• Efficient Aggregation of Face Embeddings for Decentralized Face Recognition Deployments
  • IVNPROTECT: Isolable and Traceable Lightweight CAN-Bus Kernel-Level Protection for Securing in-Vehicle Communication
  • Evaluation of DoS/DDoS Attack Detection with ML Techniques on CIC-IDS2017 Dataset
  • Cybersecurity Awareness and Capacities of SMEs
  • An Explainable Convolutional Neural Network for Dynamic Android Malware Detection
  • Towards a Rust SDK for Keystone Enclave Application Development
  • Machine Learning Based Prediction of Vulnerability Information Subject to a Security Alert
  • An End-to-End Encrypted Cache System with Time-Dependent Access Control
  • Concrete Quantum Circuits to Prepare Generalized Dicke States on a Quantum Machine
  • Towards Audit Requirements for AI-Based Systems in Mobility Applications
  • Tracing Cryptographic Agility in Android and iOS Apps
  • CHARRA-PM: An Attestation Approach Relying on the Passport Model
  • Evaluation Scheme to Analyze Keystroke Dynamics Methods
  • Revisiting the DFT Test in the NIST SP 800-22 Randomness Test Suite
  • Veto: Prohibit Outdated Edge System Software from Booting
  • SHOID: A Secure Herd of IoT Devices Firmware Update Protocol
  • An Analysis of Cybersecurity Awareness Efforts for Swiss SMEs
  • Using Infrastructure-Based Agents to Enhance Forensic Logging of Third-Party Applications
  • Systematically Searching for Identity-Related Information in the Internet with OSINT Tools
  • Security Analysis of a Color Image Encryption Scheme Based on Dynamic Substitution and Diffusion Operations
  • Measurements of Cross-Border Quantum Key Distribution Link
  • Evaluating the Fork-Awareness of Coverage-Guided Fuzzers
  • SWaTEval: An Evaluation Framework for Stateful Web Application Testing
  • Clipaha: A Scheme to Perform Password Stretching on the Client
  • Automating XSS Vulnerability Testing Using Reinforcement Learning
  • TTP-Aided Searchable Encryption of Documents Using Threshold Secret Sharing
  • An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes
  • Privacy-Aware IoT: State-of-the-Art and Challenges
  • On the Feasibility of Fully Homomorphic Encryption of Minutiae-Based Fingerprint Representations
  • Query Log Analysis for SQL Injection Detection
  • How to Design a Blue Team Scenario for Beginners on the Example of Brute-Force Attacks on Authentications
  • SCANTRAP: Protecting Content Management Systems from Vulnerability Scanners with Cyber Deception and Obfuscation
  • Use-Case Denial of Service Attack on Actual Quantum Key Distribution Nodes
  • A Systematic Review of Secure IoT Data Sharing
  • A k-Anonymization Method for Social Network Data with Link Prediction
  • Bypassing Multiple Security Layers Using Malicious USB Human Interface Device
  • Evaluation of a Tool to Increase Cybersecurity Awareness Among Non-experts (SME Employees)
  • Dark Ending: What Happens when a Dark Web Market Closes down
  • The Story of Safety Snail and Her e-Mail: A Digital Wellness and Cybersecurity Serious Game for Pre-School Children
  • Evading Detection During Network Reconnaissance
  • Temporal Constraints in Online Dating Fraud Classification
  • Data Leakage in Isolated Virtualized Enterprise Computing Systems
  • Cloud Inspector: A Tool-Based Approach for Public Administrations to Establish Information Security Processes Towards Public Clouds
  • Exploring False Demand Attacks in Power Grids with High PV Penetration
  • Evaluation of Persistence Methods Used by Malware on Microsoft Windows Systems
  • Security Aspects of Digital Twins in IoT
  • Identifying Personal Data Processing for Code Review
  • Online Transition-Based Feature Generation for Anomaly Detection in Concurrent Data Streams
