Skip to main content

Cyber security cOmpeteNCe fOr Research anD InnovAtion

Livrables

1st year report on exploitation, dissemination, certification and standardization

First year report on exploitation, dissemination, certication and standardization

3rd year report on cybersecurity threats

Third year report on cybersecurity threats

3rd year report on community building and sustainability

Third year report on community building and sustainability

2nd year report on innovation, exploitation, dissemination, certification and standardization

Second year report on innovation, exploitation, dissemination, certification and standardization

2nd year report on liaison with stakeholders

Second year report on liaison with stakeholders

2nd year report on community building and sustainability

Second year report on community building and sustainability

3rd year report on innovation, exploitation, dissemination, certification and standardization

Third year report on innovation exploitation dissemination certification and standardization

3rd year report on liaison with stakeholders

Third year report on liaison with stakeholders

2nd year report on cybersecurity threats

Second year report on cybersecurity threats

1st report on cybersecurity workforce diversity

First report on cybersecurity workforce diversity

1st year report on designing and developing ESRTE

1st year report on designing and developing an European Secure, Resilient and Trusted Ecosystem

1st year report on cybersecurity threats

First year report on cybersecurity threats

1st year annual report on community building

First year annual report on community building

1st year report on liaison with stakeholders

First year report on liaison with stakeholders

2nd year report on designing and developing an ESRTE

Second year report on designing and developing an European Secure, Resilient and Trusted Ecosystem

3rd year report on designing and developing an ESRTE

Third year report on designing and developing an European Secure Resilient and Trusted Ecosystem

Publications

Obfuscation-Resilient Executable Payload Extraction From Packed Malware

Auteurs: Binlin Cheng, Jiang Ming, Erika A. Leal, Haotian Zhang, Jianming Fu, Guojun Peng, Jean-Yves Marion
Publié dans: USENIX Security Symposium, 2021
Éditeur: USENIX
DOI: 10.5281/zenodo.5653364

DDoS Hide & Seek - On the Effectiveness of a Booter Services Takedown

Auteurs: Daniel Kopp, Matthias Wichtlhuber, Ingmar Poese, Jair Santanna, Oliver Hohlfeld, Christoph Dietzel
Publié dans: Proceedings of the Internet Measurement Conference, 2019, Page(s) 65-72, ISBN 9781450369480
Éditeur: ACM
DOI: 10.1145/3355369.3355590

Fragmentation, truncation, and timeouts: are large DNS messages falling to bits?

Auteurs: Giovane C. M. Moura, Moritz Müller, Marco Davids, Maarten Wullink, Cristian Hesselman
Publié dans: Passive and Active Measurement Conference 2021, 2021
Éditeur: Springer

BIIT: Standardization of Blockchain-based I 2 oT Systems in the I4 Era

Auteurs: Sina Rafati Niya, Eryk Schiller, Ile Cepilov, Burkhard Stiller
Publié dans: NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, 2020, Page(s) 1-9, ISBN 978-1-7281-4973-8
Éditeur: IEEE
DOI: 10.1109/noms47738.2020.9110379

Binary level toolchain provenance identification with graph neural networks

Auteurs: Tristan Benoit, Jean-Yves Marion, Sébastien Bardin
Publié dans: SANER, 2021
Éditeur: IEEE

Blockchain on MSP430 with IEEE 802.15.4

Auteurs: Eryk Schiller; Elfat Esati; Sina Rafati Niya; Burkhard Stiller
Publié dans: The 45th IEEE Conference on Local Computer Networks (LCN), 2, 2020
Éditeur: IEEE
DOI: 10.5167/uzh-190887

(How Much) Does a Private WAN Improve Cloud Performance?

Auteurs: Todd Arnold; Ege Gu ̈rmeric ̧liler; Georgia Essig; Arpit Gupta; Matt Calder; Vasileios Giotsas; Ethan Katz-Bassett
Publié dans: IEEE INFOCOM 2020, 2, 2020
Éditeur: IEEE
DOI: 10.1109/INFOCOM41043.2020.9155428

Ageing@home: A Secure 5G Welfare Technology Solution for Elderlies

Auteurs: Boning Feng, Birgitta Langhammer, Van Thuan Do, Niels Jacot, Bernardo Santos, Bruno Dzogovic, Per Jonny Nesse, Thanh van Do
Publié dans: EAI Goodtechs 2021, 2021
Éditeur: Springer
DOI: 10.1007/978-3-030-91421-9_16

Cooperative Signaling of DDoS Attacks in a Blockchain-based Network

Auteurs: Bruno Rodrigues, Burkhard Stiller
Publié dans: Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos on - SIGCOMM Posters and Demos '19, 2019, Page(s) 39-41, ISBN 9781450368865
Éditeur: ACM Press
DOI: 10.1145/3342280.3342300

Reining in the Web's Inconsistencies with Site Policy

Auteurs: Stefano Calzavara; Tobias Urban; Dennis Tatang; Marius Steffens; Ben Stock
Publié dans: Network and Distributed System Security Symposium (NDSS), 4, 2020
Éditeur: ISOC
DOI: 10.5281/zenodo.4312470

Revisiting RPKI Route Origin Validation on the Data Plane.

Auteurs: Rodday, N., Cunha, Í., Bush, R., Katz-Bassett, E., Rodosek, G.D., Schmidt, T.C. and Wählisch, M.
Publié dans: In Proc. of Network Traffic Measurement and Analysis Conference (TMA). IFIP, 2021
Éditeur: IFIP
DOI: 10.5281/zenodo.5643400

Secure SemanticInteroperability for IoTApplications with LinkedData

Auteurs: G. Hatzivasilis, O. Soultatos, E. Lakka, S. Ioannidis, D. Anicic, A. Broring, L. Ciechomski, M. Falchetto, K. Fysarakis, G. Spanoudakis
Publié dans: IEEE Global Communications Conference (GLOBECOM 2019), 2019
Éditeur: IEEE

A Methodology for Non-Functional Property Evaluation of Machine Learning Models

Auteurs: Marco Anisetti, Claudio A. Ardagna, Ernesto Damiani, Paolo G. Panero
Publié dans: Proceedings of the 12th International Conference on Management of Digital EcoSystems, 2020, Page(s) 38-45, ISBN 9781450381154
Éditeur: ACM
DOI: 10.1145/3415958.3433101

DeepStream: autoencoder-based stream temporal clustering

Auteurs: Harush, Shimon and Meidan, Yair and Shabtai, Asaf
Publié dans: Proceedings of the 36th Annual ACM Symposium on Applied Computing, 2021, ISBN 978-1-4503-8104-8
Éditeur: ACM
DOI: 10.1145/3412841.3442083

A Practical Analysis on Mirai Botnet Traffic

Auteurs: Getoar Gallopeni, Bruno Rodrigues, Muriel Franco, Burkhard Stiller
Publié dans: IFIP Networking 2020, 2020
Éditeur: IFIP
DOI: 10.5281/zenodo.5642822

RPKI is Coming of Age - A Longitudinal Study of RPKI Deployment and Invalid Route Origins

Auteurs: Taejoong Chung, Emile Aben, Tim Bruijnzeels, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Roland van Rijswijk-Deij, John Rula, Nick Sullivan
Publié dans: Proceedings of the Internet Measurement Conference, 2019, Page(s) 406-419, ISBN 9781450369480
Éditeur: ACM
DOI: 10.1145/3355369.3355596

Security Concept forUnoccupied Aerial Systems

Auteurs: Cora Perner, Corinna Schmitt
Publié dans: Proc. of Digital Avionic Systems Conference (DASC), 2020
Éditeur: IEEE

Red-Zone: Towards an Intrusion Response Framework for Intra-Vehicle System

Auteurs: Mohammad Hamad, Marinos Tsantekidis and Vassilis Prevelakis
Publié dans: 5th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS), 2019
Éditeur: SciTePress

PPFL: Privacy-preserving Federated Learning with Trusted Execution Environments

Auteurs: Fan Mo, Hamed Haddadi, Kleomenis Katevas, Eduard Marin, Diego Perino, Nicolas Kourtellis
Publié dans: The 19th ACM International Conference on Mobile Systems, Applications, and Services, 2021
Éditeur: ACM
DOI: 10.1145/3458864.3466628

Be Your Neighbor's Miner: Building Trust in Ledger Content via Reciprocally Useful Work

Auteurs: Lara Mauri, Ernesto Damiani, Stelvio Cimato
Publié dans: 2020 IEEE 13th International Conference on Cloud Computing (CLOUD), 2020, Page(s) 53-62, ISBN 978-1-7281-8780-8
Éditeur: IEEE
DOI: 10.1109/cloud49709.2020.00021

On the Aggression Diffusion Modeling and Minimization in Twitter

Auteurs: Poiitis, Marinos and Vakali, Athena and Kourtellis, Nicolas
Publié dans: ACM Transactions on the Web, 2021
Éditeur: ACM

A Brief Review of Database Solution used within Blockchain Platforms

Auteurs: Blaž Podgorelec, Muhamed Turkanović, Martina Šestak
Publié dans: 2020
Éditeur: Springer

Fast Kernel Error Propagation Analysis in Virtualized Environments

Auteurs: Nicolas Coppik; Oliver Schwahn; Neeraj Suri
Publié dans: 10, 2021
Éditeur: IEEE
DOI: 10.5281/zenodo.4442963

Roll, Roll, Roll your Root: AComprehensive Analysis ofthe First Ever DNSSEC RootKSK Rollover.

