• Security of Digital Banking Systems in Poland: Users Study 2019
  • Comparison of the Paillier and ElGamal Cryptosystems for Smart Grid Aggregation Protocols
  • Privacy-preserving Surveillance Methods using Homomorphic Encryption
  • Maturity Modelling to Prepare for Cyber Crisis Escalation and Management
  • Translating Data Protection into Software Requirements
  • Revisiting Higher-order Computational Attacks against White-box Implementations
  • Modeling Cyber Threat Intelligence
  • Integration of Data Envelopment Analysis in Business Process Models: A Novel Approach to Measure Information Security
  • Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach
  • An Approach to Secure Legacy Software Systems
  • Is Ethereum’s ProgPoW ASIC Resistant?
  • Exploring Vulnerabilities in Solidity Smart Contract
  • Quantifying the Significance of Cybersecurity Text through Semantic Similarity and Named Entity Recognition
  • A Comparison of Blockchain-based PKI Implementations
  • A Domain-specific Modeling Framework for Attack Surface Modeling
  • AMNESIA: A Technical Solution towards GDPR-compliant Machine Learning
  • Visualizing Syscalls using Self-organizing Maps for System Intrusion Detection
  • CoProtect: Collaborative Management of Cryptographic Keys for Data Security in Cloud Systems
  • Threat Modeling and Attack Simulations of Smart Cities: A Literature Review and Explorative Study
  • Bident Structure for Neural Network Model Protection
  • Secure Ownership Transfer for the Internet of Things
  • Risk Identification: From Requirements to Threat Models
  • A Systematic Approach toward Extracting Technically Enforceable Policies from Data Usage Control Requirements
  • Host Fingerprinting for Web Servers Authentication
  • Computer Viruses: The Abstract Theory Revisited
  • Revisiting Privacy-aware Blockchain Public Key Infrastructure
  • A Formal Approach for the Analysis of the XRP Ledger Consensus Protocol
  • Email Spoofing Attack Detection through an End to End Authorship Attribution System
  • Securing IoT Devices using Geographic and Continuous Login Blocking: A Honeypot Study
  • Active Directory Kerberoasting Attack: Monitoring and Detection Techniques
  • CCA Secure Unidirectional PRE with Key Pair in the Standard Model without Pairings
  • Using Eyetracker to Find Ways to Mitigate Ransomware
  • Email Image Spam Classification based on ResNet Convolutional Neural Network
  • Lightweight Authentication and Secure Communication Suitable for IoT Devices
  • Evaluation to Classify Ransomware Variants based on Correlations between APIs
  • A Practical Approach to Stakeholder-driven Determination of Security Requirements based on the GDPR and Common Criteria
  • Achieving Privacy, Security, and Interoperability among Biometric Networks using Symmetric Encryption
  • CoRA: A Scalable Collective Remote Attestation Protocol for Sensor Networks
  • Track Down Identity Leaks using Threat Intelligence
  • Improving Accuracy and Speed of Network-based Intrusion Detection using Gradient Boosting Trees
  • Privacy-preserving Measures in Smart City Video Surveillance Systems
  • Homomorphic Encryption at Work for Private Analysis of Security Logs
  • Radical Text Detection based on Stylometry
  • On Analyzing Third-party Tracking via Machine Learning
  • The Root Causes of Compromised Accounts at the University
  • Patients to Mobilize Their Data: Secure and Flexible mHealth Delegation
  • Assessing Testing Strategies for Access Control Systems: A Controlled Experiment
  • Accountant: Protection of Data Integrity and Identification of Malicious Nodes in In-network Data Processing
  • Secrecy and Authenticity Properties of the Lightning Network Protocol
  • Privacy with Health Information Technologies: What Story Do Data Breaches in US Tell Us?
