {https://doi.org/10.1145/3609230},
  doi          = {10.1145/3609230},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/KassimLA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/KlierVB23,
  author       = {Samantha Klier and
                  Jan Varenkamp and
                  Harald Baier},
  title        = {Back and Forth - On Automatic Exposure of Origin and Dissemination
                  of Files on Windows},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {3},
  pages        = {34:1--34:17},
  year         = {2023},
  url          = {https://doi.org/10.1145/3609232},
  doi          = {10.1145/3609232},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/KlierVB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/LandauerWSHH23,
  author       = {Max Landauer and
                  Markus Wurzenberger and
                  Florian Skopik and
                  Wolfgang Hotwagner and
                  Georg H{\"{o}}ld},
  title        = {AMiner: {A} Modular Log Data Analysis Pipeline for Anomaly-based Intrusion
                  Detection},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {1},
  pages        = {12:1--12:16},
  year         = {2023},
  url          = {https://doi.org/10.1145/3567675},
  doi          = {10.1145/3567675},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/LandauerWSHH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/LangehaugBG23,
  author       = {Tor J. Langehaug and
                  Brett J. Borghetti and
                  Scott R. Graham},
  title        = {Classifying Co-resident Computer Programs Using Information Revealed
                  by Resource Contention},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {2},
  pages        = {17:1--17:29},
  year         = {2023},
  url          = {https://doi.org/10.1145/3464306},
  doi          = {10.1145/3464306},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/LangehaugBG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/LevineT23,
  author       = {Alan Levine and
                  Brett Alan Tucker},
  title        = {Zero Trust Architecture: Risk Discussion},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {1},
  pages        = {15:1--15:6},
  year         = {2023},
  url          = {https://doi.org/10.1145/3573892},
  doi          = {10.1145/3573892},
  timestamp    = {Tue, 19 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/LevineT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/LounisZ23,
  author       = {Karim Lounis and
                  Mohammad Zulkernine},
  title        = {Lessons Learned: Analysis of PUF-based Authentication Protocols for
                  IoT},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {2},
  pages        = {19:1--19:33},
  year         = {2023},
  url          = {https://doi.org/10.1145/3487060},
  doi          = {10.1145/3487060},
  timestamp    = {Tue, 19 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/LounisZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/MahmoudMY23,
  author       = {Moustafa Mahmoud and
                  Mohammad Mannan and
                  Amr M. Youssef},
  title        = {APTHunter: Detecting Advanced Persistent Threats in Early Stages},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {1},
  pages        = {11:1--11:31},
  year         = {2023},
  url          = {https://doi.org/10.1145/3559768},
  doi          = {10.1145/3559768},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/MahmoudMY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/MorelCH23,
  author       = {Lionel Morel and
                  Damien Courouss{\'{e}} and
                  Thomas Hiscock},
  title        = {Code Polymorphism Meets Code Encryption: Confidentiality and Side-channel
                  Protection of Software Components},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {2},
  pages        = {18:1--18:27},
  year         = {2023},
  url          = {https://doi.org/10.1145/3487058},
  doi          = {10.1145/3487058},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/MorelCH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/MundtB23,
  author       = {Michael Mundt and
                  Harald Baier},
  title        = {Threat-Based Simulation of Data Exfiltration Toward Mitigating Multiple
                  Ransomware Extortions},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {4},
  pages        = {54:1--54:23},
  year         = {2023},
  url          = {https://doi.org/10.1145/3568993},
  doi          = {10.1145/3568993},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/MundtB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/RondonBAAU23,
  author       = {Luis Puche Rondon and
                  Leonardo Babun and
                  Ahmet Aris and
                  Kemal Akkaya and
                  A. Selcuk Uluagac},
  title        = {LGuard: Securing Enterprise-IoT Systems against Serial-Based Attacks
                  via Proprietary Communication Buses},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {1},
  pages        = {10:1--10:26},
  year         = {2023},
  url          = {https://doi.org/10.1145/3555721},
  doi          = {10.1145/3555721},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/RondonBAAU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/RoseGK23,
  author       = {Anthony Rose and
                  Scott R. Graham and
                  Jacob J. Krasnov},
  title        = {IronNetInjector: Weaponizing .NET Dynamic Language Runtime Engines},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {3},
  pages        = {40:1--40:23},
  year         = {2023},
  url          = {https://doi.org/10.1145/3603506},
  doi          = {10.1145/3603506},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/RoseGK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/SanchezNAZG23,
  author       = {Ricardo Alejandro Manzano Sanchez and
                  Kshirasagar Naik and
                  Abdurhman Albasir and
                  Marzia Zaman and
                  Nishith Goel},
  title        = {Detection of Anomalous Behavior of Smartphone Devices using Changepoint
                  Analysis and Machine Learning Techniques},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {1},
  pages        = {2:1--2:28},
  year         = {2023},
  url          = {https://doi.org/10.1145/3492327},
  doi          = {10.1145/3492327},
  timestamp    = {Tue, 19 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/SanchezNAZG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Sengupta0M23,
  author       = {Poushali Sengupta and
                  Sudipta Paul and
                  Subhankar Mishra},
  title        = {{BUDS+:} Better Privacy with Converger and Noisy Shuffling},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {2},
  pages        = {25:1--25:23},
  year         = {2023},
  url          = {https://doi.org/10.1145/3491259},
  doi          = {10.1145/3491259},
  timestamp    = {Tue, 19 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Sengupta0M23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/ShobiriMY23,
  author       = {Behnam Shobiri and
                  Mohammad Mannan and
                  Amr M. Youssef},
  title        = {CDNs' Dark Side: Security Problems in CDN-to-Origin Connections},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {1},
  pages        = {3:1--3:22},
  year         = {2023},
  url          = {https://doi.org/10.1145/3499428},
  doi          = {10.1145/3499428},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/ShobiriMY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/SrinivasaPV23,
  author       = {Shreyas Srinivasa and
                  Jens Myrup Pedersen and
                  Emmanouil Vasilomanolakis},
  title        = {Gotta Catch 'em All: {A} Multistage Framework for Honeypot Fingerprinting},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {3},
  pages        = {42:1--42:28},
  year         = {2023},
  url          = {https://doi.org/10.1145/3584976},
  doi          = {10.1145/3584976},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/SrinivasaPV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/StavesG023,
  author       = {Alexander Staves and
                  Antonios Gouglidis and
                  David Hutchison},
  title        = {An Analysis of Adversary-Centric Security Testing within Information
                  and Operational Technology Environments},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {1},
  pages        = {14:1--14:29},
  year         = {2023},
  url          = {https://doi.org/10.1145/3569958},
  doi          = {10.1145/3569958},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/StavesG023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Vaidya0GSN23,
  author       = {Girish Vaidya and
                  T. V. Prabhakar and
                  Nithish K. Gnani and
                  Ryan Shah and
                  Shishir Nagaraja},
