On the LPSE Password Meter’s Discrepancies among Different Datasets
Classifying COVID-19 Disinformation on Twitter using a Convolutional Neural Network
Privacy-preserving Parallel Computation of Shortest Path Algorithms with Low Round Complexity
Utility of Anonymised Data in Decision Tree Derivation
Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks
Semantic Attack on Disassociated Transactions
Formalizing Real-world Threat Scenarios
Side Channel Identification using Granger Time Series Clustering with Applications to Control Systems
An Analysis of Cloud Certifications’ Performance on Privacy Protections
Efficient and Secure Encryption Adjustment for JSON Data
Digital Supply Chain Vulnerabilities in Critical Infrastructure: A Systematic Literature Review on Cybersecurity in the Energy Sector
Cluster Crash: Learning from Recent Vulnerabilities in Communication Stacks
Security Issue Classification for Vulnerability Management with Semi-supervised Learning
PREUNN: Protocol Reverse Engineering using Neural Networks
Estimating the Time-To-Compromise of Exploiting Industrial Control System Vulnerabilities
An Exploratory Study of Why UMLsec Is Not Adopted
Android Data Storage Locations and What App Developers Do with It from a Security and Privacy Perspective
SpamFender: A Semi-supervised Incremental Spam Classification System across Social Networks
A Novel Key Exchange Protocol using Logic Algebra for the Factorization Problem
Construction of a Support Tool for User Reading of Privacy Policies and Assessment of its User Impact
Impact of Cross-standard Cell Libraries on Machine Learning based Hardware Trojan Detection
Benchmarking Consumer Data and Privacy Knowledge in Connected and Autonomous Vehicles
Evaluating Deep Learning-based NIDS in Adversarial Settings
Effective & Efficient Access Control in Smart Farms: Opportunities, Challenges & Potential Approaches
Feature Importance and Deep Learning for Android Malware Detection
SMPG: Secure Multi Party Computation on Graph Databases
Age Bias in Finger Vein Biometric Research
Analysis and Enhancement of Self-sovereign Identity System Properties Compiling Standards and Regulations
Industrial and Automation Control System Cyber Range Prototype for Offensive Capability Development
Intent-aware Permission Architecture: A Model for Rethinking Informed Consent for Android Apps
Planning for Cryptographic Readiness in an Era of Quantum Computing Advancement
Incentivisation of Outsourced Network Testing: View from Platform Perspective
Protecting Shared Virtualized Environments against Cache Side-channel Attacks
Revisiting Ontology Based Access Control: The Case for Ontology Based Data Access
Linguistic Steganography for Messaging Applications
Survey and Guidelines about Learning Cyber Security Risk Assessment
Comparing Perception of Disclosure of Different Types of Information Related to Automated Tools
A Fast and Cost-effective Design for FPGA-based Fuzzy Rainbow Tradeoffs
Detecting Obfuscated Malware using Memory Feature Engineering
PDF Malware Detection based on Stacking Learning
The GDPR Compliance and Access Control Systems: Challenges and Research Opportunities
Cyber Attack Stage Tracing System based on Attack Scenario Comparison
Cryptanalysis of Some Electronic Checkbook Schemes
Differential-linear Attacks on Permutation Ciphers Revisited: Experiments on Ascon and DryGASCON
The Role of Information Deserts in Information Security Awareness and Behaviour
On Tracking Ransomware on the File System
”Fake News Detector”: An Automatic System for the Reliability Evaluation of Digital News
SecTL: Secure and Verifiable Transfer Learning-based inference
iProfile: Collecting and Analyzing Keystroke Dynamics from Android Users
WhatsApp Web Client Live Forensics Technique
Game Theoretic Analysis of Ransomware: A Preliminary Study
On the Influence of Image Settings in Deep Learning-based Malware Detection
Tamer: A Sandbox for Facilitating and Automating IoT Malware Analysis with Techniques to Elicit Malicious Behavior
Profile Hidden Markov Model Malware Detection and API Call Obfuscation
NLP-based User Authentication through Mouse Dynamics
Network Intrusion Detection: A Comprehensive Analysis of CIC-IDS2017
Implementing Post-quantum Cryptography for Developers
Towards a Better Understanding of Machine Learning based Network Intrusion Detection Systems in Industrial Networks
Containment Strategy Formalism in a Probabilistic Threat Modelling Framework
Culturally-sensitive Cybersecurity Awareness Program Design for Iranian High-school Students
A Tailored Model for Cyber Security Education Utilizing a Cyber Range
Cyber Exercises in Computer Science Education
Public Key Compression and Fast Polynomial Multiplication for NTRU using the Corrected Hybridized NTT-Karatsuba Method
DeDup.js: Discovering Malicious and Vulnerable Extensions by Detecting Duplication
Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device
Who Watches the Watchers: A Multi-Task Benchmark for Anomaly Detection
Malware in Motion
Comparing the Detection of XSS Vulnerabilities in Node.js and a Multi-tier JavaScript-based Language via Deep Learning
TEEm: A Tangle-based Elastic Emulator for Storing Connected Vehicle Data in a Distributed Ledger Technology
A Privacy-Preserving Auction Platform with Public Verifiability for Smart Manufacturing
Can We Formally Catch Cheating in E-exams?
