Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
Type Me the Truth!: Detecting Deceitful Users via Keystroke Dynamics Merylin Monaro, Riccardo Spolaor, QianQian Li, Mauro Conti, Luciano Gamberini, Giuseppe Sartori |
Type Me the Truth!: Detecting Deceitful Users via Keystroke Dynamics Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Protection of personal data in security alert sharing platforms Václav Stupka, Martin Horák, Martin Husák |
Protection of personal data in security alert sharing platforms Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
Insider Misuse Attribution using Biometrics Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven Furnell |
Insider Misuse Attribution using Biometrics Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Memory carving can finally unveil your embedded personal data Thomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine, Christophe Rosenberger |
Memory carving can finally unveil your embedded personal data Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
C'mon: Monitoring the Compliance of Cloud Services to Contracted Properties Soha Alboghdady, Stefan Winter, Ahmed Taha, Heng Zhang, Neeraj Suri |
C'mon: Monitoring the Compliance of Cloud Services to Contracted Properties Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An Approach to Botnet Malware Detection Using Nonparametric Bayesian Methods Joseph DiVita, Roger A. Hallman |
An Approach to Botnet Malware Detection Using Nonparametric Bayesian Methods Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The Demon is in the Configuration: Revisiting Hybrid Mobile Apps Configuration Model Abeer Al Jarrah, Mohamed Shehab |
The Demon is in the Configuration: Revisiting Hybrid Mobile Apps Configuration Model Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Popularity-based Detection of Domain Generation Algorithms Jasper Abbink, Christian Doerr |
Popularity-based Detection of Domain Generation Algorithms Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Application-Specific Digital Forensics Investigative Model in Internet of Things (IoT) Tanveer A. Zia, Peng Liu, Weili Han |
Application-Specific Digital Forensics Investigative Model in Internet of Things (IoT) Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Protecting Future Maritime Communication Christian Frøystad, Karin Bernsmed, Per Håkon Meland |
Protecting Future Maritime Communication Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Investigating the darknet: limitations in Slovenian legal system Anze Mihelic, Blaz Markelj, Igor Bernik, Sabina Zgaga |
Investigating the darknet: limitations in Slovenian legal system Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Efficient ID-based Designated Verifier Signature Olivier Blazy, Emmanuel Conchon, Paul Germouty, Amandine Jambert |
Efficient ID-based Designated Verifier Signature Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
DoS Attacks on Controller Area Networks by Fault Injections from the Software Layer Pal-Stefan Murvay, Bogdan Groza |
DoS Attacks on Controller Area Networks by Fault Injections from the Software Layer Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Quantifying the Spectrum of Denial-of-Service Attacks through Internet Backscatter Norbert Blenn, Vincent Ghiëtte, Christian Doerr |
Quantifying the Spectrum of Denial-of-Service Attacks through Internet Backscatter Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On the Usefulness of Compression Models for Authorship Verification Oren Halvani, Christian Winter, Lukas Graner |
On the Usefulness of Compression Models for Authorship Verification Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Quantitave Dynamic Taint Analysis of Privacy Leakage in Android Arabic Apps Ayman Youssef, Ahmed F. Shosha |
Quantitave Dynamic Taint Analysis of Privacy Leakage in Android Arabic Apps Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Measuring privacy in high dimensional microdata collections Spyros Boukoros, Stefan Katzenbeisser |
Measuring privacy in high dimensional microdata collections Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SAFE and Secure: Deeply Integrating Security in a New Hazard Analysis Sam Procter, Eugene Y. Vasserman, John Hatcliff |
SAFE and Secure: Deeply Integrating Security in a New Hazard Analysis Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