Auteurs: Moritz Müller, Matthew Thomas, Duane Wessels, Wes Hardaker, Taejoong Chung, Willem Toorop, and Roland van Rijswijk-Deij
Publié dans: Internet Measurement Conference (IMC '19), 2019
Éditeur: IMC

OpenMTD: A Frameworkfor Efficient Network-LevelMTD Evaluation

Auteurs: Richard Poschinger, Nils Rodday, Raphael Labaca Castro and Gabi Dreo Rodosek
Publié dans: ACM 27th Conference on Computer and Communications Security (CCS) - MTD Workshop, 2020
Éditeur: ACM

Dynamic NetworkReconfiguration in Safety-Critical AeronauticalSystems

Auteurs: Cora Perner, Corinna Schmitt, Georg Carle
Publié dans: Proc. of Digital Avionic Systems Conference (DASC), 2020
Éditeur: IEEE

User tracking in the post-cookie era: How websites bypass gdpr consent to track users

Auteurs: Emmanouil Papadogiannakis, Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos P Markatos
Publié dans: The Web Conference 2021, 2021
Éditeur: ACM
DOI: 10.1145/3442381.3450056

Real-time Thread Isolation and Trusted Execution on Embedded RISC-V

Auteurs: Samuel Lindemer, Gustav Midéus, Shahid Raza
Publié dans: 2020
Éditeur: IEEE

Proverum: A Hybrid Public Verifiability and Decentralized Identity Management

Auteurs: Killer, Christian; Thorbecke, Lucas; Rodrigues, Bruno; Scheid, Eder; Franco, Muriel; Stiller, Burkhard
Publié dans: 45th Conference on Local Computer Networks (LCN), 1, 2020
Éditeur: IEEE

Tangled: A Cooperative Anycast Testbed

Auteurs: Leandro M. Bertholdo (Universiteit Twente) , Joao M. Ceron (SIDN Labs) , Wouter B. de Vries (Tesorion) , Ricardo de Oliveira Schmidt (University of Passo), Lisandro Zambenedetti Granville (Federal University of Rio Grande do Sul), Roland van Rijswijk-Deij (Universiteit Twente), Aiko Pras (Universiteit Twente)
Publié dans: 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM 2021), experience track, 2021
Éditeur: IFIP/IEEE

OpenMTD: A Framework for Efficient Network-Level MTD Evaluation.

Auteurs: Poschinger, R., Rodday, N., Labaca-Castro, R. and Dreo Rodosek, G.
Publié dans: In Proceedings of the 7th ACM Workshop on Moving Target Defense, 2020
Éditeur: ACM
DOI: 10.1145/3411496.3421223

Edge2BC: a Practical Approach for Edge-to-Blockchain IoT Transactions

Auteurs: Eder John Scheid, Andreas Knecht, Tim Strasser, Christian Killer, Muriel Franco, Bruno Rodrigues, Burkhard Stiller
Publié dans: 2021
Éditeur: IEEE

Advanced 5G Network Slicing Isolation Using Enhanced VPN+ for Healthcare Verticals

Auteurs: Bruno Dzogovic, Tariq Mahmood, Bernardo Santos, Boning Feng, Van Thuan Do, Niels Jacot, Thanh Van Do
Publié dans: EAI Goodtechs 2021, 2021
Éditeur: Springer
DOI: 10.1007/978-3-030-91421-9_10

Under the Spotlight: Web Tracking in Indian Partisan News Websites

Auteurs: Vibhor Agarwal, Yash Vekaria, Pushkal Agarwal, Sangeeta Mahapatra, Shounak Set, Sakthi Balan Muthiah, Nishanth Sastry, Nicolas Kourtellis
Publié dans: Proceedings of the Fifteenth International AAAI Conference on Web and Social Media(ICWSM 2021), 2021
Éditeur: AAAI
DOI: 10.5281/zenodo.5653541

Forecasting the Impact of IXP Outages Using Anycas

Auteurs: Bertholdo, Leandro M and Ceron, Joao M and Granville, Lisandro Z and van Rijswijk-Deij, Roland
Publié dans: In Proceedings of the 2021 Network Traffic Measurement and Analysis Conference (TMA 2021), 2021
Éditeur: IFIP
DOI: 10.5281/zenodo.5645355

Using Blockchains to Enable Big Data Analysis of Private Information

Auteurs: Konstantinos Lampropoulos, Giorgos Georgakakos, Sotiris Ioannidis
Publié dans: 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2019, Page(s) 1-6, ISBN 978-1-7281-1016-5
Éditeur: IEEE
DOI: 10.1109/CAMAD.2019.8858468

IoT Device Identification Using Deep Learning

Auteurs: Jaidip Kotak, Yuval Elovici
Publié dans: 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020), 2020
Éditeur: Springer

Secure Data Exchange forComputationally ConstrainedDevices

Auteurs: Vassilis Prevelakis, Mohammad Hamad, Jihane Najar, and Ilias Spais
Publié dans: International workshop on Information & Operational Technology (IT & OT) security systems (IOSec 2019), 2019
Éditeur: Springer

A Brief Review of Database Solutions Used within Blockchain Platforms

Auteurs: Blaž Podgorelec, Muhamed Turkanović, Martina Šestak
Publié dans: 2nd International Congress on Blockchain and Applications, 2020
Éditeur: Springer

An Assurance-Based Risk Management Framework for Distributed Systems

Auteurs: Marco Anisetti, Claudio A. Ardagna, Nicola Bena, Andrea Foppiani
Publié dans: 2021 IEEE International Conference on Web Services (ICWS), 2021, Page(s) 482-492, ISBN 978-1-6654-1681-8
Éditeur: IEEE
DOI: 10.1109/icws53863.2021.00068

tsuNAME: exploiting misconfiguration and vulnerability to DDoS DNS

Auteurs: Giovane Moura, Sebastian Castro, John Heidemann Wes Hardaker
Publié dans: ACM Internet Measurement Conference 2021, 2021
Éditeur: ACM

The Rise and Fall of Fake News sites: A Traffic Analysis

Auteurs: Manolis Chalkiadakis, Alexandros Kornilakis, Panagiotis Papadopoulos, Evangelos Markatos, Nicolas Kourtellis
Publié dans: 13th ACM Web Science Conference 2021, 2021
Éditeur: ACM
DOI: 10.1145/3447535.3462510

The Far Side of DNS Amplification: Tracing the DDoS Attack Ecosystem from the Internet Core

Auteurs: Marcin Nawrocki, Mattijs Jonker, Thomas C. Schmidt, Matthias Wählisch
Publié dans: In Proceedings of the 2021 Internet Measurement Conference (IMC 2021), 2021
Éditeur: acm
DOI: 10.5281/zenodo.5645127

Cybersecurity Evaluation of Enterprise Architectures: The e-SENS Case

Auteurs: Tanja Pavleska; Helder Aranha; Massimiliano Masi; Massimiliano Masi; Giovanni Paolo Sellitto
Publié dans: 7, 2019
Éditeur: Springer Link
DOI: 10.5281/zenodo.3677533

Characterization of Anycast Adoption in the DNS Authoritative Infrastructure

Auteurs: Raffaele Sommese, Gautam Akiwate, Mattijs Jonker, Giovane C. M. Moura, Marco Davids, Roland van Rijswijk-Deij, Geoffrey M. Voelker, Stefan Savage, K.C. Claffy, Anna Sperotto
Publié dans: In Proceedings of the 2021 Network Traffic Measurement and Analysis Conference (TMA 2021), 2021
Éditeur: FIP
DOI: 10.5281/zenodo.5645314

Blockchain-based controlledinformation sharing in interorganizationalworkflows

Auteurs: Christian Rondanini, Federico Daidone, Barbara Carminati, Elena Ferrari
Publié dans: International Conference on Services Computing (SCC 2020), 2020
Éditeur: IEEE

KYoT: Self-sovereign IoT Identification with a Physically Unclonable Function

Auteurs: Sina Rafati Niya; Benjamin Jeffrey; Burkhard Stiller
Publié dans: The 45th IEEE Conference on Local Computer Networks (LCN), 2, 2020
Éditeur: IEEE
DOI: 10.5167/uzh-191961

Cluster-based anonymization of knowledge graphs

Auteurs: Anh-Tu Hoang, Barbara Carminati, and Elena Ferrari
Publié dans: Applied Cryptography and Network Security, 2020
Éditeur: Springer
DOI: 10.1007/978-3-030-57878-7_6

High-Level Synthesis design approach for Number-Theoretic Transform Implementations

Auteurs: Alexander ElKady, Apostolos P. Fournaris, Thanasis Tsakoulis, Haleplidis Evangelos, Vassilis Paliouras
Publié dans: 29th IFIP/IEEE International Conference on Very Large Scale Integration, 2021
Éditeur: Springer
DOI: 10.1109/vlsi-soc53125.2021.9607003