Ransomware Detection with Deep Neural Networks
Irreversible Applications for Windows NT Systems
SEVIL: Secure and Efficient VerifIcation over Massive Proofs of KnowLedge
Blind Side Channel on the Elephant LFSR
Towards an Automated Business Process Model Risk Assessment: A Process Mining Approach
Bypassing Current Limitations for Implementing a Credential Delegation for the Industry 4.0
A Region-based Training Data Segmentation Strategy to Credit Scoring
A Spendable Cold Wallet from QR Video
Metering Homes: Do Energy Efficiency and Privacy Need to Be in Conflict?
Stacked Ensemble Model for Enhancing the DL based SCA
Collusion-resistant Broadcast Encryption based on Hidden RSA Subgroups
Cryptanalysis of a Privacy-preserving Behavior-oriented Authentication Scheme
A Generic Privacy-preserving Protocol for Keystroke Dynamics-based Continuous Authentication
Comparison-based MPC in Star Topology
Risk-driven Model-based Architecture Design for Secure Information Flows in Manufacturing Infrastructures
Seccomp Filters from Fuzzing
CRGC: A Practical Framework for Constructing Reusable Garbled Circuits
SHINE: Resilience via Practical Interoperability of Multi-party Schnorr Signature Schemes
Application Sandboxing for Linux Desktops: A User-friendly Approach
A Method for Road Accident Prevention in Smart Cities based on Deep Reinforcement Learning
An Adaptive Web Application Firewall
TrustLend: Using Borrower Trustworthiness for Lending on Ethereum
Efficient IoT Device Fingerprinting Approach using Machine Learning
FAPRIL: Towards Faster Privacy-preserving Fingerprint-based Localization
A Longitudinal Study of Cryptographic API: A Decade of Android Malware
A Local Differential Privacy based Hybrid Recommendation Model with BERT and Matrix Factorization
Behavior Modeling of a Distributed Application for Anomaly Detection
A Real-time Method for CAN Bus Intrusion Detection by Means of Supervised Machine Learning
Large-scale Randomness Study of Security Margins for 100+ Cryptographic Functions
Parallel and Distributed Implementations of the Wiedemann and the Block-Wiedemann Methods over GF(2)
What your Fitbit Says about You: De-anonymizing Users in Lifelogging Datasets
Discovering How to Attack a System
Key Encapsulation Mechanism in Ciphertext-policy Attribute based Setting Featuring Revocation and Key-homomorphic Property
PAMMELA: Policy Administration Methodology using Machine Learning
Partially Oblivious Neural Network Inference
Decentralized Public Key Infrastructure with Identity Management using Hyperledger Fabric
Tick Tock Break the Clock: Breaking CAPTCHAs on the Darkweb
A New Leakage Resilient Symmetric Searchable Encryption Scheme for Phrase Search
Code-based Key Encapsulation Mechanism Preserving Short Ciphertext and Secret Key
Federated Naive Bayes under Differential Privacy
Effectiveness of Adversarial Component Recovery in Protected Netlist Circuit Designs
Membership Inference Attacks on Aggregated Time Series with Linear Programming
The Weakest Link: On Breaking the Association between Usernames and Passwords in Authentication Systems
Graph Algorithms over Homomorphic Encryption for Data Cooperatives
Authentication Attacks on Projection-based Cancelable Biometric Schemes
Mason Vulnerability Scoring Framework: A Customizable Framework for Scoring Common Vulnerabilities and Weaknesses
Threats to Adversarial Training for IDSs and Mitigation
Weighted Attribute-based Encryption with Parallelized Decryption
Near-collisions and Their Impact on Biometric Security
CatNap: Leveraging Generic MPC for Actively Secure Privacy-enhancing Proximity Testing with a Napping Party
Evaluation of AI-based Malware Detection in IoT Network Traffic
Towards Heterogeneous Remote Attestation Protocols
Identifying Organizations Receiving Personal Data in Android Apps
JCAlgTest: Robust Identification Metadata for Certified Smartcards
On the Efficiency and Security of Quantum-resistant Key Establishment Mechanisms on FPGA Platforms
Brain Waves and Evoked Potentials as Biometric User Identification Strategy: An Affordable Low-cost Approach
Illicit Darkweb Classification via Natural-language Processing: Classifying Illicit Content of Webpages based on Textual Information
Verification of PUF-based IoT Protocols with AVISPA and Scyther
PE-AONT: Partial Encryption All or Nothing Transform
From GDPR to Privacy Design Patterns: The MATERIALIST Framework
Resilience of GANs against Adversarial Attacks
Transient State Signaling for Spectre/Meltdown Transient Cache Side-channel Prevention
On the Practicality of Relying on Simulations in Different Abstraction Levels for Pre-silicon Side-Channel Analysis
A Secure Federated Learning: Analysis of Different Cryptographic Tools