  • Building Competitive Advantage from Ubuntu: An African Information Security Awareness Model
  • Evaluating the Effect of Justification and Confidence Information on User Perception of a Privacy Policy Summarization Tool
  • Harmonized Group Mix for ITS
  • A Curious Exploration of Malicious PDF Documents
  • Dual-use Research in Ransomware Attacks: A Discussion on Ransomware Defence Intelligence
  • Systematization of Threats and Requirements for Private Messaging with Untrusted Servers: The Case of e-Mailing and Instant Messaging
  • An Analytical Scanning Technique to Detect and Prevent the Transformed SQL Injection and XSS Attacks
  • Neural Network Security: Hiding CNN Parameters with Guided Grad-CAM
  • Distributed Defence of Service (DiDoS): A Network-layer Reputation-based DDoS Mitigation Architecture
  • Presence Metadata in the Internet of Things: Challenges and Opportunities
  • A Study of Classification of Texts into Categories of Cybersecurity Incident and Attack with Topic Models
  • New General Secret Sharing Scheme using Hierarchical Threshold Scheme: Improvement of Information Rates for Specified Participants
  • A Quantitative Study of Vulnerabilities in the Internet of Medical Things
  • Speeding Up the Computation of Elliptic Curve Scalar Multiplication based on CRT and DRM
  • External Contextual Factors in Information Security Behaviour
  • Greater Control and Transparency in Personal Data Processing
  • Securing Industrial Production from Sophisticated Cyberattacks
  • A Meta Model for a Comprehensive Description of Network Protocols Improving Security Tests
  • Introducing a Verified Authenticated Key Exchange Protocol over Voice Channels for Secure Voice Communication
  • Legislation and the Negative Impact on Cybersecurity in Healthcare
  • A Homomorphic Proxy Re-authenticators based Efficient Multi-client Non-interactive Verifiable Computation Scheme
  • Secure Comparison and Interval Test Protocols based on Three-party MPC
  • Multi-level Distributed Intrusion Detection System for an IoT based Smart Home Environment
  • Ontology-based Automation of Penetration Testing
  • Recommender Systems Robust to Data Poisoning using Trim Learning
  • Distance Metric Learning using Particle Swarm Optimization to Improve Static Malware Detection
  • Security and Privacy in Smart Grids: Challenges, Current Solutions and Future Opportunities
  • MedBIoT: Generation of an IoT Botnet Dataset in a Medium-sized IoT Network
  • Tool Support for Risk-driven Planning of Trustworthy Smart IoT Systems within DevOps
  • Methodology and Feedback about Systematic Cybersecurity Experts Auditing in Belgium
  • Toward Active and Passive Confidentiality Attacks on Cryptocurrency Off-chain Networks
  • Anomaly Detection in Communication Networks of Cyber-physical Systems using Cross-over Data Compression
  • Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification
  • Detection of Crawler Traps: Formalization and Implementation Defeating Protection on Internet and on the TOR Network
  • Verifying Sanitizer Correctness through Black-Box Learning: A Symbolic Finite Transducer Approach
  • The Blockchain Potential in Computer Virology
  • Bank Credit Risk Management based on Data Mining Techniques
  • Android Run-time Permission Exploitation User Awareness by Means of Formal Methods
  • Comparing Machine Learning Techniques for Malware Detection
  • Analysis of Security Attacks in Wireless Sensor Networks: From UPPAAL to Castalia
  • Accidental Sensitive Data Leaks Prevention via Formal Verification
  • A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based Cryptosystems
  • SMART: Shared Memory based SDN Architecture to Resist DDoS ATtacks
  • Formal Accuracy Analysis of a Biometric Data Transformation and Its Application to Secure Template Generation
  • CROOT: Code-based Round-Optimal Oblivious Transfer
  • Attribute-Based Encryption and Its Application to a Software-Distributed Shared Memory
  • Exploiting Hot Spots in Heuristic Safety Analysis of Dynamic Access Control Models
  • Towards Understanding Man-on-the-Side Attacks (MotS) in SCADA Networks
  • Towards Secure Edge-assisted Image Sharing for Timely Disaster Situation Awareness
  • VIP Blowfish Privacy in Communication Graphs
  • QSOR: Quantum-safe Onion Routing
  • Helper-in-the-Middle: Supporting Web Application Scanners Targeting Industrial Control Systems
  • A Comprehensive Quantified Approach for Security Risk Management in e-Health Systems
  • cipherPath: Efficient Traversals over Homomorphically Encrypted Paths
  • Deconstructing the Decentralization Trilemma
  • A Machine-learning based Unbiased Phishing Detection Approach
  • Stay Thrifty, Stay Secure: A VPN-based Assurance Framework for Hybrid Systems
