Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
ICT Systems Security and Privacy Protection
Nikolaos Pitropakis, Sokratis Katsikas, Steven Furnell, Konstantinos Markantonakis
Front Matter

Towards a Mobility-Aware Trust Model for the Internet of Underwater Things
Abeer Almutairi, Xavier Carpent, Steven Furnell
1-15
Rasd: Semantic Shift Detection and Adaptation for Network Intrusion Detection
Fahad Alotaibi, Sergio Maffeis
16-30
Reduce to the MACs - Privacy Friendly Generic Probe Requests
Johanna Ansohn Mcdougall, Alessandro Brighente, Anne Kunstmann, Niklas Zapatka, Hannes Federrath
31-45
PRIDA: PRIvacy-Preserving Data Aggregation with Multiple Data Customers
Beyza Bozdemir, Betül Aşkın Özdemir, Melek Önen
46-60
Keep Your Memory Dump Shut: Unveiling Data Leaks in Password Managers
Efstratios Chatzoglou, Vyron Kampourakis, Zisis Tsiatsikas, Georgios Karopoulos, Georgios Kambourakis
61-75
DryJIN: Detecting Information Leaks in Android Applications
Minseong Choi, Yubin Im, Steve Ko, Yonghwi Kwon, Yuseok Jeon, Haehyun Cho
76-90
Bruteware: A Novel Family of Cryptoviral Attacks
Valerio Coletti, Emil Müller, Frederik Lundsbjerg, Nicola Dragoni
91-104
Towards Practical Hardware Fingerprinting for Remote Attestation
Michael Eckel, Florian Fenzl, Lukas Jäger
105-118
Examining the Strength of Three Word Passwords
William Fraser, Matthew Broadbent, Nikolaos Pitropakis, Christos Chrysoulas
119-133
Can Synthetic Data Preserve Manifold Properties?
Sonakshi Garg, Vicenç Torra
134-147
“Alexa, How Do You Protect My Privacy?” A Quantitative Study of User Preferences and Requirements About Smart Speaker Privacy Settings
Luca Hernández Acosta, Delphine Reinhardt
148-161
Putting Authorization Servers on User-Owned Devices in User-Managed Access
Masato Hirai, Daisuke Kotani, Yasuo Okabe
162-176
Identification of Cyber Threats and Vulnerabilities in Norwegian Distribution Networks
Martin Gilje Jaatun, Jørn Foros, Maren Istad
177-190
Chain of Trust: Unraveling References Among Common Criteria Certified Products
Adam Janovsky, Łukasz Chmielewski, Petr Svenda, Jan Jancar, Vashek Matyas
191-205
LightArmor: A Lightweight Trusted Operating System Isolation Approach for Mobile Systems
Nan Jiang, Qihang Zhou, Xiaoqi Jia, Jiayun Chen, Qingjia Huang, Haichao Du
206-220
Satellite: Effective and Efficient Stack Memory Protection Scheme for Unsafe Programming Languages
Hongjoo Jin, Sumin Yang, Moon Chan Park, Haehyun Cho, Dong Hoon Lee
221-235
Neurosymbolic Learning in the XAI Framework for Enhanced Cyberattack Detection with Expert Knowledge Integration
Chathuranga Sampath Kalutharage, Xiaodong Liu, Christos Chrysoulas, Oluwaseun Bamgboye
236-249
Transforming EU Governance: The Digital Integration Through EBSI and GLASS
Dimitrios Kasimatis, William J. Buchanan, Mwarwan Abubakar, Owen Lo, Christos Chrysoulas, Nikolaos Pitropakis, Pavlos Papadopoulos, Sarwar Sayeed, Marc Sel
250-263
Malicious Insider Threat Detection Using Sentiment Analysis of Social Media Topics
Matt Kenny, Nikolaos Pitropakis, Sarwar Sayeed, Christos Chrysoulas, Alexios Mylonas
264-278
A Structural-Semantic Approach Integrating Graph-Based and Large Language Models Representation to Detect Android Malware
Irshad Khan, Young-Woo Kwon
279-293
Session Replication Attack Through QR Code Sniffing in Passkey CTAP Registration
Donghyun Kim, Seungmin Kim, Gwonsang Ryu, Daeseon Choi
294-307
GAD: A Real-Time Gait Anomaly Detection System with Online Adaptive Learning
Ming-Chang Lee, Jia-Chun Lin, Sokratis Katsikas
308-322
Queuing Theoretic Analysis of Dynamic Attribute-Based Access Control Systems
Gaurav Madkaikar, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri
323-337
IPEQ: Querying Multi-attribute Records with Inner Product Encryption
Marin Matsumoto, Tsubasa Takahashi, Masato Oguchi
338-352
Hiding Your Awful Online Choices Made More Efficient and Secure: A New Privacy-Aware Recommender System
Shibam Mukherjee, Roman Walch, Fredrik Meisingseth, Elisabeth Lex, Christian Rechberger
353-366
Cognition Behind Access Control: A Usability Comparison of Rule- and Category-Based Mechanisms
Denis Obrezkov
367-380
Obfuscating Code Vulnerabilities Against Static Analysis in Android Apps
Francesco Pagano, Luca Verderame, Alessio Merlo
381-395
Large Scale Heap Dump Embedding for Machine Learning: Predicting OpenSSH Key Locations
Florian Rascoussier, Lise Lahoche
396-409
Multi-method Approach to Human Expertise, Automation, and Artificial Intelligence for Vulnerability Management
Mehdi Saadallah, Abbas Shahim, Svetlana Khapova
410-422
Detecting Web Bots via Keystroke Dynamics
August See, Adrian Westphal, Cornelius Weber, Mathias Fischer
423-436
Exploring a Low-Cost Hardware Reverse Engineering Approach: A Use Case Experiment
André Waltoft-Olsen, Phillip Johnson, Lasse Øverlier, Geir Olav Dyrkolbotn
437-450
Cross-Validation for Detecting Label Poisoning Attacks: A Study on Random Forest Algorithm
Tharindu Lakshan Yasarathna, Lankeshwara Munasinghe, Harsha Kalutarage, Nhien-An Le-Khac
451-464
Xproofs: New Aggregatable and Maintainable Matrix Commitment with Optimal Proof Size
Xinwei Yong, Jiaojiao Wu, Jianfeng Wang
465-480
Predicting the Execution Time of Secure Neural Network Inference
Eloise Zhang, Zoltán Ádám Mann
481-494

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/