Abstract is missing.
- Building the Future: Tokenization, Blockchain and Citizen-focused SystemsBill Buchanan. 5
- Next Generation Information Warfare: Challenges and Research DirectionsRoberto Di Pietro. 7-8
- Challenges of GDPR and the NIS DirectiveGerald Quirchmayr. 9
- SPROOF: A Platform for Issuing and Verifying Documents in a Public BlockchainClemens Brunner, Fabian Knirsch, Dominik Engel. 15-25 [doi]
- Are You Ready When It Counts? IT Consulting Firm's Information Security Incident ManagementMaja Nyman, Christine Große. 26-37 [doi]
- Zero-sum Distinguishers for Round-reduced GIMLI PermutationJiahao Cai, Zihao Wei, Yingjie Zhang, Siwei Sun, Lei Hu. 38-43 [doi]
- Identity-based TLS for Cloud of ChipsGaurav Sharma 0006, Soultana Ellinidou, Tristan Vanspouwen, Théo Rigas, Jean-Michel Dricot, Olivier Markowitch. 44-54 [doi]
- Mobile Devices as Digital Sextants for Zero-Permission GeolocationLorenz Schwittmann, Matthäus Wander, Torben Weis. 55-66 [doi]
- Experiment on Side-Channel Key-Recovery using a Real LPWA End-deviceKazuhide Fukushima, Damien Marion 0001, Yuto Nakano, Adrien Facon, Shinsaku Kiyomoto, Sylvain Guilley. 67-74 [doi]
- Nonsense Attacks on Google Assistant and Missense Attacks on Amazon AlexaMary K. Bispham, Ioannis Agrafiotis, Michael Goldsmith. 75-87 [doi]
- Remote Exploit Development for Cyber Red Team Computer Network Operations Targeting Industrial Control SystemsBernhards Blumbergs. 88-99 [doi]
- Sensing Danger: Exploiting Sensors to Build Covert ChannelsThomas Ulz, Markus Feldbacher, Thomas W. Pieber, Christian Steger. 100-113 [doi]
- Accomplishing Transparency within the General Data Protection RegulationDayana Spagnuelo, Ana Ferreira, Gabriele Lenzini. 114-125 [doi]
- A Decentralized Solution for Combinatorial Testing of Access Control EngineSaid Daoudagh, Francesca Lonetti, Eda Marchetti. 126-135 [doi]
- Extracting Vehicle Sensor Signals from CAN Logs for Driver Re-identificationSzilvia Lestyan, Gergely Ács, Gergely Biczók, Zsolt Szalay. 136-145 [doi]
- Behavioral Biometric Authentication in Android Unlock Patterns through Machine LearningJosé Torres, Sergio de los Santos, Efthimios Alepis, Constantinos Patsakis. 146-154 [doi]
- Hypervisor-assisted Atomic Memory Acquisition in Modern SystemsMichael Kiperberg, Roee Leon, Amit Resh, Asaf Algawi, Nezer Zaidenberg. 155-162 [doi]
- SC2Share: Smart Contract for Secure Car SharingAkash Madhusudan, Iraklis Symeonidis, Mustafa A. Mustafa, Ren Zhang 0003, Bart Preneel. 163-171 [doi]
- Probabilistic Modeling and Simulation of Vehicular Cyber Attacks: An Application of the Meta Attack LanguageSotirios Katsikeas, Pontus Johnson, Simon Hacks, Robert Lagerström. 175-182 [doi]
- Permission-based Risk Signals for App Behaviour Characterization in Android AppsOluwafemi Olukoya, Lewis Mackenzie, Inah Omoronyia. 183-192 [doi]
- Locality-Sensitive Hashing for Efficient Web Application Security TestingIlan Ben-Bassat, Erez Rokah. 193-204 [doi]
- Theorising on Information Cascades and Sequential Decision-making for Analysing Security BehaviourDirk Snyman, Hennie A. Kruger. 205-212 [doi]
- Security Analysis and Efficient Implementation of Code-based Signature SchemesPartha Sarathi Roy 0001, Kirill Morozov, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi. 213-220 [doi]
- Robust Person Identification based on DTW Distance of Multiple-Joint Gait PatternTakafumi Mori, Hiroaki Kikuchi. 221-229 [doi]
- Predicting CyberSecurity Incidents using Machine Learning Algorithms: A Case Study of Korean SMEsAlaa Mohasseb, Benjamin Aziz, Jeyong Jung, Julak Lee. 230-237 [doi]
- Accelerate Performance for Elliptic Curve Scalar Multiplication based on NAF by Parallel ComputingMohammad Anagreh, Eero Vainikko, Peeter Laud. 238-245 [doi]
- A Novel Behaviour Profiling Approach to Continuous Authentication for Mobile ApplicationsSaud Alotaibi, Abdulrahman Alruban, Steven Furnell, Nathan L. Clarke. 246-251 [doi]
