SPROOF: A Platform for Issuing and Verifying Documents in a Public Blockchain
Are You Ready When It Counts? IT Consulting Firm’s Information Security Incident Management
Zero-sum Distinguishers for Round-reduced GIMLI Permutation
Identity-based TLS for Cloud of Chips
Mobile Devices as Digital Sextants for Zero-Permission Geolocation
Experiment on Side-Channel Key-Recovery using a Real LPWA End-device
Nonsense Attacks on Google Assistant and Missense Attacks on Amazon Alexa
Remote Exploit Development for Cyber Red Team Computer Network Operations Targeting Industrial Control Systems
Sensing Danger: Exploiting Sensors to Build Covert Channels
Accomplishing Transparency within the General Data Protection Regulation
A Decentralized Solution for Combinatorial Testing of Access Control Engine
Extracting Vehicle Sensor Signals from CAN Logs for Driver Re-identification
Behavioral Biometric Authentication in Android Unlock Patterns through Machine Learning
Hypervisor-assisted Atomic Memory Acquisition in Modern Systems
SC2Share: Smart Contract for Secure Car Sharing
Probabilistic Modeling and Simulation of Vehicular Cyber Attacks: An Application of the Meta Attack Language
Permission-based Risk Signals for App Behaviour Characterization in Android Apps
Locality-Sensitive Hashing for Efficient Web Application Security Testing
Theorising on Information Cascades and Sequential Decision-making for Analysing Security Behaviour
Security Analysis and Efficient Implementation of Code-based Signature Schemes
Robust Person Identification based on DTW Distance of Multiple-Joint Gait Pattern
A Novel Behaviour Profiling Approach to Continuous Authentication for Mobile Applications
Evaluating Security, Privacy and Usability Features of QR Code Readers
In-depth Feature Selection and Ranking for Automated Detection of Mobile Malware
Finding Classification Zone Violations with Anonymized Message Flow Analysis
Usability of Policy Authoring Tools: A Layered Approach
An Order-specified Aggregate Authority-transfer Signature
Automated Incident Response for Industrial Control Systems Leveraging Software-defined Networking
TED: A Container based Tool to Perform Security Risk Assessment for ELF Binaries
Evaluating Privacy Policy Summarization: An Experimental Study among Japanese Users
Towards Aligning GDPR Compliance with Software Development: A Research Agenda
The Common Vulnerability Scoring System vs. Rock Star Vulnerabilities: Why the Discrepancy?
Privacy Preservation of Social Network Users Against Attribute Inference Attacks via Malicious Data Mining
An Image Forgery Detection Solution based on DCT Coefficient Analysis
Smart-card Deployment of an Electronic Voting Protocol
Practical Solutions to Save Bitcoins Applied to an Identity System Proposal
Tracking Data Trajectories in IoT
A Fine-grained General Purpose Secure Storage Facility for Trusted Execution Environment
Sender Authentication for Automotive In-Vehicle Networks through Dual Analog Measurements to Determine the Location of the Transmitter
Predicting CyberSecurity Incidents using Machine Learning Algorithms: A Case Study of Korean SMEs
Accelerate Performance for Elliptic Curve Scalar Multiplication based on NAF by Parallel Computing
Phishing Email Detection based on Named Entity Recognition
Maia: A Language for Mandatory Integrity Controls of Structured Data
Definition and Efficient Construction of Encrypted k–anonymization Scheme
Improved Forensic Recovery of PKZIP Stream Cipher Passwords
Detecting Anomalies by using Self-Organizing Maps in Industrial Environments
AuthLedger: A Novel Blockchain-based Domain Name Authentication Scheme
Mathematical Model to Estimate Loss by Cyber Incident in Japan
Methodology of a Network Simulation in the Context of an Evaluation: Application to an IDS
A Novel Features Set for Internet Traffic Classification using Burstiness
Enhancing Business Process Modelling with Data Protection Compliance: An Ontology-based Proposal
Towards Automated Comprehensive Feature Engineering for Spam Detection
Identification and Extraction of Digital Forensic Evidence from Multimedia Data Sources using Multi-algorithmic Fusion
Monotonic and Non-monotonic Context Delegation
Probabilistic Graphical Model on Detecting Insiders: Modeling with SGD-HMM
Towards Automated Characterization of Malware’s High-level Mechanism using Virtual Machine Introspection
Malicious DNS Traffic in Tor: Analysis and Countermeasures
Threat Modeling and Attack Simulations of Connected Vehicles: A Research Outlook
