Security of Digital Banking Systems in Poland: Users Study 2019
Comparison of the Paillier and ElGamal Cryptosystems for Smart Grid Aggregation Protocols
Privacy-preserving Surveillance Methods using Homomorphic Encryption
Maturity Modelling to Prepare for Cyber Crisis Escalation and Management
Translating Data Protection into Software Requirements
Revisiting Higher-order Computational Attacks against White-box Implementations
Modeling Cyber Threat Intelligence
Integration of Data Envelopment Analysis in Business Process Models: A Novel Approach to Measure Information Security
Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach
An Approach to Secure Legacy Software Systems
Is Ethereum’s ProgPoW ASIC Resistant?
Exploring Vulnerabilities in Solidity Smart Contract
Quantifying the Significance of Cybersecurity Text through Semantic Similarity and Named Entity Recognition
A Comparison of Blockchain-based PKI Implementations
A Domain-specific Modeling Framework for Attack Surface Modeling
AMNESIA: A Technical Solution towards GDPR-compliant Machine Learning
Visualizing Syscalls using Self-organizing Maps for System Intrusion Detection
CoProtect: Collaborative Management of Cryptographic Keys for Data Security in Cloud Systems
Threat Modeling and Attack Simulations of Smart Cities: A Literature Review and Explorative Study
Bident Structure for Neural Network Model Protection
Secure Ownership Transfer for the Internet of Things
Risk Identification: From Requirements to Threat Models
A Systematic Approach toward Extracting Technically Enforceable Policies from Data Usage Control Requirements
Host Fingerprinting for Web Servers Authentication
Computer Viruses: The Abstract Theory Revisited
Revisiting Privacy-aware Blockchain Public Key Infrastructure
A Formal Approach for the Analysis of the XRP Ledger Consensus Protocol
Email Spoofing Attack Detection through an End to End Authorship Attribution System
Securing IoT Devices using Geographic and Continuous Login Blocking: A Honeypot Study
Active Directory Kerberoasting Attack: Monitoring and Detection Techniques
CCA Secure Unidirectional PRE with Key Pair in the Standard Model without Pairings
Using Eyetracker to Find Ways to Mitigate Ransomware
Email Image Spam Classification based on ResNet Convolutional Neural Network
Lightweight Authentication and Secure Communication Suitable for IoT Devices
Evaluation to Classify Ransomware Variants based on Correlations between APIs
A Practical Approach to Stakeholder-driven Determination of Security Requirements based on the GDPR and Common Criteria
Achieving Privacy, Security, and Interoperability among Biometric Networks using Symmetric Encryption
CoRA: A Scalable Collective Remote Attestation Protocol for Sensor Networks
Track Down Identity Leaks using Threat Intelligence
Improving Accuracy and Speed of Network-based Intrusion Detection using Gradient Boosting Trees
Privacy-preserving Measures in Smart City Video Surveillance Systems
Homomorphic Encryption at Work for Private Analysis of Security Logs
Radical Text Detection based on Stylometry
On Analyzing Third-party Tracking via Machine Learning
The Root Causes of Compromised Accounts at the University
Patients to Mobilize Their Data: Secure and Flexible mHealth Delegation
Assessing Testing Strategies for Access Control Systems: A Controlled Experiment
Accountant: Protection of Data Integrity and Identification of Malicious Nodes in In-network Data Processing
Secrecy and Authenticity Properties of the Lightning Network Protocol
Privacy with Health Information Technologies: What Story Do Data Breaches in US Tell Us?