MobileTrust: Secure Knowledge Integration in VANETs

Auteurs: GEORGE HATZIVASILIS; OTHONAS SOULTATOS; SOTIRIS IOANNIDIS; GEORGE SPANOUDAKIS; VASILIOS KATOS; GIORGOS DEMETRIOU
Publié dans: 11, 2019
Éditeur: ACM
DOI: 10.5281/zenodo.3675111

MENTOR: The Design and Evaluation of a Protection Services Recommender System

Auteurs: Franco, Muriel; Rodrigues, Bruno; Stiller, Burkhard
Publié dans: 45, 2019
Éditeur: IFIP
DOI: 10.5281/zenodo.3674270

AIMED: Evolving Malware with Genetic Programming to Evade Detection

Auteurs: Raphael Labaca Castro, Corinna Schmitt, Gabi Dreo
Publié dans: 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2019, Page(s) 240-247, ISBN 978-1-7281-2777-4
Éditeur: IEEE
DOI: 10.1109/TrustCom/BigDataSE.2019.00040

Applying Metamorphic Testing to Homomorphic Cryptography

Auteurs: Melvin Wolf, Jurgen Schonwalder
Publié dans: 2021 IEEE/ACM 6th International Workshop on Metamorphic Testing (MET), 2021, Page(s) 24-31, ISBN 978-1-6654-4464-4
Éditeur: IEEE
DOI: 10.1109/met52542.2021.00011

Improving Detection ofMalicious Office Documentsusing One-Side Classifiers

Auteurs: Silviu Constantin Vitel, Gheorghe Balan, Dumitru Bogdan Prelipcean
Publié dans: 21st International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC2019), 2019
Éditeur: IEEE

Do You Really Like Me? Anycast Latency and Root DNS Popularity

Auteurs: John Heidemann(USC/ISI, USC/Computers) Giovane Moura (SIDN Labs), Wes Hardaker (USC/ISI)
Publié dans: DINR 2021 Workshop, 2021
Éditeur: -
DOI: 10.5281/zenodo.5793117

BIIT: Standardization ofBlockchain-based I2oTSystems in the I4 Era

Auteurs: Sina Rafati-Niya, Eryk Schiller, Ile Cepilov, Burkhard Stiller
Publié dans: IEEE/IFIP Network Operations and Management Symposium (NOMS 2020), 2020
Éditeur: IEEE

DANTE: A framework for mining and monitoring darknet traffic

Auteurs: Dvir Cohen; Yisroel Mirsky; Yuval Elovici; Rami Puzis; Asaf Shabtai; Manuel Kamp; Tobias Martin
Publié dans: 1, 2020
Éditeur: Springer
DOI: 10.5281/zenodo.3941842

When parents and children disagree: Diving into DNS delegation inconsistency

Auteurs: Raffaele Sommese, Giovane C. M. Moura, Mattijs Jonker, Roland van Rijswijk-Deij, Alberto Dainotti, KC Claffy, Anna Sperotto
Publié dans: 2020
Éditeur: Springer

Towards Efficient and Secure Analysis of Large Datasets

Auteurs: Stelvio Cimato, Stefano Nicolo
Publié dans: 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC), 2020, Page(s) 1351-1356, ISBN 978-1-7281-7303-0
Éditeur: IEEE
DOI: 10.1109/compsac48688.2020.00-68

Software System Exploration using Library Call Analysis

Auteurs: Marinos Tsantekidis and Vassilis Prevelakis
Publié dans: 2nd Workshop on Model-driven Simulation and Training Environments for Cybersecurity (MSTEC), 2020
Éditeur: ESORICS

Challenges in Identifying Network Attacks Using Netflow Data

Auteurs: Edward Chuah, Neeraj Suri, Arshad Jhumka and Samantha Alt
Publié dans: IEEE International Symposium on Network Computing and Applications (NCA), 2021
Éditeur: IEEE
DOI: 10.5281/zenodo.5866276

Head(er)Hunter: FastIntrusion Detection usingPacket Metadata Signatures

Auteurs: Eva Papadogiannaki, Dimitris Deyannis, Sotiris Ioannidis
Publié dans: IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD2020), 2020
Éditeur: IEEE

Studying OpenCL-based Number Theoretic Transform for heterogeneous platforms

Auteurs: Evangelos Haleplidis, Thanasis Tsakoulis, Alexander El-Kady, Charis Dimopoulos, Odysseas Koufopavlou, Apostolos P. Fournaris
Publié dans: 2021 24th Euromicro Conference on Digital System Design (DSD), 2021
Éditeur: IEEE
DOI: 10.1109/dsd53832.2021.00058

TrustAV - Practical and Privacy Preserving Malware Analysis in the Cloud

Auteurs: Dimitris Deyannis, Eva Papadogiannaki, Giorgos Kalivianakis, Giorgos Vasiliadis, Sotiris Ioannidis
Publié dans: Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy, 2020, Page(s) 39-48, ISBN 9781450371070
Éditeur: ACM
DOI: 10.1145/3374664.3375748

Failure Diagnosis for Cluster Systems using Partial Correlations

Auteurs: Edward Chuah, Arshad Jhumka, Samantha Alt, Todd Evans, Neeraj Suri
Publié dans: The 19th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA'21), 2021
Éditeur: IEEE
DOI: 10.5281/zenodo.5509414

Securing Mobile e-Health Environments by Design: A Holistic Architectural Approach

Auteurs: Helder Aranha, Massimiliano Masi, Tanja Pavleska, Giovanni Paolo Sellitto
Publié dans: 2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2019, Page(s) 1-6, ISBN 978-1-7281-3316-4
Éditeur: IEEE
DOI: 10.1109/WiMOB.2019.8923479

ProtectDDoS: A Platform for Trustworthy Offering and Recommendation of Protections

Auteurs: Muriel Franco, Erion Sula, Bruno Rodrigues, Eder Scheid, Burkhard Stiller
Publié dans: International Conference on Economics of Grids, Clouds, Software and Services (GECON 2020), 2020
Éditeur: Springer
DOI: 10.5281/zenodo.4134089

YouTubing at Home: Media Sharing Behavior Change as Proxy for MobilityAround COVID-19 Lockdowns

Auteurs: Mejova, Yelena; Kourtellis, Nicolas
Publié dans: 13th ACM Web Science Conference 2021, 2021
Éditeur: ACM
DOI: 10.1145/3447535.3462494

MikroTik Devices Landscape, Realistic Honeypots, and Automated Attack Classification

Auteurs: Joao M. Ceron, Christian Scholten, Aiko Pras, Jair Santanna
Publié dans: NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, 2020, Page(s) 1-9, ISBN 978-1-7281-4973-8
Éditeur: IEEE
DOI: 10.1109/NOMS47738.2020.9110336

ANYway: Measuring the Amplification DDoS Potential of Domains

Auteurs: Olivier van der Toorn, Johannes Krupp, Mattijs Jonker, Roland van Rijswijk-Deij, Christian Rossow, Anna Sperotto
Publié dans: In Proceedings of the 17th International Conference on Network and Service Management (CNSM 2021), 2021
Éditeur: IEEE/IFIP
DOI: 10.5281/zenodo.5645149

Enriching DNS Flows with Host-Based Events to Bypass Future Protocol Encryption

Auteurs: Stanislav Špaček, Daniel Tovarňák, Pavel Čeleda
Publié dans: IFIP International Conference on ICT Systems Security and Privacy Protection, 2021, ISBN 978-3-030-78119-4
Éditeur: IFIP/IEEEE
DOI: 10.1007/978-3-030-78120-0

Towards Adversarial Resilience in Proactive Detection of Botnet Domain Names by using MTD

Auteurs: Christian Dietz, Gabi Dreo, Anna Sperotto, Aiko Pras
Publié dans: NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, 2020, Page(s) 1-5, ISBN 978-1-7281-4973-8
Éditeur: IEEE
DOI: 10.1109/NOMS47738.2020.9110332

Poster - Attacking Malware Classifiers by Crafting Gradient-Attacks that Preserve Functionality

Auteurs: Raphael Labaca-Castro, Battista Biggio, Gabi Dreo Rodosek
Publié dans: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, Page(s) 2565-2567, ISBN 9781450367479
Éditeur: ACM
DOI: 10.1145/3319535.3363257

Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems

Auteurs: Moshe Kravchik; Battista Biggio; Asaf Shabtai
Publié dans: 15, 2021
Éditeur: ACM
DOI: 10.1145/3412841.3441892

FLaaS - Federated Learning as a Service

Auteurs: Nicolas Kourtellis, Kleomenis Katevas, Diego Perino
Publié dans: Proceedings of the 1st Workshop on Distributed Machine Learning, 2020, Page(s) 7-13, ISBN 9781450381826
Éditeur: ACM
DOI: 10.1145/3426745.3431337

Blockchain-based bug bounty framework

Auteurs: Badash, L., Tapas, N., Nadler, A., Longo, F. and Shabtai, A.
Publié dans: Proceedings of the 36th Annual ACM Symposium on Applied Computing, 2021, ISBN 978-1-4503-8104-8
Éditeur: ACM
DOI: 10.1145/3412841.3441906

