Full Text Documents

34

Search


Table of Contents
ICT Systems Security and Privacy Protection
Nikolaos Pitropakis, Sokratis Katsikas, Steven Furnell, Konstantinos Markantonakis
Front Matter

Towards a Mobility-Aware Trust Model for the Internet of Underwater Things
Abeer Almutairi, Xavier Carpent, Steven Furnell
1-15
Rasd: Semantic Shift Detection and Adaptation for Network Intrusion Detection
Fahad Alotaibi, Sergio Maffeis
16-30
Reduce to the MACs - Privacy Friendly Generic Probe Requests
Johanna Ansohn Mcdougall, Alessandro Brighente, Anne Kunstmann, Niklas Zapatka, Hannes Federrath
31-45
PRIDA: PRIvacy-Preserving Data Aggregation with Multiple Data Customers
Beyza Bozdemir, Betül Aşkın Özdemir, Melek Önen
46-60
Keep Your Memory Dump Shut: Unveiling Data Leaks in Password Managers
Efstratios Chatzoglou, Vyron Kampourakis, Zisis Tsiatsikas, Georgios Karopoulos, Georgios Kambourakis
61-75
DryJIN: Detecting Information Leaks in Android Applications
Minseong Choi, Yubin Im, Steve Ko, Yonghwi Kwon, Yuseok Jeon, Haehyun Cho
76-90
Bruteware: A Novel Family of Cryptoviral Attacks
Valerio Coletti, Emil Müller, Frederik Lundsbjerg, Nicola Dragoni
91-104
Towards Practical Hardware Fingerprinting for Remote Attestation
Michael Eckel, Florian Fenzl, Lukas Jäger
105-118
Examining the Strength of Three Word Passwords
William Fraser, Matthew Broadbent, Nikolaos Pitropakis, Christos Chrysoulas
119-133
Can Synthetic Data Preserve Manifold Properties?
Sonakshi Garg, Vicenç Torra
134-147
“Alexa, How Do You Protect My Privacy?” A Quantitative Study of User Preferences and Requirements About Smart Speaker Privacy Settings
Luca Hernández Acosta, Delphine Reinhardt
148-161
Putting Authorization Servers on User-Owned Devices in User-Managed Access
Masato Hirai, Daisuke Kotani, Yasuo Okabe
162-176
Identification of Cyber Threats and Vulnerabilities in Norwegian Distribution Networks
Martin Gilje Jaatun, Jørn Foros, Maren Istad
177-190
Chain of Trust: Unraveling References Among Common Criteria Certified Products
Adam Janovsky, Łukasz Chmielewski, Petr Svenda, Jan Jancar, Vashek Matyas
191-205
LightArmor: A Lightweight Trusted Operating System Isolation Approach for Mobile Systems
Nan Jiang, Qihang Zhou, Xiaoqi Jia, Jiayun Chen, Qingjia Huang, Haichao Du
206-220
Satellite: Effective and Efficient Stack Memory Protection Scheme for Unsafe Programming Languages
Hongjoo Jin, Sumin Yang, Moon Chan Park, Haehyun Cho, Dong Hoon Lee
221-235
Neurosymbolic Learning in the XAI Framework for Enhanced Cyberattack Detection with Expert Knowledge Integration
Chathuranga Sampath Kalutharage, Xiaodong Liu, Christos Chrysoulas, Oluwaseun Bamgboye
236-249
Transforming EU Governance: The Digital Integration Through EBSI and GLASS
Dimitrios Kasimatis, William J. Buchanan, Mwarwan Abubakar, Owen Lo, Christos Chrysoulas, Nikolaos Pitropakis, Pavlos Papadopoulos, Sarwar Sayeed, Marc Sel
250-263
Malicious Insider Threat Detection Using Sentiment Analysis of Social Media Topics
Matt Kenny, Nikolaos Pitropakis, Sarwar Sayeed, Christos Chrysoulas, Alexios Mylonas
264-278
A Structural-Semantic Approach Integrating Graph-Based and Large Language Models Representation to Detect Android Malware
Irshad Khan, Young-Woo Kwon
279-293
Session Replication Attack Through QR Code Sniffing in Passkey CTAP Registration
Donghyun Kim, Seungmin Kim, Gwonsang Ryu, Daeseon Choi
294-307
GAD: A Real-Time Gait Anomaly Detection System with Online Adaptive Learning
Ming-Chang Lee, Jia-Chun Lin, Sokratis Katsikas
308-322
Queuing Theoretic Analysis of Dynamic Attribute-Based Access Control Systems
Gaurav Madkaikar, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri
323-337
IPEQ: Querying Multi-attribute Records with Inner Product Encryption
Marin Matsumoto, Tsubasa Takahashi, Masato Oguchi
338-352
Hiding Your Awful Online Choices Made More Efficient and Secure: A New Privacy-Aware Recommender System
Shibam Mukherjee, Roman Walch, Fredrik Meisingseth, Elisabeth Lex, Christian Rechberger
353-366
Cognition Behind Access Control: A Usability Comparison of Rule- and Category-Based Mechanisms
Denis Obrezkov
367-380
Obfuscating Code Vulnerabilities Against Static Analysis in Android Apps
Francesco Pagano, Luca Verderame, Alessio Merlo
381-395
Large Scale Heap Dump Embedding for Machine Learning: Predicting OpenSSH Key Locations
Florian Rascoussier, Lise Lahoche
396-409
Multi-method Approach to Human Expertise, Automation, and Artificial Intelligence for Vulnerability Management
Mehdi Saadallah, Abbas Shahim, Svetlana Khapova
410-422
Detecting Web Bots via Keystroke Dynamics
August See, Adrian Westphal, Cornelius Weber, Mathias Fischer
423-436
Exploring a Low-Cost Hardware Reverse Engineering Approach: A Use Case Experiment
André Waltoft-Olsen, Phillip Johnson, Lasse Øverlier, Geir Olav Dyrkolbotn
437-450
Cross-Validation for Detecting Label Poisoning Attacks: A Study on Random Forest Algorithm
Tharindu Lakshan Yasarathna, Lankeshwara Munasinghe, Harsha Kalutarage, Nhien-An Le-Khac
451-464
Xproofs: New Aggregatable and Maintainable Matrix Commitment with Optimal Proof Size
Xinwei Yong, Jiaojiao Wu, Jianfeng Wang
465-480
Predicting the Execution Time of Secure Neural Network Inference
Eloise Zhang, Zoltán Ádám Mann
481-494

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/