- Saikiran Subbagari:
Counter Measures to Combat Money Laundering in the New Digital Age. DTRAP 5(2): 17:1-17:13 (2024) - Scarlett Taviss, Steven H. H. Ding, Mohammad Zulkernine, Philippe Charland, Sudipta Acharya:
Asm2Seq: Explainable Assembly Code Functional Summary Generation for Reverse Engineering and Vulnerability Analysis. DTRAP 5(1): 6:1-6:25 (2024) - Akaki Tsunoda:
Demonstrating Spoofability of an Originating Number when Sending an SMS using SMPP. DTRAP 5(1): 12:1-12:13 (2024) - Julia Wunder, Alan Corona, Andreas Hammer, Zinaida Benenson:
On NVD Users' Attitudes, Experiences, Hopes, and Hurdles. DTRAP 5(3): 33:1-33:19 (2024) - 2023
- Mengfei Ren, Xiaolei Ren, Huadong Feng, Jiang Ming, Yu Lei:
Security Analysis of Zigbee Protocol Implementation via Device-agnostic Fuzzing. DTRAP 4(1): 9:1-9:24 (2023) - Anna Cartwright, Edward J. Cartwright:
The Economics of Ransomware Attacks on Integrated Supply Chain Networks. DTRAP 4(4): 56:1-56:14 (2023) - Michael Lang, Lena Yuryna Connolly, Paul Taylor, Phillip J. Corner:
The Evolving Menace of Ransomware: A Comparative Analysis of Pre-pandemic and Mid-pandemic Attacks. DTRAP 4(4): 52:1-52:22 (2023) - S. S. Iyengar, Bhavani Thuraisingham, Marek Zmuda:
Special Issue on Actionable Information for Digital Threat Discovery Using Contextualized Data or Multi Sensor Data Fusion. DTRAP 4(2): 23:1-23:2 (2023) - Jonathan Oakley, Carl R. Worley, Lu Yu, Richard R. Brooks, Ilker Özçelik, Anthony Skjellum, Jihad S. Obeid:
Scrybe: A Secure Audit Trail for Clinical Trial Data Fusion. DTRAP 4(2): 24:1-24:20 (2023) - Andreas Hammer, Mathis Ohlig, Julian Geus, Felix C. Freiling:
A Functional Classification of Forensic Access to Storage and its Legal Implications. DTRAP 4(3): 32:1-32:14 (2023) - Saurabh Kumar, Debadatta Mishra, Biswabandan Panda, Sandeep Kumar Shukla:
InviSeal: A Stealthy Dynamic Analysis Framework for Android Systems. DTRAP 4(1): 13:1-13:31 (2023) - Kibreab Adane, Berhanu Beyene, Mohammed Abebe Yimer:
Single and Hybrid-Ensemble Learning-Based Phishing Website Detection: Examining Impacts of Varied Nature Datasets and Informative Feature Selection Technique. DTRAP 4(3): 46:1-46:27 (2023) - Abdurhman Albasir, Kshirasagar Naik, Ricardo Manzano:
Toward Improving the Security of IoT and CPS Devices: An AI Approach. DTRAP 4(2): 22:1-22:30 (2023) - David Allison, Kieran McLaughlin, Paul Smith:
Goosewolf: An Embedded Intrusion Detection System for Advanced Programmable Logic Controllers. DTRAP 4(4): 59:1-59:19 (2023) - P. Mohan Anand, P. V. Sai Charan, Sandeep K. Shukla:
HiPeR - Early Detection of a Ransomware Attack using Hardware Performance Counters. DTRAP 4(3): 43:1-43:24 (2023) - Giovanni Apruzzese, Pavel Laskov, Edgardo Montes de Oca, Wissam Mallouli, Luis Burdalo Rapa, Athanasios Vasileios Grammatopoulos, Fabio Di Franco:
The Role of Machine Learning in Cybersecurity. DTRAP 4(1): 8:1-8:38 (2023) - Budi Arief, Lena Yuryna Connolly, Julio C. Hernandez-Castro, Allan Liska, Peter Y. A. Ryan:
Introduction to the Special Issue on Ransomware. DTRAP 4(4): 51:1-51:3 (2023) - Louise Axon, Arnau Erola, Ioannis Agrafiotis, Ganbayar Uuganbayar, Michael Goldsmith, Sadie Creese:
Ransomware as a Predator: Modelling the Systemic Risk to Prey. DTRAP 4(4): 55:1-55:38 (2023) - Aydin Aysu, Scott R. Graham:
Introduction to the Special Issue on the Digital Threats of Hardware Security. DTRAP 4(2): 16:1-16:2 (2023) - Pranshu Bajpai, Richard J. Enbody:
Know Thy Ransomware Response: A Detailed Framework for Devising Effective Ransomware Response Strategies. DTRAP 4(4): 57:1-57:19 (2023) - Edita Bajramovic, Christofer Fein, Marius Frinken, Paul Rösler, Felix C. Freiling:
LAVA: Log Authentication and Verification Algorithm. DTRAP 4(3): 35:1-35:17 (2023) - Florian Bausch, Andreas Dewald:
Forensic Examination of Ceph. DTRAP 4(3): 37:1-37:18 (2023) - Rajat Subhra Bhowmick, Rahul Indra, Isha Ganguli, Jayanta Paul, Jaya Sil:
Breaking Captcha System with Minimal Exertion through Deep Learning: Real-time Risk Assessment on Indian Government Websites. DTRAP 4(2): 28:1-28:24 (2023) - Marcus Botacin, Uriel Kosayev, Ruimin Sun:
Introduction to the Special Issue on Memory-Based Malware and Other Unconventional Threats. DTRAP 4(3): 39:1 (2023) - Oleg Boyarchuk, Sebastiano Mariani, Stefano Ortolani, Giovanni Vigna:
Keeping Up with the Emotets: Tracking a Multi-infrastructure Botnet. DTRAP 4(3): 41:1-41:29 (2023) - Robert A. Bridges, Sean Oesch, Michael D. Iannacone, Kelly M. T. Huffer, Brian Jewell, Jeffrey A. Nichols, Brian Weber, Miki E. Verma, Daniel Scofield, Craig Miles, Thomas Plummer, Mark Daniell, Anne M. Tall, Justin M. Beaver, Jared M. Smith:
Beyond the Hype: An Evaluation of Commercially Available Machine Learning-based Malware Detectors. DTRAP 4(2): 27:1-27:22 (2023) - Stefano Carnà, Serena Ferracci, Francesco Quaglia, Alessandro Pellegrini:
Fight Hardware with Hardware: Systemwide Detection and Mitigation of Side-channel Attacks Using Performance Counters. DTRAP 4(1): 5:1-5:24 (2023) - Fran Casino, Nikolaos Totosis, Theodoros Apostolopoulos, Nikolaos Lykousas, Constantinos Patsakis:
Analysis and Correlation of Visual Evidence in Campaigns of Malicious Office Documents. DTRAP 4(2): 26:1-26:19 (2023) - Huili Chen, Cheng Fu, Jishen Zhao, Farinaz Koushanfar:
GALU: A Genetic Algorithm Framework for Logic Unlocking. DTRAP 4(2): 21:1-21:30 (2023) - Kate Connolly, Anna Klempay, Mary McCann, Paul R. Brenner:
Dark Web Marketplaces: Data for Collaborative Threat Intelligence. DTRAP 4(4): 49:1-49:12 (2023)