• On the LPSE Password Meter’s Discrepancies among Different Datasets
  • Classifying COVID-19 Disinformation on Twitter using a Convolutional Neural Network
  • Privacy-preserving Parallel Computation of Shortest Path Algorithms with Low Round Complexity
  • Utility of Anonymised Data in Decision Tree Derivation
  • Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks
  • Semantic Attack on Disassociated Transactions
  • Formalizing Real-world Threat Scenarios
  • Side Channel Identification using Granger Time Series Clustering with Applications to Control Systems
  • An Analysis of Cloud Certifications’ Performance on Privacy Protections
  • Efficient and Secure Encryption Adjustment for JSON Data
  • Digital Supply Chain Vulnerabilities in Critical Infrastructure: A Systematic Literature Review on Cybersecurity in the Energy Sector
  • Cluster Crash: Learning from Recent Vulnerabilities in Communication Stacks
  • Security Issue Classification for Vulnerability Management with Semi-supervised Learning
  • PREUNN: Protocol Reverse Engineering using Neural Networks
  • Estimating the Time-To-Compromise of Exploiting Industrial Control System Vulnerabilities
  • An Exploratory Study of Why UMLsec Is Not Adopted
  • Android Data Storage Locations and What App Developers Do with It from a Security and Privacy Perspective
  • SpamFender: A Semi-supervised Incremental Spam Classification System across Social Networks
  • A Novel Key Exchange Protocol using Logic Algebra for the Factorization Problem
  • Construction of a Support Tool for User Reading of Privacy Policies and Assessment of its User Impact
  • Impact of Cross-standard Cell Libraries on Machine Learning based Hardware Trojan Detection
  • Benchmarking Consumer Data and Privacy Knowledge in Connected and Autonomous Vehicles
  • Evaluating Deep Learning-based NIDS in Adversarial Settings
  • Effective & Efficient Access Control in Smart Farms: Opportunities, Challenges & Potential Approaches
  • Feature Importance and Deep Learning for Android Malware Detection
  • SMPG: Secure Multi Party Computation on Graph Databases
  • Age Bias in Finger Vein Biometric Research
  • Analysis and Enhancement of Self-sovereign Identity System Properties Compiling Standards and Regulations
  • Industrial and Automation Control System Cyber Range Prototype for Offensive Capability Development
  • Intent-aware Permission Architecture: A Model for Rethinking Informed Consent for Android Apps
  • Planning for Cryptographic Readiness in an Era of Quantum Computing Advancement
  • Incentivisation of Outsourced Network Testing: View from Platform Perspective
  • Protecting Shared Virtualized Environments against Cache Side-channel Attacks
  • Revisiting Ontology Based Access Control: The Case for Ontology Based Data Access
  • Linguistic Steganography for Messaging Applications
  • Survey and Guidelines about Learning Cyber Security Risk Assessment
  • Comparing Perception of Disclosure of Different Types of Information Related to Automated Tools
  • A Fast and Cost-effective Design for FPGA-based Fuzzy Rainbow Tradeoffs
  • Detecting Obfuscated Malware using Memory Feature Engineering
  • PDF Malware Detection based on Stacking Learning
  • The GDPR Compliance and Access Control Systems: Challenges and Research Opportunities
  • Cyber Attack Stage Tracing System based on Attack Scenario Comparison
  • Cryptanalysis of Some Electronic Checkbook Schemes
  • Differential-linear Attacks on Permutation Ciphers Revisited: Experiments on Ascon and DryGASCON
  • The Role of Information Deserts in Information Security Awareness and Behaviour
  • On Tracking Ransomware on the File System
  • ”Fake News Detector”: An Automatic System for the Reliability Evaluation of Digital News
  • SecTL: Secure and Verifiable Transfer Learning-based inference
  • iProfile: Collecting and Analyzing Keystroke Dynamics from Android Users