The Archistar Secret-Sharing Backup Proxy Andreas Happe, Florian Wohner, Thomas Lorünser |
The Archistar Secret-Sharing Backup Proxy Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Reliable Behavioural Factors in the Information Security Context Peter Mayer, Alexandra Kunz, Melanie Volkamer |
Reliable Behavioural Factors in the Information Security Context Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
Fully threshold broadcast encryption Sigurd Eskeland |
Fully threshold broadcast encryption Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Author has
verified
information
|
Provisioning Software with Hardware-Software Binding Robert P. Lee, Konstantinos Markantonakis, Raja Naeem Akram |
Provisioning Software with Hardware-Software Binding Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
End-node Fingerprinting for Malware Detection on HTTPS Data Tomás Komárek, Petr Somol |
End-node Fingerprinting for Malware Detection on HTTPS Data Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Searchable Encryption with Access Control Nils Löken |
Searchable Encryption with Access Control Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
DevOps for Better Software Security in the Cloud Invited Paper Martin Gilje Jaatun, Daniela S. Cruzes, Jesus Luna |
DevOps for Better Software Security in the Cloud Invited Paper Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Tetsuji Takada |
Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
k-rAC: a Fine-Grained k-Resilient Access Control Scheme for Distributed Hash Tables Olga Kieselmann, Arno Wacker, Gregor Schiele |
k-rAC: a Fine-Grained k-Resilient Access Control Scheme for Distributed Hash Tables Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Security Analysis of Cordova Applications in Google Play Michiel Willocx, Jan Vossaert, Vincent Naessens |
Security Analysis of Cordova Applications in Google Play Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Continuous Biometric Verification for Non-Repudiation of Remote Services Enrico Schiavone, Andrea Ceccarelli, Andrea Bondavalli |
Continuous Biometric Verification for Non-Repudiation of Remote Services Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Constrained PET Composition for Measuring Enforced Privacy Sebastian Funke, Alexander Wiesmaier, Jörg Daubert |
Constrained PET Composition for Measuring Enforced Privacy Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Non-Parametric Model for Accurate and Provably Private Synthetic Data Sets Jordi Soria-Comas, Josep Domingo-Ferrer |
A Non-Parametric Model for Accurate and Provably Private Synthetic Data Sets Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Implementing Secure DevOps assessment for highly regulated environments Hasan Yasar |
Implementing Secure DevOps assessment for highly regulated environments Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Source Code Patterns of SQL Injection Vulnerabilities Felix Schuckert, Basel Katt, Hanno Langweg |
Source Code Patterns of SQL Injection Vulnerabilities Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
NEXTLEAP: Decentralizing Identity with Privacy for Secure Messaging Harry Halpin |
NEXTLEAP: Decentralizing Identity with Privacy for Secure Messaging Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Secure and Efficient Data Sharing with Atribute-based Proxy Re-encryption Scheme Masoomeh Sepehri, Alberto Trombetta |
Secure and Efficient Data Sharing with Atribute-based Proxy Re-encryption Scheme Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
JSDES: An Automated De-Obfuscation System for Malicious JavaScript Moataz AbdelKhalek, Ahmed Shosha |
JSDES: An Automated De-Obfuscation System for Malicious JavaScript Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Machine Learning Approach for Detection of nonTor Traffic Elike Hodo, Xavier J. A. Bellekens, Ephraim Iorkyase, Andrew W. Hamilton, Christos Tachtatzis, Robert C. Atkinson |
Machine Learning Approach for Detection of nonTor Traffic Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Trust-based Resilient Routing Mechanism for the Internet of Things Zeeshan Ali Khan, Johanna Ullrich, Artemios G. Voyiatzis, Peter Herrmann |
A Trust-based Resilient Routing Mechanism for the Internet of Things Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Avinash Srinivasan, Hunter Dong, Angelos Stavrou |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Using Ciphers for Failure-Recovery in ITS Systems Mustafa Ayoob, Wael Adi, Vassilis Prevelakis |