Novel Design for IE-Cache to Mitigate Conflict-based Cache-side Channel Attacks with Reduced Energy Consumption
Real-time Crowd Counting based on Wearable Ephemeral IDs
Switched-based Control Testbed to Assure Cyber-physical Resilience by Design
Offline-verifiable Data from Distributed Ledger-based Registries
Yet Another Algebraic Cryptanalysis of Small Scale Variants of AES
Efficient Hybrid Model for Intrusion Detection Systems
Side-channel Analysis and Countermeasure for Implementation of Lattice-based Signature
PhishGNN: A Phishing Website Detection Framework using Graph Neural Networks
Towards a Threat Model and Security Analysis for Data Cooperatives
Are Clouds making Our Research Irrelevant and Who Is at Fault? (Position Paper)
HTTPFuzz: Web Server Fingerprinting with HTTP Request Fuzzing
PASS-P: Performance and Security Sensitive Dynamic Cache Partitioning
GAN-based Approach to Crafting Adversarial Malware Examples against a Heterogeneous Ensemble Classifier
A Novel Method for Embedding and Extracting Secret Messages in Textual Documents based on Paragraph Resizing
Reverse Engineering for Thwarting Digital Supply Chain Attacks in Critical Infrastructures: Ethical Considerations
A Decentralised Real Estate Transfer Verification based on Self-Sovereign Identity and Smart Contracts
Moving Target Defense Router: MaTaDoR
Implementation of a Stateful Network Protocol Intrusion Detection Systems
zkBeacon: Proven Randomness Beacon based on Zero-knowledge Verifiable Computation
The Influence of Studying from Home, Stress Level, and Ability to Use Technology toward Learning Achievement during the COVID-19 Pandemic: A Case Study in Indonesia
Organizational Toughness in Clothing Industry during Covid-19 Pandemic
Facilitating the Decentralisation of Software Development Projects from a Project Management Perspective: A Literature Review
An Ethical Framework for Big Data and Smart Healthcare
Determinants of International Remittances in Mexico: Economic vs. Financial Variables
Scientific Data Analysis using Neo4j
Using Big Data Analytics to Combat Retail Fraud
The Impacts of the CEO’s Network Effect on Digitalization and Agile Leadership in China
De facto or de jure Harmonisation: How Much Dis(harmonised) Are the Entities in an IFRS Environment?
Human Resource Training of Front Office Employees and Change Management in Hospitality Sector during Crisis
Effect of Covid-19 on the Tourism Industry: Opportunities and Threats in Covid-19 Era
Factors Favoring the International Positioning of Companies with a Registered Trademark in Colombia
Project Management Fractals: Position Paper for Curriculum Integration
Financial Feasibility of Opaque Envelopes in ECBC Complaint Energy Efficient Indian Commercial Buildings: An Approach for Maximising the Internal Rate of Return
Precision Assessment of Artec Space Spider 3D Handheld Scanner for Quantifying Tufa Formation Dynamics on Small Limestone Plates (PLs)
Multi-Resolution Modeling of the Tufa Formation Dynamic using Close-Range Photogrammetry, Handheld 3D Scanner and Terrestrial Laser Scanner
Urban Sprawl Analysis in Kutupalong Refugee Camp, Bangladesh
Mobile Outdoor AR Application for Precise Visualization of Wind Turbines using Digital Surface Models
Suitability Analysis as a Recommendation System for Housing Search
Digital Surface Model Generation with Aerial Surveying System “LEICA ADS80”
Analysis of Coastline Evolution using Landsat and Sentinel 2 Images from 2001 to 2020 in Callao Bay, Peru
Multi-parametric Performance Evaluation of Drone-based Surveying for Disaster Risk Management
Comparison of Free and Open PPP Services for Master-base Positioning in Geodetic Disadvantaged Areas: Case Study along the Sirba River in Sub-Saharan Africa
Multi-Sensor 3D Modeling of Natural Heritage: Example of the Lake Zmajevo Oko
Establishing Surface Displacements along a Railway Route near Mirovo Salt Deposit, NE Bulgaria
Assessing Informal Trails Impacts and Fragmentation Effects on Protected Areas using Volunteered Geographic Information
Online Spatial Data Gathering as a Powerful Arm in Urban Management (Study in Iranian Municipality)
A Spatially Detailed Approach to the Assessment of Rooftop Solar Energy Potential based on LiDAR Data
Sea Level Rise Future Predictions: A Case Study in Crete
A Formally Correct and Algorithmically Efficient LULC Change Model-building Environment
An In-house, Self-developed Low-cost WebGIS Relying on Open-source and Self-made Tools to Show the Active Deformation Areas across Europe
Selection of Hydrographic Objects in NHD 100K Streams from NHD 24K Streams using Drainage Networks Derived from Digital Elevation Models
Poverty Population and Its Educational Accessibility: An Evaluation using Geospatial Database in Ecuador