default search action
Digital Threats: Research and Practice, Volume 3
Volume 3, Number 1, March 2022
- Introduction to the Special Issue on Insider Threats. 1:1-1:3
- Ephraim Zimmer, Christian Burkert, Hannes Federrath:
Insiders Dissected: New Foundations and a Systematisation of the Research on Insiders. 2:1-2:35 - Adam D. Williams, Shannon N. Abbott, Nathan Shoman, William S. Charlton:
Results From Invoking Artificial Neural Networks to Measure Insider Threat Detection & Mitigation. 3:1-3:20 - Paul J. Sticha, Tirso E. Diaz, Elise T. Axelrad, Sean D. Vermillion, Dennis M. Buede:
Simulating Organizational Data from Redacted Input for Inference Enterprise Modeling. 4:1-4:30 - Panpan Zheng, Shuhan Yuan, Xintao Wu:
Using Dirichlet Marked Hawkes Processes for Insider Threat Detection. 5:1-5:19
- Siri Bromander, Morton Swimmer, Lilly Pijnenburg Muller, Audun Jøsang, Martin Eian, Geir Skjøtskift, Fredrik Borg:
Investigating Sharing of Cyber Threat Intelligence and Proposing A New Data Model for Enabling Automation in Knowledge Representation and Exchange. 6:1-6:22 - Nicholas Mainardi, Alessandro Barenghi, Gerardo Pelosi:
Privacy-aware Character Pattern Matching over Outsourced Encrypted Data. 7:1-7:38
Volume 3, Number 2, June 2022
- Ricardo J. Rodríguez, Xabier Ugarte-Pedrero, Juan Tapiador:
Introduction to the Special Issue on Challenges and Trends in Malware Analysis. 8:1-8:2 - J. S. Panman de Wit, Doina Bucur, J. van der Ham:
Dynamic Detection of Mobile Malware Using Smartphone Data and Machine Learning. 9:1-9:24 - Daniele Cono D'Elia, Lorenzo Invidia, Federico Palmaro, Leonardo Querzoni:
Evaluating Dynamic Binary Instrumentation Systems for Conspicuous Features and Artifacts. 10:1-10:13 - Ailton Santos Filho, Ricardo J. Rodríguez, Eduardo L. Feitosa:
Evasion and Countermeasures Techniques to Detect Dynamic Binary Instrumentation Frameworks. 11:1-11:28
- Roberto Perdisci, Martina Lindorfer, Gianluca Stringhini:
Introduction to the ACSAC'20 Special Issue. 12:1-12:2 - Fritz Alder, Jo Van Bulck, Jesse Spielman, David F. Oswald, Frank Piessens:
Faulty Point Unit: ABI Poisoning Attacks on Trusted Execution Environments. 13:1-13:26 - Martin Rosso, Michele Campobasso, Ganduulga Gankhuyag, Luca Allodi:
SAIBERSOC: A Methodology and Tool for Experimenting with Security Operation Centers. 14:1-14:29 - Sean Oesch, Ruba Abu-Salma, Oumar Diallo, Juliane Krämer, James Simmons, Justin Wu, Scott Ruoti:
User Perceptions of Security and Privacy for Group Chat. 15:1-15:29
- Sheng Sun:
A Chosen Random Value Attack on WPA3 SAE Authentication Protocol. 16:1-16:8
Volume 3, Number 3, September 2022
- Martin Husák, Martin Lastovicka, Tomás Plesník:
Handling Internet Activism During the Russian Invasion of Ukraine: A Campus Network Perspective. 17:1-17:5
- Lucimara Desiderá, Jeroen van der Ham:
Introduction to the Special Issue on the 2020 FIRST Conference. 18:1 - Alexandre Dulaunoy, Jean-Louis Huynen, Aurelien Thirion:
Active and Passive Collection of SSH Key Material for Cyber Threat Intelligence. 19:1-19:5 - Chung-Kuan Chen, Si-Chen Lin, Szu-Chun Huang, Yung-Tien Chu, Chin-Laung Lei, Chun-Ying Huang:
Building Machine Learning-based Threat Hunting System from Scratch. 20:1-20:21 - Chase Cotton:
"Off-Label" Use of DNS. 21:1-21:13 - Desiree Sacher-Boldewin, Éireann Leverett:
The Intelligent Process Lifecycle of Active Cyber Defenders. 22:1-22:17 - Mila Bajic, Andrej Petrovski, Bojan Perkov:
Field Note on Doing Digital Rights: Central and Southeast Europe Monitoring Project. 23:1-23:7
