default search action
EICC 2021: Virtual Event, Romania
- Martin Gilje Jaatun, Geir M. Køien, Oksana Kulyk:
EICC '21: European Interdisciplinary Cybersecurity Conference, Virtual Event, Romania, November 10-11, 2021. ACM 2021, ISBN 978-1-4503-9049-1 - Kris Heid, Jens Heider:
Automated, Dynamic Android App Vulnerability and Privacy Leak Analysis: Design Considerations, Required Components and Available Tools. 1-6 - Mordechai Guri:
USBCulprit: USB-borne Air-Gap Malware. 7-13 - Manfred Hofmeier, Ulrike Lechner:
Operation Digital Ant: A Serious Game Approach to Collect Insider Threat Scenarios and Raise Awareness. 14-19 - Fabian Sterk, Andreas Heinemann:
It is not as simple as that: Playing out password security trainings in order to nudge password changes. 20-25 - Susanne Kießling, Thomas Hanka, Dominik Merli:
Salt&Pepper: Spice up Security Behavior with Cognitive Triggers. 26-31 - Mayank Raikwar, Danilo Gligoroski:
Non-Interactive VDF Client Puzzle for DoS Mitigation. 32-38 - Teri Lenard, Roland Bolboaca:
A Statefull Firewall and Intrusion Detection System Enforced with Secure Logging for Controller Area Network. 39-45 - Mari Langås, Sanna Løfqvist, Basel Katt, Thomas Haugan, Martin Gilje Jaatun:
With a Little Help from Your Friends: Collaboration with Vendors During Smart Grid Incident Response Exercises. 46-53 - Roberto Román, Iluminada Baturone:
Sealed Storage for Low-Cost IoT Devices: an Approach Using SRAM PUFs and Post-Quantum Cryptography. 54-59 - Javier Hospital, David Megías, Wojciech Mazurczyk:
Retransmission steganography in real-world scenarios: a practical study. 60-65 - Laura Hartmann, Sebastian Zillien, Steffen Wendzel:
Reset- and Reconnection-based Covert Channels in CoAP. 66-71 - Jörg Keller:
Multilevel Network Steganography in Fountain Codes. 72-76 - Tomasz Koziak, Katarzyna Wasielewska, Artur Janicki:
How to Make an Intrusion Detection SystemAware of Steganographic Transmission. 77-82 - Laura Hartmann, Steffen Wendzel:
How Feasible are Steganographic and Stealth Attacks on TIA Project Metadata of ICS: A Case Study with Real-world Data. 83-84 - Jörg Keller:
How to Tweak a Cryptographic Permutation by Direct Manipulation. 85-86 - Anne Wagner, Anna Bakas, Shelia Kennison, Eric Chan-Tin:
A Comparison of SONA and MTurk for Cybersecurity Surveys. 87-88 - Miao Zhang, Shaoning Chen, Barbara Graziano:
Key Exchange and Management Schemes for Automotive Control Units. 89-90 - Laura Hartmann, Steffen Wendzel:
Detection of Anomalous Values within TIA Project Data History for Industrial Control Systems. 91-97
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.