- Phishing Email Detection based on Named Entity RecognitionVít Listík, Simon Let, Jan Sedivý, Václav Hlavác. 252-256 [doi]
- Maia: A Language for Mandatory Integrity Controls of Structured DataWassnaa Al-Mawee, Paul J. Bonamy, Steve Carr, Jean Mayo. 257-265 [doi]
- Evaluating Security, Privacy and Usability Features of QR Code ReadersHeider A. M. Wahsheh, Flaminia L. Luccio. 266-273 [doi]
- In-depth Feature Selection and Ranking for Automated Detection of Mobile MalwareAlejandro Guerra-Manzanares, Sven Nõmm, Hayretdin Bahsi. 274-283 [doi]
- Finding Classification Zone Violations with Anonymized Message Flow AnalysisMichael Meinig, Peter Tröger, Christoph Meinel. 284-292 [doi]
- Definition and Efficient Construction of Encrypted k-anonymization SchemeMasayuki Yoshino, Takayuki Suzuki, Ken Naganuma, Hisayoshi Sato. 293-300 [doi]
- Usability of Policy Authoring Tools: A Layered ApproachStephanie Weinhardt, Olamide Omolola. 301-308 [doi]
- An Order-specified Aggregate Authority-transfer SignatureTakuya Ezure, Masaki Inamura. 309-318 [doi]
- Automated Incident Response for Industrial Control Systems Leveraging Software-defined NetworkingFlorian Patzer, Ankush Meshram, Maximilian Heß. 319-327 [doi]
- Improved Forensic Recovery of PKZIP Stream Cipher PasswordsSein Coray, Iwen Coisel, Ignacio Sanchez. 328-335 [doi]
- Detecting Anomalies by using Self-Organizing Maps in Industrial EnvironmentsRicardo Hormann, Eric Fischer. 336-344 [doi]
- AuthLedger: A Novel Blockchain-based Domain Name Authentication SchemeZhi Guan, Abba Garba, Anran Li, Zhong Chen 0001, Nesrine Kaaniche. 345-352 [doi]
- Mathematical Model to Estimate Loss by Cyber Incident in JapanMichihiro Yamada, Hiroaki Kikuchi, Naoki Matsuyama, Koji Inui. 353-360 [doi]
- TED: A Container based Tool to Perform Security Risk Assessment for ELF BinariesDaniele Mucci, Bernhards Blumbergs. 361-369 [doi]
- Evaluating Privacy Policy Summarization: An Experimental Study among Japanese UsersVanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay, Shinsaku Kiyomoto. 370-377 [doi]
- Methodology of a Network Simulation in the Context of an Evaluation: Application to an IDSPierre-Marie Bajan, Christophe Kiennert, Hervé Debar. 378-388 [doi]
- Towards Aligning GDPR Compliance with Software Development: A Research AgendaMeiko Jensen, Sahil Kapila, Nils Gruschka. 389-396 [doi]
- A Novel Features Set for Internet Traffic Classification using BurstinessHussein Oudah, Bogdan V. Ghita, Taimur Bakhshi. 397-404 [doi]
- The Common Vulnerability Scoring System vs. Rock Star Vulnerabilities: Why the Discrepancy?Doudou Fall, Youki Kadobayashi. 405-411 [doi]
- Privacy Preservation of Social Network Users Against Attribute Inference Attacks via Malicious Data MiningKhondker Jahid Reza, Md Zahidul Islam 0001, Vladimir Estivill-Castro. 412-420 [doi]
- Enhancing Business Process Modelling with Data Protection Compliance: An Ontology-based ProposalCesare Bartolini, Antonello Calabrò, Eda Marchetti. 421-428 [doi]
- Towards Automated Comprehensive Feature Engineering for Spam DetectionFred N. Kiwanuka, Ja'far Alqatawna, Anang Hudaya Muhamad Amin, Sujni Paul, Hossam Faris. 429-437 [doi]
- Identification and Extraction of Digital Forensic Evidence from Multimedia Data Sources using Multi-algorithmic FusionShahlaa Mashhadani, Nathan L. Clarke, Fudong Li. 438-448 [doi]
- Monotonic and Non-monotonic Context DelegationMouiad Al-Wahah, Csilla Farkas. 449-460 [doi]
- Probabilistic Graphical Model on Detecting Insiders: Modeling with SGD-HMMAhmed Saaudi, Yan Tong, Csilla Farkas. 461-470 [doi]
- Towards Automated Characterization of Malware's High-level Mechanism using Virtual Machine IntrospectionShun Yonamine, Youki Kadobayashi, Daisuke Miyamoto, Yuzo Taenaka. 471-478 [doi]
