• Admonita: A Recommendation-based Trust Model for Dynamic Data Integrity
  • Experiences and Recommendations from Operating a Tor Exit Node at a University
  • Who Stores the Private Key? An Exploratory Study about User Preferences of Key Management for Blockchain-based Applications
  • Automatically Extracting Business Level Access Control Requirements from BPMN Models to Align RBAC Policies
  • Protecting Privacy during a Pandemic Outbreak
  • Enhanced Information Management in Inter-organisational Planning for Critical Infrastructure Protection: Case and Framework
  • Model-based Threat and Risk Assessment for Systems Design
  • Towards Collaborative Cyber Threat Intelligence for Security Management
  • A Secure Network Scanner Architecture for Asset Management in Strongly Segmented ICS Networks
  • Canopy: A Learning-based Approach for Automatic Low-and-Slow DDoS Mitigation
  • On Security Analysis of Periodic Systems: Expressiveness and Complexity
  • Predicting Security Program Effectiveness in Bring-Your-Own-Device Deployment in Organizations
  • Automatic Detection of Cyber Security Events from Turkish Twitter Stream and Newspaper Data
  • Active Directory Kerberoasting Attack: Detection using Machine Learning Techniques
  • Field Studies on the Impact of Cryptographic Signatures and Encryption on Phishing Emails
  • Improvement of Secure Multi-Party Multiplication of (k, n) Threshold Secret Sharing Using Only N = k Servers
  • Towards a Formalisation of Expert’s Knowledge for an Automatic Construction of a Vulnerability Model of a Cyberphysical System
  • A Novel Simplified Framework to Secure IoT Communications
  • Linking Biometric Voice Identity with Self-monitoring Health Data as a Temporal-spatial Event Stored in a Mobile Device
  • DLP-Visor: A Hypervisor-based Data Leakage Prevention System
  • An Analytic Attack against ARX Addition Exploiting Standard Side-channel Leakage
  • Bridging Knowledge Gaps in Security Analytics
  • Continuous Authentication based on Hand Micro-movement during Smartphone Form Filling by Seated Human Subjects
  • Blockchain based Secured Virtual Machine Image Monitor
  • The Comparison of Word Embedding Techniques in RNNs for Vulnerability Detection
  • The Proposal of Double Agent Architecture using Actor-critic Algorithm for Penetration Testing
  • Two Stage Anomaly Detection for Network Intrusion Detection
  • Ontology-based Cybersecurity and Resilience Framework
  • A Permissioned Blockchain-based System for Collaborative Drug Discovery
  • Windows Malware Binaries in C/C++ GitHub Repositories: Prevalence and Lessons Learned
  • Optimizing Leak Detection in Open-source Platforms with Machine Learning Techniques
  • Implementation of Secondary Available Digital Content Protection Schemes using Identity-based Signatures
  • Towards an Ontology for Enterprise Level Information Security Policy Analysis
  • Adversarial Machine Learning: A Comparative Study on Contemporary Intrusion Detection Datasets
  • Profiling and Discriminating of Containerized ML Applications in Digital Data Marketplaces (DDM)
  • Automatic Detection and Decryption of AES by Monitoring S-Box Access
  • Parallel Privacy-preserving Computation of Minimum Spanning Trees
  • Representation of PE Files using LSTM Networks
  • Understanding How People Weigh the Costs and Benefits of using Facebook
  • Hydra: Practical Metadata Security for Contact Discovery, Messaging, and Dialing
  • Sociocultural Influences for Password Definition: An AI-based Study
  • Efficient Semantic Representation of Network Access Control Configuration for Ontology-based Security Analysis
  • A Lemon by Any Other Label
  • Implementing Secure Applications Thanks to an Integrated Secure Element
  • Automated Black Box Detection of HTTP GET Request-based Access Control Vulnerabilities in Web Applications
  • An Asynchronous Federated Learning Approach for a Security Source Code Scanner
  • HyperPass: Secure Password Input Platform
  • A State Saturation Attack against Massively Multiplayer Online Videogames
  • Securing the Linux Boot Process: From Start to Finish
  • Leveraging Dynamic Information for Identity and Access Management: An Extension of Current Enterprise IAM Architecture
  • Dreaming of Keys: Introducing the Phantom Gradient Attack
  • Towards Exploring User Perception of a Privacy Sensitive Information Detection Tool
  • CyExec*: Automatic Generation of Randomized Cyber Range Scenarios
  • Evaluation of Vulnerability Reproducibility in Container-based Cyber Range
  • Improving Classification of Malware Families using Learning a Distance Metric
  • A Dynamic Access Control System based on Situations of Users
  • From Exposed to Exploited: Drawing the Picture of Industrial Control Systems Security Status in the Internet Age
  • MADLIRA: A Tool for Android Malware Detection
  • Securing Orchestrated Containers with BSI Module SYS.1.6
  • Towards Academic and Skills Credentialing Standards and Distributed Ledger Technologies
  • Privacy Preserving Services for Intelligent Transportation Systems with Homomorphic Encryption
  • A Protection against the Extraction of Neural Network Models
  • Security Property Modeling
  • Developing Cyber-risk Centric Courses and Training Material for Cyber Ranges: A Systematic Approach
  • Release-aware In-out Encryption Adjustment in MongoDB Query Processing
  • Learning from Smartphone Location Data as Anomaly Detection for Behavioral Authentication through Deep Neuroevolution
  • Accessible Cyber Security: The Next Frontier?