Building Competitive Advantage from Ubuntu: An African Information Security Awareness Model
Evaluating the Effect of Justification and Confidence Information on User Perception of a Privacy Policy Summarization Tool
Harmonized Group Mix for ITS
A Curious Exploration of Malicious PDF Documents
Dual-use Research in Ransomware Attacks: A Discussion on Ransomware Defence Intelligence
Systematization of Threats and Requirements for Private Messaging with Untrusted Servers: The Case of e-Mailing and Instant Messaging
An Analytical Scanning Technique to Detect and Prevent the Transformed SQL Injection and XSS Attacks
Neural Network Security: Hiding CNN Parameters with Guided Grad-CAM
Distributed Defence of Service (DiDoS): A Network-layer Reputation-based DDoS Mitigation Architecture
Presence Metadata in the Internet of Things: Challenges and Opportunities
A Study of Classification of Texts into Categories of Cybersecurity Incident and Attack with Topic Models
New General Secret Sharing Scheme using Hierarchical Threshold Scheme: Improvement of Information Rates for Specified Participants
A Quantitative Study of Vulnerabilities in the Internet of Medical Things
Speeding Up the Computation of Elliptic Curve Scalar Multiplication based on CRT and DRM
External Contextual Factors in Information Security Behaviour
Greater Control and Transparency in Personal Data Processing
Securing Industrial Production from Sophisticated Cyberattacks
A Meta Model for a Comprehensive Description of Network Protocols Improving Security Tests
Introducing a Verified Authenticated Key Exchange Protocol over Voice Channels for Secure Voice Communication
Legislation and the Negative Impact on Cybersecurity in Healthcare
A Homomorphic Proxy Re-authenticators based Efficient Multi-client Non-interactive Verifiable Computation Scheme
Secure Comparison and Interval Test Protocols based on Three-party MPC
Multi-level Distributed Intrusion Detection System for an IoT based Smart Home Environment
Ontology-based Automation of Penetration Testing
Recommender Systems Robust to Data Poisoning using Trim Learning
Distance Metric Learning using Particle Swarm Optimization to Improve Static Malware Detection
Security and Privacy in Smart Grids: Challenges, Current Solutions and Future Opportunities
MedBIoT: Generation of an IoT Botnet Dataset in a Medium-sized IoT Network
Tool Support for Risk-driven Planning of Trustworthy Smart IoT Systems within DevOps
Methodology and Feedback about Systematic Cybersecurity Experts Auditing in Belgium
Toward Active and Passive Confidentiality Attacks on Cryptocurrency Off-chain Networks
Anomaly Detection in Communication Networks of Cyber-physical Systems using Cross-over Data Compression
Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification
Detection of Crawler Traps: Formalization and Implementation Defeating Protection on Internet and on the TOR Network
Verifying Sanitizer Correctness through Black-Box Learning: A Symbolic Finite Transducer Approach
The Blockchain Potential in Computer Virology
Bank Credit Risk Management based on Data Mining Techniques
Android Run-time Permission Exploitation User Awareness by Means of Formal Methods
Comparing Machine Learning Techniques for Malware Detection
Analysis of Security Attacks in Wireless Sensor Networks: From UPPAAL to Castalia
Accidental Sensitive Data Leaks Prevention via Formal Verification
A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems
SMART: Shared Memory based SDN Architecture to Resist DDoS ATtacks
Formal Accuracy Analysis of a Biometric Data Transformation and Its Application to Secure Template Generation
CROOT: Code-based Round-Optimal Oblivious Transfer
Attribute-Based Encryption and Its Application to a Software-Distributed Shared Memory
Exploiting Hot Spots in Heuristic Safety Analysis of Dynamic Access Control Models
Towards Understanding Man-on-the-Side Attacks (MotS) in SCADA Networks
Towards Secure Edge-assisted Image Sharing for Timely Disaster Situation Awareness
VIP Blowfish Privacy in Communication Graphs
QSOR: Quantum-safe Onion Routing
Helper-in-the-Middle: Supporting Web Application Scanners Targeting Industrial Control Systems
A Comprehensive Quantified Approach for Security Risk Management in e-Health Systems
cipherPath: Efficient Traversals over Homomorphically Encrypted Paths
Deconstructing the Decentralization Trilemma
A Machine-learning based Unbiased Phishing Detection Approach
Stay Thrifty, Stay Secure: A VPN-based Assurance Framework for Hybrid Systems