Using Ciphers for Failure-Recovery in ITS Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Identification of Dependency-based Attacks on Node.js Brian Pfretzschner, Lotfi Ben Othmane |
Identification of Dependency-based Attacks on Node.js Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Anomaly Detection for Simulated IEC-60870-5-104 Trafiic Ersi Hodo, Stepan Grebeniuk, Henri Ruotsalainen, Paul Tavolato |
Anomaly Detection for Simulated IEC-60870-5-104 Trafiic Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Secure Matrix Multiplication with MapReduce Xavier Bultel, Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade |
Secure Matrix Multiplication with MapReduce Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Self-healing Multi-Cloud Application Modelling Erkuden Rios, Eider Iturbe, Maria Carmen Palacios |
Self-healing Multi-Cloud Application Modelling Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Towards the Adoption of Secure Cloud Identity Services Alexandros Kostopoulos, Evangelos Sfakianakis, Ioannis P. Chochliouros, John Sören Pettersson, Stephan Krenn, Welderufael Tesfay, Andrea Migliavacca, Felix Hörandner |
Towards the Adoption of Secure Cloud Identity Services Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Christopher Meffert, Devon Clark, Ibrahim M. Baggili, Frank Breitinger |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Andrew Slaughter, Mark Yampolskiy, Manyalibo Matthews, Wayne E. King, Gabe Guss, Yuval Elovici |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Forensic Image Inspection Assisted by Deep Learning Felix Mayer, Martin Steinebach |
Forensic Image Inspection Assisted by Deep Learning Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Position Paper: The Past, Present, and Future of Sanitizable and Redactable Signatures Arne Bilzhause, Henrich C. Pöhls, Kai Samelin |
Position Paper: The Past, Present, and Future of Sanitizable and Redactable Signatures Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Towards Semi-automated Detection of Trigger-based Behavior for Software Security Assurance Dorottya Papp, Levente Buttyán, Zhendong Ma |
Towards Semi-automated Detection of Trigger-based Behavior for Software Security Assurance Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Towards a Secure SCRUM Process for Agile Web Application Development Patrik Maier, Zhendong Ma, Roderick Bloem |
Towards a Secure SCRUM Process for Agile Web Application Development Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Sebastian Thomas Schork, Antonia Schwichtenberg, Spiros Alexakis, George Moldovan |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Rolling DICE: Lightweight Remote Attestation for COTS IoT Hardware Lukas Jäger, Richard Petri, Andreas Fuchs |
Rolling DICE: Lightweight Remote Attestation for COTS IoT Hardware Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Security and Privacy Implications of NFC-enabled Contactless Payment Systems Nicholas Akinyokun, Vanessa Teague |
Security and Privacy Implications of NFC-enabled Contactless Payment Systems Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
Enabling Trust Assessment In Clouds-of-Clouds: A Similarity-Based Approach Reda Yaich, Nora Cuppens, Frédéric Cuppens |
Enabling Trust Assessment In Clouds-of-Clouds: A Similarity-Based Approach Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Comparative Study on the Scalability of Dynamic Group Key Agreement Protocols Orhan Ermis, Serif Bahtiyar, Emin Anarim, M. Ufuk Çaglayan |
A Comparative Study on the Scalability of Dynamic Group Key Agreement Protocols Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Sravani Teja Bulusu, Romain Laborde, Ahmad Samer Wazan, François Barrère, Abdelmalek Benzekri |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Microblogging in a Privacy-Preserving way Nikolaos P. Karvelas, Marius Senftleben, Stefan Katzenbeisser |
Microblogging in a Privacy-Preserving way Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On Using TLS to Secure In-Vehicle Networks Daniel Zelle, Christoph Krauß, Hubert Strauß, Karsten Schmidt |
On Using TLS to Secure In-Vehicle Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SensorBuster: On Identifying Sensor Nodes in P2P Botnets Shankar Karuppayah, Leon Böck, Tim Grube, Selvakumar Manickam, Max Mühlhäuser, Mathias Fischer |