  title        = {Sensor Identification via Acoustic Physically Unclonable Function},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {2},
  pages        = {20:1--20:25},
  year         = {2023},
  url          = {https://doi.org/10.1145/3488306},
  doi          = {10.1145/3488306},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Vaidya0GSN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Walshe023,
  author       = {Thomas Walshe and
                  Andrew Simpson},
  title        = {Towards a Greater Understanding of Coordinated Vulnerability Disclosure
                  Policy Documents},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {2},
  pages        = {29:1--29:36},
  year         = {2023},
  url          = {https://doi.org/10.1145/3586180},
  doi          = {10.1145/3586180},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Walshe023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/XenakisN0KAA23,
  author       = {Antonios Xenakis and
                  Sabrina Mamtaz Nourin and
                  Zhiyuan Chen and
                  George Karabatis and
                  Ahmed Aleroud and
                  Jhancy Amarsingh},
  title        = {A Self-adaptive and Secure Approach to Share Network Trace Data},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {4},
  pages        = {50:1--50:20},
  year         = {2023},
  url          = {https://doi.org/10.1145/3617181},
  doi          = {10.1145/3617181},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/XenakisN0KAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/XiaoZAKYC23,
  author       = {Ya Xiao and
                  Yang Zhao and
                  Nicholas Allen and
                  Nathan Keynes and
                  Danfeng (Daphne) Yao and
                  Cristina Cifuentes},
  title        = {Industrial Experience of Finding Cryptographic Vulnerabilities in
                  Large-scale Codebases},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {1},
  pages        = {4:1--4:18},
  year         = {2023},
  url          = {https://doi.org/10.1145/3507682},
  doi          = {10.1145/3507682},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/XiaoZAKYC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/YilmazCGAH23,
  author       = {Yagiz Yilmaz and
                  Or{\c{c}}un {\c{C}}etin and
                  Claudia Grigore and
                  Budi Arief and
                  Julio C. Hernandez{-}Castro},
  title        = {Personality Types and Ransomware Victimisation},
  journal      = {{DTRAP}},
  volume       = {4},
  number       = {4},
  pages        = {53:1--53:25},
  year         = {2023},
  url          = {https://doi.org/10.1145/3568994},
  doi          = {10.1145/3568994},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/YilmazCGAH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/0001SKEMW22,
  author       = {Jinxin Liu and
                  Murat Simsek and
                  Burak Kantarci and
                  Melike Erol{-}Kantarci and
                  Andrew J. Malton and
                  Andrew Walenstein},
  title        = {Risk-aware Fine-grained Access Control in Cyber-physical Contexts},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {4},
  pages        = {43:1--43:29},
  year         = {2022},
  url          = {https://doi.org/10.1145/3480468},
  doi          = {10.1145/3480468},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/0001SKEMW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/AlderBSOP22,
  author       = {Fritz Alder and
                  Jo Van Bulck and
                  Jesse Spielman and
                  David F. Oswald and
                  Frank Piessens},
  title        = {Faulty Point Unit: {ABI} Poisoning Attacks on Trusted Execution Environments},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {2},
  pages        = {13:1--13:26},
  year         = {2022},
  url          = {https://doi.org/10.1145/3491264},
  doi          = {10.1145/3491264},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/AlderBSOP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/ApruzzeseAFMC22,
  author       = {Giovanni Apruzzese and
                  Mauro Andreolini and
                  Luca Ferretti and
                  Mirco Marchetti and
                  Michele Colajanni},
  title        = {Modeling Realistic Adversarial Attacks against Network Intrusion Detection
                  Systems},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {3},
  pages        = {31:1--31:19},
  year         = {2022},
  url          = {https://doi.org/10.1145/3469659},
  doi          = {10.1145/3469659},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/ApruzzeseAFMC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/AxonFSSHKGC22,
  author       = {Louise Axon and
                  Katherine Fletcher and
                  Arianna Schuler Scott and
                  Marcel Stolz and
                  Robert Hannigan and
                  Ali {El Kaafarani} and
                  Michael Goldsmith and
                  Sadie Creese},
  title        = {Emerging Cybersecurity Capability Gaps in the Industrial Internet
                  of Things: Overview and Research Agenda},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {4},
  pages        = {34:1--34:27},
  year         = {2022},
  url          = {https://doi.org/10.1145/3503920},
  doi          = {10.1145/3503920},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/AxonFSSHKGC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/BajicPP22,
  author       = {Mila Bajic and
                  Andrej Petrovski and
                  Bojan Perkov},
  title        = {Field Note on Doing Digital Rights: Central and Southeast Europe Monitoring
                  Project},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {3},
  pages        = {23:1--23:7},
  year         = {2022},
  url          = {https://doi.org/10.1145/3513024},
  doi          = {10.1145/3513024},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/BajicPP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/BoutetCCLRBR22,
  author       = {Antoine Boutet and
                  Claude Castelluccia and
                  Mathieu Cunche and
                  C{\'{e}}dric Lauradoux and
                  Vincent Roca and
                  Adrien Baud and
                  Pierre{-}Guillaume Raverdy},
  title        = {Desire: Leveraging the Best of Centralized and Decentralized Contact
                  Tracing Systems},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {3},
  pages        = {28:1--28:20},
  year         = {2022},
  url          = {https://doi.org/10.1145/3480467},
  doi          = {10.1145/3480467},
  timestamp    = {Thu, 21 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/BoutetCCLRBR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/BromanderSMJESB22,
  author       = {Siri Bromander and
                  Morton Swimmer and
                  Lilly Pijnenburg Muller and
                  Audun J{\o}sang and
                  Martin Eian and
                  Geir Skj{\o}tskift and
                  Fredrik Borg},
  title        = {Investigating Sharing of Cyber Threat Intelligence and Proposing {A}
                  New Data Model for Enabling Automation in Knowledge Representation
                  and Exchange},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {1},
  pages        = {6:1--6:22},
  year         = {2022},
  url          = {https://doi.org/10.1145/3458027},
  doi          = {10.1145/3458027},
  timestamp    = {Thu, 21 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/BromanderSMJESB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/ChenLHCLH22,
  author       = {Chung{-}Kuan Chen and
                  Si{-}Chen Lin and
                  Szu{-}Chun Huang and
                  Yung{-}Tien Chu and
                  Chin{-}Laung Lei and
                  Chun{-}Ying Huang},
  title        = {Building Machine Learning-based Threat Hunting System from Scratch},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {3},
  pages        = {20:1--20:21},
  year         = {2022},
  url          = {https://doi.org/10.1145/3491260},
  doi          = {10.1145/3491260},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/ChenLHCLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Cotton22,
  author       = {Chase Cotton},
  title        = {"Off-Label" Use of {DNS}},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {3},
  pages        = {21:1--21:13},
  year         = {2022},
  url          = {https://doi.org/10.1145/3491261},
  doi          = {10.1145/3491261},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Cotton22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/DEliaIPQ22,
  author       = {Daniele Cono D'Elia and
                  Lorenzo Invidia and
                  Federico Palmaro and
                  Leonardo Querzoni},
  title        = {Evaluating Dynamic Binary Instrumentation Systems for Conspicuous
