Admonita: A Recommendation-based Trust Model for Dynamic Data Integrity
Experiences and Recommendations from Operating a Tor Exit Node at a University
Who Stores the Private Key? An Exploratory Study about User Preferences of Key Management for Blockchain-based Applications
Automatically Extracting Business Level Access Control Requirements from BPMN Models to Align RBAC Policies
Protecting Privacy during a Pandemic Outbreak
Enhanced Information Management in Inter-organisational Planning for Critical Infrastructure Protection: Case and Framework
Model-based Threat and Risk Assessment for Systems Design
Towards Collaborative Cyber Threat Intelligence for Security Management
A Secure Network Scanner Architecture for Asset Management in Strongly Segmented ICS Networks
Canopy: A Learning-based Approach for Automatic Low-and-Slow DDoS Mitigation
On Security Analysis of Periodic Systems: Expressiveness and Complexity
Predicting Security Program Effectiveness in Bring-Your-Own-Device Deployment in Organizations
Automatic Detection of Cyber Security Events from Turkish Twitter Stream and Newspaper Data
Active Directory Kerberoasting Attack: Detection using Machine Learning Techniques
Field Studies on the Impact of Cryptographic Signatures and Encryption on Phishing Emails
Improvement of Secure Multi-Party Multiplication of (k, n) Threshold Secret Sharing Using Only N = k Servers
Towards a Formalisation of Expert’s Knowledge for an Automatic Construction of a Vulnerability Model of a Cyberphysical System
A Novel Simplified Framework to Secure IoT Communications
Linking Biometric Voice Identity with Self-monitoring Health Data as a Temporal-spatial Event Stored in a Mobile Device
DLP-Visor: A Hypervisor-based Data Leakage Prevention System
An Analytic Attack against ARX Addition Exploiting Standard Side-channel Leakage
Bridging Knowledge Gaps in Security Analytics
Continuous Authentication based on Hand Micro-movement during Smartphone Form Filling by Seated Human Subjects
Blockchain based Secured Virtual Machine Image Monitor
The Comparison of Word Embedding Techniques in RNNs for Vulnerability Detection
The Proposal of Double Agent Architecture using Actor-critic Algorithm for Penetration Testing
Two Stage Anomaly Detection for Network Intrusion Detection
Ontology-based Cybersecurity and Resilience Framework
A Permissioned Blockchain-based System for Collaborative Drug Discovery
Windows Malware Binaries in C/C++ GitHub Repositories: Prevalence and Lessons Learned
Optimizing Leak Detection in Open-source Platforms with Machine Learning Techniques
Implementation of Secondary Available Digital Content Protection Schemes using Identity-based Signatures
Towards an Ontology for Enterprise Level Information Security Policy Analysis
Adversarial Machine Learning: A Comparative Study on Contemporary Intrusion Detection Datasets
Profiling and Discriminating of Containerized ML Applications in Digital Data Marketplaces (DDM)
Automatic Detection and Decryption of AES by Monitoring S-Box Access
Parallel Privacy-preserving Computation of Minimum Spanning Trees
Representation of PE Files using LSTM Networks
Understanding How People Weigh the Costs and Benefits of using Facebook
Hydra: Practical Metadata Security for Contact Discovery, Messaging, and Dialing
Sociocultural Influences for Password Definition: An AI-based Study
Efficient Semantic Representation of Network Access Control Configuration for Ontology-based Security Analysis
A Lemon by Any Other Label
Implementing Secure Applications Thanks to an Integrated Secure Element
Automated Black Box Detection of HTTP GET Request-based Access Control Vulnerabilities in Web Applications
An Asynchronous Federated Learning Approach for a Security Source Code Scanner
HyperPass: Secure Password Input Platform
A State Saturation Attack against Massively Multiplayer Online Videogames
Securing the Linux Boot Process: From Start to Finish
Leveraging Dynamic Information for Identity and Access Management: An Extension of Current Enterprise IAM Architecture
Dreaming of Keys: Introducing the Phantom Gradient Attack
Towards Exploring User Perception of a Privacy Sensitive Information Detection Tool
CyExec*: Automatic Generation of Randomized Cyber Range Scenarios
Evaluation of Vulnerability Reproducibility in Container-based Cyber Range
Improving Classification of Malware Families using Learning a Distance Metric
A Dynamic Access Control System based on Situations of Users
From Exposed to Exploited: Drawing the Picture of Industrial Control Systems Security Status in the Internet Age
MADLIRA: A Tool for Android Malware Detection
Securing Orchestrated Containers with BSI Module SYS.1.6
Towards Academic and Skills Credentialing Standards and Distributed Ledger Technologies
Privacy Preserving Services for Intelligent Transportation Systems with Homomorphic Encryption
A Protection against the Extraction of Neural Network Models
Security Property Modeling
Developing Cyber-risk Centric Courses and Training Material for Cyber Ranges: A Systematic Approach
Release-aware In-out Encryption Adjustment in MongoDB Query Processing
Learning from Smartphone Location Data as Anomaly Detection for Behavioral Authentication through Deep Neuroevolution
Accessible Cyber Security: The Next Frontier?