  • Towards Language Support for Model-based Security Policy Engineering
  • Droppix: Towards More Realistic Video Fingerprinting
  • A White-Box Encryption Scheme using Physically Unclonable Functions
  • Ensuring the Integrity of Outsourced Web Scripts
  • A Fine-grained Access Control Model for Knowledge Graphs
  • Privacy-Preserving Greater-Than Integer Comparison without Binary Decomposition
  • FPGA-based McEliece Cryptosystem using Non-linear Convolutional Codes
  • A Novel Anonymous Authentication and Key Agreement Scheme for Smart Grid
  • Beyond Black and White: Combining the Benefits of Regular and Incognito Browsing Modes
  • A Trend-following Trading Indicator on Homomorphically Encrypted Data
  • Accelerating Homomorphic Encryption using Approximate Computing Techniques
  • Performance Comparison of Two Generic MPC-frameworks with Symmetric Ciphers
  • This Selfie Does Not Exist: On the Security of Electroneum Cloud Mining
  • Multi-Stakeholder Cybersecurity Risk Assessment for Data Protection
  • Defender-centric Conceptual Cyber Exposure Ontology for Adaptive Cyber Risk Assessment
  • An Enhanced Lightweight Authentication Scheme for Secure Access to Cloud Data
  • An Innovative Self-Healing Approach with STIX Data Utilisation
  • Linear Generalized ElGamal Encryption Scheme
  • Optimizing dm-crypt for XTS-AES: Getting the Best of Atmel Cryptographic Co-processors
  • Identity Verification and Fraud Detection During Online Exams with a Privacy Compliant Biometric System
  • Authentication and Key Management Automation in Decentralized Secure Email and Messaging via Low-entropy Secrets
  • Decentralized Multi-Client Attribute Based Functional Encryption
  • SENSSE: Simple, Efficient Searchable Symmetric Encryption for Sensor Networks
  • Solving Set Relations with Secure Bloom Filters Keeping Cardinality Private
  • Efficient Access-control in the IIoT through Attribute-Based Encryption with Outsourced Decryption
  • Evasive Windows Malware: Impact on Antiviruses and Possible Countermeasures
  • Practical Hash-based Anonymity for MAC Addresses
  • ProteiNN: Privacy-preserving One-to-Many Neural Network Classifications
  • Security Analysis of ElGamal Implementations
  • Practical Predicate Encryption for Inner Product
  • Privacy-preserving Content-based Publish/Subscribe with Encrypted Matching and Data Splitting
  • Avoiding Network and Host Detection using Packet Bit-masking
  • An Identity-matching Process to Strengthen Trust in Federated-identity Architectures
  • Under Pressure: Pushing Down on Me – Touch Sensitive Door Handle to Identify Users at Room Entry
  • Optimal Transport Layer for Secure Computation
  • CP-ABE Scheme Satisfying Constant-size Keys based on ECC
  • Practically Efficient Attribute-based Encryption for Compartmented Access Structures
  • SwaNN: Switching among Cryptographic Tools for Privacy-preserving Neural Network Predictions
  • Exploring Current E-mail Cyber Threats using Authenticated SMTP Honeypot
  • Round-optimal Constant-size Blind Signatures
  • Efficient Constructions of Non-interactive Secure Multiparty Computation from Pairwise Independent Hashing
  • Providing Secured Access Delegation in Identity Management Systems
  • Prov-Trust: Towards a Trustworthy SGX-based Data Provenance System
  • DCBC: A Distributed High-performance Block-Cipher Mode of Operation
  • Differentially Private Graph Publishing and Randomized Response for Collaborative Filtering
  • Signatures to Go: A Framework for Qualified PDF Signing on Mobile Devices
  • Address-bit Differential Power Analysis on Boolean Split Exponent Counter-measure
  • Privacy Enhanced DigiLocker using Ciphertext-Policy Attribute-Based Encryption
  • FALCO: Detecting Superfluous JavaScript Injection Attacks using Website Fingerprints
  • Beyond Administration: A Modeling Scheme Supporting the Dynamic Analysis of Role-based Access Control Policies
  • Termination of Ethereum’s Smart Contracts
  • Non-invasive Wireless Mobile System for COVID-19 Monitoring in Nursing Homes
  • Securing Device-to-Cloud Interactions in the Internet of Things Relying on Edge Devices
  • How Did MiFID Affect Systemic Underperformance in the European Equity Market? A Tracking Error based Approach
  • DLT-based Tokens Classification towards Accounting Regulation
  • Measures of Monetary Policy in Latin America
  • A Commons-compatible Implementation of the Sharing Economy: Blockchain-based Open Source Mediation
  • Comparative Study of e-Commerce Ventures: Copycat Enablers in Business Models
  • Huff Model for Shopping Centre Assessment using Aggregated Mobile Phone Data
  • A Simple Scenario-based Qualitative Model for Assessing Start-up Risks
  • Determinants of Technological Innovation Capabilities: Using Fuzzy-DEMATEL and ANP