  • WhatsApp Web Client Live Forensics Technique
  • Game Theoretic Analysis of Ransomware: A Preliminary Study
  • On the Influence of Image Settings in Deep Learning-based Malware Detection
  • Tamer: A Sandbox for Facilitating and Automating IoT Malware Analysis with Techniques to Elicit Malicious Behavior
  • Profile Hidden Markov Model Malware Detection and API Call Obfuscation
  • NLP-based User Authentication through Mouse Dynamics
  • Network Intrusion Detection: A Comprehensive Analysis of CIC-IDS2017
  • Implementing Post-quantum Cryptography for Developers
  • Towards a Better Understanding of Machine Learning based Network Intrusion Detection Systems in Industrial Networks
  • Containment Strategy Formalism in a Probabilistic Threat Modelling Framework
  • Culturally-sensitive Cybersecurity Awareness Program Design for Iranian High-school Students
  • A Tailored Model for Cyber Security Education Utilizing a Cyber Range
  • Cyber Exercises in Computer Science Education
  • Public Key Compression and Fast Polynomial Multiplication for NTRU using the Corrected Hybridized NTT-Karatsuba Method
  • DeDup.js: Discovering Malicious and Vulnerable Extensions by Detecting Duplication
  • Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device
  • Who Watches the Watchers: A Multi-Task Benchmark for Anomaly Detection
  • Malware in Motion
  • Comparing the Detection of XSS Vulnerabilities in Node.js and a Multi-tier JavaScript-based Language via Deep Learning
  • TEEm: A Tangle-based Elastic Emulator for Storing Connected Vehicle Data in a Distributed Ledger Technology
  • A Privacy-Preserving Auction Platform with Public Verifiability for Smart Manufacturing
  • Can We Formally Catch Cheating in E-exams?
  • Ransomware Detection with Deep Neural Networks
  • Irreversible Applications for Windows NT Systems
  • SEVIL: Secure and Efficient VerifIcation over Massive Proofs of KnowLedge
  • Blind Side Channel on the Elephant LFSR
  • Towards an Automated Business Process Model Risk Assessment: A Process Mining Approach
  • Bypassing Current Limitations for Implementing a Credential Delegation for the Industry 4.0
  • A Region-based Training Data Segmentation Strategy to Credit Scoring
  • A Spendable Cold Wallet from QR Video
  • Metering Homes: Do Energy Efficiency and Privacy Need to Be in Conflict?
  • Stacked Ensemble Model for Enhancing the DL based SCA
  • Collusion-resistant Broadcast Encryption based on Hidden RSA Subgroups
  • Cryptanalysis of a Privacy-preserving Behavior-oriented Authentication Scheme
  • A Generic Privacy-preserving Protocol for Keystroke Dynamics-based Continuous Authentication
  • Comparison-based MPC in Star Topology
  • Risk-driven Model-based Architecture Design for Secure Information Flows in Manufacturing Infrastructures
  • Seccomp Filters from Fuzzing
  • CRGC: A Practical Framework for Constructing Reusable Garbled Circuits
  • SHINE: Resilience via Practical Interoperability of Multi-party Schnorr Signature Schemes
  • Application Sandboxing for Linux Desktops: A User-friendly Approach
  • A Method for Road Accident Prevention in Smart Cities based on Deep Reinforcement Learning
  • An Adaptive Web Application Firewall
  • TrustLend: Using Borrower Trustworthiness for Lending on Ethereum
  • Efficient IoT Device Fingerprinting Approach using Machine Learning
  • FAPRIL: Towards Faster Privacy-preserving Fingerprint-based Localization
  • A Longitudinal Study of Cryptographic API: A Decade of Android Malware
  • A Local Differential Privacy based Hybrid Recommendation Model with BERT and Matrix Factorization
  • Behavior Modeling of a Distributed Application for Anomaly Detection
  • A Real-time Method for CAN Bus Intrusion Detection by Means of Supervised Machine Learning
  • Large-scale Randomness Study of Security Margins for 100+ Cryptographic Functions