  • Design Rationale for Symbiotically Secure Key Management Systems in IoT and Beyond
  • SPA Attack on NTRU Protected Implementation with Sparse Representation of Private Key
  • Assessing Security and Privacy Insights for Smart Home Users
  • On the Design of GDPR Compliant Workflows for Responsible Neuroimage Data Sharing
  • XMeDNN: An Explainable Deep Neural Network System for Intrusion Detection in Internet of Medical Things
  • Towards Long-Term Continuous Tracing of Internet-Wide Scanning Campaigns Based on Darknet Analysis
  • A Stochastic Game Model for Cloud Platform Security
  • Vehicle Data Collection: A Privacy Policy Analysis and Comparison
  • A Scenario-Driven Cyber Security Awareness Exercise Utilizing Dynamic Polling: Methodology and Lessons Learned
  • Systematic Literature Review of Threat Modeling Concepts
  • Cyber Teaching Hospitals: Developing Cyber Workforce Competence
  • Correlating Intrusion Detection with Attack Graph on Virtual Computer Networkings
  • Vulnerabilities in IoT Devices, Backends, Applications, and Components
  • Comparing the Effect of Privacy and Non-Privacy Social Media Photo Tools on Factors of Privacy Concern
  • On the Use of Multiple Approximations in the Linear Cryptanalysis of Baby Rijndael
  • Automating Vehicle SOA Threat Analysis Using a Model-Based Methodology
  • PDIFT: A Practical Dynamic Information-Flow Tracker
  • Improving Unlinkability in C-ITS: A Methodology For Optimal Obfuscation
  • t.ex-Graph: Automated Web Tracker Detection Using Centrality Metrics and Data Flow Characteristics
  • P2BAC: Privacy Policy Based Access Control Using P-LPL
  • Secure Software Updates for IoT Based on Industry Requirements
  • A Game Theoretic Analysis of Cyber Threats
  • RPCDroid: Runtime Identification of Permission Usage Contexts in Android Applications
  • Secure Joint Querying Over Federated Graph Databases Utilising SMPC Protocols
  • Towards Security Attack Event Monitoring for Cyber Physical-Systems
  • Anomalous File System Activity Detection Through Temporal Association Rule Mining
  • Automata-Based Study of Dynamic Access Control Policies
  • StegWare: A Novel Malware Model Exploiting Payload Steganography and Dynamic Compilation
  • A Framework for Assessing Decompiler Inference Accuracy of Source-Level Program Constructs
  • Fast-Flux Malicious Domain Name Detection Method Based on Domain Resolution Spatial Features
  • A Biometric Self Authentication Scheme
  • Group Privacy for Personalized Federated Learning
  • Forecasting Cyber-Attacks to Destination Ports Using Machine Learning
  • A Self-Configuration Controller To Detect, Identify, and Recover Misconfiguration at IoT Edge Devices and Containerized Cluster System
  • Assessing the Impact of Attacks on Connected and Autonomous Vehicles in Vehicular Ad Hoc Networks
  • Differential Privacy: Toward a Better Tuning of the Privacy Budget (ε) Based on Risk
  • Assessing Risk in High Performance Computing Attacks
  • SeCloud: Computer-Aided Support for Selecting Security Measures for Cloud Architectures
  • Human Factors for Cybersecurity Awareness in a Remote Work Environment
  • Light Quantum Key Distribution Network Security Estimation Tool
  • Evaluating Label Flipping Attack in Deep Learning-Based NIDS
  • Security for Next-Gen Analytics for Cross-Organisation Collaboration
  • Leveraging Hardware Reverse Engineering to Improve the Cyber Security and Resilience of the Smart Grid
  • On the Implementation of a Lattice-Based Revocable Hierarchical Ibe
  • Lessons Learned: Defending Against Property Inference Attacks
  • ArmorDroid: A Rule-Set Customizable Plugin for Secure Android Application Development
  • SQLi Detection with ML: A Data-Source Perspective
