Big Brother is Smart Watching You - Privacy Concerns about Health and Fitness Applications
Incoming Call Implicit User Authentication - User Authentication via Hand Movement Pattern
ACCESSORS - A Data-Centric Permission Model for the Internet of Things
How to Break CaptchaStar
Knock-Knock: The Unbearable Lightness of Android Notifications
Spectral Analysis of Keystroke Streams: Towards Effective Real-time Continuous User Authentication
Identifying Needs for a Holistic Modelling Approach to Privacy Aspects in Enterprise Software Systems
A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System
BroncoVote: Secure Voting System using Ethereum’s Blockchain
Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization
VisABAC: A Tool for Visualising ABAC Policies
A Comparative Analysis of Current Cryptocurrencies
Inferring Smartphone Users’ Handwritten Patterns by using Motion Sensors
On App-based Matrix Code Authentication in Online Banking
Privacy Compliant Multi-biometric Authentication on Smartphones
Prerequisite to Measure Information Security - A State of the Art Literature Review
Evaluation of Biometric Template Protection Schemes based on a Transformation
Measuring Identity and Access Management Performance - An Expert Survey on Possible Performance Indicators
Securing the Flow - Data Flow Analysis with Operational Node Structures
Cyber Threat Information Classification and Life Cycle Management using Smart Contracts
Towards Risk-aware Access Control Framework for Healthcare Information Sharing
Towards an Optimal Template Reduction for Securing Embedded Fingerprint Devices
Malicious PDF Documents Detection using Machine Learning Techniques - A Practical Approach with Cloud Computing Applications
Privacy-preserving Biometric Authentication Model for e-Finance Applications
Relational Database Anonymization - A Model-driven Guiding Approach
Encryption Schemes based on a Single Permutation: PCBC, POFB, PCFB and PCTR
A Test of Structured Threat Descriptions for Information Security Risk Assessments
Attack Tree for Modelling Unauthorized EMV Card Transactions at POS Terminals
Automated Detection of the Early Stages of Cyber Kill Chain
Modular Platform for Customer-Side Detection of BGP Redirection Attacks
Phishing Through Time: A Ten Year Story based on Abstracts
A Cyber Safety Model for Schools in Mozambique
Hardware-based Cyber Threats
Towards a Personal Identity Code Respecting Privacy
Intrusion Detection System Test Framework for SCADA Systems
A Risk-aware Access Control Model for Biomedical Research Platforms
Alignment-free Cancellable Template Generation for Fingerprint based Authentication
Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis
AECID: A Self-learning Anomaly Detection Approach based on Light-weight Log Parser Models
Probability Preservation Property with Relative Error and Its Applications
Who’s Driving My Car? A Machine Learning based Approach to Driver Identification
Enhancing Security Education - Recognising Threshold Concepts and Other Influencing Factors
Decoy Systems with Low Energy Bluetooth Communication
Malware Detection based on HTTPS Characteristic via Machine Learning
Using Application Layer Metrics to Detect Advanced SCADA Attacks
Towards a Cyber Security Label for SMEs: A European Perspective
Secure Two-party Agglomerative Hierarchical Clustering Construction
Back to the Drawing Board - Bringing Security Constraints in an Architecture-centric Software Development Process
Querying Encrypted Graph Databases
Unsupervised Holiday Detection from Low-resolution Smart Metering Data
A Framework for Web Application Integrity
Face Spoofing Detection for Smartphones using a 3D Reconstruction and the Motion Sensors
SAFEPASS - Presenting a Convenient, Portable and Secure Password Manager
Statistical and Combinatorial Analysis of the TOR Routing Protocol - Structural Weaknesses Identified in the TOR Network
VizMal: A Visualization Tool for Analyzing the Behavior of Android Malware
Deep Learning versus Gist Descriptors for Image-based Malware Classification