Differential Tracking Across Topical Webpages of Indian News Media

Auteurs: Yash Vekaria, Vibhor Agarwal, Pushkal Agarwal, Sangeeta Mahapatra, Sakthi Balan Muthiah, Nishanth Sastry, Nicolas Kourtellis
Publié dans: 13th ACM Web Science Conference 2021, 2021
Éditeur: ACM
DOI: 10.1145/3447535.3462497

Exploring Content Moderation in the Decentralised Web: The Pleroma Case

Auteurs: Anaobi Ishaku Hassan, Aravindh Raman, Ignacio Castro, Haris Bin Zia, Emiliano De Cristofaro, Nishanth Sastry, and Gareth Tyson
Publié dans: ACM CONEXT, 2021
Éditeur: ACM
DOI: 10.1145/3485983.3494838

Cybersecurity in the Era of Digital Transformation: The case of Greece

Auteurs: Leandros Maglaras; George Drivas; Nestoras Chouliaras; Eerke Boiten; Costas Lambrinoudakis; Sotiris Ioannidis
Publié dans: 7, 2021, Page(s) 1-5, ISBN 978-1-7281-9301-4
Éditeur: IEEE
DOI: 10.5281/zenodo.4462523

ITrade: A Blockchain-based, Self-Sovereign, and Scalable Marketplace for IoT Data Streams

Auteurs: Sina Rafati Niya, Danijel Dordevic, Burkhard Stiller
Publié dans: International Symposium on Integrated Network Management (IM 2021), 2021
Éditeur: IFIP/IEEE
DOI: 10.1109/sa51175.2021.9507182

Wireless SDN for Highly Utilized MANETs

Auteurs: Klement Streit, Nils Rodday, Florian Steuber, Corinna Schmitt, Gabi Dreo Rodosek
Publié dans: 2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2019, Page(s) 226-234, ISBN 978-1-7281-3316-4
Éditeur: IEEE
DOI: 10.1109/WiMOB.2019.8923172

Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning

Auteurs: Benjamin Zi Hao Zhao, Mohamed Ali Kaafar, Nicolas Kourtellis
Publié dans: CCSW 2020: The ACM Cloud Computing Security Workshop, 2020
Éditeur: ACM

SecBot: a Business-Driven Conversational Agent for Cybersecurity Planning and Management

Auteurs: Muriel Franco, Bruno Rodrigues, Eder John Scheid, Arthur Jacobs, Christian Killer, Lisandro Granville, Burkhard Stiller
Publié dans: 16th International Conference on Network and Service Management (CNSM 2020), 2020
Éditeur: IFIP
DOI: 10.23919/cnsm50824.2020.9269037

Leveraging eBPF to preserveuser privacy for DNS, DoT,and DoH queries

Auteurs: Sean Rivera, Vijay Gurbani, Sofiane Lagraa, Antonio Ken Iannillo and Radu State
Publié dans: ARES 2020/CUING 2020, 2020
Éditeur: ARES

Reliable measurements withBGP and RPKI

Auteurs: Mattijs Jonker, Nils Rodday
Publié dans: IEEE/IFIP Network Operations and Management Symposium (NOMS), 2020
Éditeur: IEEE

Towards Automating Security Enhancement for Cloud Services

Auteurs: Mohamed Oulaaffart, Remi Badonnel, Olivier Festor
Publié dans: IFIP/IEEE International Symposium on Integrated Network Managemen( IFIP/IEEE IM), 2021
Éditeur: IFIP/IEEE
DOI: 10.5281/zenodo.5718102

Towards Cybersecurity MOOC Certification

Auteurs: Matthias Beckerle, Argyro Chatzopoulou, and Simone Fischer-Hübner
Publié dans: SECOND INTERNATIONAL WORKSHOP ON CYBERSECURITY CERTIFICATION, 6th IEEE European Symposium on Security and Privacy, 2021, ISBN 978-1-6654-1012-0
Éditeur: IEEE
DOI: 10.1109/eurospw54576.2021.00008

When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures

Auteurs: Fidel, Gil; Bitton, Ron; Shabtai, Asaf
Publié dans: 6, 2020
Éditeur: IEEE
DOI: 10.5281/zenodo.3941781

Modeling aggression propagation on social media

Auteurs: Chrysoula Terizi and Despoina Chatzakou and Evaggelia Pitoura and Panayiotis Tsaparas and Nicolas Kourtellis
Publié dans: Online Social Networks and Media, 2021
Éditeur: Elsevier
DOI: 10.1016/j.osnem.2021.100137

A Risk Assessment Mechanism for Android Apps

Auteurs: Ha Xuan Son, Barbara Carminati, Elena Ferrari
Publié dans: 2021 IEEE International Conference on Smart Internet of Things (SmartIoT), 2021, Page(s) 237-244, ISBN 978-1-6654-4511-5
Éditeur: IEEE
DOI: 10.1109/smartiot52359.2021.00044

On the Deployment of Default Routes in Inter-domain Routing.

Auteurs: Rodday, N., Kaltenbach, L., Cunha, I., Bush, R., Katz-Bassett, E., Rodosek, G.D., Schmidt, T.C. and Wählisch, M.
Publié dans: In Proceedings of the ACM SIGCOMM 2021 Workshop on Technologies, Applications, and Uses of a Responsible Internet, 2021
Éditeur: ACM
DOI: 10.1145/3472951.3473505

Reconfiguring the Functionality of IoT Edge/End nodes using FPGA based System on Chips

Auteurs: Apostolos P. Fournaris, Aris Lalos, Christos Koulamas
Publié dans: 2019 First International Conference on Societal Automation (SA), 2019, Page(s) 1-5, ISBN 978-1-7281-3345-4
Éditeur: IEEE
DOI: 10.1109/sa47457.2019.8938038

Æternum: A Decentralized Voting System with Unconditional Privacy

Auteurs: Christian Killer, Markus Knecht, Claude Müller, Bruno Rodrigues, Eder John Scheid, Muriel Franco, Burkhard Stiller
Publié dans: 2021
Éditeur: IEEE

Who’s Got Your Mail? Characterizing Mail Service Provider Usage

Auteurs: Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Stefan Savage, Geoffrey M. Voelker
Publié dans: In Proceedings of the 2021 Internet Measurement Conference (IMC 2021), 2021
Éditeur: ACM
DOI: 10.1145/3487552.3487820

IoT-based Access Management Supported by AI and Blockchains

Auteurs: Eryk Schiller, Elfat Esati, Burkhard Stiller
Publié dans: 17th International Conference on Network and Service Management, 2021
Éditeur: IFIP
DOI: 10.5167/uzh-205714

SC-FLARE: CooperativeDDoS Signalingbased on Smart Contracts

Auteurs: Bruno Rodrigues, Spasen Trendafilov, Eder Scheid, Burkhard Stiller
Publié dans: IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2020), 2020
Éditeur: IEEE

Stop tracking me Bro! Differential Tracking of User Demographics on Hyper-Partisan Websites

Auteurs: Agarwal, Pushkal and Joglekar, Sagar and Papadopoulos, Panagiotis and Sastry, Nishanth and Kourtellis, Nicolas T
Publié dans: International Web Conference (WWW), 2020
Éditeur: ACM

Tangled: A Cooperative Anycast Testbed

Auteurs: Bertholdo, Leandro M.; Ceron, Joao M.; Vries, Wouter B. de; Schmitt, Ricardo de O.; Granville, Lisandro Zambenedetti; Rijswijk-Deij, Roland van; Pras, Aiko
Publié dans: In Proceedings of the 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM 2021), 2021
Éditeur: IEEE/IFIP

How to kill symbolic deobfuscation for free (or: unleashing the potential of path-oriented protections)

Auteurs: Mathilde Ollivier, Sébastien Bardin, Richard Bonichon, Jean-Yves Marion
Publié dans: Proceedings of the 35th Annual Computer Security Applications Conference, 2019, Page(s) 177-189, ISBN 9781450376280
Éditeur: ACM
DOI: 10.1145/3359789.3359812

SaCI: a Blockchain-based Cyber Insurance Approach for the Deployment and Management of a Contract Coverage

Auteurs: Muriel Franco, Noah Berni, Eder John Scheid, Bruno Rodrigues, Christian Killer, Burkhard Stiller
Publié dans: 8th International Conference on the Economics of Grids, Clouds, Systems and Services (GECON 2021), 2021
Éditeur: IEEE
DOI: 10.5281/zenodo.5642663

ProtectDDoS: A Platform forTrustworthyOffering andRecommendation ofProtections

Auteurs: Muriel Franco, Erion, Sula, Bruno Rodrigues, Eder Scheid, Burkhard Stiller
Publié dans: International Conference on Economics of Grids, Clouds, Software and Services (GECON 2020), 2020
Éditeur: Springer

Non-IID data re-balancing at IoT edge with peer-to-peer federated learning for anomaly detection

Auteurs: Han Wang, Luis Muñoz-González, David Eklund, Shahid Raza
Publié dans: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2021, Page(s) 153-163, ISBN 9781450383493
Éditeur: ACM
DOI: 10.1145/3448300.3467827

