• Big Brother is Smart Watching You - Privacy Concerns about Health and Fitness Applications
  • Incoming Call Implicit User Authentication - User Authentication via Hand Movement Pattern
  • ACCESSORS - A Data-Centric Permission Model for the Internet of Things
  • How to Break CaptchaStar
  • Knock-Knock: The Unbearable Lightness of Android Notifications
  • Spectral Analysis of Keystroke Streams: Towards Effective Real-time Continuous User Authentication
  • Identifying Needs for a Holistic Modelling Approach to Privacy Aspects in Enterprise Software Systems
  • A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System
  • BroncoVote: Secure Voting System using Ethereum’s Blockchain
  • Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization
  • VisABAC: A Tool for Visualising ABAC Policies
  • A Comparative Analysis of Current Cryptocurrencies
  • Inferring Smartphone Users’ Handwritten Patterns by using Motion Sensors
  • On App-based Matrix Code Authentication in Online Banking
  • Privacy Compliant Multi-biometric Authentication on Smartphones
  • Prerequisite to Measure Information Security - A State of the Art Literature Review
  • Evaluation of Biometric Template Protection Schemes based on a Transformation
  • Measuring Identity and Access Management Performance - An Expert Survey on Possible Performance Indicators
  • Securing the Flow - Data Flow Analysis with Operational Node Structures
  • Cyber Threat Information Classification and Life Cycle Management using Smart Contracts
  • Towards Risk-aware Access Control Framework for Healthcare Information Sharing
  • Towards an Optimal Template Reduction for Securing Embedded Fingerprint Devices
  • Malicious PDF Documents Detection using Machine Learning Techniques - A Practical Approach with Cloud Computing Applications
  • Privacy-preserving Biometric Authentication Model for e-Finance Applications
  • Relational Database Anonymization - A Model-driven Guiding Approach
  • Encryption Schemes based on a Single Permutation: PCBC, POFB, PCFB and PCTR
  • A Test of Structured Threat Descriptions for Information Security Risk Assessments
  • Attack Tree for Modelling Unauthorized EMV Card Transactions at POS Terminals
  • Automated Detection of the Early Stages of Cyber Kill Chain
  • Modular Platform for Customer-Side Detection of BGP Redirection Attacks
  • Phishing Through Time: A Ten Year Story based on Abstracts
  • A Cyber Safety Model for Schools in Mozambique
  • Hardware-based Cyber Threats
  • Towards a Personal Identity Code Respecting Privacy
  • Intrusion Detection System Test Framework for SCADA Systems
  • A Risk-aware Access Control Model for Biomedical Research Platforms
  • Alignment-free Cancellable Template Generation for Fingerprint based Authentication
  • Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis
  • AECID: A Self-learning Anomaly Detection Approach based on Light-weight Log Parser Models
  • Probability Preservation Property with Relative Error and Its Applications
  • Who’s Driving My Car? A Machine Learning based Approach to Driver Identification
  • Enhancing Security Education - Recognising Threshold Concepts and Other Influencing Factors
  • Decoy Systems with Low Energy Bluetooth Communication
  • Malware Detection based on HTTPS Characteristic via Machine Learning
  • Using Application Layer Metrics to Detect Advanced SCADA Attacks
  • Towards a Cyber Security Label for SMEs: A European Perspective
  • Secure Two-party Agglomerative Hierarchical Clustering Construction
  • Back to the Drawing Board - Bringing Security Constraints in an Architecture-centric Software Development Process
  • Querying Encrypted Graph Databases
  • Unsupervised Holiday Detection from Low-resolution Smart Metering Data
  • A Framework for Web Application Integrity
  • Face Spoofing Detection for Smartphones using a 3D Reconstruction and the Motion Sensors
  • SAFEPASS - Presenting a Convenient, Portable and Secure Password Manager
  • Statistical and Combinatorial Analysis of the TOR Routing Protocol - Structural Weaknesses Identified in the TOR Network
  • VizMal: A Visualization Tool for Analyzing the Behavior of Android Malware
  • Deep Learning versus Gist Descriptors for Image-based Malware Classification