- Gabriel Kaptchuk, Fabio Massacci, Sara Nieves Matheu-García, Elissa M. Redmiles:
Introduction to the Special Issue on Security and Privacy for COVID-19. 24:1-24:2 - Lucy Simko, Jack Lucas Chang, Maggie Jiang, Ryan Calo, Franziska Roesner, Tadayoshi Kohno:
COVID-19 Contact Tracing and Privacy: A Longitudinal Study of Public Opinion. 25:1-25:36 - Borce Stojkovski, Ruba Abu-Salma, Karen Triquet, Gabriele Lenzini:
"Unless One Does the Research, It May Seem as Just a Useless Battery-consuming App" - Field Notes on COVID-19 Contact Tracing Applications. 26:1-26:17 - Gabriel Kaptchuk, Daniel G. Goldstein, Eszter Hargittai, Jake M. Hofman, Elissa M. Redmiles:
How Good is Good Enough? Quantifying the Impact of Benefits, Accuracy, and Privacy on Willingness to Adopt COVID-19 Decision Aids. 27:1-27:18 - Antoine Boutet, Claude Castelluccia, Mathieu Cunche, Cédric Lauradoux, Vincent Roca, Adrien Baud, Pierre-Guillaume Raverdy:
Desire: Leveraging the Best of Centralized and Decentralized Contact Tracing Systems. 28:1-28:20 - Serge Vaudenay, Martin Vuagnoux:
SwissCovid in the Perspective of Its Goals. 29:1-29:17
- Shehzeen Hussain, Paarth Neekhara, Brian Dolhansky, Joanna Bitton, Cristian Canton Ferrer, Julian J. McAuley, Farinaz Koushanfar:
Exposing Vulnerabilities of Deepfake Detection Systems with Robust Attacks. 30:1-30:23 - Giovanni Apruzzese, Mauro Andreolini, Luca Ferretti, Mirco Marchetti, Michele Colajanni:
Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems. 31:1-31:19 - Christopher Jelesnianski, Jinwoo Yom, Changwoo Min, Yeongjin Jang:
Securely Sharing Randomized Code That Flies. 32:1-32:25
Volume 3, Number 4, December 2022
- Paul Shomo, Sebastián Echeverría, Jesse Sowell:
Introduction to the Special Issue on the Lifecycle of IoT (In)security. 33:1-33:2 - Louise Axon, Katherine Fletcher, Arianna Schuler Scott, Marcel Stolz, Robert Hannigan, Ali El Kaafarani, Michael Goldsmith, Sadie Creese:
Emerging Cybersecurity Capability Gaps in the Industrial Internet of Things: Overview and Research Agenda. 34:1-34:27 - Pooria Madani, Natalija Vlajic, Ivo Maljevic:
Randomized Moving _target Approach for MAC-Layer Spoofing Detection and Prevention in IoT Systems. 35:1-35:24 - Karl Mozurkewich:
Field Note on IoT Security: Novel JIT Security for Large-Scale Heterogeneous IoT Deployments. 36:1-36:5
- Fabio Massacci, Nick Nikiforakis, Ivan Pashchenko, Antonino Sabetta, Victoria Wang:
Introduction to the Special Issue on Vulnerabilities. 37:1 - Johannes Düsing, Ben Hermann:
Analyzing the Direct and Transitive Impact of Vulnerabilities onto Different Artifact Repositories. 38:1-38:25 - Allen D. Householder, Jonathan M. Spring:
Are We Skillful or Just Lucky? Interpreting the Possible Histories of Vulnerability Disclosures. 39:1-39:28 - Paul-David Jarvis, Amalia Damianou, Cosmin Ciobanu, Vasilis Katos:
Vulnerability Exposure Driven Intelligence in Smart, Circular Cities. 40:1-40:18 - Ming Li, Peter J. Hawrylak, John Hale:
Strategies for Practical Hybrid Attack Graph Generation and Analysis. 41:1-41:24 - Éireann Leverett, Matilda Rhode, Adam Wedgbury:
Vulnerability Forecasting: Theory and Practice. 42:1-42:27
- Jinxin Liu, Murat Simsek, Burak Kantarci, Melike Erol-Kantarci, Andrew J. Malton, Andrew Walenstein:
Risk-aware Fine-grained Access Control in Cyber-physical Contexts. 43:1-43:29 - Adam Zibak, Clemens Sauerwein, Andrew C. Simpson:
Threat Intelligence Quality Dimensions for Research and Practice. 44:1-44:22
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.