Colluding Covert Channel for Malicious Information Exfiltration in Android Environment
Unconventional Attack against Voting Machines Enlarging the Scope of Cybersecurity Risk Analysis
Experimental Evaluation of Description Logic Concept Learning Algorithms for Static Malware Detection
Towards Formal Security Verification of Over-the-Air Update Protocol: Requirements, Survey and UpKit Case Study
Utilizing Keystroke Dynamics as Additional Security Measure to Protect Account Recovery Mechanism
Remote WebAuthn: FIDO2 Authentication for Less Accessible Devices
Study of Intra- and Inter-user Variance in Password Keystroke Dynamics
Enabling Monetization of Depreciating Data on Blockchains
How to Improve the GDPR Compliance through Consent Management and Access Control
Detecting Cyber Security Attacks against a Microservices Application using Distributed Tracing
An Overview of Cryptographic Accumulators
Malware Classification with Word Embedding Features
Malware Classification using Long Short-term Memory Models
Malware Classification with GMM-HMM Models
A New Dataset for Smartphone Gesture-based Authentication
On Formalising and Analysing the Tweetchain Protocol
Mobile Robots: An Overview of Data and Security
Stopping DNS Rebinding Attacks in the Browser
Checking Contact Tracing App Implementations
Security Issues of Electronic and Mobile Banking
Enforcing Cardinality Constraint in Temporal RBAC
Supporting Cyber Threat Analysis with Service-Oriented Enterprise Modeling
Signer and Message Ambiguity from a Variety of Keys
An Upcycling Tokenization Method for Credit Card Numbers
Ransomware Detection using Markov Chain Models over File Headers
Dynamic Access Control Framework for Enterprise Content Management Systems
AVX-512-based Parallelization of Block Sieving and Bucket Sieving for the General Number Field Sieve Method
A Unified Model to Detect Information Flow and Access Control Violations in Software Architectures
Can a TLS Certificate Be Phishy?
Involving Humans in the Cryptographic Loop: Introduction and Threat Analysis of EEVEHAC
Comparing Classifiers’ Performance under Differential Privacy
Proof-of-Useful-Randomness: Mitigating the Energy Waste in Blockchain Proof-of-Work
A New MILP Model for Matrix Multiplications with Applications to KLEIN and PRINCE
Protecting End User’s Privacy When using Social Login through GDPR Compliance
Hashing to Prime in Zero-Knowledge
Private Set Intersection: Past, Present and Future
BLT+L: Efficient Signatures from Timestamping and Endorsements
Efficient Joint Random Number Generation for Secure Multi-party Computation
Scalable k-anonymous Microaggregation: Exploiting the Tradeoff between Computational Complexity and Information Loss
MMU-based Access Control for Libraries
Statically Identifying XSS using Deep Learning
A Novel Security Framework for Minimization of False Information Dissemination in VANETs: Bayesian Game Formulation
Are You There, Moriarty? Feasibility Study of Internet-based Location for Location-based Access Control Systems
An Extension of the Avalanche Criterion in the Context of c-Differentials
Python and Malware: Developing Stealth and Evasive Malware without Obfuscation
A New Delegated Authentication Protocol based on PRE
SSI Strong Authentication using a Mobile-phone based Identity Wallet Reaching a High Level of Assurance
Armored Twins: Flexible Privacy Protection for Digital Twins through Conditional Proxy Re-Encryption and Multi-Party Computation
Mobile Family Detection through Audio Signals Classification
Towards Integrating Security in Industrial Engineering Design Practices
Practically Efficient RFID Scheme with Constant-time Identification
A Comparison of GKE Protocols based on SIDH
Multi-Party Private Set Intersection Protocols for Practical Applications
Balancing Quality and Efficiency in Private Clustering with Affinity Propagation
Exposure Resilient Public-key Encryption with Keyword Search against Keyword Guessing Attack
Using Program Analysis to Identify the Use of Vulnerable Functions
Automated Symbolic Verification of Telegram’s MTProto 2.0
Compact Variable-base ECC Scalar Multiplication using Euclidean Addition Chains
Secure Computation by Secret Sharing using Input Encrypted with Random Number
Formal Proof of a Vulnerability in Z-Wave IoT Protocol