Requirements and Challenges for Secure and Trustworthy UAS Collaboration

Auteurs: Marco Anisetti; Claudio A. Ardagna; Barbara Carminati; Elena Ferrari; Cora Lisa Perner
Publié dans: 2, 2021, Page(s) 89-98, ISBN 978-1-7281-8543-9
Éditeur: IEEE
DOI: 10.1109/TPS-ISA50397.2020.00022

Encrypted HTTP/2 Traffic Monitoring: Standing the Test of Time and Space

Auteurs: Pierre-Olivier Brissaud; Jérôme François; Isabelle Chrisment; Thibault Cholez; Olivier Bettan
Publié dans: Proceedings of the 12th IEEE International Workshop on Information Forensics and Security (WIFS) 2020, 2, 2020, Page(s) 1-6, ISBN 978-1-7281-9930-6
Éditeur: IEEE
DOI: 10.5281/zenodo.4311959

The Million DollarHandshake: Secure andAttested Communications inthe Cloud

Auteurs: Nikolaos Chalkiadakis, Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis, Sotiris Ioannidis
Publié dans: IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (IEEE Cloud 2020), 2020
Éditeur: IEEE

Preventing File-less Attackswith Machine LearningTechniques

Auteurs: Alexandru Gabriel Bucevschi, Gheorghe Balan, Dumitru Bogdan Prelipcean
Publié dans: 21st International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC2019), 2019
Éditeur: IEEE

Security Certification Scheme for Content-centric Networks

Auteurs: Marco Anisetti, Claudio A. Ardagna, Filippo Berto, Ernesto Damiani
Publié dans: 2021 IEEE International Conference on Services Computing (SCC), 2021, Page(s) 203-212, ISBN 978-1-6654-1683-2
Éditeur: IEEE
DOI: 10.1109/scc53864.2021.00033

A Unified Graph-Based Approach to Disinformation Detection using Contextual and Semantic Relations

Auteurs: Marius Paraschiv, Nikos Salamanos, Costas Iordanou, Nikolaos Laoutaris, Michael Sirivianos
Publié dans: International AAAI Conference on Web and Social Media (ICWSM 2022), 2022
Éditeur: ICWSM
DOI: 10.5281/zenodo.5534294

Assessing the state and improving the art of parallel testing for C

Auteurs: Oliver Schwahn, Nicolas Coppik, Stefan Winter, Neeraj Suri
Publié dans: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis - ISSTA 2019, 2019, Page(s) 123-133, ISBN 9781-450362245
Éditeur: ACM Press
DOI: 10.1145/3293882.3330573

Extracting Safe Thread Schedules from Incomplete Model Checking Results

Auteurs: Patrick Metzler, Neeraj Suri and Georg Weissenbacher
Publié dans: Proc. of SPIN, 2019
Éditeur: IEEE

Analysing and Improving Customer-Side Cloud Security Certifiability

Auteurs: Shujie Zhao, Yiqun Chen, Stefan Winter and Neeraj Suri
Publié dans: Proc. of ISSRE/WoSOCER Workshop, 2019, 2019
Éditeur: IEEE

Gyro: A Modular Scale-Out Layer for Single-Server DBMSs

Auteurs: Habib Saissi, Marco Serafini and Neeraj Suri
Publié dans: Proc. of SRDS, 2019
Éditeur: IEEE

Inferring Performance Bug Patterns from Developer Commits

Auteurs: Yiqun Chen, Stefan Winter and Neeraj Suri
Publié dans: IEEE Proc. of ISSRE, 2019, 2019
Éditeur: IEEE

Counterfighting Counterfeit: detecting and taking down fraudulent webshops at a ccTLD

Auteurs: Thymen Wabeke; Giovane C. M. Moura; Nanneke Franken; Cristian Hesselman
Publié dans: 2020
Éditeur: LNCS
DOI: 10.5281/zenodo.3678750

A NIS Directive compliant Cybersecurity Maturity Assessment Framework

Auteurs: G. Drivas,  A. Chatzopoulou, L. Maglaras, C. Lambrinoudakis, Allan Cook, H. Janicke
Publié dans:  Computer Society Signature Conference on Computers, Software and Applications (COMPSAC 2020), 2020
Éditeur: IEEE
DOI: 10.1109/compsac48688.2020.00-20

Cybersecurity in the public sector in Greece

Auteurs: George Drivas, Leandros Maglaras, Helge Janicke, Sotiris Ioannidis
Publié dans: 2019
Éditeur: ECCWS

A Continuous Certification Methodology for DevOps

Auteurs: Marco Anisetti, Claudio A. Ardagna, Filippo Gaudenzi, Ernesto Damiani
Publié dans: Proceedings of the 11th International Conference on Management of Digital EcoSystems, 2019, Page(s) 205-212, ISBN 9781-450362382
Éditeur: ACM
DOI: 10.1145/3297662.3365827

Trustworthy IoT: An Evidence Collection Approach Based on Smart Contracts

Auteurs: Claudio Agostino Ardagna, Rasool Asal, Ernesto Damiani, Nabil El Ioini, Claus Pahl
Publié dans: 2019 IEEE International Conference on Services Computing (SCC), 2019, Page(s) 46-50, ISBN 978-1-7281-2720-0
Éditeur: IEEE
DOI: 10.1109/SCC.2019.00020

Secure Healthcare: 5G-enabled Network Slicing for Elderly Care

Auteurs: Bruno Dzogovic, Van Thuan Do, Bernardo Santos, Niels Jacot, Boning Feng, Thanh Van Do
Publié dans: 2020 5th International Conference on Computer and Communication Systems (ICCCS), 2020, Page(s) 864-868, ISBN 978-1-7281-6136-5
Éditeur: IEEE
DOI: 10.1109/icccs49078.2020.9118583

Improving Cellular IoT Security with Identity Federation and Anomaly Detection

Auteurs: Bernardo Santos, Bruno Dzogovic, Boning Feng, Niels Jacot, Van Thuan Do, Thanh Van Do
Publié dans: 2020 5th International Conference on Computer and Communication Systems (ICCCS), 2020, Page(s) 776-780, ISBN 978-1-7281-6136-5
Éditeur: IEEE
DOI: 10.1109/ICCCS49078.2020.9118438

Connecting Remote eNodeB with Containerized 5G C-RANs in OpenStack Cloud

Auteurs: Bruno Dzogovic, Bernardo Santos, Van Thuan Do, Boning Feng, Niels Jacot, Thanh Van Do
Publié dans: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019, Page(s) 14-19, ISBN 978-1-7281-1661-7
Éditeur: IEEE
DOI: 10.1109/cscloud/edgecom.2019.00013

Bringing 5G Into User's Smart Home

Auteurs: Bruno Dzogovic, Bernardo Santos, Thanh Van Do, Boning Feng, Thuan Van Do, Niels Jacot
Publié dans: 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), 2019, Page(s) 782-787, ISBN 978-1-7281-3024-8
Éditeur: IEEE
DOI: 10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00145

Thunderbolt-3 Backbone for Augmented 5G Network Slicing in Cloud-Radio Access Networks

Auteurs: Bruno Dzogovic, Thanh van Do, Bernardo Santos, Do Van Thuan, Boning Feng, Niels Jacot
Publié dans: 2019 IEEE 2nd 5G World Forum (5GWF), 2019, Page(s) 415-420, ISBN 978-1-7281-3627-1
Éditeur: IEEE
DOI: 10.1109/5gwf.2019.8911710

Towards Achieving a Secure Authentication Mechanism for IoT Devices in 5G Networks

Auteurs: Bernardo de Matos Patrocinio dos Santos, Bruno Dzogovic, Boning Feng, Van Thuan Do, Niels Jacot, Thanh Van Do
Publié dans: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019, Page(s) 130-135, ISBN 978-1-7281-1661-7
Éditeur: IEEE
DOI: 10.1109/cscloud/edgecom.2019.000-7

Demo: Blockchain for the Simplification and Automation of KYC Result Sharing

Auteurs: Robert Norvill, Mathis Steichen, Wazen M. Shbair, Radu State
Publié dans: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2019, Page(s) 9-10, ISBN 978-1-7281-1328-9
Éditeur: IEEE
DOI: 10.1109/BLOC.2019.8751480

BlockZoom: Large-Scale Blockchain Testbed

Auteurs: Wazen M. Shbair, Mathis Steichen, Jerome Francois, Radu State
Publié dans: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2019, Page(s) 5-6, ISBN 978-1-7281-1328-9
Éditeur: IEEE
DOI: 10.1109/BLOC.2019.8751230

Talon: An Automated Framework for Cross-Device Tracking Detection

Auteurs: Solomos, Konstantinos; Ilia, Panagiotis; Ioannidis, Sotiris; Kourtellis, Nicolas
Publié dans: 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 8, 2019
Éditeur: USENIX
DOI: 10.5281/zenodo.3598091

Cookie Synchronization: Everything You Always Wanted to Know But Were Afraid to Ask

Auteurs: Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos Markatos
Publié dans: The World Wide Web Conference on - WWW '19, 2019, Page(s) 1432-1442, ISBN 9781-450366748
Éditeur: ACM Press
DOI: 10.1145/3308558.3313542

No More ChasingWaterfalls: A Measurement Study of the Header Bidding Ad-Ecosystem

