• SPROOF: A Platform for Issuing and Verifying Documents in a Public Blockchain
  • Are You Ready When It Counts? IT Consulting Firm’s Information Security Incident Management
  • Zero-sum Distinguishers for Round-reduced GIMLI Permutation
  • Identity-based TLS for Cloud of Chips
  • Mobile Devices as Digital Sextants for Zero-Permission Geolocation
  • Experiment on Side-Channel Key-Recovery using a Real LPWA End-device
  • Nonsense Attacks on Google Assistant and Missense Attacks on Amazon Alexa
  • Remote Exploit Development for Cyber Red Team Computer Network Operations Targeting Industrial Control Systems
  • Sensing Danger: Exploiting Sensors to Build Covert Channels
  • Accomplishing Transparency within the General Data Protection Regulation
  • A Decentralized Solution for Combinatorial Testing of Access Control Engine
  • Extracting Vehicle Sensor Signals from CAN Logs for Driver Re-identification
  • Behavioral Biometric Authentication in Android Unlock Patterns through Machine Learning
  • Hypervisor-assisted Atomic Memory Acquisition in Modern Systems
  • SC2Share: Smart Contract for Secure Car Sharing
  • Probabilistic Modeling and Simulation of Vehicular Cyber Attacks: An Application of the Meta Attack Language
  • Permission-based Risk Signals for App Behaviour Characterization in Android Apps
  • Locality-Sensitive Hashing for Efficient Web Application Security Testing
  • Theorising on Information Cascades and Sequential Decision-making for Analysing Security Behaviour
  • Security Analysis and Efficient Implementation of Code-based Signature Schemes
  • Robust Person Identification based on DTW Distance of Multiple-Joint Gait Pattern
  • A Novel Behaviour Profiling Approach to Continuous Authentication for Mobile Applications
  • Evaluating Security, Privacy and Usability Features of QR Code Readers
  • In-depth Feature Selection and Ranking for Automated Detection of Mobile Malware
  • Finding Classification Zone Violations with Anonymized Message Flow Analysis
  • Usability of Policy Authoring Tools: A Layered Approach
  • An Order-specified Aggregate Authority-transfer Signature
  • Automated Incident Response for Industrial Control Systems Leveraging Software-defined Networking
  • TED: A Container based Tool to Perform Security Risk Assessment for ELF Binaries
  • Evaluating Privacy Policy Summarization: An Experimental Study among Japanese Users
  • Towards Aligning GDPR Compliance with Software Development: A Research Agenda
  • The Common Vulnerability Scoring System vs. Rock Star Vulnerabilities: Why the Discrepancy?
  • Privacy Preservation of Social Network Users Against Attribute Inference Attacks via Malicious Data Mining
  • An Image Forgery Detection Solution based on DCT Coefficient Analysis
  • Smart-card Deployment of an Electronic Voting Protocol
  • Practical Solutions to Save Bitcoins Applied to an Identity System Proposal
  • Tracking Data Trajectories in IoT
  • A Fine-grained General Purpose Secure Storage Facility for Trusted Execution Environment
  • Sender Authentication for Automotive In-Vehicle Networks through Dual Analog Measurements to Determine the Location of the Transmitter
  • Predicting CyberSecurity Incidents using Machine Learning Algorithms: A Case Study of Korean SMEs
  • Accelerate Performance for Elliptic Curve Scalar Multiplication based on NAF by Parallel Computing
  • Phishing Email Detection based on Named Entity Recognition
  • Maia: A Language for Mandatory Integrity Controls of Structured Data
  • Definition and Efficient Construction of Encrypted k–anonymization Scheme
  • Improved Forensic Recovery of PKZIP Stream Cipher Passwords
  • Detecting Anomalies by using Self-Organizing Maps in Industrial Environments
  • AuthLedger: A Novel Blockchain-based Domain Name Authentication Scheme
  • Mathematical Model to Estimate Loss by Cyber Incident in Japan
  • Methodology of a Network Simulation in the Context of an Evaluation: Application to an IDS
  • A Novel Features Set for Internet Traffic Classification using Burstiness
  • Enhancing Business Process Modelling with Data Protection Compliance: An Ontology-based Proposal
  • Towards Automated Comprehensive Feature Engineering for Spam Detection
  • Identification and Extraction of Digital Forensic Evidence from Multimedia Data Sources using Multi-algorithmic Fusion
  • Monotonic and Non-monotonic Context Delegation
  • Probabilistic Graphical Model on Detecting Insiders: Modeling with SGD-HMM
  • Towards Automated Characterization of Malware’s High-level Mechanism using Virtual Machine Introspection
  • Malicious DNS Traffic in Tor: Analysis and Countermeasures
  • Threat Modeling and Attack Simulations of Connected Vehicles: A Research Outlook