Attack and Defence Modelling for Attacks via the Speech Interface
The Curious Case of Machine Learning in Malware Detection
Survey and Lessons Learned on Raising SME Awareness about Cybersecurity
SMMDecoy: Detecting GPU Keyloggers using Security by Deception Techniques
Flexible Access Control and Confidentiality over Encrypted Data for Document-based Database
Vulnerabilities in IoT Devices for Smart Home Environment
The HERMENEUT Project: Enterprises Intangible Risk Management via Economic Models based on Simulation of Modern Cyber Attacks
Machine Learning for All: A More Robust Federated Learning Framework
Construction of Secure Internal Networks with Communication Classifying System
A Secure Framework with Remote Configuration of Intellectual Property
Location Privacy Assured Internet of Things
Solving a Hard Instance of Suspicious Behaviour Detection with Sparse Binary Vectors Clustering
Systematic Characterization of a Sequence Group
Deep Neural Networks for Android Malware Detection
A Systematic Approach to Choose the Data Warehouse Architecture
Transfer Learning for Image-based Malware Classification
A Comparative Analysis of Android Malware
Fuzzy Logic Decision based Collaborative Privacy Management Framework for Online Social Networks
Analytical Modelling of Cyber-physical Systems
Spyware Detection using Temporal Logic
Design of an Example Network Protocol for Security Tests Targeting Industrial Automation Systems
Modeling and Simulation of Attacks on Cyber-physical Systems
ZKlaims: Privacy-preserving Attribute-based Credentials using Non-interactive Zero-knowledge Techniques
High-performance Pipelined FPGA Implementation of the Elliptic Curve Cryptography over GF (2n)
I Want to Break Square-free: The 4p − 1 Factorization Method and Its RSA Backdoor Viability
Indirect Data Representation Via Offset Vectoring: A Code-integrity-driven In-memory Data Regeneration Scheme
Potential Impacts in Citizens’ Privacy of using Federated Identity Management to Offer e-Government Services
Attack on a Scheme for Obfuscating and Outsourcing SAT Computations to the Cloud
LASER: Lightweight and Secure Remote Keyless Entry Protocol
Enriching Threat Intelligence Platforms Capabilities
Efficient Secure Floating-point Arithmetic using Shamir Secret Sharing
DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling
BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON Signature Scheme
On the Energy Consumption of Quantum-resistant Cryptographic Software Implementations Suitable for Wireless Sensor Networks
Distributed Anomaly Detection of Single Mote Attacks in RPL Networks
Hunting Traits for Cryptojackers
PRE as a Service within Smart Grid City
Evaluation of Intrusion Detection Systems in IPv6 Networks
A Comparative Study of Misapplied Crypto in Android and iOS Applications
Secure Strassen-Winograd Matrix Multiplication with MapReduce
DABSTERS: Distributed Authorities using Blind Signature to Effect Robust Security in e-Voting
Secure Intersection with MapReduce
“Open Weakness and Vulnerability Modeler” (OVVL): An Updated Approach to Threat Modeling
Differential Privacy meets Verifiable Computation: Achieving Strong Privacy and Integrity Guarantees
On the Efficacy of New Privacy Attacks against 5G AKA
BTG-RKASE: Privacy Preserving Revocable Key Aggregate Searchable Encryption with Fine-grained Multi-delegation & Break-The-Glass Access Control
An Investigation into the “Beautification” of Security Ceremonies
Universal Encoding for Provably Irreversible Data Erasing
Security for Distributed Deep Neural Networks: Towards Data Confidentiality & Intellectual Property Protection
OC-ORAM: Constant Bandwidth ORAM with Smaller Block Size using Oblivious Clear Algorithm
What Are the Threats? (Charting the Threat Models of Security Ceremonies)
A Software-defined Networking-based Detection and Mitigation Approach against KRACK
Master of Puppets: Trusting Silicon in the Fight for Practical Security in Fully Decentralised Peer-to-Peer Networks
PORTOS: Proof of Data Reliability for Real-World Distributed Outsourced Storage
A Robust Anaglyph 3D Video Watermarking based on Multi-sprite Generation
A Tool-assisted Methodology for the Data Protection Impact Assessment
Method for Vector Map Protection based on using of a Watermark Image as a Secondary Carrier
Web Application for Privacy-preserving Scheduling using Secure Computation
LADS: A Live Anomaly Detection System based on Machine Learning Methods
ECDSA-compatible Delegable Undeniable Signature
Here and There at Once, with my Mobile Phone!