Formal Analysis of EDHOC Key Establishment for Constrained IoT Devices
The Missing Piece of the ABAC Puzzle: A Modeling Scheme for Dynamic Analysis
A Scalable Bitcoin-based Public Key Certificate Management System
Program Protection through Software-based Hardware Abstraction
Cloud Key Management using Trusted Execution Environment
Model Inversion for Impersonation in Behavioral Authentication Systems
Trace Recovery: Inferring Fine-grained Trace of Energy Data from Aggregates
Preventing Watermark Forging Attacks in a MLaaS Environment
Systematic Evaluation of Probabilistic k-Anonymity for Privacy Preserving Micro-data Publishing and Analysis
RMCCS: RSSI-based Message Consistency Checking Scheme for V2V Communications
Boolean Exponent Splitting
An Improved Live Anomaly Detection System (I-LADS) based on Deep Learning Algorithms
Inferring Flow Table State through Active Fingerprinting in SDN Environments: A Practical Approach
A New Method of Testing Machine Learning Models of Detection for Targeted DDoS Attacks
Comparing Support Vector Machine and Neural Network Classifiers of CVE Vulnerabilities
SecSDN: A Novel Architecture for a Secure SDN
Privacy Aura for Transparent Authentication on Multiple Smart Devices
Proof-of-Forgery for Hash-based Signatures
Trusted Enforcement of Application-specific Security Policies
Storage Friendly Provably Secure Multivariate Identity-Based Signature from Isomorphism of Polynomials Problem
Formal Security Verification of the Station-to-Station based Cell-attachment Procedure of LDACS
RICAV: RIsk based Context-Aware Security Solution for the Intra-Electric Vehicle Network
Verify It Yourself: A Note on Activation Functions’ Influence on Fast DeepFake Detection
GRANEF: Utilization of a Graph Database for Network Forensics
HIJaX: Human Intent JavaScript XSS Generator
User Identification from Time Series of Fitness Data
Privacy Preserving Scalable Authentication Protocol with Partially Trusted Third Party for Distributed Internet-of-Things
Side Channel Counter-measures based on Randomized AMNS Modular Multiplication
C2RBAC: An Extended Capability-Role-Based Access Control with Context Awareness for Dynamic Environments
Can Data Subject Perception of Privacy Risks Be Useful in a Data Protection Impact Assessment?
Goal and Threat Modelling for Driving Automotive Cybersecurity Risk Analysis Conforming to ISO/SAE 21434
Selective Owner-side Encryption in Digital Data Markets: Strategies for Key Derivation
Responding to Living-Off-the-Land Tactics using Just-In-Time Memory Forensics (JIT-MF) for Android
Collateral-Free Trustworthiness-based Personal Lending on a Decentralized Application (DApp)
Investing Data with Untrusted Parties using HE
Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment
Empirical Security and Privacy Analysis of Mobile Symptom Checking Apps on Google Play
BlockJack: Towards Improved Prevention of IP Prefix Hijacking Attacks in Inter-domain Routing via Blockchain
A Framework for Security and Risk Analysis of Enrollment Procedures: Application to Fully-remote Solutions based on eDocuments
Accurate Measurement of the Energy Consumption of Security Functions
Property Inference Attacks on Convolutional Neural Networks: Influence and Implications of Target Model’s Complexity
Classifying Biometric Systems Users among the Doddington Zoo: Application to Keystroke Dynamics
Fair Mutual Authentication
Towards CRYSTALS-Kyber VHDL Implementation
Fast Cramer-Shoup Cryptosystem
Anonymous Attribute-based Credentials in Collaborative Indoor Positioning Systems
Machine Learning Classification of Obfuscation using Image Visualization
PUF based Lightweight Authentication and Key Exchange Protocol for IoT
Vulnerability Metrics for Graph-based Configuration Security
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation
On Chameleon Pseudonymisation and Attribute Compartmentation-as-a-Service
Smart Home based on Internet of Things and Ethical Issues
Academic Network for Strengthening Accounting and Fiscal Research in Post-pandemic Times
Youth: Possible Segment of the Movement for Sustainability in Tourism
The Influence of Context on Value Proposition Co-creation of Online Shopping Platform in China
Morocco's Trade, between Free Trade Agreements and Integration into the African Union: Which Potential for Morocco's Foreign Trade?