  • Parallel and Distributed Implementations of the Wiedemann and the Block-Wiedemann Methods over GF(2)
  • What your Fitbit Says about You: De-anonymizing Users in Lifelogging Datasets
  • Discovering How to Attack a System
  • Key Encapsulation Mechanism in Ciphertext-policy Attribute based Setting Featuring Revocation and Key-homomorphic Property
  • PAMMELA: Policy Administration Methodology using Machine Learning
  • Partially Oblivious Neural Network Inference
  • Decentralized Public Key Infrastructure with Identity Management using Hyperledger Fabric
  • Tick Tock Break the Clock: Breaking CAPTCHAs on the Darkweb
  • A New Leakage Resilient Symmetric Searchable Encryption Scheme for Phrase Search
  • Code-based Key Encapsulation Mechanism Preserving Short Ciphertext and Secret Key
  • Federated Naive Bayes under Differential Privacy
  • Effectiveness of Adversarial Component Recovery in Protected Netlist Circuit Designs
  • Membership Inference Attacks on Aggregated Time Series with Linear Programming
  • The Weakest Link: On Breaking the Association between Usernames and Passwords in Authentication Systems
  • Graph Algorithms over Homomorphic Encryption for Data Cooperatives
  • Authentication Attacks on Projection-based Cancelable Biometric Schemes
  • Mason Vulnerability Scoring Framework: A Customizable Framework for Scoring Common Vulnerabilities and Weaknesses
  • Threats to Adversarial Training for IDSs and Mitigation
  • Weighted Attribute-based Encryption with Parallelized Decryption
  • Near-collisions and Their Impact on Biometric Security
  • CatNap: Leveraging Generic MPC for Actively Secure Privacy-enhancing Proximity Testing with a Napping Party
  • Evaluation of AI-based Malware Detection in IoT Network Traffic
  • Towards Heterogeneous Remote Attestation Protocols
  • Identifying Organizations Receiving Personal Data in Android Apps
  • JCAlgTest: Robust Identification Metadata for Certified Smartcards
  • On the Efficiency and Security of Quantum-resistant Key Establishment Mechanisms on FPGA Platforms
  • Brain Waves and Evoked Potentials as Biometric User Identification Strategy: An Affordable Low-cost Approach
  • Illicit Darkweb Classification via Natural-language Processing: Classifying Illicit Content of Webpages based on Textual Information
  • Verification of PUF-based IoT Protocols with AVISPA and Scyther
  • PE-AONT: Partial Encryption All or Nothing Transform
  • From GDPR to Privacy Design Patterns: The MATERIALIST Framework
  • Resilience of GANs against Adversarial Attacks
  • Transient State Signaling for Spectre/Meltdown Transient Cache Side-channel Prevention
  • On the Practicality of Relying on Simulations in Different Abstraction Levels for Pre-silicon Side-Channel Analysis
  • A Secure Federated Learning: Analysis of Different Cryptographic Tools
  • Novel Design for IE-Cache to Mitigate Conflict-based Cache-side Channel Attacks with Reduced Energy Consumption
  • Real-time Crowd Counting based on Wearable Ephemeral IDs
  • Switched-based Control Testbed to Assure Cyber-physical Resilience by Design
  • Offline-verifiable Data from Distributed Ledger-based Registries
  • Yet Another Algebraic Cryptanalysis of Small Scale Variants of AES
  • Efficient Hybrid Model for Intrusion Detection Systems
  • Side-channel Analysis and Countermeasure for Implementation of Lattice-based Signature
  • PhishGNN: A Phishing Website Detection Framework using Graph Neural Networks
  • Towards a Threat Model and Security Analysis for Data Cooperatives
  • Are Clouds making Our Research Irrelevant and Who Is at Fault? (Position Paper)
  • HTTPFuzz: Web Server Fingerprinting with HTTP Request Fuzzing
  • PASS-P: Performance and Security Sensitive Dynamic Cache Partitioning
  • GAN-based Approach to Crafting Adversarial Malware Examples against a Heterogeneous Ensemble Classifier