  • Guidelines and a Framework to Improve the Delivery of Network Intrusion Detection Datasets
  • Labelled Vulnerability Dataset on Android Source Code (LVDAndro) to Develop AI-Based Code Vulnerability Detection Models
  • A Comprehensive Risk Assessment Framework for IoT-Enabled Healthcare Environment
  • Adapting P2P Mixnets to Provide Anonymity for Uplink-Intensive Applications
  • On the Security of the Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication
  • Robust Three-Factor Lightweight Authentication Based on Extended Chaotic Maps for Portable Resource-Constrained Devices
  • SEBDA: A Secure and Efficient Blockchain Based Data Aggregation Scheme
  • Data Protection and Security Issues with Network Error Logging
  • Defeating MageCart Attacks in a NAISS Way
  • Fidelis: Verifiable Keyword Search with No Trust Assumption
  • A Method for Robust and Explainable Image-Based Network Traffic Classification with Deep Learning
  • A First Appraisal of Cryptographic Mechanisms for the Selective Disclosure of Verifiable Credentials
  • Lightweight FHE-based Protocols Achieving Results Consistency for Data Encrypted Under Different Keys
  • Approximate Homomorphic Pre-Processing for CNNs
  • Trans-IDS: A Transformer-Based Intrusion Detection System
  • Regulating Cyber Incidents: A Review of Recent Reporting Requirements
  • OCScraper: Automated Analysis of the Fingerprintability of the iOS API
  • Griffin: Towards Mixed Multi-Key Homomorphic Encryption
  • Automated Feature Engineering for AutoML Using Genetic Algorithms
  • Towards Usable Scoring of Common Weaknesses
  • Generic Blockchain on Generic Human Behavior
  • A 10-Layer Model for Service Availability Risk Management
  • Smart Bulbs Can Be Hacked to Hack into Your Household
  • Lattice-Based Threshold Signature Implementation for Constrained Devices
  • Unclonable Cryptography: A Tale of Two No-Cloning Paradigms
  • Design of a New Hardware IP-HLS for Real-Time Image Chaos-Based Encryption
  • How to Plausibly Deny Steganographic Secrets
  • Proctoring Online Exam Using Eye Tracking
  • Toward a Compliant Token-Based e-Voting System with SSI-Granted Eligibility
  • Self-Sovereign Identity (SSI) Attribute-Based Web Authentication
  • International Mutual Recognition: A Description of Trust Services in US, UK, EU and JP and the Testbed “Hakoniwa”
  • Improving Intrusion Detection Systems with Multi-Agent Deep Reinforcement Learning: Enhanced Centralized and Decentralized Approaches
  • Combining Generators of Adversarial Malware Examples to Increase Evasion Rate
  • Detecting BrakTooth Attacks
  • SoK: Towards CCA Secure Fully Homomorphic Encryption
  • Remote Security Assessment for Cyber-Physical Systems: Adapting Design Patterns for Enhanced Diagnosis
  • Anomaly Detection in Smart Grid Networks Using Power Consumption Data
  • Security for Distributed Machine Learning
  • The Explainability-Privacy-Utility Trade-Off for Machine Learning-Based Tabular Data Analysis
  • VerifMSI: Practical Verification of Hardware and Software Masking Schemes Implementations
  • A Lightweight Access Control Scheme with Attribute Policy for Blockchain-Enabled Internet of Things
  • Optimizing Attribute-Based Encryption for Circuits Using Compartmented Access Structures
  • RSSI-Based Fingerprinting of Bluetooth Low Energy Devices
  • On Single-Server Delegation Without Precomputation
  • WebAppAuth: An Architecture to Protect from Compromised First-Party Web Servers
  • Anomaly-Based Intrusion Detection System for DDoS Attack with Deep Learning Techniques
  • Privacy Protection of Synthetic Smart Grid Data Simulated via Generative Adversarial Networks
  • JShelter: Give Me My Browser Back
  • Threshold Cryptosystems Based on 2 k-th Power Residue Symbols
