Efficient Aggregation of Face Embeddings for Decentralized Face Recognition Deployments
IVNPROTECT: Isolable and Traceable Lightweight CAN-Bus Kernel-Level Protection for Securing in-Vehicle Communication
Evaluation of DoS/DDoS Attack Detection with ML Techniques on CIC-IDS2017 Dataset
Cybersecurity Awareness and Capacities of SMEs
An Explainable Convolutional Neural Network for Dynamic Android Malware Detection
Towards a Rust SDK for Keystone Enclave Application Development
Machine Learning Based Prediction of Vulnerability Information Subject to a Security Alert
An End-to-End Encrypted Cache System with Time-Dependent Access Control
Concrete Quantum Circuits to Prepare Generalized Dicke States on a Quantum Machine
Towards Audit Requirements for AI-Based Systems in Mobility Applications
Tracing Cryptographic Agility in Android and iOS Apps
CHARRA-PM: An Attestation Approach Relying on the Passport Model
Evaluation Scheme to Analyze Keystroke Dynamics Methods
Revisiting the DFT Test in the NIST SP 800-22 Randomness Test Suite
Veto: Prohibit Outdated Edge System Software from Booting
SHOID: A Secure Herd of IoT Devices Firmware Update Protocol
An Analysis of Cybersecurity Awareness Efforts for Swiss SMEs
Using Infrastructure-Based Agents to Enhance Forensic Logging of Third-Party Applications
Systematically Searching for Identity-Related Information in the Internet with OSINT Tools
Security Analysis of a Color Image Encryption Scheme Based on Dynamic Substitution and Diffusion Operations
Measurements of Cross-Border Quantum Key Distribution Link
Evaluating the Fork-Awareness of Coverage-Guided Fuzzers
SWaTEval: An Evaluation Framework for Stateful Web Application Testing
Clipaha: A Scheme to Perform Password Stretching on the Client
Automating XSS Vulnerability Testing Using Reinforcement Learning
TTP-Aided Searchable Encryption of Documents Using Threshold Secret Sharing
An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes
Privacy-Aware IoT: State-of-the-Art and Challenges
On the Feasibility of Fully Homomorphic Encryption of Minutiae-Based Fingerprint Representations
Query Log Analysis for SQL Injection Detection
How to Design a Blue Team Scenario for Beginners on the Example of Brute-Force Attacks on Authentications
SCANTRAP: Protecting Content Management Systems from Vulnerability Scanners with Cyber Deception and Obfuscation
Use-Case Denial of Service Attack on Actual Quantum Key Distribution Nodes
A Systematic Review of Secure IoT Data Sharing
A k-Anonymization Method for Social Network Data with Link Prediction
Bypassing Multiple Security Layers Using Malicious USB Human Interface Device
Evaluation of a Tool to Increase Cybersecurity Awareness Among Non-experts (SME Employees)
Dark Ending: What Happens when a Dark Web Market Closes down
The Story of Safety Snail and Her e-Mail: A Digital Wellness and Cybersecurity Serious Game for Pre-School Children
Evading Detection During Network Reconnaissance
Temporal Constraints in Online Dating Fraud Classification
Data Leakage in Isolated Virtualized Enterprise Computing Systems
Cloud Inspector: A Tool-Based Approach for Public Administrations to Establish Information Security Processes Towards Public Clouds
Exploring False Demand Attacks in Power Grids with High PV Penetration
Evaluation of Persistence Methods Used by Malware on Microsoft Windows Systems
Security Aspects of Digital Twins in IoT
Identifying Personal Data Processing for Code Review
Online Transition-Based Feature Generation for Anomaly Detection in Concurrent Data Streams
Design Rationale for Symbiotically Secure Key Management Systems in IoT and Beyond
SPA Attack on NTRU Protected Implementation with Sparse Representation of Private Key
Assessing Security and Privacy Insights for Smart Home Users
On the Design of GDPR Compliant Workflows for Responsible Neuroimage Data Sharing
XMeDNN: An Explainable Deep Neural Network System for Intrusion Detection in Internet of Medical Things
Towards Long-Term Continuous Tracing of Internet-Wide Scanning Campaigns Based on Darknet Analysis
A Stochastic Game Model for Cloud Platform Security
Vehicle Data Collection: A Privacy Policy Analysis and Comparison
A Scenario-Driven Cyber Security Awareness Exercise Utilizing Dynamic Polling: Methodology and Lessons Learned
Systematic Literature Review of Threat Modeling Concepts
Cyber Teaching Hospitals: Developing Cyber Workforce Competence
Correlating Intrusion Detection with Attack Graph on Virtual Computer Networkings
Vulnerabilities in IoT Devices, Backends, Applications, and Components
Comparing the Effect of Privacy and Non-Privacy Social Media Photo Tools on Factors of Privacy Concern
On the Use of Multiple Approximations in the Linear Cryptanalysis of Baby Rijndael