- Threat Modeling and Attack Simulations of Connected Vehicles: A Research OutlookWenjun Xiong, Fredrik Krantz, Robert Lagerström. 479-486 [doi]
- An Image Forgery Detection Solution based on DCT Coefficient AnalysisHoai Phuong Nguyen, Florent Retraint, Frédéric Morain-Nicolier, Agnès Delahaies. 487-494 [doi]
- The HERMENEUT Project: Enterprises Intangible Risk Management via Economic Models based on Simulation of Modern Cyber AttacksEnrico Frumento, Carlo Dambra. 495-502 [doi]
- Smart-card Deployment of an Electronic Voting ProtocolHervé Chabanne, Emmanuelle Dottax, Franck Rondepierre. 503-510 [doi]
- Practical Solutions to Save Bitcoins Applied to an Identity System ProposalDaniel Augot, Hervé Chabanne, William George. 511-518 [doi]
- Attack and Defence Modelling for Attacks via the Speech InterfaceMary K. Bispham, Ioannis Agrafiotis, Michael Goldsmith. 519-527 [doi]
- The Curious Case of Machine Learning in Malware DetectionSherif Saad, William Briguglio, Haytham Elmiligi. 528-535 [doi]
- Malicious DNS Traffic in Tor: Analysis and CountermeasuresMichael Sonntag. 536-543 [doi]
- Machine Learning for All: A More Robust Federated Learning FrameworkIlias Chamatidis, Georgios Spathoulas. 544-551 [doi]
- Construction of Secure Internal Networks with Communication Classifying SystemYuya Sato, Hirokazu Hasegawa, Hiroki Takakura. 552-557 [doi]
- Survey and Lessons Learned on Raising SME Awareness about CybersecurityChristophe Ponsard, Jeremy Grandclaudon, Sébastien Bal. 558-563 [doi]
- A Secure Framework with Remote Configuration of Intellectual PropertyNadir Khan, Sven Nitzsche, Jürgen Becker. 564-571 [doi]
- Tracking Data Trajectories in IoTChiara Bodei, Letterio Galletta. 572-579 [doi]
- SMMDecoy: Detecting GPU Keyloggers using Security by Deception TechniquesIjlal Loutfi. 580-587 [doi]
- A Fine-grained General Purpose Secure Storage Facility for Trusted Execution EnvironmentLuigi Catuogno, Clemente Galdi. 588-595 [doi]
- Sender Authentication for Automotive In-Vehicle Networks through Dual Analog Measurements to Determine the Location of the TransmitterCarlos Moreno 0002, Sebastian Fischmeister. 596-605 [doi]
- Flexible Access Control and Confidentiality over Encrypted Data for Document-based DatabaseMaryam Almarwani, Boris Konev, Alexei Lisitsa. 606-614 [doi]
- Vulnerabilities in IoT Devices for Smart Home EnvironmentLuís Costa, João Paulo Barros, Miguel Tavares. 615-622 [doi]
- Location Privacy Assured Internet of ThingsIsmail Butun, Mikael Gidlund. 623-630 [doi]
- Solving a Hard Instance of Suspicious Behaviour Detection with Sparse Binary Vectors ClusteringEric Filiol, Abhilash Hota. 635-644 [doi]
- Systematic Characterization of a Sequence GroupPaul Irolla. 645-656 [doi]
- Deep Neural Networks for Android Malware DetectionAbhilash Hota, Paul Irolla. 657-663 [doi]
- A Comparative Analysis of Android MalwareNeeraj Chavan, Fabio Di Troia, Mark Stamp. 664-673 [doi]
- Fuzzy Logic Decision based Collaborative Privacy Management Framework for Online Social NetworksGulsum Akkuzu, Benjamin Aziz, Mo Adda. 674-684 [doi]
- Analytical Modelling of Cyber-physical SystemsPaul Tavolato, Christina Tavolato-Wötzl. 685-689 [doi]
- Spyware Detection using Temporal LogicFausto Fasano, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone. 690-699 [doi]
- Modeling and Simulation of Attacks on Cyber-physical SystemsCinzia Bernardeschi, Andrea Domenici, Maurizio Palmieri. 700-708 [doi]
- A Systematic Approach to Choose the Data Warehouse ArchitectureAntonello Venditti, Fausto Fasano. 711-718 [doi]
- Transfer Learning for Image-based Malware ClassificationNiket Bhodia, Pratikkumar Prajapati, Fabio Di Troia, Mark Stamp. 719-726 [doi]
- Design of an Example Network Protocol for Security Tests Targeting Industrial Automation SystemsSteffen Pfrang, Mark Giraud, Anne Borcherding, David Meier, Jürgen Beyerer. 727-738 [doi]