default search action
SEC 2024: Edinburgh, UK
- Nikolaos Pitropakis, Sokratis K. Katsikas, Steven Furnell, Konstantinos Markantonakis:
ICT Systems Security and Privacy Protection - 39th IFIP International Conference, SEC 2024, Edinburgh, UK, June 12-14, 2024, Proceedings. IFIP Advances in Information and Communication Technology 710, Springer 2024, ISBN 978-3-031-65174-8 - Abeer Almutairi, Xavier Carpent, Steven Furnell:
Towards a Mobility-Aware Trust Model for the Internet of Underwater Things. 1-15 - Fahad Alotaibi, Sergio Maffeis:
Rasd: Semantic Shift Detection and Adaptation for Network Intrusion Detection. 16-30 - Johanna Ansohn McDougall, Alessandro Brighente, Anne Kunstmann, Niklas Zapatka, Hannes Federrath:
Reduce to the MACs - Privacy Friendly Generic Probe Requests. 31-45 - Beyza Bozdemir, Betül Askin Özdemir, Melek Önen:
PRIDA: PRIvacy-Preserving Data Aggregation with Multiple Data Customers. 46-60 - Efstratios Chatzoglou, Vyron Kampourakis, Zisis Tsiatsikas, Georgios Karopoulos, Georgios Kambourakis:
Keep Your Memory Dump Shut: Unveiling Data Leaks in Password Managers. 61-75 - Minseong Choi, Yubin Im, Steve Ko, Yonghwi Kwon, Yuseok Jeon, Haehyun Cho:
DryJIN: Detecting Information Leaks in Android Applications. 76-90 - Valerio Coletti, Emil Müller, Frederik Meyer Lehmann Lundsbjerg, Nicola Dragoni:
Bruteware: A Novel Family of Cryptoviral Attacks. 91-104 - Michael Eckel, Florian Fenzl, Lukas Jäger:
Towards Practical Hardware Fingerprinting for Remote Attestation. 105-118 - William Fraser, Matthew Broadbent, Nikolaos Pitropakis, Christos Chrysoulas:
Examining the Strength of Three Word Passwords. 119-133 - Sonakshi Garg, Vicenç Torra:
Can Synthetic Data Preserve Manifold Properties? 134-147 - Luca Hernández Acosta, Delphine Reinhardt:
"Alexa, How Do You Protect My Privacy?" A Quantitative Study of User Preferences and Requirements About Smart Speaker Privacy Settings. 148-161 - Masato Hirai, Daisuke Kotani, Yasuo Okabe:
Putting Authorization Servers on User-Owned Devices in User-Managed Access. 162-176 - Martin Gilje Jaatun, Jørn Foros, Maren Istad:
Identification of Cyber Threats and Vulnerabilities in Norwegian Distribution Networks. 177-190 - Adam Janovsky, Lukasz Chmielewski, Petr Svenda, Jan Jancar, Vashek Matyas:
Chain of Trust: Unraveling References Among Common Criteria Certified Products. 191-205 - Nan Jiang, Qihang Zhou, Xiaoqi Jia, Jiayun Chen, Qingjia Huang, Haichao Du:
LightArmor: A Lightweight Trusted Operating System Isolation Approach for Mobile Systems. 206-220 - Hongjoo Jin, Sumin Yang, Moon Chan Park, Haehyun Cho, Dong Hoon Lee:
Satellite: Effective and Efficient Stack Memory Protection Scheme for Unsafe Programming Languages. 221-235 - Chathuranga Sampath Kalutharage, Xiaodong Liu, Christos Chrysoulas, Oluwaseun Bamgboye:
Neurosymbolic Learning in the XAI Framework for Enhanced Cyberattack Detection with Expert Knowledge Integration. 236-249 - Dimitrios Kasimatis, William J. Buchanan, Mwrwan Abubakar, Owen Lo, Christos Chrysoulas, Nikolaos Pitropakis, Pavlos Papadopoulos, Sarwar Sayeed, Marc Sel:
Transforming EU Governance: The Digital Integration Through EBSI and GLASS. 250-263 - Matt Kenny, Nikolaos Pitropakis, Sarwar Sayeed, Christos Chrysoulas, Alexios Mylonas:
Malicious Insider Threat Detection Using Sentiment Analysis of Social Media Topics. 264-278 - Irshad Khan, Young-Woo Kwon:
A Structural-Semantic Approach Integrating Graph-Based and Large Language Models Representation to Detect Android Malware. 279-293 - Donghyun Kim, Seungmin Kim, Gwonsang Ryu, Daeseon Choi:
Session Replication Attack Through QR Code Sniffing in Passkey CTAP Registration. 294-307 - Ming-Chang Lee, Jia-Chun Lin, Sokratis K. Katsikas:
GAD: A Real-Time Gait Anomaly Detection System with Online Adaptive Learning. 308-322 - Gaurav Madkaikar, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Queuing Theoretic Analysis of Dynamic Attribute-Based Access Control Systems. 323-337 - Marin Matsumoto, Tsubasa Takahashi, Masato Oguchi:
IPEQ: Querying Multi-attribute Records with Inner Product Encryption. 338-352 - Shibam Mukherjee, Roman Walch, Fredrik Meisingseth, Elisabeth Lex, Christian Rechberger:
Hiding Your Awful Online Choices Made More Efficient and Secure: A New Privacy-Aware Recommender System. 353-366 - Denis Obrezkov:
Cognition Behind Access Control: A Usability Comparison of Rule- and Category-Based Mechanisms. 367-380 - Francesco Pagano, Luca Verderame, Alessio Merlo:
Obfuscating Code Vulnerabilities Against Static Analysis in Android Apps. 381-395 - Florian Rascoussier, Lise Lahoche:
Large Scale Heap Dump Embedding for Machine Learning: Predicting OpenSSH Key Locations. 396-409 - Mehdi Saadallah, Abbas Shahim, Svetlana Khapova:
Multi-method Approach to Human Expertise, Automation, and Artificial Intelligence for Vulnerability Management - Investigation of Challenges and Emerging Tensions. 410-422 - August See, Adrian Westphal, Cornelius Weber, Mathias Fischer:
Detecting Web Bots via Keystroke Dynamics. 423-436 - André Waltoft-Olsen, Phillip Johnson, Lasse Øverlier, Geir Olav Dyrkolbotn:
Exploring a Low-Cost Hardware Reverse Engineering Approach: A Use Case Experiment. 437-450 - Tharindu Lakshan Yasarathna, Lankeshwara Munasinghe, Harsha Kalutarage, Nhien-An Le-Khac:
Cross-Validation for Detecting Label Poisoning Attacks: A Study on Random Forest Algorithm. 451-464 - Xinwei Yong, Jiaojiao Wu, Jianfeng Wang:
Xproofs: New Aggregatable and Maintainable Matrix Commitment with Optimal Proof Size. 465-480 - Eloise Zhang, Zoltán Ádám Mann:
Predicting the Execution Time of Secure Neural Network Inference. 481-494
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.