- 2024
- Ying Yuan, Giovanni Apruzzese, Mauro Conti:
Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors Using Machine Learning. DTRAP 5(2): 16:1-16:51 (2024) - Andreas Hammer, Christian Cerny, Christoph Jung, Christian Eichenmüller, Felix C. Freiling:
Increasing Street Credibility: Cartography-Aware Forensic Analysis of GNSS Trace Validity. DTRAP 5(3): 32:1-32:20 (2024) - Andreas Hammer, Julian Geus, Florian Nicolai, Philip Schütz, Christofer Fein, Felix C. Freiling:
Fit for Forensics: Taxonomy and Common Model for Forensic Analysis of Fitness Trackers. DTRAP 5(3): 29:1-29:20 (2024) - Yurong Chen, Yongsheng Mei, Tian Lan, Guru Venkataramani:
Exploring Effective Fuzzing Strategies to Analyze Communication Protocols. DTRAP 5(1): 11:1-11:22 (2024) - Jing Xu, Stefanos Koffas, Stjepan Picek:
Unveiling the Threat: Investigating Distributed and Centralized Backdoor Attacks in Federated Graph Neural Networks. DTRAP 5(2): 15:1-15:29 (2024) - Rodney Adriko, Jason R. C. Nurse:
Does Cyber Insurance Promote Cyber Security Best Practice? An Analysis Based on Insurance Application Forms. DTRAP 5(3): 25:1-25:39 (2024) - Clement Chimezie Aladi:
Web Application Security: A Pragmatic Exposé. DTRAP 5(2): 20:1-20:9 (2024) - Yechan Bae, Sarbartha Banerjee, Sangho Lee, Marcus Peinado:
Spacelord: Private and Secure Smart Space Sharing. DTRAP 5(2): 14:1-14:27 (2024) - Benjamin E. Bagozzi, Rajni Goel, Brunilda Lugo-de-Fabritz, Kelly Knickmeier-Cummings, Karthik Balasubramanian:
A Framework for Enhancing Social Media Misinformation Detection with Topical-Tactics. DTRAP 5(3): 24:1-24:29 (2024) - Fabrício Ceschin, Marcus Botacin, Albert Bifet, Bernhard Pfahringer, Luiz S. Oliveira, Heitor Murilo Gomes, André Grégio:
Machine Learning (In) Security: A Stream of Problems. DTRAP 5(1): 9:1-9:32 (2024) - Markus Demmel, Thomas Göbel, Patrik Gonçalves, Harald Baier:
Data Synthesis Is Going Mobile - On Community-Driven Dataset Generation for Android Devices. DTRAP 5(3): 30:1-30:19 (2024) - Richard Derbyshire, Benjamin Green, Charl van der Walt, David Hutchison:
Dead Man's PLC: Towards Viable Cyber Extortion for Operational Technology. DTRAP 5(3): 23:1-23:24 (2024) - Andreas Dewald, Thomas Schreck:
Introduction to the IMF 2024 Special Issue. DTRAP 5(3): 26:1-26:2 (2024) - Eva Domschot, Ramyaa Ramyaa, Michael R. Smith:
Improving Automated Labeling for ATT&CK Tactics in Malware Threat Reports. DTRAP 5(1): 2:1-2:16 (2024) - Douglas Everson, Long Cheng:
A Survey on Network Attack Surface Mapping. DTRAP 5(2): 18:1-18:25 (2024) - Yang Gao, Benjamin M. Ampel, Sagar Samtani:
Evading Anti-Phishing Models: A Field Note Documenting an Experience in the Machine Learning Security Evasion Competition 2022. DTRAP 5(1): 7:1-7:8 (2024) - Jalal Ghadermazi, Ankit Shah, Sushil Jajodia:
A Machine Learning and Optimization Framework for Efficient Alert Management in a Cybersecurity Operations Center. DTRAP 5(2): 19:1-19:23 (2024) - Mehdi Akbari Gurabi, Lasse Nitz, Andrej Bregar, Jan Popanda, Christian Siemers, Roman Matzutt, Avikarsha Mandal:
Requirements for Playbook-Assisted Cyber Incident Response, Reporting and Automation. DTRAP 5(3): 34:1-34:11 (2024) - Erik Hemberg, Matthew J. Turner, Nick Rutar, Una-May O'Reilly:
Enhancements to Threat, Vulnerability, and Mitigation Knowledge for Cyber Analytics, Hunting, and Simulations. DTRAP 5(1): 8:1-8:33 (2024) - Andrew E. Hong, Peter P. Malinovsky, Suresh K. Damodaran:
Towards Attack Detection in Multimodal Cyber-Physical Systems with Sticky HDP-HMM based Time Series Analysis. DTRAP 5(1): 5:1-5:21 (2024) - Rucha Bhalchandra Joshi, Subhankar Mishra:
Locally and Structurally Private Graph Neural Networks. DTRAP 5(1): 10:1-10:23 (2024) - Tor J. Langehaug, Scott R. Graham:
CuMONITOR: Continuous Monitoring of Microarchitecture for Software Task Identification and Classification. DTRAP 5(3): 22:1-22:22 (2024) - Christian Lindenmeier, Jan Gruber, Felix C. Freiling:
InvesTEE: A TEE-supported Framework for Lawful Remote Forensic Investigations. DTRAP 5(3): 27:1-27:20 (2024) - Martina Lindorfer, Gianluca Stringhini:
Introduction to the ACSAC'22 Special Issue. DTRAP 5(2): 13:1-13:2 (2024) - Thalita Scharr Rodrigues Pimenta, Fabricio Ceschin, Andre Gregio:
ANDROIDGYNY: Reviewing Clustering Techniques for Android Malware Family Classification. DTRAP 5(1): 3:1-3:35 (2024) - Venkata Sai Charan Putrevu, Subhasis Mukhopadhyay, Subhajit Manna, Nanda Rani, Ansh Vaid, Hrushikesh Chunduri, Mohan Anand Putrevu, Sandeep K. Shukla:
ADAPT: Adaptive Camouflage Based Deception Orchestration For Trapping Advanced Persistent Threats. DTRAP 5(3): 21:1-21:35 (2024) - Ethan M. Rudd, David Krisiloff, Scott E. Coull, Daniel Olszewski, Edward Raff, James Holt:
Efficient Malware Analysis Using Metric Embeddings. DTRAP 5(1): 4:1-4:20 (2024) - Lisa Rzepka, Jenny Ottmann, Felix C. Freiling, Harald Baier:
Causal Inconsistencies Are Normal in Windows Memory Dumps (Too). DTRAP 5(3): 31:1-31:20 (2024) - Sagar Samtani, Edward Raff, Hyrum S. Anderson:
Applied Machine Learning for Information Security. DTRAP 5(1): 1:1-1:5 (2024) - Jakob Stühn, Jan-Niclas Hilgert, Martin Lambertz:
The Hidden Threat: Analysis of Linux Rootkit Techniques and Limitations of Current Detection Tools. DTRAP 5(3): 28:1-28:24 (2024)