Automating Vehicle SOA Threat Analysis Using a Model-Based Methodology
PDIFT: A Practical Dynamic Information-Flow Tracker
Improving Unlinkability in C-ITS: A Methodology For Optimal Obfuscation
t.ex-Graph: Automated Web Tracker Detection Using Centrality Metrics and Data Flow Characteristics
P2BAC: Privacy Policy Based Access Control Using P-LPL
Secure Software Updates for IoT Based on Industry Requirements
A Game Theoretic Analysis of Cyber Threats
RPCDroid: Runtime Identification of Permission Usage Contexts in Android Applications
Secure Joint Querying Over Federated Graph Databases Utilising SMPC Protocols
Towards Security Attack Event Monitoring for Cyber Physical-Systems
Anomalous File System Activity Detection Through Temporal Association Rule Mining
Automata-Based Study of Dynamic Access Control Policies
StegWare: A Novel Malware Model Exploiting Payload Steganography and Dynamic Compilation
A Framework for Assessing Decompiler Inference Accuracy of Source-Level Program Constructs
Fast-Flux Malicious Domain Name Detection Method Based on Domain Resolution Spatial Features
A Biometric Self Authentication Scheme
Group Privacy for Personalized Federated Learning
Forecasting Cyber-Attacks to Destination Ports Using Machine Learning
A Self-Configuration Controller To Detect, Identify, and Recover Misconfiguration at IoT Edge Devices and Containerized Cluster System
Assessing the Impact of Attacks on Connected and Autonomous Vehicles in Vehicular Ad Hoc Networks
Differential Privacy: Toward a Better Tuning of the Privacy Budget (ε) Based on Risk
Assessing Risk in High Performance Computing Attacks
SeCloud: Computer-Aided Support for Selecting Security Measures for Cloud Architectures
Human Factors for Cybersecurity Awareness in a Remote Work Environment
Light Quantum Key Distribution Network Security Estimation Tool
Evaluating Label Flipping Attack in Deep Learning-Based NIDS
Security for Next-Gen Analytics for Cross-Organisation Collaboration
Leveraging Hardware Reverse Engineering to Improve the Cyber Security and Resilience of the Smart Grid
On the Implementation of a Lattice-Based Revocable Hierarchical Ibe
Lessons Learned: Defending Against Property Inference Attacks
ArmorDroid: A Rule-Set Customizable Plugin for Secure Android Application Development
SQLi Detection with ML: A Data-Source Perspective
Guidelines and a Framework to Improve the Delivery of Network Intrusion Detection Datasets
Labelled Vulnerability Dataset on Android Source Code (LVDAndro) to Develop AI-Based Code Vulnerability Detection Models
A Comprehensive Risk Assessment Framework for IoT-Enabled Healthcare Environment
Adapting P2P Mixnets to Provide Anonymity for Uplink-Intensive Applications
On the Security of the Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication
Robust Three-Factor Lightweight Authentication Based on Extended Chaotic Maps for Portable Resource-Constrained Devices
SEBDA: A Secure and Efficient Blockchain Based Data Aggregation Scheme
Data Protection and Security Issues with Network Error Logging
Defeating MageCart Attacks in a NAISS Way
Fidelis: Verifiable Keyword Search with No Trust Assumption
A Method for Robust and Explainable Image-Based Network Traffic Classification with Deep Learning
A First Appraisal of Cryptographic Mechanisms for the Selective Disclosure of Verifiable Credentials
Lightweight FHE-based Protocols Achieving Results Consistency for Data Encrypted Under Different Keys
Approximate Homomorphic Pre-Processing for CNNs
Trans-IDS: A Transformer-Based Intrusion Detection System
Regulating Cyber Incidents: A Review of Recent Reporting Requirements
OCScraper: Automated Analysis of the Fingerprintability of the iOS API
Griffin: Towards Mixed Multi-Key Homomorphic Encryption
Automated Feature Engineering for AutoML Using Genetic Algorithms
Towards Usable Scoring of Common Weaknesses
Generic Blockchain on Generic Human Behavior
A 10-Layer Model for Service Availability Risk Management
Smart Bulbs Can Be Hacked to Hack into Your Household
Lattice-Based Threshold Signature Implementation for Constrained Devices
Unclonable Cryptography: A Tale of Two No-Cloning Paradigms
Design of a New Hardware IP-HLS for Real-Time Image Chaos-Based Encryption
How to Plausibly Deny Steganographic Secrets
Proctoring Online Exam Using Eye Tracking
Toward a Compliant Token-Based e-Voting System with SSI-Granted Eligibility
Self-Sovereign Identity (SSI) Attribute-Based Web Authentication
International Mutual Recognition: A Description of Trust Services in US, UK, EU and JP and the Testbed “Hakoniwa”
Improving Intrusion Detection Systems with Multi-Agent Deep Reinforcement Learning: Enhanced Centralized and Decentralized Approaches
