- Andreas Dewald, Thomas Schreck:
Introduction to the IMF 2023 Special Issue. DTRAP 4(3): 31:1-31:2 (2023) - Maksim Ekin Eren, Juston S. Moore, Erik Skau, Elisabeth Moore, Manish Bhattarai, Gopinath Chennupati, Boian S. Alexandrov:
General-purpose Unsupervised Cyber Anomaly Detection via Non-negative Tensor Factorization. DTRAP 4(1): 6:1-6:28 (2023) - Mattia Falduti, Sergio Tessaris:
Mapping the Interdisciplinary Research on Non-consensual Pornography: Technical and Quantitative Perspectives. DTRAP 4(3): 44:1-44:22 (2023) - Dimitrios Georgoulias, Jens Myrup Pedersen, Morten Falch, Emmanouil Vasilomanolakis:
COVID-19 Vaccination Certificates in the Darkweb. DTRAP 4(1): 7:1-7:17 (2023) - Thomas Göbel, Harald Baier, Frank Breitinger:
Data for Digital Forensics: Why a Discussion on "How Realistic is Synthetic Data" is Dispensable. DTRAP 4(3): 38:1-38:18 (2023) - Pierre Graux, Jean-François Lalande, Valérie Viet Triem Tong, Pierre Wilke:
OATs'inside: Retrieving Object Behaviors From Native-based Obfuscated Android Applications. DTRAP 4(2): 30:1-30:27 (2023) - Jan Gruber, Merlin Humml:
A Formal Treatment of Expressiveness and Relevanceof Digital Evidence. DTRAP 4(3): 33:1-33:16 (2023) - Tobias Hilbig, Thomas Geras, Erwin Kupris, Thomas Schreck:
security.txt Revisited: Analysis of Prevalence and Conformity in 2022. DTRAP 4(3): 36:1-36:17 (2023) - Koen van Hove, Jeroen van der Ham-de Vos, Roland van Rijswijk-Deij:
rpkiller: Threat Analysis of the BGP Resource Public Key Infrastructure. DTRAP 4(4): 58:1-58:24 (2023) - Henry Howland:
CVSS: Ubiquitous and Broken. DTRAP 4(1): 1:1-1:12 (2023) - Angel Hueca, Sharon Mudd, Timothy J. Shimeall:
Introduction to the Special Issue on Information Sharing. DTRAP 4(4): 47:1-47:2 (2023) - Martin Husák, Pavol Sokol, Martin Zádník, Václav Bartos, Martin Horák:
Lessons Learned from Automated Sharing of Intrusion Detection Alerts: The Case of the SABU Platform. DTRAP 4(4): 48:1-48:11 (2023) - Sharifah Roziah Binti Mohd Kassim, Shujun Li, Budi Arief:
Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions. DTRAP 4(3): 45:1-45:24 (2023) - Samantha Klier, Jan Varenkamp, Harald Baier:
Back and Forth - On Automatic Exposure of Origin and Dissemination of Files on Windows. DTRAP 4(3): 34:1-34:17 (2023) - Max Landauer, Markus Wurzenberger, Florian Skopik, Wolfgang Hotwagner, Georg Höld:
AMiner: A Modular Log Data Analysis Pipeline for Anomaly-based Intrusion Detection. DTRAP 4(1): 12:1-12:16 (2023) - Tor J. Langehaug, Brett J. Borghetti, Scott R. Graham:
Classifying Co-resident Computer Programs Using Information Revealed by Resource Contention. DTRAP 4(2): 17:1-17:29 (2023) - Alan Levine, Brett Alan Tucker:
Zero Trust Architecture: Risk Discussion. DTRAP 4(1): 15:1-15:6 (2023) - Karim Lounis, Mohammad Zulkernine:
Lessons Learned: Analysis of PUF-based Authentication Protocols for IoT. DTRAP 4(2): 19:1-19:33 (2023) - Moustafa Mahmoud, Mohammad Mannan, Amr M. Youssef:
APTHunter: Detecting Advanced Persistent Threats in Early Stages. DTRAP 4(1): 11:1-11:31 (2023) - Lionel Morel, Damien Couroussé, Thomas Hiscock:
Code Polymorphism Meets Code Encryption: Confidentiality and Side-channel Protection of Software Components. DTRAP 4(2): 18:1-18:27 (2023) - Michael Mundt, Harald Baier:
Threat-Based Simulation of Data Exfiltration Toward Mitigating Multiple Ransomware Extortions. DTRAP 4(4): 54:1-54:23 (2023) - Luis Puche Rondon, Leonardo Babun, Ahmet Aris, Kemal Akkaya, A. Selcuk Uluagac:
LGuard: Securing Enterprise-IoT Systems against Serial-Based Attacks via Proprietary Communication Buses. DTRAP 4(1): 10:1-10:26 (2023) - Anthony Rose, Scott R. Graham, Jacob J. Krasnov:
IronNetInjector: Weaponizing .NET Dynamic Language Runtime Engines. DTRAP 4(3): 40:1-40:23 (2023) - Ricardo Alejandro Manzano Sanchez, Kshirasagar Naik, Abdurhman Albasir, Marzia Zaman, Nishith Goel:
Detection of Anomalous Behavior of Smartphone Devices using Changepoint Analysis and Machine Learning Techniques. DTRAP 4(1): 2:1-2:28 (2023) - Poushali Sengupta, Sudipta Paul, Subhankar Mishra:
BUDS+: Better Privacy with Converger and Noisy Shuffling. DTRAP 4(2): 25:1-25:23 (2023) - Behnam Shobiri, Mohammad Mannan, Amr M. Youssef:
CDNs' Dark Side: Security Problems in CDN-to-Origin Connections. DTRAP 4(1): 3:1-3:22 (2023) - Shreyas Srinivasa, Jens Myrup Pedersen, Emmanouil Vasilomanolakis:
Gotta Catch 'em All: A Multistage Framework for Honeypot Fingerprinting. DTRAP 4(3): 42:1-42:28 (2023) - Alexander Staves, Antonios Gouglidis, David Hutchison:
An Analysis of Adversary-Centric Security Testing within Information and Operational Technology Environments. DTRAP 4(1): 14:1-14:29 (2023) - Girish Vaidya, T. V. Prabhakar, Nithish K. Gnani, Ryan Shah, Shishir Nagaraja:
Sensor Identification via Acoustic Physically Unclonable Function. DTRAP 4(2): 20:1-20:25 (2023) - Thomas Walshe, Andrew Simpson:
Towards a Greater Understanding of Coordinated Vulnerability Disclosure Policy Documents. DTRAP 4(2): 29:1-29:36 (2023)