Auteurs: Michalis Pachilakis; Panagiotis Papadopoulos; Evangelos P. Markatos; Nicolas Kourtellis
Publié dans: Proceedings of the Internet Measurement Conference, 70, 2019
Éditeur: ACM
DOI: 10.5281/zenodo.3598095

Disinformation Warfare: Understanding State-Sponsored Trolls on Twitter and Their Influence on the Web

Auteurs: Savvas Zannettou, Tristan Caulfield, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini, Jeremy Blackburn
Publié dans: Companion Proceedings of The 2019 World Wide Web Conference, 2019, Page(s) 218-226, ISBN 9781-450366755
Éditeur: ACM
DOI: 10.1145/3308560.3316495

Who Let The Trolls Out? - Towards Understanding State-Sponsored Trolls

Auteurs: Savvas Zannettou, Tristan Caulfield, William Setzer, Michael Sirivianos, Gianluca Stringhini, Jeremy Blackburn
Publié dans: Proceedings of the 10th ACM Conference on Web Science - WebSci '19, 2019, Page(s) 353-362, ISBN 9781-450362023
Éditeur: ACM Press
DOI: 10.1145/3292522.3326016

Complexity Analysis of Decentralized Application Development Using Integration Tools

Auteurs: PATRIK REK, BLAZ PODGORELEC, and MUHAMED TURKANOVIC
Publié dans: Proceedings of the Eighth Workshop on Software Quality Analysis, Monitoring, Improvement, and Applications, September 22-25, 2019, 2019
Éditeur: CEUR
DOI: 10.5281/zenodo.3674326

Cyber Insurance of Information Systems: Security and Privacy Cyber Insurance Contracts for ICT and Helathcare Organizations

Auteurs: George Hatzivasilis, Panos Chatziadam, Nikos Petroulakis, Sotiris Ioannidis, Matteo Mangini, Christos Kloukinas, Artsiom Yautsiukhin, Michalis Antoniou, Dimitrios G. Katehakis, Marios Panayiotou
Publié dans: 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2019, Page(s) 1-6, ISBN 978-1-7281-1016-5
Éditeur: IEEE
DOI: 10.1109/camad.2019.8858165

TradeMap: A FINMA-compliant Anonymous Management of an End-2-end Trading Market Place

Auteurs: Rafati Niya, Sina; Allemann, Sebastian; Gabay, Arik; Stiller, Burkhard
Publié dans: 2019
Éditeur: IEEE
DOI: 10.5281/zenodo.3677142

Beyond content analysis - detecting targeted ads via distributed counting

Auteurs: Costas Iordanou, Nicolas Kourtellis, Juan Miguel Carrascosa, Claudio Soriente, Ruben Cuevas, Nikolaos Laoutaris
Publié dans: Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, 2019, Page(s) 110-122, ISBN 9781-450369985
Éditeur: ACM
DOI: 10.1145/3359989.3365428

Cluster-Based Anonymization of Directed Graphs

Auteurs: Anh-Tu Hoang, Barbara Carminati, Elena Ferrari
Publié dans: 2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC), 2019, Page(s) 91-100, ISBN 978-1-7281-6739-8
Éditeur: IEEE
DOI: 10.1109/cic48465.2019.00020

“How over is it?” Understanding the Incel Community on YouTube

Auteurs: Kostantinos Papadamou, Savvas Zannettou, Jeremy Blackburny, Emiliano De Cristofaroz, Gianluca Stringhini, Michael Sirivianos
Publié dans: 2020
Éditeur: CSCW
DOI: 10.5281/zenodo.3898038

Stop tracking me Bro! Differential Tracking of User Demographics on Hyper-Partisan Websites

Auteurs: Pushkal Agarwal, Sagar Joglekar, Panagiotis Papadopoulos, Nishanth Sastry, Nicolas Kourtellis
Publié dans: Proceedings of The Web Conference 2020, 2020, Page(s) 1479-1490, ISBN 9781-450370233
Éditeur: ACM
DOI: 10.1145/3366423.3380221

Clash of the Trackers: Measuring the Evolution of the Online Tracking Ecosystem

Auteurs: Konstantinos Solomos; Panagiotis Ilia; Sotiris Ioannidis; Nicolas Kourtellis
Publié dans: ACM Network Traffic Measurement and Analysis Conference, 2020
Éditeur: ACM/IFIP
DOI: 10.5281/zenodo.3925659

A Proposal for Security Assessment of Trustzone-M Based Software

Auteurs: Antonio Ken Iannillo, Radu State
Publié dans: 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2019, Page(s) 126-127, ISBN 978-1-7281-5138-0
Éditeur: IEEE
DOI: 10.1109/ISSREW.2019.00110

Auto-Encoding Robot State Against Sensor Spoofing Attacks

Auteurs: Sean Rivera, Sofiane Lagraa, Antonio Ken Iannillo, Radu State
Publié dans: 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2019, Page(s) 252-257, ISBN 978-1-7281-5138-0
Éditeur: IEEE
DOI: 10.1109/ISSREW.2019.00080

Mobile App to SGX Enclave Secure Channel

Auteurs: Fernando Kaway Carvalho Ota, Jorge Augusto Meira, Cyril Renaud Cassagnes, Radu State
Publié dans: 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2019, Page(s) 258-263, ISBN 978-1-7281-5138-0
Éditeur: IEEE
DOI: 10.1109/issrew.2019.00081

Helping Users Managing Context-Based Privacy Preferences

Auteurs: Md. Zulfikar Alom, Barbara Carminati, Elena Ferrari
Publié dans: 2019 IEEE International Conference on Services Computing (SCC), 2019, Page(s) 100-107, ISBN 978-1-7281-2720-0
Éditeur: IEEE
DOI: 10.1109/scc.2019.00027

Adapting Users' Privacy Preferences in Smart Environments

Auteurs: Md. Zulfikar Alom, Barbara Carminati, Elena Ferrari
Publié dans: 2019 IEEE International Congress on Internet of Things (ICIOT), 2019, Page(s) 165-172, ISBN 978-1-7281-2714-9
Éditeur: IEEE
DOI: 10.1109/iciot.2019.00036

Confidential Discovery of IoT Devices through Blockchain

Auteurs: Christian Rondanini, Barbara Carminati, Elena Ferrari
Publié dans: 2019 IEEE International Congress on Internet of Things (ICIOT), 2019, Page(s) 1-8, ISBN 978-1-7281-2714-9
Éditeur: IEEE
DOI: 10.1109/iciot.2019.00014

Analysis of Fault Tolerance in Permissioned Blockchain Networks

Auteurs: Blaz Podgorelec, Vid Kersic, Muhamed Turkanovic
Publié dans: 2019 XXVII International Conference on Information, Communication and Automation Technologies (ICAT), 2019, Page(s) 1-6, ISBN 978-1-7281-4543-3
Éditeur: IEEE
DOI: 10.1109/ICAT47117.2019.8938836

A Resource Efficient Implementation of the RESTCONF Protocol for OpenWrt Systems

Auteurs: Malte Granderath, Jurgen Schonwalder
Publié dans: NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, 2020, Page(s) 1-6, ISBN 978-1-7281-4973-8
Éditeur: IEEE
DOI: 10.1109/noms47738.2020.9110458

An Example of a Cybersecurity Education Model

Auteurs: Muhamed Turkanovic, Tatjana Welzer, Marko Holbl
Publié dans: 2019 29th Annual Conference of the European Association for Education in Electrical and Information Engineering (EAEEIE), 2019, Page(s) 1-4, ISBN 978-1-7281-3222-8
Éditeur: IEEE
DOI: 10.1109/eaeeie46886.2019.9000440

Cultural Diversity in Database Teaching

Auteurs: Tatjana Welzer, Marjan Druzovec, Marko Kompara, Marko Holbl
Publié dans: 2019 29th Annual Conference of the European Association for Education in Electrical and Information Engineering (EAEEIE), 2019, Page(s) 1-4, ISBN 978-1-7281-3222-8
Éditeur: IEEE
DOI: 10.1109/EAEEIE46886.2019.9000471

Using TLS Fingerprints for OS Identification in Encrypted Traffic

Auteurs: Martin Lastovicka, Stanislav Spacek, Petr Velan, Pavel Celeda
Publié dans: NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, 2020, Page(s) 1-6, ISBN 978-1-7281-4973-8
Éditeur: IEEE
DOI: 10.1109/noms47738.2020.9110319

Optimizing 5G VPN+ Transport Networks with Vector Packet Processing and FPGA Cryptographic Offloading

Auteurs: Bruno Dzogovic, Bernardo Santos, Boning Feng, Van Thuan Do, Niels Jacot, Thanh Van Do
Publié dans: MobiWIS 2021, 2021
Éditeur: Springer
DOI: 10.1007/978-3-030-83164-6_7

Revisiting Rowhammerattacks in Embedded

Auteurs: Lidia Pocero Fraile, Apostolos P. Fournaris and Odysseas Koufopavlou
Publié dans: 14th IEEE International Conference on Design & Technology of Integrated Systems in Nanoscale Era, 2019
Éditeur: IEEE