APT RPG: Design of a Gamified Attacker/Defender Meta Model
Health State of Google’s PlayStore - Finding Malware in Large Sets of Applications from the Android Market
Acoustic Gait Analysis using Support Vector Machines
Cluster Analysis for Driver Aggressiveness Identification
Advancing Protocol Fuzzing for Industrial Automation and Control Systems
Attacks on Industrial Control Systems - Modeling and Anomaly Detection
Identifying Insecure Features in Android Applications using Model Checking
Autocorrelation Analysis of Financial Botnet Traffic
The Rapid Extraction of Suspicious Traffic from Passive DNS
Novel Access Control Approach for Inter-organizational Workflows
Secure Benchmarking using Electronic Voting
Fully Homomorphic Distributed Identity-based Encryption Resilient to Continual Auxiliary Input Leakage
Side Channel Attacks over Encrypted TCP/IP Modbus Reveal Functionality Leaks
DRANKULA: A McEliece-like Rank Metric based Cryptosystem Implementation
On the Security of Linear Sketch Schemes against Recovering Attacks
A Steganogaphic Scheme for MAC-Independent Opportunistic Routing and Encoding (MORE) Protocol
BDABE - Blockchain-based Distributed Attribute based Encryption
An Optimistic Fair Exchange E-commerce Protocol for Complex Transactions
An Extended Case Study about Securing Smart Home Hubs through N-version Programming
Lightweight Attribute-based Encryption Supporting Access Policy Update for Cloud Assisted IoT
Hash-Based Signature with Constant-Sum Fingerprinting and Partial Construction of Hash Chains
Applying Deep Learning Techniques to CAN Bus Attacks for Supporting Identification and Analysis Tasks
Secure Grouping and Aggregation with MapReduce
Cost-effective Private Linear Key Agreement with Adaptive CCA Security from Prime Order Multilinear Maps and Tracing Traitors
Combining Design by Contract and Inference Rules of Programming Logic towards Software Reliability
Intellectual Property Protection for Distributed Neural Networks - Towards Confidentiality of Data, Model, and Inference
SABE: A Selective Attribute-based Encryption for an Efficient Threshold Multi-level Access Control
A Blockchain based Access Control Scheme
Anonymous Data Collection Scheme from Short Group Signatures
Unobtrusive Psychological Profiling for Risk Analysis
Fuzzy Logic based Model for Energy Consumption Trust Estimation in Electric Vehicular Networks
Static Security Certification of Programs via Dynamic Labelling
Verifying the Enforcement and Effectiveness of Network Lateral Movement Resistance Techniques
Algebraic Side-Channel Attacks on Masked Implementations of AES
A Quantitative Framework to Model Advanced Persistent Threats
Towards an Enhanced Security Data Analytic Platform
Binary Edwards Curves for Intrinsically Secure ECC Implementations for the IoT
A Flexible Framework for Rogue Access Point Detection
Holistic Database Encryption
The AVARE PATRON - A Holistic Privacy Approach for the Internet of Things
KAuth: A Strong Single Sign-On Service based on PKI
Spoof-of-Work - Evaluating Device Authorisation in Mobile Mining Processes
PAPEETE: Private, Authorized, and Fast Personal Genomic Testing
Compact Lattice Signatures
Analysis of Man-In-The-Middle of Attack on Bitcoin Address
Secure Authentication Solution for Cloud-based Smart City Surveillance System
A Machine Learning Approach for Privacy-preservation in E-business Applications
Big Data Anonymization Requirements vs Privacy Models
Theoretical Security Evaluation of the Human Semantic Authentication Protocol
A Novel Lattice Reduction Algorithm
Crypto-democracy: A Decentralized Voting Scheme using Blockchain Technology
DBStore: A TrustZone-backed Database Management System for Mobile Applications
Evaluating the Provision of Botnet Defences using Translational Research Concepts
Microcontroller Implementation of Simultaneous Protections Against Observation and Perturbation Attacks for ECC
Malware Detection in PDF Files using Machine Learning
AVISPA versus AVANTSSAR in the Model Checking of Secure Communication Protocols
Lightweight Ring Signatures for Decentralized Privacy-preserving Transactions