  • A Novel Method for Embedding and Extracting Secret Messages in Textual Documents based on Paragraph Resizing
  • Reverse Engineering for Thwarting Digital Supply Chain Attacks in Critical Infrastructures: Ethical Considerations
  • A Decentralised Real Estate Transfer Verification based on Self-Sovereign Identity and Smart Contracts
  • Moving Target Defense Router: MaTaDoR
  • Implementation of a Stateful Network Protocol Intrusion Detection Systems
  • zkBeacon: Proven Randomness Beacon based on Zero-knowledge Verifiable Computation
  • The Influence of Studying from Home, Stress Level, and Ability to Use Technology toward Learning Achievement during the COVID-19 Pandemic: A Case Study in Indonesia
  • Organizational Toughness in Clothing Industry during Covid-19 Pandemic
  • Facilitating the Decentralisation of Software Development Projects from a Project Management Perspective: A Literature Review
  • An Ethical Framework for Big Data and Smart Healthcare
  • Determinants of International Remittances in Mexico: Economic vs. Financial Variables
  • Scientific Data Analysis using Neo4j
  • Using Big Data Analytics to Combat Retail Fraud
  • The Impacts of the CEO’s Network Effect on Digitalization and Agile Leadership in China
  • De facto or de jure Harmonisation: How Much Dis(harmonised) Are the Entities in an IFRS Environment?
  • Human Resource Training of Front Office Employees and Change Management in Hospitality Sector during Crisis
  • Effect of Covid-19 on the Tourism Industry: Opportunities and Threats in Covid-19 Era
  • Factors Favoring the International Positioning of Companies with a Registered Trademark in Colombia
  • Project Management Fractals: Position Paper for Curriculum Integration
  • Financial Feasibility of Opaque Envelopes in ECBC Complaint Energy Efficient Indian Commercial Buildings: An Approach for Maximising the Internal Rate of Return
  • Precision Assessment of Artec Space Spider 3D Handheld Scanner for Quantifying Tufa Formation Dynamics on Small Limestone Plates (PLs)
  • Multi-Resolution Modeling of the Tufa Formation Dynamic using Close-Range Photogrammetry, Handheld 3D Scanner and Terrestrial Laser Scanner
  • Urban Sprawl Analysis in Kutupalong Refugee Camp, Bangladesh
  • Mobile Outdoor AR Application for Precise Visualization of Wind Turbines using Digital Surface Models
  • Suitability Analysis as a Recommendation System for Housing Search
  • Digital Surface Model Generation with Aerial Surveying System “LEICA ADS80”
  • Analysis of Coastline Evolution using Landsat and Sentinel 2 Images from 2001 to 2020 in Callao Bay, Peru
  • Multi-parametric Performance Evaluation of Drone-based Surveying for Disaster Risk Management
  • Comparison of Free and Open PPP Services for Master-base Positioning in Geodetic Disadvantaged Areas: Case Study along the Sirba River in Sub-Saharan Africa
  • Multi-Sensor 3D Modeling of Natural Heritage: Example of the Lake Zmajevo Oko
  • Establishing Surface Displacements along a Railway Route near Mirovo Salt Deposit, NE Bulgaria
  • Assessing Informal Trails Impacts and Fragmentation Effects on Protected Areas using Volunteered Geographic Information
  • Online Spatial Data Gathering as a Powerful Arm in Urban Management (Study in Iranian Municipality)
  • A Spatially Detailed Approach to the Assessment of Rooftop Solar Energy Potential based on LiDAR Data
  • Sea Level Rise Future Predictions: A Case Study in Crete
  • A Formally Correct and Algorithmically Efficient LULC Change Model-building Environment
  • An In-house, Self-developed Low-cost WebGIS Relying on Open-source and Self-made Tools to Show the Active Deformation Areas across Europe
  • Selection of Hydrographic Objects in NHD 100K Streams from NHD 24K Streams using Drainage Networks Derived from Digital Elevation Models
  • Poverty Population and Its Educational Accessibility: An Evaluation using Geospatial Database in Ecuador