                  Features and Artifacts},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {2},
  pages        = {10:1--10:13},
  year         = {2022},
  url          = {https://doi.org/10.1145/3478520},
  doi          = {10.1145/3478520},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/DEliaIPQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/DesideraH22,
  author       = {Lucimara Desider{\'{a}} and
                  Jeroen van der Ham},
  title        = {Introduction to the Special Issue on the 2020 {FIRST} Conference},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {3},
  pages        = {18:1},
  year         = {2022},
  url          = {https://doi.org/10.1145/3549069},
  doi          = {10.1145/3549069},
  timestamp    = {Thu, 21 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/DesideraH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/DulaunoyHT22,
  author       = {Alexandre Dulaunoy and
                  Jean{-}Louis Huynen and
                  Aurelien Thirion},
  title        = {Active and Passive Collection of {SSH} Key Material for Cyber Threat
                  Intelligence},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {3},
  pages        = {19:1--19:5},
  year         = {2022},
  url          = {https://doi.org/10.1145/3491262},
  doi          = {10.1145/3491262},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/DulaunoyHT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/DusingH22,
  author       = {Johannes D{\"{u}}sing and
                  Ben Hermann},
  title        = {Analyzing the Direct and Transitive Impact of Vulnerabilities onto
                  Different Artifact Repositories},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {4},
  pages        = {38:1--38:25},
  year         = {2022},
  url          = {https://doi.org/10.1145/3472811},
  doi          = {10.1145/3472811},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/DusingH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/FilhoRF22,
  author       = {Ailton Santos Filho and
                  Ricardo J. Rodr{\'{\i}}guez and
                  Eduardo L. Feitosa},
  title        = {Evasion and Countermeasures Techniques to Detect Dynamic Binary Instrumentation
                  Frameworks},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {2},
  pages        = {11:1--11:28},
  year         = {2022},
  url          = {https://doi.org/10.1145/3480463},
  doi          = {10.1145/3480463},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/FilhoRF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/HouseholderS22,
  author       = {Allen D. Householder and
                  Jonathan M. Spring},
  title        = {Are We Skillful or Just Lucky? Interpreting the Possible Histories
                  of Vulnerability Disclosures},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {4},
  pages        = {39:1--39:28},
  year         = {2022},
  url          = {https://doi.org/10.1145/3477431},
  doi          = {10.1145/3477431},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/HouseholderS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/HusakLP22,
  author       = {Martin Hus{\'{a}}k and
                  Martin Lastovicka and
                  Tom{\'{a}}s Plesn{\'{\i}}k},
  title        = {Handling Internet Activism During the Russian Invasion of Ukraine:
                  {A} Campus Network Perspective},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {3},
  pages        = {17:1--17:5},
  year         = {2022},
  url          = {https://doi.org/10.1145/3534566},
  doi          = {10.1145/3534566},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/HusakLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/HussainNDBFMK22,
  author       = {Shehzeen Hussain and
                  Paarth Neekhara and
                  Brian Dolhansky and
                  Joanna Bitton and
                  Cristian Canton Ferrer and
                  Julian J. McAuley and
                  Farinaz Koushanfar},
  title        = {Exposing Vulnerabilities of Deepfake Detection Systems with Robust
                  Attacks},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {3},
  pages        = {30:1--30:23},
  year         = {2022},
  url          = {https://doi.org/10.1145/3464307},
  doi          = {10.1145/3464307},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/HussainNDBFMK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/JarvisDCK22,
  author       = {Paul{-}David Jarvis and
                  Amalia Damianou and
                  Cosmin Ciobanu and
                  Vasilis Katos},
  title        = {Vulnerability Exposure Driven Intelligence in Smart, Circular Cities},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {4},
  pages        = {40:1--40:18},
  year         = {2022},
  url          = {https://doi.org/10.1145/3487059},
  doi          = {10.1145/3487059},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/JarvisDCK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/JelesnianskiYMJ22,
  author       = {Christopher Jelesnianski and
                  Jinwoo Yom and
                  Changwoo Min and
                  Yeongjin Jang},
  title        = {Securely Sharing Randomized Code That Flies},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {3},
  pages        = {32:1--32:25},
  year         = {2022},
  url          = {https://doi.org/10.1145/3474558},
  doi          = {10.1145/3474558},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/JelesnianskiYMJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/KaptchukGHHR22,
  author       = {Gabriel Kaptchuk and
                  Daniel G. Goldstein and
                  Eszter Hargittai and
                  Jake M. Hofman and
                  Elissa M. Redmiles},
  title        = {How Good is Good Enough? Quantifying the Impact of Benefits, Accuracy,
                  and Privacy on Willingness to Adopt {COVID-19} Decision Aids},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {3},
  pages        = {27:1--27:18},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488307},
  doi          = {10.1145/3488307},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/KaptchukGHHR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/KaptchukMMR22,
  author       = {Gabriel Kaptchuk and
                  Fabio Massacci and
                  Sara Nieves Matheu{-}Garc{\'{\i}}a and
                  Elissa M. Redmiles},
  title        = {Introduction to the Special Issue on Security and Privacy for {COVID-19}},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {3},
  pages        = {24:1--24:2},
  year         = {2022},
  url          = {https://doi.org/10.1145/3549070},
  doi          = {10.1145/3549070},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/KaptchukMMR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/LeverettRW22,
  author       = {{\'{E}}ireann Leverett and
                  Matilda Rhode and
                  Adam Wedgbury},
  title        = {Vulnerability Forecasting: Theory and Practice},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {4},
  pages        = {42:1--42:27},
  year         = {2022},
  url          = {https://doi.org/10.1145/3492328},
  doi          = {10.1145/3492328},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/LeverettRW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/LiHH22,
  author       = {Ming Li and
                  Peter J. Hawrylak and
                  John Hale},
  title        = {Strategies for Practical Hybrid Attack Graph Generation and Analysis},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {4},
  pages        = {41:1--41:24},
  year         = {2022},
  url          = {https://doi.org/10.1145/3491257},
  doi          = {10.1145/3491257},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/LiHH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/MadaniVM22,
  author       = {Pooria Madani and
                  Natalija Vlajic and
                  Ivo Maljevic},
  title        = {Randomized Moving Target Approach for MAC-Layer Spoofing Detection
                  and Prevention in IoT Systems},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {4},
  pages        = {35:1--35:24},
  year         = {2022},
  url          = {https://doi.org/10.1145/3477403},
  doi          = {10.1145/3477403},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/MadaniVM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/MainardiBP22,
  author       = {Nicholas Mainardi and
                  Alessandro Barenghi and
                  Gerardo Pelosi},
  title        = {Privacy-aware Character Pattern Matching over Outsourced Encrypted
                  Data},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {1},
  pages        = {7:1--7:38},
  year         = {2022},
  url          = {https://doi.org/10.1145/3462333},
  doi          = {10.1145/3462333},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/MainardiBP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/MassacciNPSW22,