SensorBuster: On Identifying Sensor Nodes in P2P Botnets Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Malware and Formal Methods: Rigorous Approaches for detecting Malicious Behaviour Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone |
Malware and Formal Methods: Rigorous Approaches for detecting Malicious Behaviour Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
VMAttack: Deobfuscating Virtualization-Based Packed Binaries Anatoli Kalysch, Johannes Götzfried, Tilo Müller |
VMAttack: Deobfuscating Virtualization-Based Packed Binaries Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Towards DDoS Attack Resilient Wide Area Monitoring Systems Kubilay Demir, Neeraj Suri |
Towards DDoS Attack Resilient Wide Area Monitoring Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Attack Potential in Impact and Complexity Luca Allodi, Fabio Massacci |
Attack Potential in Impact and Complexity Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Adaptive Resource Management Enabling Deception (ARMED) Partha P. Pal, Nathaniel Soule, Nate Lageman, Shane S. Clark, Marco M. Carvalho, Adrian Granados, Anthony Alves |
Adaptive Resource Management Enabling Deception (ARMED) Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
ZONESEC: built-in cyber-security for wide area surveillance system Aljosa Pasic, Jose-Ramon Martinez-Salio, Susana Gonzalez Zarzosa, Rodrigo Diaz |
ZONESEC: built-in cyber-security for wide area surveillance system Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Busting a Myth: Review of Agile Security Engineering Methods Kalle Rindell, Sami Hyrynsalmi, Ville Leppänen |
Busting a Myth: Review of Agile Security Engineering Methods Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Resource Hints in HTML5: A New Pandora's Box of Security Nightmares Natalija Vlajic, X. Y. Shi, Hamzeh Roumani, Pooria Madani |
Resource Hints in HTML5: A New Pandora's Box of Security Nightmares Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
David Bernhard, Oksana Kulyk, Melanie Volkamer |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Incremental Clustering for Semi-Supervised Anomaly Detection applied on Log Data Markus Wurzenberger, Florian Skopik, Max Landauer, Philipp Greitbauer, Roman Fiedler, Wolfgang Kastner |
Incremental Clustering for Semi-Supervised Anomaly Detection applied on Log Data Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Using Markov Chains to Model Sensor Network Reliability Tom Arjannikov, Simon Diemert, Sudhakar Ganti, Chloe Lampman, Edward C. Wiebe |
Using Markov Chains to Model Sensor Network Reliability Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
REMI: A Reliable and Secure Multicast Routing Protocol for IoT Networks Mauro Conti, Pallavi Kaliyar, Chhagan Lal |
REMI: A Reliable and Secure Multicast Routing Protocol for IoT Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
M2M-REP: Reputation of Machines in the Internet of Things Muhammad Ajmal Azad, Samiran Bag, Feng Hao |
M2M-REP: Reputation of Machines in the Internet of Things Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression Sabine S. Schmidt, Wojciech Mazurczyk, Jörg Keller, Luca Caviglione |
A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Systemic Risk Modeling and Evaluation through Simulation and Bayesian Networks Andrea Tundis, Alfredo Garro, Teresa Gallo, Domenico Saccà, Simona Citrigno, Sabrina Graziano, Max Mühlhäuser |
Systemic Risk Modeling and Evaluation through Simulation and Bayesian Networks Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Other
Verification:
Authors have
verified
information
|
Towards a Model of User-centered Privacy Preservation Paul Grace, Mike Surridge |
Towards a Model of User-centered Privacy Preservation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices Saeed Ibrahim Alqahtani, Shujun Li |
PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Investigating User Comprehension and Risk Perception of Apple's Touch ID Technology Yousra Javed, Mohamed Shehab, Emmanuel Bello-Ogunu |
Investigating User Comprehension and Risk Perception of Apple's Touch ID Technology Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Go with the -Bitcoin- Flow, with Visual Analytics Stefano Bistarelli, Francesco Santini |
Go with the -Bitcoin- Flow, with Visual Analytics Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