  • Attack and Defence Modelling for Attacks via the Speech Interface
  • The Curious Case of Machine Learning in Malware Detection
  • Survey and Lessons Learned on Raising SME Awareness about Cybersecurity
  • SMMDecoy: Detecting GPU Keyloggers using Security by Deception Techniques
  • Flexible Access Control and Confidentiality over Encrypted Data for Document-based Database
  • Vulnerabilities in IoT Devices for Smart Home Environment
  • The HERMENEUT Project: Enterprises Intangible Risk Management via Economic Models based on Simulation of Modern Cyber Attacks
  • Machine Learning for All: A More Robust Federated Learning Framework
  • Construction of Secure Internal Networks with Communication Classifying System
  • A Secure Framework with Remote Configuration of Intellectual Property
  • Location Privacy Assured Internet of Things
  • Solving a Hard Instance of Suspicious Behaviour Detection with Sparse Binary Vectors Clustering
  • Systematic Characterization of a Sequence Group
  • Deep Neural Networks for Android Malware Detection
  • A Systematic Approach to Choose the Data Warehouse Architecture
  • Transfer Learning for Image-based Malware Classification
  • A Comparative Analysis of Android Malware
  • Fuzzy Logic Decision based Collaborative Privacy Management Framework for Online Social Networks
  • Analytical Modelling of Cyber-physical Systems
  • Spyware Detection using Temporal Logic
  • Design of an Example Network Protocol for Security Tests Targeting Industrial Automation Systems
  • Modeling and Simulation of Attacks on Cyber-physical Systems
  • ZKlaims: Privacy-preserving Attribute-based Credentials using Non-interactive Zero-knowledge Techniques
  • High-performance Pipelined FPGA Implementation of the Elliptic Curve Cryptography over GF (2n)
  • I Want to Break Square-free: The 4p − 1 Factorization Method and Its RSA Backdoor Viability
  • Indirect Data Representation Via Offset Vectoring: A Code-integrity-driven In-memory Data Regeneration Scheme
  • Potential Impacts in Citizens’ Privacy of using Federated Identity Management to Offer e-Government Services
  • Attack on a Scheme for Obfuscating and Outsourcing SAT Computations to the Cloud
  • LASER: Lightweight and Secure Remote Keyless Entry Protocol
  • Enriching Threat Intelligence Platforms Capabilities
  • Efficient Secure Floating-point Arithmetic using Shamir Secret Sharing
  • DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling
  • BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON Signature Scheme
  • On the Energy Consumption of Quantum-resistant Cryptographic Software Implementations Suitable for Wireless Sensor Networks
  • Distributed Anomaly Detection of Single Mote Attacks in RPL Networks
  • Hunting Traits for Cryptojackers
  • PRE as a Service within Smart Grid City
  • Evaluation of Intrusion Detection Systems in IPv6 Networks
  • A Comparative Study of Misapplied Crypto in Android and iOS Applications
  • Secure Strassen-Winograd Matrix Multiplication with MapReduce
  • DABSTERS: Distributed Authorities using Blind Signature to Effect Robust Security in e-Voting
  • Secure Intersection with MapReduce
  • “Open Weakness and Vulnerability Modeler” (OVVL): An Updated Approach to Threat Modeling
  • Differential Privacy meets Verifiable Computation: Achieving Strong Privacy and Integrity Guarantees
  • On the Efficacy of New Privacy Attacks against 5G AKA
  • BTG-RKASE: Privacy Preserving Revocable Key Aggregate Searchable Encryption with Fine-grained Multi-delegation & Break-The-Glass Access Control
  • An Investigation into the “Beautification” of Security Ceremonies
  • Universal Encoding for Provably Irreversible Data Erasing
  • Security for Distributed Deep Neural Networks: Towards Data Confidentiality & Intellectual Property Protection
  • OC-ORAM: Constant Bandwidth ORAM with Smaller Block Size using Oblivious Clear Algorithm
  • What Are the Threats? (Charting the Threat Models of Security Ceremonies)
  • A Software-defined Networking-based Detection and Mitigation Approach against KRACK
  • Master of Puppets: Trusting Silicon in the Fight for Practical Security in Fully Decentralised Peer-to-Peer Networks
  • PORTOS: Proof of Data Reliability for Real-World Distributed Outsourced Storage
  • A Robust Anaglyph 3D Video Watermarking based on Multi-sprite Generation
  • A Tool-assisted Methodology for the Data Protection Impact Assessment
  • Method for Vector Map Protection based on using of a Watermark Image as a Secondary Carrier
  • Web Application for Privacy-preserving Scheduling using Secure Computation
  • LADS: A Live Anomaly Detection System based on Machine Learning Methods
  • ECDSA-compatible Delegable Undeniable Signature
  • Here and There at Once, with my Mobile Phone!