The Transition from IAS 39 to IFRS 9 and Its Impact on Financial Performance: Case of a Moroccan Public Financial Institution
Population Mobility Patterns and Monitoring of COVID-19 Restriction Measures in Latvia
Does the Board of Commissioners Affect Tax Avoidance? Evidence from Banking Industry in Indonesia
The SMEs Innovation in Europe
FinTech and Commercial Banks' Performance in China: The Current Status and Lessons Learned from Our Data Analysis
Innovation as Argumentation in Closed and Technology-mediated Open Models
Relationship between Planned Behavior in Front of the Desire That Student Has to Enroll in the Public Accounting Programs on Distance-teaching Mode in Colombia
Trends in Recruitment Information and Communication System using Artificial Intelligence in Industry 4.0
Using SAR Satellite Imagery for Potential Green Roof Retrofitting for Flood Mitigation in Urban Environment
Vertical Accuracy Assessment of ALOS PALSAR, GMTED2010, SRTM and Topodata Digital Elevation Models
Deep Learning Application for Urban Change Detection from Aerial Images
Virtual Outcrops Building in Extreme Logistic Conditions for Data Collection, Geological Mapping, and Teaching: The Santorini’s Caldera Case Study, Greece
Multicriteria Spatial Analysis to Map Artificial Groundwater Recharge Zones: Northern UAE
An Analytical Tool for Georeferenced Sensor Data based on ELK Stack
Multitemporal Remote Sensing for Invasive Prosopis Juliflora Plants Mapping and Monitoring: Sharjah, UAE
A Journey to Salamis Island (Greece) using a GIS Tailored Interactive Story Map Application
Mapping Siberian Arctic Mountain Permafrost Landscapes by Machine Learning Multi-sensors Remote Sensing: Example of Adycha River Valley
Definition of an Enriched GIS Network for Evacuation Planning
Modeling Normal and Extreme Wave Conditions in Callao Bay, Peru using Reanalysis Data
Integrating Population Surveys using Spatial Visual Analytics: A Case Study on Nutrition and Health Indicators of Children under Five in India
Derivation of Wildfire Ignition Index using GIS-MCDA from High-Resolution UAV Imagery Data and Perception Analysis in Settlement Sali, Dugi Otok Island (Croatia)
Derivation of Urban Planning Indicators (UPIs) using Worldview-3 Imagery and GEOBIA Method for Split Settlement, Croatia
Civic-Tech and Volunteered Geographic Information under the COVID-19 Pandemic: A Japanese Case Study
Study on Carrying Capacity of Resources in Danjiangkou Reservoir Area based on GIS Technologies
Deploying Urban Agricultural System for an Innovative and Sustainable Urban Renewal
A Study of Higher Order Volume Scattering in a Layer of Discrete Random Scatterers
Study on Ground Motions in Southwest Bulgaria based on in-Situ and Satellite Data
Evaluating a Convolutional Neural Network and a Mosaic Image Database for Land Use Segmentation in the Brazilian Amazon Region
A New Soil Degradation Method Analysis by Sentinel 2 Images Combining Spectral Indices and Statistics Analysis: Application to the Cameroonians Shores of Lake Chad and Its Hinterland
Vegetation Filtering using Colour for Monitoring Applications from Photogrammetric Data
A Comparison of Interpolation Techniques in Producing a DEM from the 5 m National Geospatial Institute (NGI) Contours
An Improved Approach for Effective Describing Geometric Data in ifcOWL through WKT High Order Expressions
Multi-Temporal Inundated Areas Monitoring Made Easy: The Case of Kerkini Lake in Greece
Recent Advances in Land Surface Phenology Estimation with Multispectral Sensing
Air and Water Quality Improvement during COVID-19 Lockdown
Spatial K-anonymity: A Privacy-preserving Method for COVID-19 Related Geo-spatial Technologies