Decentralized Privacy-preserving Access for Low Emission Zones
Identity-based Conditional Privacy-Preserving Authentication Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret
Integration of a Secure Physical Element as a Trusted Oracle in a Hyperledger Blockchain
RACE: Randomized Counter Mode of Authenticated Encryption using Cellular Automata
Is Privacy a Myth for Facebook Users?
Dynamic Taint-tracking: Directions for Future Research
Mind the Gap: Finding What Updates Have (Really) Changed in Android Applications
An Analysis of User Behaviors in Phishing eMail using Machine Learning Techniques
Semantic-based Obligation for Context-Based Access Control
Fides: Unleashing the Full Potential of Remote Attestation
An Efficient FHE Scheme to Secure Cloud Computing
PrivySharing: A Blockchain-based Framework for Integrity and Privacy-preserving Data Sharing in Smart Cities
A Taxonomy of Metrics and Tests to Evaluate and Validate Properties of Industrial Intrusion Detection Systems
Entropy and Security of Pseudorandom Number Generators based on Chaotic Iterations
A New Certificateless System Construction for Multiple Key Generator Centers to Secure Device-to-Device Communications
Keystroke Dynamics Anonymization System
A Wizard-based Approach for Secure Code Generation of Single Sign-On and Access Delegation Solutions for Mobile Native Apps
Prying CoW: Inferring Secrets across Virtual Machine Boundaries
Cryptanalysis of Homomorphic Encryption Schemes based on the Aproximate GCD Problem
Reducing Computational Cost in IoT Cyber Security: Case Study of Artificial Immune System Algorithm
Merger & Acquisition: A Comparative Integration Analysis of Third World Country
Scientific Foundation of Models: Towards the Complexity of the Agile Business Model
Mobile Phone Data Statistics as Proxy Indicator for Regional Economic Activity Assessment
Computer-supported Active Transparency for Strategic Open Innovation
Smart Healthcare and Ethical Issues
The Impact of Triple Bottom Line-oriented Environmental Management System on Firms’ Performance in China: Evidence from Yangtze River Delta
Knowledge Basis for Integration of Finance, Economics, Management and IT Business
South Austrian Seniors “vs.” ICT for Healthcare in AAL Pilot Regions
A Toolset to Detect and Classify Active Deformation Areas using Interferometric SAR Data
Fuzzy Estimation of Link Travel Time from a Digital Elevation Model and Road Hierarchy Level
Querying Distributed GIS with GeoPQLJ based on GeoJSON
The e-approximation of the Label Correcting Modification of the Dijkstra's Algorithm
2D-STR: Reducing Spatio-temporal Traffic Datasets by Partitioning and Modelling
Optimizing Sample Patches Selection of CNN to Improve the mIOU on Landslide Detection
Deriving Spelling Variants from User Queries to Improve Geocoding Accuracy
Georeferencing of Road Infrastructure from Photographs using Computer Vision and Deep Learning for Road Safety Applications
Energy Modelling in Rural Areas with Spatial and Temporal Data in Germany and Czech Republic
Mapping Land Cover Types using Sentinel-2 Imagery: A Case Study
Knowledge Models and Image Processing Analysis in Remote Sensing: Examples of Yakutsk (Russia) and Kaunas (Lithuania)
Well Detection in Satellite Images using Convolutional Neural Networks
Monitoring Local Shoreline Changes by Integrating UASs, Airborne LiDAR, Historical Images and Orthophotos