  author       = {Fabio Massacci and
                  Nick Nikiforakis and
                  Ivan Pashchenko and
                  Antonino Sabetta and
                  Victoria Wang},
  title        = {Introduction to the Special Issue on Vulnerabilities},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {4},
  pages        = {37:1},
  year         = {2022},
  url          = {https://doi.org/10.1145/3580605},
  doi          = {10.1145/3580605},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/MassacciNPSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Mozurkewich22,
  author       = {Karl Mozurkewich},
  title        = {Field Note on IoT Security: Novel {JIT} Security for Large-Scale Heterogeneous
                  IoT Deployments},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {4},
  pages        = {36:1--36:5},
  year         = {2022},
  url          = {https://doi.org/10.1145/3503919},
  doi          = {10.1145/3503919},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Mozurkewich22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/OeschADKSWR22,
  author       = {Sean Oesch and
                  Ruba Abu{-}Salma and
                  Oumar Diallo and
                  Juliane Kr{\"{a}}mer and
                  James Simmons and
                  Justin Wu and
                  Scott Ruoti},
  title        = {User Perceptions of Security and Privacy for Group Chat},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {2},
  pages        = {15:1--15:29},
  year         = {2022},
  url          = {https://doi.org/10.1145/3491265},
  doi          = {10.1145/3491265},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/OeschADKSWR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/PerdisciLS22,
  author       = {Roberto Perdisci and
                  Martina Lindorfer and
                  Gianluca Stringhini},
  title        = {Introduction to the ACSAC'20 Special Issue},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {2},
  pages        = {12:1--12:2},
  year         = {2022},
  url          = {https://doi.org/10.1145/3534708},
  doi          = {10.1145/3534708},
  timestamp    = {Thu, 21 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/PerdisciLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/RodriguezUT22,
  author       = {Ricardo J. Rodr{\'{\i}}guez and
                  Xabier Ugarte{-}Pedrero and
                  Juan Tapiador},
  title        = {Introduction to the Special Issue on Challenges and Trends in Malware
                  Analysis},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {2},
  pages        = {8:1--8:2},
  year         = {2022},
  url          = {https://doi.org/10.1145/3536319},
  doi          = {10.1145/3536319},
  timestamp    = {Thu, 21 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/RodriguezUT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/RossoCGA22,
  author       = {Martin Rosso and
                  Michele Campobasso and
                  Ganduulga Gankhuyag and
                  Luca Allodi},
  title        = {{SAIBERSOC:} {A} Methodology and Tool for Experimenting with Security
                  Operation Centers},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {2},
  pages        = {14:1--14:29},
  year         = {2022},
  url          = {https://doi.org/10.1145/3491266},
  doi          = {10.1145/3491266},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/RossoCGA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Sacher-Boldewin22,
  author       = {Desiree Sacher{-}Boldewin and
                  {\'{E}}ireann Leverett},
  title        = {The Intelligent Process Lifecycle of Active Cyber Defenders},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {3},
  pages        = {22:1--22:17},
  year         = {2022},
  url          = {https://doi.org/10.1145/3499427},
  doi          = {10.1145/3499427},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Sacher-Boldewin22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/ShomoES22,
  author       = {Paul Shomo and
                  Sebasti{\'{a}}n Echeverr{\'{\i}}a and
                  Jesse Sowell},
  title        = {Introduction to the Special Issue on the Lifecycle of IoT (In)security},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {4},
  pages        = {33:1--33:2},
  year         = {2022},
  url          = {https://doi.org/10.1145/3569901},
  doi          = {10.1145/3569901},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/ShomoES22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/SimkoCJCRK22,
  author       = {Lucy Simko and
                  Jack Lucas Chang and
                  Maggie Jiang and
                  Ryan Calo and
                  Franziska Roesner and
                  Tadayoshi Kohno},
  title        = {{COVID-19} Contact Tracing and Privacy: {A} Longitudinal Study of
                  Public Opinion},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {3},
  pages        = {25:1--25:36},
  year         = {2022},
  url          = {https://doi.org/10.1145/3480464},
  doi          = {10.1145/3480464},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/SimkoCJCRK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/StichaDAVB22,
  author       = {Paul J. Sticha and
                  Tirso E. Diaz and
                  Elise T. Axelrad and
                  Sean D. Vermillion and
                  Dennis M. Buede},
  title        = {Simulating Organizational Data from Redacted Input for Inference Enterprise
                  Modeling},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {1},
  pages        = {4:1--4:30},
  year         = {2022},
  url          = {https://doi.org/10.1145/3457910},
  doi          = {10.1145/3457910},
  timestamp    = {Thu, 21 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/StichaDAVB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/StojkovskiATL22,
  author       = {Borce Stojkovski and
                  Ruba Abu{-}Salma and
                  Karen Triquet and
                  Gabriele Lenzini},
  title        = {"Unless One Does the Research, It May Seem as Just a Useless Battery-consuming
                  App" - Field Notes on {COVID-19} Contact Tracing Applications},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {3},
  pages        = {26:1--26:17},
  year         = {2022},
  url          = {https://doi.org/10.1145/3480466},
  doi          = {10.1145/3480466},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/StojkovskiATL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Sun22,
  author       = {Sheng Sun},
  title        = {A Chosen Random Value Attack on {WPA3} {SAE} Authentication Protocol},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {2},
  pages        = {16:1--16:8},
  year         = {2022},
  url          = {https://doi.org/10.1145/3468526},
  doi          = {10.1145/3468526},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Sun22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/VaudenayV22,
  author       = {Serge Vaudenay and
                  Martin Vuagnoux},
  title        = {SwissCovid in the Perspective of Its Goals},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {3},
  pages        = {29:1--29:17},
  year         = {2022},
  url          = {https://doi.org/10.1145/3480465},
  doi          = {10.1145/3480465},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/VaudenayV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/WilliamsASC22,
  author       = {Adam D. Williams and
                  Shannon N. Abbott and
                  Nathan Shoman and
                  William S. Charlton},
  title        = {Results From Invoking Artificial Neural Networks to Measure Insider
                  Threat Detection {\&} Mitigation},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {1},
  pages        = {3:1--3:20},
  year         = {2022},
  url          = {https://doi.org/10.1145/3457909},
  doi          = {10.1145/3457909},
  timestamp    = {Thu, 21 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/WilliamsASC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/WitBH22,
  author       = {J. S. Panman de Wit and
                  Doina Bucur and
                  J. van der Ham},
  title        = {Dynamic Detection of Mobile Malware Using Smartphone Data and Machine
                  Learning},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {2},
  pages        = {9:1--9:24},
  year         = {2022},
  url          = {https://doi.org/10.1145/3484246},
  doi          = {10.1145/3484246},
  timestamp    = {Thu, 21 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/WitBH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/X22,
  title        = {Introduction to the Special Issue on Insider Threats},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {1},
  pages        = {1:1--1:3},
  year         = {2022},
  url          = {https://doi.org/10.1145/3477501},
  doi          = {10.1145/3477501},