  • Colluding Covert Channel for Malicious Information Exfiltration in Android Environment
  • Unconventional Attack against Voting Machines Enlarging the Scope of Cybersecurity Risk Analysis
  • Experimental Evaluation of Description Logic Concept Learning Algorithms for Static Malware Detection
  • Towards Formal Security Verification of Over-the-Air Update Protocol: Requirements, Survey and UpKit Case Study
  • Utilizing Keystroke Dynamics as Additional Security Measure to Protect Account Recovery Mechanism
  • Remote WebAuthn: FIDO2 Authentication for Less Accessible Devices
  • Study of Intra- and Inter-user Variance in Password Keystroke Dynamics
  • Enabling Monetization of Depreciating Data on Blockchains
  • How to Improve the GDPR Compliance through Consent Management and Access Control
  • Detecting Cyber Security Attacks against a Microservices Application using Distributed Tracing
  • An Overview of Cryptographic Accumulators
  • Malware Classification with Word Embedding Features
  • Malware Classification using Long Short-term Memory Models
  • Malware Classification with GMM-HMM Models
  • A New Dataset for Smartphone Gesture-based Authentication
  • On Formalising and Analysing the Tweetchain Protocol
  • Mobile Robots: An Overview of Data and Security
  • Stopping DNS Rebinding Attacks in the Browser
  • Checking Contact Tracing App Implementations
  • Security Issues of Electronic and Mobile Banking
  • Enforcing Cardinality Constraint in Temporal RBAC
  • Supporting Cyber Threat Analysis with Service-Oriented Enterprise Modeling
  • Signer and Message Ambiguity from a Variety of Keys
  • An Upcycling Tokenization Method for Credit Card Numbers
  • Ransomware Detection using Markov Chain Models over File Headers
  • Dynamic Access Control Framework for Enterprise Content Management Systems
  • AVX-512-based Parallelization of Block Sieving and Bucket Sieving for the General Number Field Sieve Method
  • A Unified Model to Detect Information Flow and Access Control Violations in Software Architectures
  • Can a TLS Certificate Be Phishy?
  • Involving Humans in the Cryptographic Loop: Introduction and Threat Analysis of EEVEHAC
  • Comparing Classifiers’ Performance under Differential Privacy
  • Proof-of-Useful-Randomness: Mitigating the Energy Waste in Blockchain Proof-of-Work
  • A New MILP Model for Matrix Multiplications with Applications to KLEIN and PRINCE
  • Protecting End User’s Privacy When using Social Login through GDPR Compliance
  • Hashing to Prime in Zero-Knowledge
  • Private Set Intersection: Past, Present and Future
  • BLT+L: Efficient Signatures from Timestamping and Endorsements
  • Efficient Joint Random Number Generation for Secure Multi-party Computation
  • Scalable k-anonymous Microaggregation: Exploiting the Tradeoff between Computational Complexity and Information Loss
  • MMU-based Access Control for Libraries
  • Statically Identifying XSS using Deep Learning
  • A Novel Security Framework for Minimization of False Information Dissemination in VANETs: Bayesian Game Formulation
  • Are You There, Moriarty? Feasibility Study of Internet-based Location for Location-based Access Control Systems
  • An Extension of the Avalanche Criterion in the Context of c-Differentials
  • Python and Malware: Developing Stealth and Evasive Malware without Obfuscation
  • A New Delegated Authentication Protocol based on PRE
  • SSI Strong Authentication using a Mobile-phone based Identity Wallet Reaching a High Level of Assurance
  • Armored Twins: Flexible Privacy Protection for Digital Twins through Conditional Proxy Re-Encryption and Multi-Party Computation
  • Mobile Family Detection through Audio Signals Classification
  • Towards Integrating Security in Industrial Engineering Design Practices
  • Practically Efficient RFID Scheme with Constant-time Identification
  • A Comparison of GKE Protocols based on SIDH
  • Multi-Party Private Set Intersection Protocols for Practical Applications
  • Balancing Quality and Efficiency in Private Clustering with Affinity Propagation
  • Exposure Resilient Public-key Encryption with Keyword Search against Keyword Guessing Attack
  • Using Program Analysis to Identify the Use of Vulnerable Functions
  • Automated Symbolic Verification of Telegram’s MTProto 2.0
  • Compact Variable-base ECC Scalar Multiplication using Euclidean Addition Chains
  • Secure Computation by Secret Sharing using Input Encrypted with Random Number
  • Formal Proof of a Vulnerability in Z-Wave IoT Protocol