  • Improvement of Winternitz OTS with a Novel Fingerprinting Function
  • MEMES: Memory Encryption-Based Memory Safety on Commodity Hardware
  • K-Anonymous Privacy Preserving Manifold Learning
  • AIS Authentication Using Certificateless Cryptography
  • One to Bind Them: Binding Verifiable Credentials to User Attributes
  • A Note on a CBC-Type Mode of Operation
  • CAPoW: Context-Aware AI-Assisted Proof of Work Based DDoS Defense
  • Classical to Post-Quantum Secure ABE-IBE Proxy Re-Encryption Scheme
  • Risk-Based Illegal Information Flow Detection in the IIoT
  • ZT-NIDS: Zero Trust, Network Intrusion Detection System
  • On the Effectiveness of Re-Identification Attacks and Local Differential Privacy-Based Solutions for Smart Meter Data
  • Towards a Geometric Deep Learning-Based Cyber Security: Network System Intrusion Detection Using Graph Neural Networks
  • BAGUETTE: Hunting for Evidence of Malicious Behavior in Dynamic Analysis Reports
  • PIUDI: Private Information Update for Distributed Infrastructure
  • BeeHIVE: Behavioral Biometric System Based on Object Interactions in Smart Environments
  • XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-Independent Enforcement
  • Informed Consent as Patient Driven Policy for Clinical Diagnosis and Treatment: A Smart Contract Based Approach
  • Using Untrusted and Unreliable Cloud Providers to Obtain Private Email
  • Heterogeneous Graph Storage and Leakage Prevention for Data Cooperatives
  • Smoothing the Ride: Providing a Seamless Upgrade Path from Established Cross-Border eID Workflows Towards eID Wallet Systems
  • Blockchain Data Replication
  • Virtual Private Networks in the Quantum Era: A Security in Depth Approach
  • Secure E-Commerce Protocol with Complex Trading Capabilities of Intermediaries
  • 5G Handover: When Forward Security Breaks
  • IMAGINE Dataset: Digital Camera Identification Image Benchmarking Dataset
  • Uncovering Flaws in Anti-Phishing Blacklists for Phishing Websites Using Novel Cloaking Techniques
  • CNN-HMM Model for Real Time DGA Categorization
  • A Secure Emergency Framework in an IoT Based Patient Monitoring System
  • Migrating Applications to Post-Quantum Cryptography: Beyond Algorithm Replacement
  • Analyzing Image Based Strategies for Android Malware Detection and Classification: An Empirical Exploration
  • Privacy-Preserving Algorithms for Data Cooperatives with Directed Graphs
  • ERC20: Correctness via Linearizability and Interference Freedom of the Underlying Smart Contract
  • A Rand Index-Based Analysis of Consensus Protocols
  • Δ SFL: (Decoupled Server Federated Learning) to Utilize DLG Attacks in Federated Learning by Decoupling the Server
  • Large Language Models for Code Obfuscation Evaluation of the Obfuscation Capabilities of OpenAI’s GPT-3.5 on C Source Code
  • Multi-Environment Training Against Reward Poisoning Attacks on Deep Reinforcement Learning
  • Privacy in Practice: Private COVID-19 Detection in X-Ray Images
  • Context-Aware Behavioral Fingerprinting of IoT Devices via Network Traffic Analysis
  • Receipt-Free Electronic Voting from zk-SNARK
  • A Two-Party Hierarchical Deterministic Wallets in Practice
  • When the Few Outweigh the Many: Illicit Content Recognition with Few-Shot Learning
  • Trading Strategy Validation Using Forwardtesting with Deep Neural Networks
  • Framework for IT Project Management During the COVID-19 Pandemic
  • Using Fuzzy Multiple Criteria Decision Analysis to Explore the Decisive Factors of Charismatic Leadership
  • Optimizing Transport Network to Reduce Municipality Mobility Budget
  • Transportation Infrastructure and Market and Supplier Access: How Do They Shape Foreign Direct Investment?