Combining Generators of Adversarial Malware Examples to Increase Evasion Rate
Detecting BrakTooth Attacks
SoK: Towards CCA Secure Fully Homomorphic Encryption
Remote Security Assessment for Cyber-Physical Systems: Adapting Design Patterns for Enhanced Diagnosis
Anomaly Detection in Smart Grid Networks Using Power Consumption Data
Security for Distributed Machine Learning
The Explainability-Privacy-Utility Trade-Off for Machine Learning-Based Tabular Data Analysis
VerifMSI: Practical Verification of Hardware and Software Masking Schemes Implementations
A Lightweight Access Control Scheme with Attribute Policy for Blockchain-Enabled Internet of Things
Optimizing Attribute-Based Encryption for Circuits Using Compartmented Access Structures
RSSI-Based Fingerprinting of Bluetooth Low Energy Devices
On Single-Server Delegation Without Precomputation
WebAppAuth: An Architecture to Protect from Compromised First-Party Web Servers
Anomaly-Based Intrusion Detection System for DDoS Attack with Deep Learning Techniques
Privacy Protection of Synthetic Smart Grid Data Simulated via Generative Adversarial Networks
JShelter: Give Me My Browser Back
Threshold Cryptosystems Based on 2 k-th Power Residue Symbols
Improvement of Winternitz OTS with a Novel Fingerprinting Function
MEMES: Memory Encryption-Based Memory Safety on Commodity Hardware
K-Anonymous Privacy Preserving Manifold Learning
AIS Authentication Using Certificateless Cryptography
One to Bind Them: Binding Verifiable Credentials to User Attributes
A Note on a CBC-Type Mode of Operation
CAPoW: Context-Aware AI-Assisted Proof of Work Based DDoS Defense
Classical to Post-Quantum Secure ABE-IBE Proxy Re-Encryption Scheme
Risk-Based Illegal Information Flow Detection in the IIoT
ZT-NIDS: Zero Trust, Network Intrusion Detection System
On the Effectiveness of Re-Identification Attacks and Local Differential Privacy-Based Solutions for Smart Meter Data
Towards a Geometric Deep Learning-Based Cyber Security: Network System Intrusion Detection Using Graph Neural Networks
BAGUETTE: Hunting for Evidence of Malicious Behavior in Dynamic Analysis Reports
PIUDI: Private Information Update for Distributed Infrastructure
BeeHIVE: Behavioral Biometric System Based on Object Interactions in Smart Environments
XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-Independent Enforcement
Informed Consent as Patient Driven Policy for Clinical Diagnosis and Treatment: A Smart Contract Based Approach
Using Untrusted and Unreliable Cloud Providers to Obtain Private Email
Heterogeneous Graph Storage and Leakage Prevention for Data Cooperatives
Smoothing the Ride: Providing a Seamless Upgrade Path from Established Cross-Border eID Workflows Towards eID Wallet Systems
Blockchain Data Replication
Virtual Private Networks in the Quantum Era: A Security in Depth Approach
Secure E-Commerce Protocol with Complex Trading Capabilities of Intermediaries
5G Handover: When Forward Security Breaks
IMAGINE Dataset: Digital Camera Identification Image Benchmarking Dataset
Uncovering Flaws in Anti-Phishing Blacklists for Phishing Websites Using Novel Cloaking Techniques
CNN-HMM Model for Real Time DGA Categorization
A Secure Emergency Framework in an IoT Based Patient Monitoring System
Migrating Applications to Post-Quantum Cryptography: Beyond Algorithm Replacement
Analyzing Image Based Strategies for Android Malware Detection and Classification: An Empirical Exploration
Privacy-Preserving Algorithms for Data Cooperatives with Directed Graphs
ERC20: Correctness via Linearizability and Interference Freedom of the Underlying Smart Contract
A Rand Index-Based Analysis of Consensus Protocols
Δ SFL: (Decoupled Server Federated Learning) to Utilize DLG Attacks in Federated Learning by Decoupling the Server
Large Language Models for Code Obfuscation Evaluation of the Obfuscation Capabilities of OpenAI’s GPT-3.5 on C Source Code
Multi-Environment Training Against Reward Poisoning Attacks on Deep Reinforcement Learning
Privacy in Practice: Private COVID-19 Detection in X-Ray Images
Context-Aware Behavioral Fingerprinting of IoT Devices via Network Traffic Analysis
Receipt-Free Electronic Voting from zk-SNARK
A Two-Party Hierarchical Deterministic Wallets in Practice
When the Few Outweigh the Many: Illicit Content Recognition with Few-Shot Learning
Trading Strategy Validation Using Forwardtesting with Deep Neural Networks
Framework for IT Project Management During the COVID-19 Pandemic
Using Fuzzy Multiple Criteria Decision Analysis to Explore the Decisive Factors of Charismatic Leadership
Optimizing Transport Network to Reduce Municipality Mobility Budget
Transportation Infrastructure and Market and Supplier Access: How Do They Shape Foreign Direct Investment?