Accuracy Assessment of a Photogrammetric UAV Block by using Different Software and Adopting Diverse Processing Strategies
Accelerating Urban Modelling Algorithms with Artificial Intelligence
GIS Application for Groundwater Vulnerability Assessment: Study Case of Hammam-Bou-hadjar Area-NW of Algeria
Critical Analysis of Urban Vegetation Mapping by Satellite Multispectral and Airborne Hyperspectral Imagery
Optimization of Rainwater Harvesting Sites using GIS
A Novel 2.5D Shadow Calculation Algorithm for Urban Environment
A Method of Terrain Crack Removal Suited for Large Differences in Boundary LoD
Skeleton Line Extraction Method in the Areas with Dense Junctions Considering Stroke Features
The Story Map for Metaxa Mine (Santorini, Greece): A Unique Site Where History and Volcanology Meet Each Other
The Study of Discrimination of Remotely Sensed Data for Designing the Separation Technique between Cassava and Sugarcane Farmland
Reaction-diffusion Model Describing the Morphogenesis of Urban Systems in the US
Sentinel-2 based Remote Evaluation System for a Harvest Monitoring of Sugarcane Area in the Northeast Thailand Contract Farming
Workflows for Virtual Reality Visualisation and Navigation Scenarios in Earth Sciences
Exploring Bot Pervasiveness in Global Cities using Publicly Available Volunteered Geographic Information
Management and Creation of a New Tourist Route in the National Park of the Sibillini Mountains using GIS Software, for Economic Development
Socio-economic and Demographic Trends in EU Rural Areas: An Indicator-based Assessment with LUISA Territorial Modelling Platform
GNSS Positioning using Android Smartphone
GIS-based Livability Assessment: A Practical Tool, a Promising Solution?
Homography and Image Processing Techniques for Cadastre Object Extraction
3D Point Clouds in PostgreSQL/PostGIS for Applications in GIS and Geodesy
A Point of Interest Intelligent Search Method based on Browsing History
Improving the Performance of Road Network Analysis: The Morandi Bridge Case Study
Spatial Analysis of Drug Poisoning Deaths and Access to Substance-use Disorder Treatment in the United States
Advantages and Difficulties of using Spatial Enablement to Support Public Health in Cities: The PULSE Case Study
Remediation of Coastal Marine Sediment using Iron
Numerical Modelling of the Pollution Distribution from the Underwater Discharge of the Wastewater Treatment Plant near the Heraclean Peninsula of the Crimea under Different Wind Directions
Numerical Modelling of the Circulation and Pollution Transport from Rivers and Wastewater Treatment Plants in the Sochi Coastal Area
Assessment of Extreme Surge Simulation Accuracy in the Sea of Azov for Various Types of Atmospheric Forcing and Ocean Model Parameters
Investigation of Characteristics in Mountain Area with the Aim of Collecting Data for Modelling Flow Turbulent Parameters in a Wind Farm Located in a Coastal Area
Numerical Modelling of High-frequency Internal Waves Generated by River Discharge in Coastal Ocean
Strong Internal Tides in the Strait of Gibraltar: Measurements and Modelling
Numerical Simulation of Coastal Flows with Passive Pollutant by Regularized Hydrodynamic Equations in Shallow Water Approximation
Numerical Simulation of Internal Wave Attractors in Horizontally Elongated Domains with Sloping Boundaries