Table of Contents
|
ICT Systems Security and Privacy Protection Nikolaos Pitropakis, Sokratis Katsikas, Steven Furnell, Konstantinos Markantonakis |
Front Matter |
|
Towards a Mobility-Aware Trust Model for the Internet of Underwater Things Abeer Almutairi, Xavier Carpent, Steven Furnell |
1-15 |
Rasd: Semantic Shift Detection and Adaptation for Network Intrusion Detection Fahad Alotaibi, Sergio Maffeis |
16-30 |
Reduce to the MACs - Privacy Friendly Generic Probe Requests Johanna Ansohn Mcdougall, Alessandro Brighente, Anne Kunstmann, Niklas Zapatka, Hannes Federrath |
31-45 |
PRIDA: PRIvacy-Preserving Data Aggregation with Multiple Data Customers Beyza Bozdemir, Betül Aşkın Özdemir, Melek Önen |
46-60 |
Keep Your Memory Dump Shut: Unveiling Data Leaks in Password Managers Efstratios Chatzoglou, Vyron Kampourakis, Zisis Tsiatsikas, Georgios Karopoulos, Georgios Kambourakis |
61-75 |
DryJIN: Detecting Information Leaks in Android Applications Minseong Choi, Yubin Im, Steve Ko, Yonghwi Kwon, Yuseok Jeon, Haehyun Cho |
76-90 |
Bruteware: A Novel Family of Cryptoviral Attacks Valerio Coletti, Emil Müller, Frederik Lundsbjerg, Nicola Dragoni |
91-104 |
Towards Practical Hardware Fingerprinting for Remote Attestation Michael Eckel, Florian Fenzl, Lukas Jäger |
105-118 |
Examining the Strength of Three Word Passwords William Fraser, Matthew Broadbent, Nikolaos Pitropakis, Christos Chrysoulas |
119-133 |
Can Synthetic Data Preserve Manifold Properties? Sonakshi Garg, Vicenç Torra |
134-147 |
“Alexa, How Do You Protect My Privacy?” A Quantitative Study of User Preferences and Requirements About Smart Speaker Privacy Settings Luca Hernández Acosta, Delphine Reinhardt |
148-161 |
Putting Authorization Servers on User-Owned Devices in User-Managed Access Masato Hirai, Daisuke Kotani, Yasuo Okabe |
162-176 |
Identification of Cyber Threats and Vulnerabilities in Norwegian Distribution Networks Martin Gilje Jaatun, Jørn Foros, Maren Istad |
177-190 |
Chain of Trust: Unraveling References Among Common Criteria Certified Products Adam Janovsky, Łukasz Chmielewski, Petr Svenda, Jan Jancar, Vashek Matyas |
191-205 |
LightArmor: A Lightweight Trusted Operating System Isolation Approach for Mobile Systems Nan Jiang, Qihang Zhou, Xiaoqi Jia, Jiayun Chen, Qingjia Huang, Haichao Du |
206-220 |
Satellite: Effective and Efficient Stack Memory Protection Scheme for Unsafe Programming Languages Hongjoo Jin, Sumin Yang, Moon Chan Park, Haehyun Cho, Dong Hoon Lee |
221-235 |
Neurosymbolic Learning in the XAI Framework for Enhanced Cyberattack Detection with Expert Knowledge Integration Chathuranga Sampath Kalutharage, Xiaodong Liu, Christos Chrysoulas, Oluwaseun Bamgboye |
236-249 |
Transforming EU Governance: The Digital Integration Through EBSI and GLASS Dimitrios Kasimatis, William J. Buchanan, Mwarwan Abubakar, Owen Lo, Christos Chrysoulas, Nikolaos Pitropakis, Pavlos Papadopoulos, Sarwar Sayeed, Marc Sel |
250-263 |
Malicious Insider Threat Detection Using Sentiment Analysis of Social Media Topics Matt Kenny, Nikolaos Pitropakis, Sarwar Sayeed, Christos Chrysoulas, Alexios Mylonas |
264-278 |
A Structural-Semantic Approach Integrating Graph-Based and Large Language Models Representation to Detect Android Malware Irshad Khan, Young-Woo Kwon |
279-293 |
Session Replication Attack Through QR Code Sniffing in Passkey CTAP Registration Donghyun Kim, Seungmin Kim, Gwonsang Ryu, Daeseon Choi |
294-307 |
GAD: A Real-Time Gait Anomaly Detection System with Online Adaptive Learning Ming-Chang Lee, Jia-Chun Lin, Sokratis Katsikas |
308-322 |
Queuing Theoretic Analysis of Dynamic Attribute-Based Access Control Systems Gaurav Madkaikar, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri |
323-337 |
IPEQ: Querying Multi-attribute Records with Inner Product Encryption Marin Matsumoto, Tsubasa Takahashi, Masato Oguchi |
338-352 |
Hiding Your Awful Online Choices Made More Efficient and Secure: A New Privacy-Aware Recommender System Shibam Mukherjee, Roman Walch, Fredrik Meisingseth, Elisabeth Lex, Christian Rechberger |
353-366 |
Cognition Behind Access Control: A Usability Comparison of Rule- and Category-Based Mechanisms Denis Obrezkov |
367-380 |
Obfuscating Code Vulnerabilities Against Static Analysis in Android Apps Francesco Pagano, Luca Verderame, Alessio Merlo |
381-395 |
Large Scale Heap Dump Embedding for Machine Learning: Predicting OpenSSH Key Locations Florian Rascoussier, Lise Lahoche |
396-409 |
Multi-method Approach to Human Expertise, Automation, and Artificial Intelligence for Vulnerability Management Mehdi Saadallah, Abbas Shahim, Svetlana Khapova |
410-422 |
Detecting Web Bots via Keystroke Dynamics August See, Adrian Westphal, Cornelius Weber, Mathias Fischer |
423-436 |
Exploring a Low-Cost Hardware Reverse Engineering Approach: A Use Case Experiment André Waltoft-Olsen, Phillip Johnson, Lasse Øverlier, Geir Olav Dyrkolbotn |
437-450 |
Cross-Validation for Detecting Label Poisoning Attacks: A Study on Random Forest Algorithm Tharindu Lakshan Yasarathna, Lankeshwara Munasinghe, Harsha Kalutarage, Nhien-An Le-Khac |
451-464 |
Xproofs: New Aggregatable and Maintainable Matrix Commitment with Optimal Proof Size Xinwei Yong, Jiaojiao Wu, Jianfeng Wang |
465-480 |
Predicting the Execution Time of Secure Neural Network Inference Eloise Zhang, Zoltán Ádám Mann |
481-494 |