One-Message Unilateral Entity Authentication Schemes Alfredo De Santis, Manuela Flores, Barbara Masucci |
One-Message Unilateral Entity Authentication Schemes Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Low-Cost UAV-Based Secure Location Verification Method Marco Rasori, Pericle Perazzo, Gianluca Dini |
A Low-Cost UAV-Based Secure Location Verification Method Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Attack Scenario Modeling for Smart Grids Assessment through Simulation Andrea Tundis, Rolf Egert, Max Mühlhäuser |
Attack Scenario Modeling for Smart Grids Assessment through Simulation Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Other
Verification:
Authors have
verified
information
|
A Cloud-Based Compilation and Hardening Platform for Android Apps Marcel Busch, Mykolai Protsenko, Tilo Müller |
A Cloud-Based Compilation and Hardening Platform for Android Apps Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Khanh-Huu-The Dam, Tayssir Touili |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Victim Communication Stack (VCS): A flexible model to select the Human Attack Vector Enrico Frumento, Federica Freschi, Davide Andreoletti, Angelo Consoli |
Victim Communication Stack (VCS): A flexible model to select the Human Attack Vector Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SONAR: Automatic Detection of Cyber Security Events over the Twitter Stream Quentin Le Sceller, ElMouatez Billah Karbab, Mourad Debbabi, Farkhund Iqbal |
SONAR: Automatic Detection of Cyber Security Events over the Twitter Stream Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Anomaly-Based Detection and Classification of Attacks in Cyber-Physical Systems Philipp Kreimel, Oliver Eigner, Paul Tavolato |
Anomaly-Based Detection and Classification of Attacks in Cyber-Physical Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Integrating Reactive Cloud Applications in SERECA Christof Fetzer, Giovanni Mazzeo, John Oliver, Luigi Romano, Martijn Verburg |
Integrating Reactive Cloud Applications in SERECA Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Holistic Approach for Privacy Protection in E-Government Konstantinos Angelopoulos, Vasiliki Diamantopoulou, Haralambos Mouratidis, Michalis Pavlidis, Mattia Salnitri, Paolo Giorgini, José F. Ruiz |
A Holistic Approach for Privacy Protection in E-Government Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS Sebastian Neuner, Artemios G. Voyiatzis, Martin Schmiedecker, Edgar R. Weippl |
Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Lightweight Address Hopping for Defending the IPv6 IoT Aljosha Judmayer, Johanna Ullrich, Georg Merzdovnik, Artemios G. Voyiatzis, Edgar R. Weippl |
Lightweight Address Hopping for Defending the IPv6 IoT Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Secure Enrollment of Certificates Using Short PINs Michael Rossberg, Markus Theil |
Secure Enrollment of Certificates Using Short PINs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Blockchain-based Approach for Data Accountability and Provenance Tracking Ricardo Neisse, Gary Steri, Igor Nai Fovino |
A Blockchain-based Approach for Data Accountability and Provenance Tracking Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts Martin Husák, Jaroslav Kaspar, Elias Bou-Harb, Pavel Celeda |
On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Are Network Covert Timing Channels Statistical Anomalies? Félix Iglesias, Tanja Zseby |
Are Network Covert Timing Channels Statistical Anomalies? Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Artificial Ambient Environments for Proximity Critical Applications Iakovos Gurulian, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes |
Artificial Ambient Environments for Proximity Critical Applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Overcoming Limits of Blockchain for IoT Applications Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera |
Overcoming Limits of Blockchain for IoT Applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
bin2llvm: Analysis of Binary Programs Using LLVM Intermediate Representation Kevin Kirchner, Stefan Rosenthaler |
bin2llvm: Analysis of Binary Programs Using LLVM Intermediate Representation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Nicolás Notario, Eleonora Ciceri, Alberto Crespo, Eduardo González Real, Ilio Catallo, Sauro Vicini |
Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|