ICS Testbed Tetris: Practical Building Blocks Towards a Cyber Security Resource

Auteurs: Benjamin Green; Richard Derbyshire; William Knowles; James Boorman; Pierre Ciholas; Daniel Prince; David Hutchison
Publié dans: 1, 2020
Éditeur: Usenix
DOI: 10.5281/zenodo.4311806

Fair and accurate age prediction using distribution aware data curation and augmentation

Auteurs: Cao, Y., Berend, D., Tolmach, P., Levy, M., Amit, G., Liu, Y., Shabtai A., and Elovici Y.
Publié dans: 2022 IEEE Winter Conference on Applications of Computer Vision (WACV), 2022
Éditeur: IEEE
DOI: 10.5281/zenodo.5833886

A Streaming Machine Learning Framework for Online Aggression Detection on Twitter

Auteurs: Herodotos Herodotou, Despoina Chatzakou, Nicolas Kourtellis
Publié dans: International Conference on Big Data (IEEE BigData), 2020
Éditeur: IEEE

Fault-Enabled Chosen-Ciphertext Attacks on Kyber

Auteurs: Julius Hermelink, Peter Pessl, and Thomas Poeppelmann
Publié dans: 22nd International Conference on Cryptology in India, 2021
Éditeur: Springer
DOI: 10.5281/zenodo.5718027

MMU-based Access Control for Libraries

Auteurs: Marinos Tsantekidis and Vassilis Prevelakis
Publié dans: 18th International Conference on Security and Cryptography (SECRYPT), 2021, ISBN 978-989-758-524-1
Éditeur: SCITEPRESS
DOI: 10.5220/0010536706860691

A Comprehensive Study of the Bitcoin P2P Network

Auteurs: Jean-Philippe Eisenbarth, Thibault Cholez, Olivier Perrin
Publié dans: 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2021
Éditeur: IEEE
DOI: 10.5281/zenodo.5574869

SecBot: a Business-Driven Conversational Agent for Cybersecurity Planning and Management

Auteurs: Muriel Franco, Bruno Rodrigues, Eder Scheid, Arthur Jacobs, Christian Killer, Lisandro Granville, Burkhard Stiller
Publié dans: 2020
Éditeur: IFIP

Decentralized, Secure and Cognitive Architecture for Automotive CyberPhysical System of Systems

Auteurs: Apostolos P. Fournaris, Aris Lalos, Petros Kapsalas, Christos Koulamas
Publié dans: 2020 9th Mediterranean Conference on Embedded Computing (MECO), 2020, Page(s) 1-5, ISBN 978-1-7281-6949-1
Éditeur: Springer
DOI: 10.1109/MECO49872.2020.9134336

YourAdvalue: Measuring Advertising Price Dynamics without Bankrupting User Privacy

Auteurs: Pachilakis, Michalis; Papadopoulos, Panagiotis; Laoutaris, Nikolaos; Markatos, Evangelos P; Kourtellis, Nicolas
Publié dans: ACM Measurement and Analysis of Computing Systems (POMACS), 2021
Éditeur: ACM
DOI: 10.1145/10.1145/3491044

HSM-based Key Management Solution for Ethereum Blockchain

Auteurs: Wazen Shbair, Eugene Gavrilov, and Radu State
Publié dans: 2021
Éditeur: IEEE

Blockchain-based controlled information sharing in inter-organizational workflows

Auteurs: Christian Rondanini, Barbara Carminati, Federico Daidone, and Elena Ferrari
Publié dans: The 2020 IEEE International Conference on Services Computing (SCC), 2020
Éditeur: IEEE
DOI: 10.1109/scc49832.2020.00056

Efficient Monitoring ofLibrary Call Invocation

Auteurs: Marinos Tsantekidis und Vassilis Prevelakis
Publié dans: The 2nd IEEE International Symposium on Future Cyber Security Technologies (FCST), 2019
Éditeur: IEEE

TraceSanitizer – Eliminating the Effects of Non-determinism on Error Propagation Analysis

Auteurs: Habib Saissi; Stefan Winter; Oliver Schwahn; Karthik Pattabiraman; Neeraj Suri
Publié dans: 3, 2020
Éditeur: IEEE
DOI: 10.5281/zenodo.3795366

TradeMap: A FINMA-compliant Anonymous Management of an End-2-end Trading Market Place

Auteurs: Sina Rafati Niya, Sebastian Allemann, Arik Gabay, Burkhard Stiller
Publié dans: 2019 15th International Conference on Network and Service Management (CNSM), 2019, Page(s) 1-5, ISBN 978-3-903176-24-9
Éditeur: IEEE
DOI: 10.23919/cnsm46954.2019.9012706

Clash of the trackers: measuring the evolution of the online tracking ecosystem

Auteurs: Kostantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis, Nicolas Kourtellis
Publié dans: International Conference on Network Traffic Measurement and Analysis Conference, 2020
Éditeur: ACM, IFIP

Scalable Transport Mechanisms for Blockchain IoT Applications

Auteurs: Schiller, Eryk Jerzy; Rafati Niya, Sina; Surbeck, Timo; Stiller, Burkhard
Publié dans: Schiller, Eryk Jerzy; Rafati Niya, Sina; Surbeck, Timo; Stiller, Burkhard (2019). Scalable Transport Mechanisms for Blockchain IoT Applications. In: 44th IEEE Conference on Local Computer Networks (LCN 2019), Osnabrück, Germany, 14 October 2019 - 17 October 2019., 11, 2019
Éditeur: IEEE
DOI: 10.5167/uzh-174017

Design and implementation of cast-as-intended verifiability for a blockchain-based voting system

Auteurs: Christian Killer, Bruno Rodrigues, Raphael Matile, Eder Scheid, Burkhard Stiller
Publié dans: Proceedings of the 35th Annual ACM Symposium on Applied Computing, 2020, Page(s) 286-293, ISBN 9781450368667
Éditeur: ACM
DOI: 10.1145/3341105.3373884

Security Management and Visualization in a Blockchain-based Collaborative Defense

Auteurs: Christian Killer, Bruno Rodrigues, Burkhard Stiller
Publié dans: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2019, Page(s) 108-111, ISBN 978-1-7281-1328-9
Éditeur: IEEE
DOI: 10.1109/bloc.2019.8751272

Stay Thrifty, Stay Secure: AVPN-Based AssuranceFramework for HybridSystems

Auteurs: Marco Anisetti, Claudio A. Ardagna, Nicola Bena, Ernesto Damiani
Publié dans: 17th International Conference on Security and Cryptography (SECRYPT 2020), 2020
Éditeur: SCITEPRESS

The Reality of Algorithm Agility - Studying the DNSSEC Algorithm Life-Cycle

Auteurs: Moritz Müller, Willem Toorop, Taejoong Chung, Jelte Jansen, Roland van Rijswijk-Deij
Publié dans: Proceedings of the ACM Internet Measurement Conference, 2020, Page(s) 295-308, ISBN 9781450381383
Éditeur: ACM
DOI: 10.1145/3419394.3423638

Be Your Neighbor’s Miner:Building Trust in LedgerContent via ReciprocallyUseful Work

Auteurs: Lara Mauri, Ernesto Damiani and Stelvio Cimato
Publié dans: 2020 IEEE International Conference on Cloud Computing (CLOUD 2020), 2020
Éditeur: IEEE

AR-PUFs: Advanced Security Primitives for the Internet of Things and Cyber-Physical Systems

Auteurs: Nikolaos Athanasios Anagnostopoulos, Tolga Arul, Yufan Fan, Manish Kumar, Stefan Katzenbeisser
Publié dans: 2019 IEEE International Conference on Consumer Electronics (ICCE), 2019, Page(s) 1-5, ISBN 978-1-5386-7910-4
Éditeur: IEEE
DOI: 10.1109/ICCE.2019.8661840

End-to-End Semantic Interoperability Mechanisms for IoT

Auteurs: Eftychia Lakka, Nikolaos E. Petroulakis, George Hatzivasilis, Othonas Soultatos, Manolis Michalodimitrakis, Urszula Rak, Karolina Waledzik, Darko Anicic, Vivek Kulkarni
Publié dans: 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2019, Page(s) 1-6, ISBN 978-1-7281-1016-5
Éditeur: IEEE
DOI: 10.1109/CAMAD.2019.8858501

Creating Trusted SecuritySensors for AnomalyDetection Systems usingHardware components

Auteurs: Apostolos Fournaris, Charis Dimopoulos, and Odysseas Koufopavlou
Publié dans: TRUDEVICE 2020: Workshop on Trustworthy Manufacturing and Utilization of Secure Devices, Design, Automation and Test in Europe Conference (DATE 2020), 2020
Éditeur: Springer

An enclave assisted snapshot-based kernel integrity monitor

Auteurs: Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis, Sotiris Ioannidis
Publié dans: Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and Networking, 2020, Page(s) 19-24, ISBN 9781450371322
Éditeur: ACM
DOI: 10.1145/3378679.3394539

Analyzing the Viability of UAV Missions Facing Cyber Attacks

Auteurs: Jukka Soikkeli, Cora Perner, Emil C. Lupu
Publié dans: 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2021, Page(s) 103-112, ISBN 978-1-6654-1012-0
Éditeur: IEEE
DOI: 10.1109/eurospw54576.2021.00018

Securing Runtime Memory via MMU manipulation

Auteurs: Marinos Tsantekidis and Vassilis Prevelakis
Publié dans: 15th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), 2021, ISBN 978-1-61208-919-5
Éditeur: IARIA XPS Press
DOI: 10.5281/zenodo.5834070

No More Chasing Waterfalls:A Measurement Study of theHeader Bidding Ad-Ecosystem

Auteurs: Michalis Pachilakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis
Publié dans: 19th ACM on Internet Measurement Conference, 2019
Éditeur: ACM

Clouding up the Internet - how centralized is DNS traffic becoming?