  • APT RPG: Design of a Gamified Attacker/Defender Meta Model
  • Health State of Google’s PlayStore - Finding Malware in Large Sets of Applications from the Android Market
  • Acoustic Gait Analysis using Support Vector Machines
  • Cluster Analysis for Driver Aggressiveness Identification
  • Advancing Protocol Fuzzing for Industrial Automation and Control Systems
  • Attacks on Industrial Control Systems - Modeling and Anomaly Detection
  • Identifying Insecure Features in Android Applications using Model Checking
  • Autocorrelation Analysis of Financial Botnet Traffic
  • The Rapid Extraction of Suspicious Traffic from Passive DNS
  • Novel Access Control Approach for Inter-organizational Workflows
  • Secure Benchmarking using Electronic Voting
  • Fully Homomorphic Distributed Identity-based Encryption Resilient to Continual Auxiliary Input Leakage
  • Side Channel Attacks over Encrypted TCP/IP Modbus Reveal Functionality Leaks
  • DRANKULA: A McEliece-like Rank Metric based Cryptosystem Implementation
  • On the Security of Linear Sketch Schemes against Recovering Attacks
  • A Steganogaphic Scheme for MAC-Independent Opportunistic Routing and Encoding (MORE) Protocol
  • BDABE - Blockchain-based Distributed Attribute based Encryption
  • An Optimistic Fair Exchange E-commerce Protocol for Complex Transactions
  • An Extended Case Study about Securing Smart Home Hubs through N-version Programming
  • Lightweight Attribute-based Encryption Supporting Access Policy Update for Cloud Assisted IoT
  • Hash-Based Signature with Constant-Sum Fingerprinting and Partial Construction of Hash Chains
  • Applying Deep Learning Techniques to CAN Bus Attacks for Supporting Identification and Analysis Tasks
  • Secure Grouping and Aggregation with MapReduce
  • Cost-effective Private Linear Key Agreement with Adaptive CCA Security from Prime Order Multilinear Maps and Tracing Traitors
  • Combining Design by Contract and Inference Rules of Programming Logic towards Software Reliability
  • Intellectual Property Protection for Distributed Neural Networks - Towards Confidentiality of Data, Model, and Inference
  • SABE: A Selective Attribute-based Encryption for an Efficient Threshold Multi-level Access Control
  • A Blockchain based Access Control Scheme
  • Anonymous Data Collection Scheme from Short Group Signatures
  • Unobtrusive Psychological Profiling for Risk Analysis
  • Fuzzy Logic based Model for Energy Consumption Trust Estimation in Electric Vehicular Networks
  • Static Security Certification of Programs via Dynamic Labelling
  • Verifying the Enforcement and Effectiveness of Network Lateral Movement Resistance Techniques
  • Algebraic Side-Channel Attacks on Masked Implementations of AES
  • A Quantitative Framework to Model Advanced Persistent Threats
  • Towards an Enhanced Security Data Analytic Platform
  • Binary Edwards Curves for Intrinsically Secure ECC Implementations for the IoT
  • A Flexible Framework for Rogue Access Point Detection
  • Holistic Database Encryption
  • The AVARE PATRON - A Holistic Privacy Approach for the Internet of Things
  • KAuth: A Strong Single Sign-On Service based on PKI
  • Spoof-of-Work - Evaluating Device Authorisation in Mobile Mining Processes
  • PAPEETE: Private, Authorized, and Fast Personal Genomic Testing
  • Compact Lattice Signatures
  • Analysis of Man-In-The-Middle of Attack on Bitcoin Address
  • Secure Authentication Solution for Cloud-based Smart City Surveillance System
  • A Machine Learning Approach for Privacy-preservation in E-business Applications
  • Big Data Anonymization Requirements vs Privacy Models
  • Theoretical Security Evaluation of the Human Semantic Authentication Protocol
  • A Novel Lattice Reduction Algorithm
  • Crypto-democracy: A Decentralized Voting Scheme using Blockchain Technology
  • DBStore: A TrustZone-backed Database Management System for Mobile Applications
  • Evaluating the Provision of Botnet Defences using Translational Research Concepts
  • Microcontroller Implementation of Simultaneous Protections Against Observation and Perturbation Attacks for ECC
  • Malware Detection in PDF Files using Machine Learning
  • AVISPA versus AVANTSSAR in the Model Checking of Secure Communication Protocols