Towards Language Support for Model-based Security Policy Engineering
Droppix: Towards More Realistic Video Fingerprinting
A White-Box Encryption Scheme using Physically Unclonable Functions
Ensuring the Integrity of Outsourced Web Scripts
A Fine-grained Access Control Model for Knowledge Graphs
Privacy-Preserving Greater-Than Integer Comparison without Binary Decomposition
FPGA-based McEliece Cryptosystem using Non-linear Convolutional Codes
A Novel Anonymous Authentication and Key Agreement Scheme for Smart Grid
Beyond Black and White: Combining the Benefits of Regular and Incognito Browsing Modes
A Trend-following Trading Indicator on Homomorphically Encrypted Data
Accelerating Homomorphic Encryption using Approximate Computing Techniques
Performance Comparison of Two Generic MPC-frameworks with Symmetric Ciphers
This Selfie Does Not Exist: On the Security of Electroneum Cloud Mining
Multi-Stakeholder Cybersecurity Risk Assessment for Data Protection
Defender-centric Conceptual Cyber Exposure Ontology for Adaptive Cyber Risk Assessment
An Enhanced Lightweight Authentication Scheme for Secure Access to Cloud Data
An Innovative Self-Healing Approach with STIX Data Utilisation
Linear Generalized ElGamal Encryption Scheme
Optimizing dm-crypt for XTS-AES: Getting the Best of Atmel Cryptographic Co-processors
Identity Verification and Fraud Detection During Online Exams with a Privacy Compliant Biometric System
Authentication and Key Management Automation in Decentralized Secure Email and Messaging via Low-entropy Secrets
Decentralized Multi-Client Attribute Based Functional Encryption
SENSSE: Simple, Efficient Searchable Symmetric Encryption for Sensor Networks
Solving Set Relations with Secure Bloom Filters Keeping Cardinality Private
Efficient Access-control in the IIoT through Attribute-Based Encryption with Outsourced Decryption
Evasive Windows Malware: Impact on Antiviruses and Possible Countermeasures
Practical Hash-based Anonymity for MAC Addresses
ProteiNN: Privacy-preserving One-to-Many Neural Network Classifications
Security Analysis of ElGamal Implementations
Practical Predicate Encryption for Inner Product
Privacy-preserving Content-based Publish/Subscribe with Encrypted Matching and Data Splitting
Avoiding Network and Host Detection using Packet Bit-masking
An Identity-matching Process to Strengthen Trust in Federated-identity Architectures
Under Pressure: Pushing Down on Me – Touch Sensitive Door Handle to Identify Users at Room Entry
Optimal Transport Layer for Secure Computation
CP-ABE Scheme Satisfying Constant-size Keys based on ECC
Practically Efficient Attribute-based Encryption for Compartmented Access Structures
SwaNN: Switching among Cryptographic Tools for Privacy-preserving Neural Network Predictions
Exploring Current E-mail Cyber Threats using Authenticated SMTP Honeypot
Round-optimal Constant-size Blind Signatures
Efficient Constructions of Non-interactive Secure Multiparty Computation from Pairwise Independent Hashing
Providing Secured Access Delegation in Identity Management Systems
Prov-Trust: Towards a Trustworthy SGX-based Data Provenance System
DCBC: A Distributed High-performance Block-Cipher Mode of Operation
Differentially Private Graph Publishing and Randomized Response for Collaborative Filtering
Signatures to Go: A Framework for Qualified PDF Signing on Mobile Devices
Address-bit Differential Power Analysis on Boolean Split Exponent Counter-measure
Privacy Enhanced DigiLocker using Ciphertext-Policy Attribute-Based Encryption
FALCO: Detecting Superfluous JavaScript Injection Attacks using Website Fingerprints
Beyond Administration: A Modeling Scheme Supporting the Dynamic Analysis of Role-based Access Control Policies
Termination of Ethereum’s Smart Contracts
Non-invasive Wireless Mobile System for COVID-19 Monitoring in Nursing Homes
Securing Device-to-Cloud Interactions in the Internet of Things Relying on Edge Devices
How Did MiFID Affect Systemic Underperformance in the European Equity Market? A Tracking Error based Approach
DLT-based Tokens Classification towards Accounting Regulation
Measures of Monetary Policy in Latin America
A Commons-compatible Implementation of the Sharing Economy: Blockchain-based Open Source Mediation
Comparative Study of e-Commerce Ventures: Copycat Enablers in Business Models
Huff Model for Shopping Centre Assessment using Aggregated Mobile Phone Data
A Simple Scenario-based Qualitative Model for Assessing Start-up Risks
Determinants of Technological Innovation Capabilities: Using Fuzzy-DEMATEL and ANP