  timestamp    = {Thu, 21 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/X22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/ZhengYW22,
  author       = {Panpan Zheng and
                  Shuhan Yuan and
                  Xintao Wu},
  title        = {Using Dirichlet Marked Hawkes Processes for Insider Threat Detection},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {1},
  pages        = {5:1--5:19},
  year         = {2022},
  url          = {https://doi.org/10.1145/3457908},
  doi          = {10.1145/3457908},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/ZhengYW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/ZibakSS22,
  author       = {Adam Zibak and
                  Clemens Sauerwein and
                  Andrew C. Simpson},
  title        = {Threat Intelligence Quality Dimensions for Research and Practice},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {4},
  pages        = {44:1--44:22},
  year         = {2022},
  url          = {https://doi.org/10.1145/3484202},
  doi          = {10.1145/3484202},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/ZibakSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/ZimmerBF22,
  author       = {Ephraim Zimmer and
                  Christian Burkert and
                  Hannes Federrath},
  title        = {Insiders Dissected: New Foundations and a Systematisation of the Research
                  on Insiders},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {1},
  pages        = {2:1--2:35},
  year         = {2022},
  url          = {https://doi.org/10.1145/3473674},
  doi          = {10.1145/3473674},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/ZimmerBF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/0001WN21,
  author       = {Pratim Datta and
                  Mark Whitmore and
                  Joseph K. Nwankpa},
  title        = {A Perfect Storm: Social Media News, Psychological Biases, and {AI}},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {2},
  pages        = {15:1--15:21},
  year         = {2021},
  url          = {https://doi.org/10.1145/3428157},
  doi          = {10.1145/3428157},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/0001WN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/AksoyPY21,
  author       = {Sinan G. Aksoy and
                  Emilie Purvine and
                  Stephen J. Young},
  title        = {Directional Laplacian Centrality for Cyber Situational Awareness},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {4},
  pages        = {28:1--28:28},
  year         = {2021},
  url          = {https://doi.org/10.1145/3450286},
  doi          = {10.1145/3450286},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/AksoyPY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/AleroudYP0K21,
  author       = {Ahmed Aleroud and
                  Fan Yang and
                  Sai C. Pallaprolu and
                  Zhiyuan Chen and
                  George Karabatis},
  title        = {Anonymization of Network Traces Data through Condensation-based Differential
                  Privacy},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {4},
  pages        = {30:1--30:23},
  year         = {2021},
  url          = {https://doi.org/10.1145/3425401},
  doi          = {10.1145/3425401},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/AleroudYP0K21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Amiet21,
  author       = {Nils Amiet},
  title        = {Blockchain Vulnerabilities in Practice},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {2},
  pages        = {8:1--8:7},
  year         = {2021},
  url          = {https://doi.org/10.1145/3407230},
  doi          = {10.1145/3407230},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Amiet21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/DashKP21,
  author       = {Pritam Dash and
                  Mehdi Karimibiuki and
                  Karthik Pattabiraman},
  title        = {Stealthy Attacks against Robotic Vehicles Protected by Control-based
                  Intrusion Detection Techniques},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {1},
  pages        = {7:1--7:25},
  year         = {2021},
  url          = {https://doi.org/10.1145/3419474},
  doi          = {10.1145/3419474},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/DashKP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/DesmetSVJJ21,
  author       = {Lieven Desmet and
                  Jan Spooren and
                  Thomas Vissers and
                  Peter Janssen and
                  Wouter Joosen},
  title        = {Premadoma: An Operational Solution to Prevent Malicious Domain Name
                  Registrations in the .eu {TLD}},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {1},
  pages        = {2:1--2:24},
  year         = {2021},
  url          = {https://doi.org/10.1145/3419476},
  doi          = {10.1145/3419476},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/DesmetSVJJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/DykstraRSHM21,
  author       = {Josiah Dykstra and
                  Neil C. Rowe and
                  Timothy J. Shimeall and
                  Angela Horneman and
                  Marisa Midler},
  title        = {Introduction: On the Nature of Situational Awareness},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {4},
  pages        = {25:1--25:3},
  year         = {2021},
  url          = {https://doi.org/10.1145/3462334},
  doi          = {10.1145/3462334},
  timestamp    = {Fri, 22 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/DykstraRSHM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/GencLS21,
  author       = {Ziya Alper Gen{\c{c}} and
                  Gabriele Lenzini and
                  Daniele Sgandurra},
  title        = {Cut-and-Mouse and Ghost Control: Exploiting Antivirus Software with
                  Synthesized Inputs},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {1},
  pages        = {4:1--4:23},
  year         = {2021},
  url          = {https://doi.org/10.1145/3431286},
  doi          = {10.1145/3431286},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/GencLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/GlazerSS21,
  author       = {Amanda K. Glazer and
                  Jacob V. Spertus and
                  Philip B. Stark},
  title        = {More Style, Less Work: Card-style Data Decrease Risk-limiting Audit
                  Sample Sizes},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {4},
  pages        = {32:1--32:15},
  year         = {2021},
  url          = {https://doi.org/10.1145/3457907},
  doi          = {10.1145/3457907},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/GlazerSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Ham21,
  author       = {Jeroen van der Ham},
  title        = {Toward a Better Understanding of "Cybersecurity"},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {3},
  pages        = {18:1--18:3},
  year         = {2021},
  url          = {https://doi.org/10.1145/3442445},
  doi          = {10.1145/3442445},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Ham21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/HappaAHBGC21,
  author       = {Jassim Happa and
                  Ioannis Agrafiotis and
                  Martin Helmhout and
                  Thomas Bashford{-}Rogers and
                  Michael Goldsmith and
                  Sadie Creese},
  title        = {Assessing a Decision Support Tool for {SOC} Analysts},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {3},
  pages        = {22:1--22:35},
  year         = {2021},
  url          = {https://doi.org/10.1145/3430753},
  doi          = {10.1145/3430753},
  timestamp    = {Fri, 22 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/HappaAHBGC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/HappaBRGC21,
  author       = {Jassim Happa and
                  Thomas Bashford{-}Rogers and
                  Alastair Janse van Rensburg and
                  Michael Goldsmith and
                  Sadie Creese},
  title        = {Deception in Network Defences Using Unpredictability},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {4},
  pages        = {29:1--29:26},
  year         = {2021},
  url          = {https://doi.org/10.1145/3450973},
  doi          = {10.1145/3450973},
  timestamp    = {Fri, 22 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/HappaBRGC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/HuangZB21,
  author       = {Teng{-}Chieh Huang and
                  Razieh Nokhbeh Zaeem and
                  K. Suzanne Barber},
  title        = {Identifying Real-world Credible Experts in the Financial Domain},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {2},
  pages        = {17:1--17:14},
  year         = {2021},
  url          = {https://doi.org/10.1145/3446783},
  doi          = {10.1145/3446783},