  • Lightweight Ring Signatures for Decentralized Privacy-preserving Transactions
  • Blind PDF Document Watermarking Robust Against PCA and ICA Attacks
  • Implicit Data Integrity: Protecting User Data without MACs
  • Blockchain for IoT: The Challenges and a Way Forward
  • Towards Efficient Software Protection Obeying Kerckhoffs’s Principle using Tamper-proof Hardware
  • Learning Plaintext in Galbraith’s LWE Cryptosystem
  • Privacy-preserving Distributed Access Control for Medical Data
  • An Efficient Privacy-preserving Recommender System for e-Healthcare Systems
  • Efficient Index-based Search Protocols for Encrypted Databases
  • Towards a Cloud-based System for Software Protection and Licensing
  • Attribute Based Signatures: The Case for Automation
  • A Quantum-Secure Niederreiter Cryptosystem using Quasi-Cyclic Codes
  • Distortion-free Watermarking Scheme for Compressed Data in Columnar Database
  • Hotspot Analysis of the Spatial and Temporal Distribution of Fires
  • A Newly Emerging Ethical Problem in PGIS - Ubiquitous Atoque Absconditus and Casual Offenders for Pleasure
  • Enhanced Address Search with Spelling Variants
  • Automatic Tree Annotation in LiDAR Data
  • Improvements to DEM Merging with r.mblend
  • Mapping and Monitoring Airports with Sentinel 1 and 2 Data - Urban Geospatial Mapping for the SCRAMJET Business Networking Tool
  • Outdoors Mobile Augmented Reality Application Visualizing 3D Reconstructed Historical Monuments
  • An Interactive Story Map for the Methana Volcanic Peninsula
  • GIS and Geovisualization Technologies Applied to Rainfall Spatial Patterns over the Iberian Peninsula using the Global Climate Monitor Web Viewer
  • Land-use Classification for High-resolution Remote Sensing Image using Collaborative Representation with a Locally Adaptive Dictionary
  • Optimal Estimation of Census Block Group Clusters to Improve the Computational Efficiency of Drive Time Calculations
  • ResPred: A Privacy Preserving Location Prediction System Ensuring Location-based Service Utility
  • Elcano: A Geospatial Big Data Processing System based on SparkSQL
  • VOLA: A Compact Volumetric Format for 3D Mapping and Embedded Systems
  • Minimum Collection Period for Viable Population Estimation from Social Media
  • Spatiotemporal Data-Cube Retrieval and Processing with xWCPS
  • Improving Urban Simulation Accuracy through Analysis of Control Factors: A Case Study in the City Belt along the Yellow River in Ningxia, China
  • Comparison of Landsat and ASTER in Land Cover Change Detection within Granite Quarries
  • Standardized Big Data Processing in Hybrid Clouds
  • An Automated Approach to Mining and Visual Analytics of Spatiotemporal Context from Online Media Articles
  • An Example of Multitemporal Photogrammetric Documentation and Spatial Analysis in Process Revitalisation and Urban Planning
  • Positional Accuracy Assessment of the VGI Data from OpenStreetMap - Case Study: Federal University of Bahia Campus in Brazil
  • Representing GeoData for Tourism with Schema.org
  • Location Intelligence for Augmented Smart Cities Integrating Sensor Web and Spatial Data Infrastructure (SmaCiSENS)
  • Investigating the Use of Primes in Hashing for Volumetric Data
  • Unmanned Aerial Survey for Modelling Glacier Topography in Antarctica: First Results
  • Identifying the Impact of Human Made Transformations of Historical Watercourses and Flood Risk
  • Evaluation of AW3D30 Elevation Accuracy in China
  • Quantifying Land Cover Changes Caused by Granite Quarries from 1973-2015 using Landsat Data
  • Logic Modeling for NSDI Implementation Plan - A Case Study in Indonesia
  • An Alternative Raster Display Model
  • A Concept for Fast Indoor Mapping and Positioning in Post-Disaster Scenarios
  • Towards Rich Sensor Data Representation - Functional Data Analysis Framework for Opportunistic Mobile Monitoring
  • Evaluation of Two Solar Radiation Algorithms on 3D City Models for Calculating Photovoltaic Potential
  • Synthetic Images Simulation (SImS): A Tool in Development
  • Delimitation of Urban Areas with Use of the Plataform Google Engine Explorer
  • Geospatial Data Sharing Barriers Across Organizations and the Possible Solution for Ethiopia
  • Creating a Likelihood and Consequence Model to Analyse Rising Main Bursts