  • A Review Paper on the Application of Big Data by Banking Institutions and Related Ethical Issues and Responses
  • Ambiguity of Innovation Typology in Innovation Measurement: Towards a Unified Typology of Innovation and Measurement Model
  • A Comprehensive Evaluation of Economic Vitality and Markov's Prediction: An Empirical Study of a Major City in China
  • A Smart Treasury Fit for the 4th Industrial Revolution
  • Towards the Innovation of High-tech Small-medium Enterprises (SMEs): The Interview Approach
  • Ethical Questions Raised by Public Accountants in Colombia Related to Tax Advice
  • A Survey on Machine Learning for Stock Price Prediction: Algorithms and Techniques
  • A Public Participatory Approach toward the Development of a Comprehensive Geospatial Database in Support of High-scale Food Security Analysis
  • A Comparative Analysis of “Urban Expansion” using Remotely Sensed Data of CORINE Land Cover and Global Human Settlement Layer in Estonia
  • A Cloud Architecture for Processing and Visualization of Geo-located 3D Digital Cultural Heritage Models
  • Use of Current Remote Sensing Methods for Biodiversity Monitoring and Conservation of Mount Kilimanjaro National Park Ecosystems
  • Towards Real Estate Analytics using Map Personalisation
  • Design and Development of an Application for Predicting Bus Travel Times using a Segmentation Approach
  • Analysis of Cartographic Generalization based on PYTHON Programming Language on Digital Topographic Maps
  • Relation between Proximity to Public Open Spaces and Socio-economic Level in Three Cities in the Ecuadorian Andes
  • From Pixels to 3D Representations of Buildings: A 3D Geo-visualization of Perspective Urban Respecting Some Urbanization Constraints
  • Spatial Entity Resolution between Restaurant Locations and Transportation Destinations in Southeast Asia
  • Aiding Irrigation Census in Developing Countries by Detecting Minor Irrigation Structures from Satellite Imagery
  • Application of Rodrigues Matrix in High Accuracy Geo-location for ZY-3 Panchromatic Imagery
  • Quantifying Tufa Growth Rates (TGRs) using Structure-from-Motion (SfM) Photogrammetry
  • GIScience Integrated with Computer Vision for the Interpretation and Analysis of Old Paintings
  • The Construction of a Network for Indoor Navigation
  • Alas Landscape Modeling by Remote Sensing Image Analysis and Geographic Ontology: Study Case of Central Yakutia (Russia)
  • Selfie Drones for 3D Modelling, Geological Mapping and Data Collection: Key Examples from Santorini Volcanic Complex, Greece
  • Urban Consumption Patterns: OpenStreetMap Quality for Social Science Research
  • An Integrated Environmental Monitoring Approach through the Development of Coal Mine, a GIS Open Source Application
  • In-memory k Nearest Neighbor GPU-based Query Processing
  • A GIS Open Source Application to Perform the Spatial Distribution of Prevention Quality Indicators (PQIs)
  • Scale Drone Mapping on K8S: Auto-scale Drone Imagery Processing on Kubernetes-orchestrated On-premise Cloud-computing Platform
  • A Pilot Project Proposal for the Implementation of a Geographic Information System for Immuno-Oncology in Italy
  • Novel Virtual Reality Solutions for Captivating Virtual Underwater Tours Targeting the Cultural and Tourism Industries
  • Optimal Path Planning for Drone Inspections of Linear Infrastructures
  • Forecasting Travel Times with Space Partitioning Methods
  • Prediction of Spatiotemporal Distributions of Transient Urban Populations with Statistics Gathered by Cell Phones
  • Location Extraction from Twitter Messages using Bidirectional Long Short-Term Memory Model
  • Geolocation Prediction from Tweets: A Case Study of Influenza-like Illness in Australia
  • Occupancy Grid Map Generation from OSM Indoor Data for Indoor Positioning Applications
  • Combining Spatial Data Layers using Fuzzy Inference Systems: Application to an Agronomic Case Study
  • In-house Localization for Wi-Fi Coverage Diagnostics
  • Multiscale GIS based Analysis of Urban Green Spaces (UGS) Accessibility: Case Study of Sisak (Croatia)
  • Assessing the Vertical Accuracy of Worldview-3 Stereo-extracted Digital Surface Model over Olive Groves
  • Corinth Gulf Story Map: Enhancing Public Awareness in Natural and Anthropogenic Environment using Interactive GIS Applications
  • Assessment of the Completeness of OpenStreetMap and Google Maps for the Province of Pavia (Italy)
  • Improving the Usability of the Land Cover and Use Information System of Spain (SIOSE): A Proposal to Distribute New Thematic Layers and Predefined Reclassifications
  • Towards an Affordable GIS for Analysing Public Transport Mobility Data: A Preliminary File Naming Convention for Avoiding Duplication of Efforts