Exploring Situational Leadership Using Critical Incident Technique in the Times of COVID-19
A Bibliometric Analysis for Stakeholder Management Focused on Energy and Sustainability
Bridging Corporate Social Responsibility and Individual Social Responsibility
The Correlation of ESG Ratings and Abnormal Returns: An Event Study Using Machine Learning
Analysis of Production Costs: An Approach to Decision-Making
Exploring Risks in the Metaverse in an Immersive Digital Economy
A Review on Cryptocurrency Transaction Methods for Money Laundering
Revisiting Food Deserts in North Carolina, USA, Using a Cloud-Based Real-Time Quality Assurance/Quality Control (QA/QC) Tool
Spatio-Temporal Modelling of Relationship Between Organic Carbon Content and Land Use Using Deep Learning Approach and Several Co-Variables: Application to the Soils of the Beni Mellal in Morocco
Bushfire Susceptibility Mapping Using Gene Expression Programming and Machine Learning Methods: A Case Study of Kangaroo Island, South Australia
Sentinel 2 High-Resolution Land Cover Mapping in Sub-Saharan Africa with Google Earth Engine
LiDAR and SfM-MVS Integrated Approach to Build a Highly Detailed 3D Virtual Model of Urban Areas
Modelling Spatial Connectivity of Forest Harvest Areas: Exact and Heuristic Approaches
3D Geospatial Data Management Architecture for Common Operational Picture Functionalities in Emergency Response
Borehole Inner Surface Visualization System with Vibration Cancellation and Trajectory Smoothing Based on Optical Monocular Video Camera
GNSS Monitoring of Geodynamics in the Region Around Sofia and South-Western Bulgaria
Evaluating the Fulfilment Rate of Charging Demand for Electric Vehicles Using Open-Source Data
On-the-Fly Acquisition and Rendering with Low Cost LiDAR and RGB Cameras for Marine Navigation
Accuracy Assessment of Direct Georeferencing Using UAV Matrice 210 RTK V2 on Gully Santiš, Island of Pag (Croatia)
New Challenges in the Implementation and Exploitation of a Low-Cost Web Map of the Active Deformation Areas Across Europe
Using Deep Learning and Radar Backscatter for Mapping River Water Surface
Modeling & Simulating the Evacuation of a Building Based on Building Floor Plan and Evacuation Strategies
Exploring Spectral Data, Change Detection Information and Trajectories for Land Cover Monitoring over a Fire-Prone Area of Portugal
GIS Multicriteria Decision Analysis in Selecting the Optimal Location for Urban Green Space: A Case Study of Zadar City
Data-Driven Modelling of Freshwater Ecosystems: A Multiscale Framework Based on Global Geospatial Data
Vector Tile Geospatial Data Protection Using Quantization-Based Watermarking
The Evolution of the South-Eastern Baltic Sea Coastline Between 1988 and 2018 by Remote Sensing
When Should We Report the Traffic Jams of Today? A Case Study on a Swiss Highway Using Graph Neural Networks and Expert Knowledge
Standards-Based Geospatial Services Integration for Smart Cities Platforms
Evaluation of Urban Perception Using Only Image Segmentation Features
Biodiversity, Urban Quality Life and Air Quality Indices for Hotspot Detection of Transformation Opportunities in Cities: A Case Study in Barcelona
Imperviousness Density Mapping Based on GIS-MCDA and High-Resolution Worldview-2 Imagery
Identification of Emergent and Floating Aquatic Vegetation Using an Unsupervised Thresholding Approach: A Case Study of the Dniester Delta in Ukraine
Deep-Learning Based Super-Resolution of Aeolianite Images on the Purpose of Edge Detection and Pattern Extraction
A Novel Method for InSAR Phase Unwrapping with Single Baseline
Spatial Patterns in Neurodegenerative Disease’s Hospitalizations in Portugal (2000-2016)