  • Decentralized Privacy-preserving Access for Low Emission Zones
  • Identity-based Conditional Privacy-Preserving Authentication Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret
  • Integration of a Secure Physical Element as a Trusted Oracle in a Hyperledger Blockchain
  • RACE: Randomized Counter Mode of Authenticated Encryption using Cellular Automata
  • Is Privacy a Myth for Facebook Users?
  • Dynamic Taint-tracking: Directions for Future Research
  • Mind the Gap: Finding What Updates Have (Really) Changed in Android Applications
  • An Analysis of User Behaviors in Phishing eMail using Machine Learning Techniques
  • Semantic-based Obligation for Context-Based Access Control
  • Fides: Unleashing the Full Potential of Remote Attestation
  • An Efficient FHE Scheme to Secure Cloud Computing
  • PrivySharing: A Blockchain-based Framework for Integrity and Privacy-preserving Data Sharing in Smart Cities
  • A Taxonomy of Metrics and Tests to Evaluate and Validate Properties of Industrial Intrusion Detection Systems
  • Entropy and Security of Pseudorandom Number Generators based on Chaotic Iterations
  • A New Certificateless System Construction for Multiple Key Generator Centers to Secure Device-to-Device Communications
  • Keystroke Dynamics Anonymization System
  • A Wizard-based Approach for Secure Code Generation of Single Sign-On and Access Delegation Solutions for Mobile Native Apps
  • Prying CoW: Inferring Secrets across Virtual Machine Boundaries
  • Cryptanalysis of Homomorphic Encryption Schemes based on the Aproximate GCD Problem
  • Reducing Computational Cost in IoT Cyber Security: Case Study of Artificial Immune System Algorithm
  • Merger & Acquisition: A Comparative Integration Analysis of Third World Country
  • Scientific Foundation of Models: Towards the Complexity of the Agile Business Model
  • Mobile Phone Data Statistics as Proxy Indicator for Regional Economic Activity Assessment
  • Computer-supported Active Transparency for Strategic Open Innovation
  • Smart Healthcare and Ethical Issues
  • The Impact of Triple Bottom Line-oriented Environmental Management System on Firms’ Performance in China: Evidence from Yangtze River Delta
  • Knowledge Basis for Integration of Finance, Economics, Management and IT Business
  • South Austrian Seniors “vs.” ICT for Healthcare in AAL Pilot Regions
  • A Toolset to Detect and Classify Active Deformation Areas using Interferometric SAR Data
  • Fuzzy Estimation of Link Travel Time from a Digital Elevation Model and Road Hierarchy Level
  • Querying Distributed GIS with GeoPQLJ based on GeoJSON
  • The e-approximation of the Label Correcting Modification of the Dijkstra's Algorithm
  • 2D-STR: Reducing Spatio-temporal Traffic Datasets by Partitioning and Modelling
  • Optimizing Sample Patches Selection of CNN to Improve the mIOU on Landslide Detection
  • Deriving Spelling Variants from User Queries to Improve Geocoding Accuracy
  • Georeferencing of Road Infrastructure from Photographs using Computer Vision and Deep Learning for Road Safety Applications
  • Energy Modelling in Rural Areas with Spatial and Temporal Data in Germany and Czech Republic
  • Mapping Land Cover Types using Sentinel-2 Imagery: A Case Study
  • Knowledge Models and Image Processing Analysis in Remote Sensing: Examples of Yakutsk (Russia) and Kaunas (Lithuania)
  • Well Detection in Satellite Images using Convolutional Neural Networks
  • Monitoring Local Shoreline Changes by Integrating UASs, Airborne LiDAR, Historical Images and Orthophotos