  timestamp    = {Fri, 22 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/HuangZB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/IliouKTKVK21,
  author       = {Christos Iliou and
                  Theodoros Kostoulas and
                  Theodora Tsikrika and
                  Vasilis Katos and
                  Stefanos Vrochidis and
                  Ioannis Kompatsiaris},
  title        = {Detection of Advanced Web Bots by Combining Web Logs with Mouse Behavioural
                  Biometrics},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {3},
  pages        = {24:1--24:26},
  year         = {2021},
  url          = {https://doi.org/10.1145/3447815},
  doi          = {10.1145/3447815},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/IliouKTKVK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/JacobsREAR21,
  author       = {Jay Jacobs and
                  Sasha Romanosky and
                  Benjamin Edwards and
                  Idris Adjerid and
                  Michael Roytman},
  title        = {Exploit Prediction Scoring System {(EPSS)}},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {3},
  pages        = {20:1--20:17},
  year         = {2021},
  url          = {https://doi.org/10.1145/3436242},
  doi          = {10.1145/3436242},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/JacobsREAR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Konstantinovskiy21,
  author       = {Lev Konstantinovskiy and
                  Oliver Price and
                  Mevan Babakar and
                  Arkaitz Zubiaga},
  title        = {Toward Automated Factchecking: Developing an Annotation Schema and
                  Benchmark for Consistent Automated Claim Detection},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {2},
  pages        = {14:1--14:16},
  year         = {2021},
  url          = {https://doi.org/10.1145/3412869},
  doi          = {10.1145/3412869},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Konstantinovskiy21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/KumarIP21,
  author       = {Rajesh Kumar and
                  Can Isik and
                  Vir V. Phoha},
  title        = {Treadmill Assisted Gait Spoofing {(TAGS):} An Emerging Threat to Wearable
                  Sensor-based Gait Authentication},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {3},
  pages        = {23:1--23:17},
  year         = {2021},
  url          = {https://doi.org/10.1145/3442151},
  doi          = {10.1145/3442151},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/KumarIP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/LampR0A21,
  author       = {Josephine Lamp and
                  Carlos E. Rubio{-}Medrano and
                  Ziming Zhao and
                  Gail{-}Joon Ahn},
  title        = {\emph{ExSol}: Collaboratively Assessing Cybersecurity Risks for Protecting
                  Energy Delivery Systems},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {3},
  pages        = {21:1--21:23},
  year         = {2021},
  url          = {https://doi.org/10.1145/3428156},
  doi          = {10.1145/3428156},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/LampR0A21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/McCorryMTS021,
  author       = {Patrick McCorry and
                  Maryam Mehrnezhad and
                  Ehsan Toreini and
                  Siamak F. Shahandashti and
                  Feng Hao},
  title        = {On Secure E-Voting over Blockchain},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {4},
  pages        = {33:1--33:13},
  year         = {2021},
  url          = {https://doi.org/10.1145/3461461},
  doi          = {10.1145/3461461},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/McCorryMTS021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Metcalf21,
  author       = {Leigh Metcalf},
  title        = {Editorial on the Special Issue on Election Security},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {4},
  pages        = {31:1},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471534},
  doi          = {10.1145/3471534},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Metcalf21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/MetcalfS21,
  author       = {Leigh Metcalf and
                  Jonathan M. Spring},
  title        = {The Ecosystem of Detection and Blocklisting of Domain Generation},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {3},
  pages        = {19:1--19:22},
  year         = {2021},
  url          = {https://doi.org/10.1145/3423951},
  doi          = {10.1145/3423951},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/MetcalfS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/NakatsukaPT21,
  author       = {Yoshimichi Nakatsuka and
                  Andrew Paverd and
                  Gene Tsudik},
  title        = {PDoT: Private DNS-over-TLS with {TEE} Support},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {1},
  pages        = {3:1--3:22},
  year         = {2021},
  url          = {https://doi.org/10.1145/3431171},
  doi          = {10.1145/3431171},
  timestamp    = {Fri, 22 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/NakatsukaPT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/PerdisciLDLKS21,
  author       = {Roberto Perdisci and
                  Martina Lindorfer and
                  Adam Doup{\'{e}} and
                  Andrea Lanzi and
                  Alexandros Kapravelos and
                  Gianluca Stringhini},
  title        = {Introduction to the ACSAC'19 Special Issue - Vol. 2},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {1},
  pages        = {1:1--1:2},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437253},
  doi          = {10.1145/3437253},
  timestamp    = {Fri, 22 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/PerdisciLDLKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/RingODWNS21,
  author       = {John H. Ring and
                  Colin Michael Van Oort and
                  Samson Durst and
                  Vanessa White and
                  Joseph P. Near and
                  Christian Skalka},
  title        = {Methods for Host-based Intrusion Detection with Deep Learning},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {4},
  pages        = {26:1--26:29},
  year         = {2021},
  url          = {https://doi.org/10.1145/3461462},
  doi          = {10.1145/3461462},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/RingODWNS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Samtani0BC21,
  author       = {Sagar Samtani and
                  Weifeng Li and
                  Victor A. Benjamin and
                  Hsinchun Chen},
  title        = {Informing Cyber Threat Intelligence through Dark Web Situational Awareness:
                  The AZSecure Hacker Assets Portal},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {4},
  pages        = {27:1--27:10},
  year         = {2021},
  url          = {https://doi.org/10.1145/3450972},
  doi          = {10.1145/3450972},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Samtani0BC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/SikderBU21,
  author       = {Amit Kumar Sikder and
                  Leonardo Babun and
                  A. Selcuk Uluagac},
  title        = {Aegis+: {A} Context-aware Platform-independent Security Framework
                  for Smart Home Systems},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {1},
  pages        = {6:1--6:33},
  year         = {2021},
  url          = {https://doi.org/10.1145/3428026},
  doi          = {10.1145/3428026},
  timestamp    = {Fri, 22 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/SikderBU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/SpringI21,
  author       = {Jonathan M. Spring and
                  Phyllis Illari},
  title        = {Review of Human Decision-making during Computer Security Incident
                  Analysis},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {2},
  pages        = {11:1--11:47},
  year         = {2021},
  url          = {https://doi.org/10.1145/3427787},
  doi          = {10.1145/3427787},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/SpringI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/TewariZKBA21,
  author       = {Shubhra Tewari and
                  Renos Zabounidis and
                  Ammina Kothari and
                  Reynold Bailey and
                  Cecilia Ovesdotter Alm},
  title        = {Perceptions of Human and Machine-Generated Articles},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {2},
  pages        = {12:1--12:16},
  year         = {2021},
  url          = {https://doi.org/10.1145/3428158},
  doi          = {10.1145/3428158},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/TewariZKBA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/UsuiOIKIMM21,
  author       = {Toshinori Usui and
                  Yuto Otsuki and
                  Tomonori Ikuse and
                  Yuhei Kawakoya and