Blind PDF Document Watermarking Robust Against PCA and ICA Attacks
Implicit Data Integrity: Protecting User Data without MACs
Blockchain for IoT: The Challenges and a Way Forward
Towards Efficient Software Protection Obeying Kerckhoffs’s Principle using Tamper-proof Hardware
Learning Plaintext in Galbraith’s LWE Cryptosystem
Privacy-preserving Distributed Access Control for Medical Data
An Efficient Privacy-preserving Recommender System for e-Healthcare Systems
Efficient Index-based Search Protocols for Encrypted Databases
Towards a Cloud-based System for Software Protection and Licensing
Attribute Based Signatures: The Case for Automation
A Quantum-Secure Niederreiter Cryptosystem using Quasi-Cyclic Codes
Distortion-free Watermarking Scheme for Compressed Data in Columnar Database
Hotspot Analysis of the Spatial and Temporal Distribution of Fires
A Newly Emerging Ethical Problem in PGIS - Ubiquitous Atoque Absconditus and Casual Offenders for Pleasure
Enhanced Address Search with Spelling Variants
Automatic Tree Annotation in LiDAR Data
Improvements to DEM Merging with r.mblend
Mapping and Monitoring Airports with Sentinel 1 and 2 Data - Urban Geospatial Mapping for the SCRAMJET Business Networking Tool
Outdoors Mobile Augmented Reality Application Visualizing 3D Reconstructed Historical Monuments
An Interactive Story Map for the Methana Volcanic Peninsula
GIS and Geovisualization Technologies Applied to Rainfall Spatial Patterns over the Iberian Peninsula using the Global Climate Monitor Web Viewer
Land-use Classification for High-resolution Remote Sensing Image using Collaborative Representation with a Locally Adaptive Dictionary
Optimal Estimation of Census Block Group Clusters to Improve the Computational Efficiency of Drive Time Calculations
ResPred: A Privacy Preserving Location Prediction System Ensuring Location-based Service Utility
Elcano: A Geospatial Big Data Processing System based on SparkSQL
VOLA: A Compact Volumetric Format for 3D Mapping and Embedded Systems
Minimum Collection Period for Viable Population Estimation from Social Media
Spatiotemporal Data-Cube Retrieval and Processing with xWCPS
Improving Urban Simulation Accuracy through Analysis of Control Factors: A Case Study in the City Belt along the Yellow River in Ningxia, China
Comparison of Landsat and ASTER in Land Cover Change Detection within Granite Quarries
Standardized Big Data Processing in Hybrid Clouds
An Automated Approach to Mining and Visual Analytics of Spatiotemporal Context from Online Media Articles
An Example of Multitemporal Photogrammetric Documentation and Spatial Analysis in Process Revitalisation and Urban Planning
Positional Accuracy Assessment of the VGI Data from OpenStreetMap - Case Study: Federal University of Bahia Campus in Brazil
Representing GeoData for Tourism with Schema.org
Location Intelligence for Augmented Smart Cities Integrating Sensor Web and Spatial Data Infrastructure (SmaCiSENS)
Investigating the Use of Primes in Hashing for Volumetric Data
Unmanned Aerial Survey for Modelling Glacier Topography in Antarctica: First Results
Identifying the Impact of Human Made Transformations of Historical Watercourses and Flood Risk
Evaluation of AW3D30 Elevation Accuracy in China
Quantifying Land Cover Changes Caused by Granite Quarries from 1973-2015 using Landsat Data
Logic Modeling for NSDI Implementation Plan - A Case Study in Indonesia
An Alternative Raster Display Model
A Concept for Fast Indoor Mapping and Positioning in Post-Disaster Scenarios
Towards Rich Sensor Data Representation - Functional Data Analysis Framework for Opportunistic Mobile Monitoring
Evaluation of Two Solar Radiation Algorithms on 3D City Models for Calculating Photovoltaic Potential
Synthetic Images Simulation (SImS): A Tool in Development
Delimitation of Urban Areas with Use of the Plataform Google Engine Explorer
Geospatial Data Sharing Barriers Across Organizations and the Possible Solution for Ethiopia
Creating a Likelihood and Consequence Model to Analyse Rising Main Bursts