  • Accuracy Assessment of a Photogrammetric UAV Block by using Different Software and Adopting Diverse Processing Strategies
  • Accelerating Urban Modelling Algorithms with Artificial Intelligence
  • GIS Application for Groundwater Vulnerability Assessment: Study Case of Hammam-Bou-hadjar Area-NW of Algeria
  • Critical Analysis of Urban Vegetation Mapping by Satellite Multispectral and Airborne Hyperspectral Imagery
  • Optimization of Rainwater Harvesting Sites using GIS
  • A Novel 2.5D Shadow Calculation Algorithm for Urban Environment
  • A Method of Terrain Crack Removal Suited for Large Differences in Boundary LoD
  • Skeleton Line Extraction Method in the Areas with Dense Junctions Considering Stroke Features
  • The Story Map for Metaxa Mine (Santorini, Greece): A Unique Site Where History and Volcanology Meet Each Other
  • The Study of Discrimination of Remotely Sensed Data for Designing the Separation Technique between Cassava and Sugarcane Farmland
  • Reaction-diffusion Model Describing the Morphogenesis of Urban Systems in the US
  • Sentinel-2 based Remote Evaluation System for a Harvest Monitoring of Sugarcane Area in the Northeast Thailand Contract Farming
  • Workflows for Virtual Reality Visualisation and Navigation Scenarios in Earth Sciences
  • Exploring Bot Pervasiveness in Global Cities using Publicly Available Volunteered Geographic Information
  • Management and Creation of a New Tourist Route in the National Park of the Sibillini Mountains using GIS Software, for Economic Development
  • Socio-economic and Demographic Trends in EU Rural Areas: An Indicator-based Assessment with LUISA Territorial Modelling Platform
  • GNSS Positioning using Android Smartphone
  • GIS-based Livability Assessment: A Practical Tool, a Promising Solution?
  • Homography and Image Processing Techniques for Cadastre Object Extraction
  • 3D Point Clouds in PostgreSQL/PostGIS for Applications in GIS and Geodesy
  • A Point of Interest Intelligent Search Method based on Browsing History
  • Improving the Performance of Road Network Analysis: The Morandi Bridge Case Study
  • Spatial Analysis of Drug Poisoning Deaths and Access to Substance-use Disorder Treatment in the United States
  • Advantages and Difficulties of using Spatial Enablement to Support Public Health in Cities: The PULSE Case Study
  • Remediation of Coastal Marine Sediment using Iron
  • Numerical Modelling of the Pollution Distribution from the Underwater Discharge of the Wastewater Treatment Plant near the Heraclean Peninsula of the Crimea under Different Wind Directions
  • Numerical Modelling of the Circulation and Pollution Transport from Rivers and Wastewater Treatment Plants in the Sochi Coastal Area
  • Assessment of Extreme Surge Simulation Accuracy in the Sea of Azov for Various Types of Atmospheric Forcing and Ocean Model Parameters
  • Investigation of Characteristics in Mountain Area with the Aim of Collecting Data for Modelling Flow Turbulent Parameters in a Wind Farm Located in a Coastal Area
  • Numerical Modelling of High-frequency Internal Waves Generated by River Discharge in Coastal Ocean
  • Strong Internal Tides in the Strait of Gibraltar: Measurements and Modelling
  • Numerical Simulation of Coastal Flows with Passive Pollutant by Regularized Hydrodynamic Equations in Shallow Water Approximation
  • Numerical Simulation of Internal Wave Attractors in Horizontally Elongated Domains with Sloping Boundaries