  • Exploring Situational Leadership Using Critical Incident Technique in the Times of COVID-19
  • A Bibliometric Analysis for Stakeholder Management Focused on Energy and Sustainability
  • Bridging Corporate Social Responsibility and Individual Social Responsibility
  • The Correlation of ESG Ratings and Abnormal Returns: An Event Study Using Machine Learning
  • Analysis of Production Costs: An Approach to Decision-Making
  • Exploring Risks in the Metaverse in an Immersive Digital Economy
  • A Review on Cryptocurrency Transaction Methods for Money Laundering
  • Revisiting Food Deserts in North Carolina, USA, Using a Cloud-Based Real-Time Quality Assurance/Quality Control (QA/QC) Tool
  • Spatio-Temporal Modelling of Relationship Between Organic Carbon Content and Land Use Using Deep Learning Approach and Several Co-Variables: Application to the Soils of the Beni Mellal in Morocco
  • Bushfire Susceptibility Mapping Using Gene Expression Programming and Machine Learning Methods: A Case Study of Kangaroo Island, South Australia
  • Sentinel 2 High-Resolution Land Cover Mapping in Sub-Saharan Africa with Google Earth Engine
  • LiDAR and SfM-MVS Integrated Approach to Build a Highly Detailed 3D Virtual Model of Urban Areas
  • Modelling Spatial Connectivity of Forest Harvest Areas: Exact and Heuristic Approaches
  • 3D Geospatial Data Management Architecture for Common Operational Picture Functionalities in Emergency Response
  • Borehole Inner Surface Visualization System with Vibration Cancellation and Trajectory Smoothing Based on Optical Monocular Video Camera
  • GNSS Monitoring of Geodynamics in the Region Around Sofia and South-Western Bulgaria
  • Evaluating the Fulfilment Rate of Charging Demand for Electric Vehicles Using Open-Source Data
  • On-the-Fly Acquisition and Rendering with Low Cost LiDAR and RGB Cameras for Marine Navigation
  • Accuracy Assessment of Direct Georeferencing Using UAV Matrice 210 RTK V2 on Gully Santiš, Island of Pag (Croatia)
  • New Challenges in the Implementation and Exploitation of a Low-Cost Web Map of the Active Deformation Areas Across Europe
  • Using Deep Learning and Radar Backscatter for Mapping River Water Surface
  • Modeling & Simulating the Evacuation of a Building Based on Building Floor Plan and Evacuation Strategies
  • Exploring Spectral Data, Change Detection Information and Trajectories for Land Cover Monitoring over a Fire-Prone Area of Portugal
  • GIS Multicriteria Decision Analysis in Selecting the Optimal Location for Urban Green Space: A Case Study of Zadar City
  • Data-Driven Modelling of Freshwater Ecosystems: A Multiscale Framework Based on Global Geospatial Data
  • Vector Tile Geospatial Data Protection Using Quantization-Based Watermarking
  • The Evolution of the South-Eastern Baltic Sea Coastline Between 1988 and 2018 by Remote Sensing
  • When Should We Report the Traffic Jams of Today? A Case Study on a Swiss Highway Using Graph Neural Networks and Expert Knowledge
  • Standards-Based Geospatial Services Integration for Smart Cities Platforms
  • Evaluation of Urban Perception Using Only Image Segmentation Features
  • Biodiversity, Urban Quality Life and Air Quality Indices for Hotspot Detection of Transformation Opportunities in Cities: A Case Study in Barcelona
  • Imperviousness Density Mapping Based on GIS-MCDA and High-Resolution Worldview-2 Imagery
  • Identification of Emergent and Floating Aquatic Vegetation Using an Unsupervised Thresholding Approach: A Case Study of the Dniester Delta in Ukraine
  • Deep-Learning Based Super-Resolution of Aeolianite Images on the Purpose of Edge Detection and Pattern Extraction
  • A Novel Method for InSAR Phase Unwrapping with Single Baseline
  • Spatial Patterns in Neurodegenerative Disease’s Hospitalizations in Portugal (2000-2016)