                  Makoto Iwamura and
                  Jun Miyoshi and
                  Kanta Matsuura},
  title        = {Automatic Reverse Engineering of Script Engine Binaries for Building
                  Script {API} Tracers},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {1},
  pages        = {5:1--5:31},
  year         = {2021},
  url          = {https://doi.org/10.1145/3416126},
  doi          = {10.1145/3416126},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/UsuiOIKIMM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/ValechaSVKAR21,
  author       = {Rohit Valecha and
                  Srikrishna Krishnarao Srinivasan and
                  Tejaswi Volety and
                  K. Hazel Kwon and
                  Manish Agrawal and
                  H. Raghav Rao},
  title        = {Fake News Sharing: An Investigation of Threat and Coping Cues in the
                  Context of the Zika Virus},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {2},
  pages        = {16:1--16:16},
  year         = {2021},
  url          = {https://doi.org/10.1145/3410025},
  doi          = {10.1145/3410025},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/ValechaSVKAR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/WangIBSPW21,
  author       = {Li Wang and
                  S. Sitharama Iyengar and
                  Amith K. Belman and
                  Pawel Sniatala and
                  Vir V. Phoha and
                  Changsheng Wan},
  title        = {Game Theory based Cyber-Insurance to Cover Potential Loss from Mobile
                  Malware Exploitation},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {2},
  pages        = {9:1--9:24},
  year         = {2021},
  url          = {https://doi.org/10.1145/3409959},
  doi          = {10.1145/3409959},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/WangIBSPW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Woods0S21,
  author       = {Daniel W. Woods and
                  Tyler Moore and
                  Andrew C. Simpson},
  title        = {The County Fair Cyber Loss Distribution: Drawing Inferences from Insurance
                  Prices},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {2},
  pages        = {10:1--10:21},
  year         = {2021},
  url          = {https://doi.org/10.1145/3434403},
  doi          = {10.1145/3434403},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Woods0S21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Zafarani0PA21,
  author       = {Reza Zafarani and
                  Huan Liu and
                  Vir V. Phoha and
                  Javad Azimi},
  title        = {Inroduction on Recent Trends and Perspectives in Fake News Research},
  journal      = {{DTRAP}},
  volume       = {2},
  number       = {2},
  pages        = {13:1--13:3},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448634},
  doi          = {10.1145/3448634},
  timestamp    = {Fri, 22 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Zafarani0PA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/0001JPZ20,
  author       = {Xinyi Zhou and
                  Atishay Jain and
                  Vir V. Phoha and
                  Reza Zafarani},
  title        = {Fake News Early Detection: {A} Theory-driven Model},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {2},
  pages        = {12:1--12:25},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377478},
  doi          = {10.1145/3377478},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/0001JPZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/AgadakosDJWASWK20,
  author       = {Ioannis Agadakos and
                  Nicholas DeMarinis and
                  Di Jin and
                  Kent Williams{-}King and
                  Jearson Alfajardo and
                  Benjamin Shteinfeld and
                  David Williams{-}King and
                  Vasileios P. Kemerlis and
                  Georgios Portokalidis},
  title        = {Large-scale Debloating of Binary Shared Libraries},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {4},
  pages        = {19:1--19:28},
  year         = {2020},
  url          = {https://doi.org/10.1145/3414997},
  doi          = {10.1145/3414997},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/AgadakosDJWASWK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Burton20,
  author       = {Ren{\'{e}}e Burton},
  title        = {Unsupervised Learning Techniques for Malware Characterization: Understanding
                  Certain DNS-based DDoS Attacks},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {3},
  pages        = {14:1--14:26},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377869},
  doi          = {10.1145/3377869},
  timestamp    = {Tue, 26 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Burton20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/ChevalierPDH20,
  author       = {Ronny Chevalier and
                  David Plaquin and
                  Chris I. Dalton and
                  Guillaume Hiet},
  title        = {Intrusion Survivability for Commodity Operating Systems},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {4},
  pages        = {21:1--21:30},
  year         = {2020},
  url          = {https://doi.org/10.1145/3419471},
  doi          = {10.1145/3419471},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/ChevalierPDH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/ChuaYGL20,
  author       = {Mark Yep{-}Kui Chua and
                  George O. M. Yee and
                  Yuan Xiang Gu and
                  Chung{-}Horng Lung},
  title        = {Threats to Online Advertising and Countermeasures: {A} Technical Survey},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {2},
  pages        = {11:1--11:27},
  year         = {2020},
  url          = {https://doi.org/10.1145/3374136},
  doi          = {10.1145/3374136},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/ChuaYGL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/CormackH20,
  author       = {Andrew Cormack and
                  Jeroen van der Ham},
  title        = {Introduction to the {FIRST} Special Issue},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {1},
  pages        = {2:1--2:3},
  year         = {2020},
  url          = {https://doi.org/10.1145/3380746},
  doi          = {10.1145/3380746},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/CormackH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/DurvauxD20,
  author       = {Fran{\c{c}}ois Durvaux and
                  Marc Durvaux},
  title        = {SCA-Pitaya: {A} Practical and Affordable Side-Channel Attack Setup
                  for Power Leakage-Based Evaluations},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {1},
  pages        = {3:1--3:16},
  year         = {2020},
  url          = {https://doi.org/10.1145/3371393},
  doi          = {10.1145/3371393},
  timestamp    = {Tue, 26 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/DurvauxD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/GajraniTL0ZG20,
  author       = {Jyoti Gajrani and
                  Meenakshi Tripathi and
                  Vijay Laxmi and
                  Gaurav Somani and
                  Akka Zemmari and
                  Manoj Singh Gaur},
  title        = {\emph{Vulvet}: Vetting of Vulnerabilities in Android Apps to Thwart
                  Exploitation},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {2},
  pages        = {10:1--10:25},
  year         = {2020},
  url          = {https://doi.org/10.1145/3376121},
  doi          = {10.1145/3376121},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/GajraniTL0ZG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/GutzwillerDP20,
  author       = {Robert S. Gutzwiller and
                  Josiah Dykstra and
                  Bryan D. Payne},
  title        = {Gaps and Opportunities in Situational Awareness for Cybersecurity},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {3},
  pages        = {18:1--18:6},
  year         = {2020},
  url          = {https://doi.org/10.1145/3384471},
  doi          = {10.1145/3384471},
  timestamp    = {Tue, 26 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/GutzwillerDP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/KarimCHCB20,
  author       = {Imtiaz Karim and
                  Fabrizio Cicala and
                  Syed Rafiul Hussain and
                  Omar Chowdhury and
                  Elisa Bertino},
  title        = {ATFuzzer: Dynamic Analysis Framework of {AT} Interface for Android
                  Smartphones},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {4},
  pages        = {23:1--23:29},
  year         = {2020},
  url          = {https://doi.org/10.1145/3416125},
  doi          = {10.1145/3416125},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/KarimCHCB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/KohlrauschB20,
  author       = {Jan Kohlrausch and
                  Eugene A. Brin},