  • Formal Analysis of EDHOC Key Establishment for Constrained IoT Devices
  • The Missing Piece of the ABAC Puzzle: A Modeling Scheme for Dynamic Analysis
  • A Scalable Bitcoin-based Public Key Certificate Management System
  • Program Protection through Software-based Hardware Abstraction
  • Cloud Key Management using Trusted Execution Environment
  • Model Inversion for Impersonation in Behavioral Authentication Systems
  • Trace Recovery: Inferring Fine-grained Trace of Energy Data from Aggregates
  • Preventing Watermark Forging Attacks in a MLaaS Environment
  • Systematic Evaluation of Probabilistic k-Anonymity for Privacy Preserving Micro-data Publishing and Analysis
  • RMCCS: RSSI-based Message Consistency Checking Scheme for V2V Communications
  • Boolean Exponent Splitting
  • An Improved Live Anomaly Detection System (I-LADS) based on Deep Learning Algorithms
  • Inferring Flow Table State through Active Fingerprinting in SDN Environments: A Practical Approach
  • A New Method of Testing Machine Learning Models of Detection for Targeted DDoS Attacks
  • Comparing Support Vector Machine and Neural Network Classifiers of CVE Vulnerabilities
  • SecSDN: A Novel Architecture for a Secure SDN
  • Privacy Aura for Transparent Authentication on Multiple Smart Devices
  • Proof-of-Forgery for Hash-based Signatures
  • Trusted Enforcement of Application-specific Security Policies
  • Storage Friendly Provably Secure Multivariate Identity-Based Signature from Isomorphism of Polynomials Problem
  • Formal Security Verification of the Station-to-Station based Cell-attachment Procedure of LDACS
  • RICAV: RIsk based Context-Aware Security Solution for the Intra-Electric Vehicle Network
  • Verify It Yourself: A Note on Activation Functions’ Influence on Fast DeepFake Detection
  • GRANEF: Utilization of a Graph Database for Network Forensics
  • HIJaX: Human Intent JavaScript XSS Generator
  • User Identification from Time Series of Fitness Data
  • Privacy Preserving Scalable Authentication Protocol with Partially Trusted Third Party for Distributed Internet-of-Things
  • Side Channel Counter-measures based on Randomized AMNS Modular Multiplication
  • C2RBAC: An Extended Capability-Role-Based Access Control with Context Awareness for Dynamic Environments
  • Can Data Subject Perception of Privacy Risks Be Useful in a Data Protection Impact Assessment?
  • Goal and Threat Modelling for Driving Automotive Cybersecurity Risk Analysis Conforming to ISO/SAE 21434
  • Selective Owner-side Encryption in Digital Data Markets: Strategies for Key Derivation
  • Responding to Living-Off-the-Land Tactics using Just-In-Time Memory Forensics (JIT-MF) for Android
  • Collateral-Free Trustworthiness-based Personal Lending on a Decentralized Application (DApp)
  • Investing Data with Untrusted Parties using HE
  • Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment
  • Empirical Security and Privacy Analysis of Mobile Symptom Checking Apps on Google Play
  • BlockJack: Towards Improved Prevention of IP Prefix Hijacking Attacks in Inter-domain Routing via Blockchain
  • A Framework for Security and Risk Analysis of Enrollment Procedures: Application to Fully-remote Solutions based on eDocuments
  • Accurate Measurement of the Energy Consumption of Security Functions
  • Property Inference Attacks on Convolutional Neural Networks: Influence and Implications of Target Model’s Complexity
  • Classifying Biometric Systems Users among the Doddington Zoo: Application to Keystroke Dynamics
  • Fair Mutual Authentication
  • Towards CRYSTALS-Kyber VHDL Implementation
  • Fast Cramer-Shoup Cryptosystem
  • Anonymous Attribute-based Credentials in Collaborative Indoor Positioning Systems
  • Machine Learning Classification of Obfuscation using Image Visualization
  • PUF based Lightweight Authentication and Key Exchange Protocol for IoT
  • Vulnerability Metrics for Graph-based Configuration Security
  • Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation
  • On Chameleon Pseudonymisation and Attribute Compartmentation-as-a-Service
  • Smart Home based on Internet of Things and Ethical Issues
  • Academic Network for Strengthening Accounting and Fiscal Research in Post-pandemic Times
  • Youth: Possible Segment of the Movement for Sustainability in Tourism
  • The Influence of Context on Value Proposition Co-creation of Online Shopping Platform in China
  • Morocco's Trade, between Free Trade Agreements and Integration into the African Union: Which Potential for Morocco's Foreign Trade?