A Review Paper on the Application of Big Data by Banking Institutions and Related Ethical Issues and Responses
Ambiguity of Innovation Typology in Innovation Measurement: Towards a Unified Typology of Innovation and Measurement Model
A Comprehensive Evaluation of Economic Vitality and Markov's Prediction: An Empirical Study of a Major City in China
A Smart Treasury Fit for the 4th Industrial Revolution
Towards the Innovation of High-tech Small-medium Enterprises (SMEs): The Interview Approach
Ethical Questions Raised by Public Accountants in Colombia Related to Tax Advice
A Survey on Machine Learning for Stock Price Prediction: Algorithms and Techniques
A Public Participatory Approach toward the Development of a Comprehensive Geospatial Database in Support of High-scale Food Security Analysis
A Comparative Analysis of “Urban Expansion” using Remotely Sensed Data of CORINE Land Cover and Global Human Settlement Layer in Estonia
A Cloud Architecture for Processing and Visualization of Geo-located 3D Digital Cultural Heritage Models
Use of Current Remote Sensing Methods for Biodiversity Monitoring and Conservation of Mount Kilimanjaro National Park Ecosystems
Towards Real Estate Analytics using Map Personalisation
Design and Development of an Application for Predicting Bus Travel Times using a Segmentation Approach
Analysis of Cartographic Generalization based on PYTHON Programming Language on Digital Topographic Maps
Relation between Proximity to Public Open Spaces and Socio-economic Level in Three Cities in the Ecuadorian Andes
From Pixels to 3D Representations of Buildings: A 3D Geo-visualization of Perspective Urban Respecting Some Urbanization Constraints
Spatial Entity Resolution between Restaurant Locations and Transportation Destinations in Southeast Asia
Aiding Irrigation Census in Developing Countries by Detecting Minor Irrigation Structures from Satellite Imagery
Application of Rodrigues Matrix in High Accuracy Geo-location for ZY-3 Panchromatic Imagery
Quantifying Tufa Growth Rates (TGRs) using Structure-from-Motion (SfM) Photogrammetry
GIScience Integrated with Computer Vision for the Interpretation and Analysis of Old Paintings
The Construction of a Network for Indoor Navigation
Alas Landscape Modeling by Remote Sensing Image Analysis and Geographic Ontology: Study Case of Central Yakutia (Russia)
Selfie Drones for 3D Modelling, Geological Mapping and Data Collection: Key Examples from Santorini Volcanic Complex, Greece
Urban Consumption Patterns: OpenStreetMap Quality for Social Science Research
An Integrated Environmental Monitoring Approach through the Development of Coal Mine, a GIS Open Source Application
In-memory k Nearest Neighbor GPU-based Query Processing
A GIS Open Source Application to Perform the Spatial Distribution of Prevention Quality Indicators (PQIs)
Scale Drone Mapping on K8S: Auto-scale Drone Imagery Processing on Kubernetes-orchestrated On-premise Cloud-computing Platform
A Pilot Project Proposal for the Implementation of a Geographic Information System for Immuno-Oncology in Italy
Novel Virtual Reality Solutions for Captivating Virtual Underwater Tours Targeting the Cultural and Tourism Industries
Optimal Path Planning for Drone Inspections of Linear Infrastructures
Forecasting Travel Times with Space Partitioning Methods
Prediction of Spatiotemporal Distributions of Transient Urban Populations with Statistics Gathered by Cell Phones
Location Extraction from Twitter Messages using Bidirectional Long Short-Term Memory Model
Geolocation Prediction from Tweets: A Case Study of Influenza-like Illness in Australia
Occupancy Grid Map Generation from OSM Indoor Data for Indoor Positioning Applications
Combining Spatial Data Layers using Fuzzy Inference Systems: Application to an Agronomic Case Study
In-house Localization for Wi-Fi Coverage Diagnostics
Multiscale GIS based Analysis of Urban Green Spaces (UGS) Accessibility: Case Study of Sisak (Croatia)
Assessing the Vertical Accuracy of Worldview-3 Stereo-extracted Digital Surface Model over Olive Groves
Corinth Gulf Story Map: Enhancing Public Awareness in Natural and Anthropogenic Environment using Interactive GIS Applications
Assessment of the Completeness of OpenStreetMap and Google Maps for the Province of Pavia (Italy)
Improving the Usability of the Land Cover and Use Information System of Spain (SIOSE): A Proposal to Distribute New Thematic Layers and Predefined Reclassifications
Towards an Affordable GIS for Analysing Public Transport Mobility Data: A Preliminary File Naming Convention for Avoiding Duplication of Efforts