  title        = {{ARIMA} Supplemented Security Metrics for Quality Assurance and Situational
                  Awareness},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {1},
  pages        = {6:1--6:21},
  year         = {2020},
  url          = {https://doi.org/10.1145/3376926},
  doi          = {10.1145/3376926},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/KohlrauschB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Koot20,
  author       = {Matthijs R. Koot},
  title        = {Field Note on {CVE-2019-11510:} Pulse Connect Secure {SSL-VPN} in
                  the Netherlands},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {2},
  pages        = {13:1--13:7},
  year         = {2020},
  url          = {https://doi.org/10.1145/3382765},
  doi          = {10.1145/3382765},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Koot20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/LakhotiaM20,
  author       = {Arun Lakhotia and
                  Leigh Metcalf},
  title        = {Digital Threats: Research and Practice Inaugural Issue Editorial},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {1},
  pages        = {1:1--1:3},
  year         = {2020},
  url          = {https://doi.org/10.1145/3380320},
  doi          = {10.1145/3380320},
  timestamp    = {Tue, 26 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/LakhotiaM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/LaurenzaLM20,
  author       = {Giuseppe Laurenza and
                  Riccardo Lazzeretti and
                  Luca Mazzotti},
  title        = {Malware Triage for Early Identification of Advanced Persistent Threat
                  Activities},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {3},
  pages        = {16:1--16:17},
  year         = {2020},
  url          = {https://doi.org/10.1145/3386581},
  doi          = {10.1145/3386581},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/LaurenzaLM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/OsmanMHY20,
  author       = {Tousif Osman and
                  Mohammad Mannan and
                  Urs Hengartner and
                  Amr M. Youssef},
  title        = {Securing Applications against Side-channel Attacks through Resource
                  Access Veto},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {4},
  pages        = {22:1--22:29},
  year         = {2020},
  url          = {https://doi.org/10.1145/3416124},
  doi          = {10.1145/3416124},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/OsmanMHY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/PalitMP20,
  author       = {Tapti Palit and
                  Fabian Monrose and
                  Michalis Polychronakis},
  title        = {Mitigating Data-only Attacks by Protecting Memory-resident Sensitive
                  Data},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {4},
  pages        = {20:1--20:26},
  year         = {2020},
  url          = {https://doi.org/10.1145/3419475},
  doi          = {10.1145/3419475},
  timestamp    = {Tue, 26 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/PalitMP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/PerdisciLDLKS20,
  author       = {Roberto Perdisci and
                  Martina Lindorfer and
                  Adam Doup{\'{e}} and
                  Andrea Lanzi and
                  Alexandros Kapravelos and
                  Gianluca Stringhini},
  title        = {Introduction to the ACSAC'19 Special Issue - Part 1},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {4},
  pages        = {19e:1--19e:3},
  year         = {2020},
  url          = {https://doi.org/10.1145/3437251},
  doi          = {10.1145/3437251},
  timestamp    = {Tue, 26 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/PerdisciLDLKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Sacher20,
  author       = {Desiree Sacher},
  title        = {Fingerpointing False Positives: How to Better Integrate Continuous
                  Improvement into Security Monitoring},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {1},
  pages        = {7:1--7:7},
  year         = {2020},
  url          = {https://doi.org/10.1145/3370084},
  doi          = {10.1145/3370084},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Sacher20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Sanchez-RolaBS20,
  author       = {Iskander S{\'{a}}nchez{-}Rola and
                  Davide Balzarotti and
                  Igor Santos},
  title        = {Cookies from the Past: Timing Server-side Request Processing Code
                  for History Sniffing},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {4},
  pages        = {24:1--24:24},
  year         = {2020},
  url          = {https://doi.org/10.1145/3419473},
  doi          = {10.1145/3419473},
  timestamp    = {Tue, 26 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Sanchez-RolaBS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/ScofieldMK20,
  author       = {Daniel Scofield and
                  Craig Miles and
                  Stephen Kuhn},
  title        = {Automated Model Learning for Accurate Detection of Malicious Digital
                  Documents},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {3},
  pages        = {15:1--15:21},
  year         = {2020},
  url          = {https://doi.org/10.1145/3379505},
  doi          = {10.1145/3379505},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/ScofieldMK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/ShuklaKMPJP20,
  author       = {Diksha Shukla and
                  Partha Pratim Kundu and
                  Ravichandra Malapati and
                  Sujit Poudel and
                  Zhanpeng Jin and
                  Vir V. Phoha},
  title        = {Thinking Unveiled: An Inference and Correlation Model to Attack {EEG}
                  Biometrics},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {2},
  pages        = {9:1--9:29},
  year         = {2020},
  url          = {https://doi.org/10.1145/3374137},
  doi          = {10.1145/3374137},
  timestamp    = {Tue, 24 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/ShuklaKMPJP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/Steinhauser020,
  author       = {Anton{\'{\i}}n Steinhauser and
                  Petr Tuma},
  title        = {Database Traffic Interception for Graybox Detection of Stored and
                  Context-sensitive {XSS}},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {3},
  pages        = {17:1--17:23},
  year         = {2020},
  url          = {https://doi.org/10.1145/3399668},
  doi          = {10.1145/3399668},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/Steinhauser020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/TienCBK20,
  author       = {Chin{-}Wei Tien and
                  Shang{-}Wen Chen and
                  Tao Ban and
                  Sy{-}Yen Kuo},
  title        = {Machine Learning Framework to Analyze IoT Malware Using {ELF} and
                  Opcode Features},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {1},
  pages        = {5:1--5:19},
  year         = {2020},
  url          = {https://doi.org/10.1145/3378448},
  doi          = {10.1145/3378448},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/TienCBK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/ToornS20,
  author       = {Olivier van der Toorn and
                  Anna Sperotto},
  title        = {Looking Beyond the Horizon: Thoughts on Proactive Detection of Threats},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {1},
  pages        = {4:1--4:13},
  year         = {2020},
  url          = {https://doi.org/10.1145/3373639},
  doi          = {10.1145/3373639},
  timestamp    = {Tue, 26 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/ToornS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/UkropKM20,
  author       = {Martin Ukrop and
                  Lydia Kraus and
                  Vashek Matyas},
  title        = {Will You Trust This {TLS} Certificate?: Perceptions of People Working
                  in {IT} (Extended Version)},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {4},
  pages        = {25:1--25:29},
  year         = {2020},
  url          = {https://doi.org/10.1145/3419472},
  doi          = {10.1145/3419472},
  timestamp    = {Tue, 26 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/UkropKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/WakedMY20,
  author       = {Louis Waked and
                  Mohammad Mannan and
                  Amr M. Youssef},
  title        = {The Sorry State of {TLS} Security in Enterprise Interception Appliances},
  journal      = {{DTRAP}},
  volume       = {1},
  number       = {2},
  pages        = {8:1--8:26},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372802},
  doi          = {10.1145/3372802},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/WakedMY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}