  • The Transition from IAS 39 to IFRS 9 and Its Impact on Financial Performance: Case of a Moroccan Public Financial Institution
  • Population Mobility Patterns and Monitoring of COVID-19 Restriction Measures in Latvia
  • Does the Board of Commissioners Affect Tax Avoidance? Evidence from Banking Industry in Indonesia
  • The SMEs Innovation in Europe
  • FinTech and Commercial Banks' Performance in China: The Current Status and Lessons Learned from Our Data Analysis
  • Innovation as Argumentation in Closed and Technology-mediated Open Models
  • Relationship between Planned Behavior in Front of the Desire That Student Has to Enroll in the Public Accounting Programs on Distance-teaching Mode in Colombia
  • Trends in Recruitment Information and Communication System using Artificial Intelligence in Industry 4.0
  • Using SAR Satellite Imagery for Potential Green Roof Retrofitting for Flood Mitigation in Urban Environment
  • Vertical Accuracy Assessment of ALOS PALSAR, GMTED2010, SRTM and Topodata Digital Elevation Models
  • Deep Learning Application for Urban Change Detection from Aerial Images
  • Virtual Outcrops Building in Extreme Logistic Conditions for Data Collection, Geological Mapping, and Teaching: The Santorini’s Caldera Case Study, Greece
  • Multicriteria Spatial Analysis to Map Artificial Groundwater Recharge Zones: Northern UAE
  • An Analytical Tool for Georeferenced Sensor Data based on ELK Stack
  • Multitemporal Remote Sensing for Invasive Prosopis Juliflora Plants Mapping and Monitoring: Sharjah, UAE
  • A Journey to Salamis Island (Greece) using a GIS Tailored Interactive Story Map Application
  • Mapping Siberian Arctic Mountain Permafrost Landscapes by Machine Learning Multi-sensors Remote Sensing: Example of Adycha River Valley
  • Definition of an Enriched GIS Network for Evacuation Planning
  • Modeling Normal and Extreme Wave Conditions in Callao Bay, Peru using Reanalysis Data
  • Integrating Population Surveys using Spatial Visual Analytics: A Case Study on Nutrition and Health Indicators of Children under Five in India
  • Derivation of Wildfire Ignition Index using GIS-MCDA from High-Resolution UAV Imagery Data and Perception Analysis in Settlement Sali, Dugi Otok Island (Croatia)
  • Derivation of Urban Planning Indicators (UPIs) using Worldview-3 Imagery and GEOBIA Method for Split Settlement, Croatia
  • Civic-Tech and Volunteered Geographic Information under the COVID-19 Pandemic: A Japanese Case Study
  • Study on Carrying Capacity of Resources in Danjiangkou Reservoir Area based on GIS Technologies
  • Deploying Urban Agricultural System for an Innovative and Sustainable Urban Renewal
  • A Study of Higher Order Volume Scattering in a Layer of Discrete Random Scatterers
  • Study on Ground Motions in Southwest Bulgaria based on in-Situ and Satellite Data
  • Evaluating a Convolutional Neural Network and a Mosaic Image Database for Land Use Segmentation in the Brazilian Amazon Region
  • A New Soil Degradation Method Analysis by Sentinel 2 Images Combining Spectral Indices and Statistics Analysis: Application to the Cameroonians Shores of Lake Chad and Its Hinterland
  • Vegetation Filtering using Colour for Monitoring Applications from Photogrammetric Data
  • A Comparison of Interpolation Techniques in Producing a DEM from the 5 m National Geospatial Institute (NGI) Contours
  • An Improved Approach for Effective Describing Geometric Data in ifcOWL through WKT High Order Expressions
  • Multi-Temporal Inundated Areas Monitoring Made Easy: The Case of Kerkini Lake in Greece
  • Recent Advances in Land Surface Phenology Estimation with Multispectral Sensing
  • Air and Water Quality Improvement during COVID-19 Lockdown
  • Spatial K-anonymity: A Privacy-preserving Method for COVID-19 Related Geo-spatial Technologies