Auteurs: Giovane C. M. Moura, Sebastian Castro, Wes Hardaker, Maarten Wullink, Cristian Hesselman
Publié dans: Proceedings of the ACM Internet Measurement Conference, 2020, Page(s) 42-49, ISBN 9781450381383
Éditeur: ACM
DOI: 10.1145/3419394.3423625

DLIT: A Scalable Distributed Ledger for IoT Data

Auteurs: Sina Rafati Niya, Raphael Beckmann, Burkhard Stiller
Publié dans: 2020 Second International Conference on Blockchain Computing and Applications (BCCA), 2020, Page(s) 100-107, ISBN 978-1-7281-8370-1
Éditeur: IEEE
DOI: 10.1109/BCCA50787.2020.9274456

Distributed DDoS Defense:A collaborative Approach at Internet Scale

Auteurs: Jessica Steinberger, Anna Sperotto, Harald Baier, Aiko Pras
Publié dans: NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, 2020, Page(s) 1-6, ISBN 978-1-7281-4973-8
Éditeur: IEEE
DOI: 10.1109/NOMS47738.2020.9110300

A Secure 5G Eldercare Solution Using Millimeterwave Sensors

Auteurs: Boning Feng, Akihiro Kajiwara, Van Thuan Do, Niels Jacot, Bernardo Santos, Bruno Dzogovic, Thanh Van Do
Publié dans: MobiWIS 2021, 2021
Éditeur: Springer
DOI: 10.1007/978-3-030-83164-6_1

Decentralized RuntimeMonitoring ApproachRelying on the EthereumBlockchain Infrastructure

Auteurs: Ahmed Taha, Ahmed Zakaria, Dongseong Kim, Neeraj Suri
Publié dans: Proc. of Intl. Conference on Cloud Engineering, 2020, 2020
Éditeur: IEEE

DeepStream: Autoencoder-Based Stream Temporal Clustering

Auteurs: Harush, s., Meidan, Y., and Shabtai, A.
Publié dans: 2021
Éditeur: ACM

Helix: DGA Domain Embeddings for Tracking and Exploring Botnets

Auteurs: Sidi, L., Mirsky, Y., Nadler, A., Elovici, Y. and Shabtai, A.
Publié dans: Proceedings of the 29th ACM International Conference on Information & Knowledge Management, 2020, ISBN 978-1-4503-6859-9
Éditeur: ACM
DOI: 10.1145/3340531.3416022

BGP Anycast Tuner: Intuitive Route Management for Anycast Services

Auteurs: Leandro M. Bertholdo, Joao M. Ceron, Lisandro Z. Granville, Giovane C. M. Moura, Cristian Hesselman, Roland van Rijswijk-Deij
Publié dans: 2020 16th International Conference on Network and Service Management (CNSM), 2020, Page(s) 1-7, ISBN 978-3-903176-31-7
Éditeur: IEEE
DOI: 10.23919/CNSM50824.2020.9269102

Anomaly Detection in Cellular IoT with Machine Learning

Auteurs: Bernardo Santos, Imran Qayyrm Khan, Bruno Dzogovic, Boning Feng, Van Thuan Do, Niels Jacot, Thanh Van Do
Publié dans: EAI Goodtechs 2021, 2021
Éditeur: Springer
DOI: 10.1007/978-3-030-91421-9_5

Hard edges: Hardware-based Control-Flow Integrity for Embedded Devices

Auteurs: Christou, George and Vasiliadis, Giorgos and Athanasopoulos, Elias and Ioannidis, Sotiris
Publié dans: International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation, 2021
Éditeur: Springer
DOI: 10.5281/zenodo.5653420

Enabling Digital ForensicsReadiness for Internet ofVehicles

Auteurs: C. Alexakosa, C. Katsinia , K. Votisb , A. Lalasb , D. Tzovarasb , D. Serpanos
Publié dans: 23rd EURO Working Group on Transportation Meeting, EWGT 2020, 16-18 September 2020, Paphos, Cyprus, 2020
Éditeur: EWGT

A Practical Analysis on Mirai Botnet Traffic

Auteurs: Getoar Gallopeni; Bruno Rodrigues; Muriel Franco; Burkhard Stiller
Publié dans: 11, 2020
Éditeur: IFIP
DOI: 10.5281/zenodo.3966899

Evaluating TCP Connection Healthiness

Auteurs: Nils Rodday, Raphael Labaca Castro, Klement Streit, Gabi Dreo Rodosek
Publié dans: 2019 29th International Telecommunication Networks and Applications Conference (ITNAC), 2019, Page(s) 1-4, ISBN 978-1-7281-3673-8
Éditeur: IEEE
DOI: 10.1109/ITNAC46935.2019.9078021

Python-Based TinyIPFIX in Wireless Sensor Networks

Auteurs: Eryk Schiller, Ramon Huber, Burkhard Stiller
Publié dans: IEEE 46th Conference on Local Computer Networks (LCN), 2021
Éditeur: IEEE
DOI: 10.1109/lcn52139.2021.9525017

SecGrid: A Visual System for the Analysis and ML-Based Classification of Cyberattack Traffic

Auteurs: Muriel Franco, Jan Von der Assen, Luc Boillat, Christian Killer, Bruno Rodrigues, Eder John Scheid, Lisandro Granville, Burkhard Stiller
Publié dans: IEEE 46th Conference on Local Computer Networks (LCN 2021), 2021
Éditeur: IEEE
DOI: 10.1109/lcn52139.2021.9524932

Privacy-Preserving Sequential Publishing of Knowledge Graphs

Auteurs: Anh-Tu Hoang, Barbara Carminati, Elena Ferrari
Publié dans: 2021 IEEE 37th International Conference on Data Engineering (ICDE), 2021, Page(s) 2021-2026, ISBN 978-1-7281-9184-3
Éditeur: IEEE
DOI: 10.1109/icde51399.2021.00194

Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning

Auteurs: Benjamin Zi Hao Zhao, Mohamed Ali Kaafar, Nicolas Kourtellis
Publié dans: Cloud Computing Security Workshop (CCSW), 2020
Éditeur: ACM

Mammoth: Monitoring the ABAC Monitor of MQTT-based Internet of Things ecosystems

Auteurs: Pietro Colombo, Elena Ferrari, Samuele Salvia
Publié dans: The 25th ACM Symposium on Access Control Models and Technologies (SACMAT 2020), 2020
Éditeur: ACM

Blockchains in the Age ofSoftwarization - Hands-onExperiences withProgramming SmartContracts and Their SecurityPitfalls

Auteurs: Bruno Rodrigues, Eder Scheid, Burkhard Stiller
Publié dans: IEEE/IFIP Network Operations and Management Symposium (NOMS), 2020
Éditeur: IEEE

Forecasting the Impact of IXP Outages Using Anycast

Auteurs: Leandro M. Bertholdo (Universiteit Twente), João M. Ceron (SIDN Labs), Lisandro Z. Granville (Federal University of Rio Grande do Sul), Roland van Rijswijk-Deij(NLnet Labs)
Publié dans: Network Traffic Measurement and Analysis Conference 2021, 2021
Éditeur: IFIP/IEEE

Enabling Security-by-Design in Smart Grids: An Architecture-Based Approach

Auteurs: Helder Aranha, Massimiliano Masi, Tanja Pavleska, Giovanni Paolo Sellitto
Publié dans: 2019 15th European Dependable Computing Conference (EDCC), 2019, Page(s) 177-179, ISBN 978-1-7281-3929-6
Éditeur: IEEE
DOI: 10.1109/edcc.2019.00042

Machine Learning for Security at the IoT Edge - A Feasibility Study

Auteurs: Han Wang; Luis Barriga; Arash Vahidi; Shahid Raza
Publié dans: 2, 2019
Éditeur: IEEE
DOI: 10.5281/zenodo.3677348

DDoS Mitigation: AMeasurement-BasedApproach

Auteurs: Mattijs Jonker, Anna Sperotto, Aiko Pras
Publié dans: 2020 IEEE/IFIP Network Operations and Management Symposium, 2020
Éditeur: IEEE Press

Catching them red-handed: Real-time Aggression Detection on Social Media

Auteurs: Herodotos Herodotou; Despoina Chatzakou; Nicolas Kourtellis
Publié dans: 1, 2020
Éditeur: IEEE
DOI: 10.5281/zenodo.4323436

Cluster-BasedAnonymization ofKnowledge Graphs

Auteurs: Anh-Tu Hoang, Barbara Carminati and Elena Ferrar
Publié dans: 18th International Conference on Applied Cryptography and Network Security, 2020
Éditeur: Springer

Adaptation of Proof-of-Stake-based Blockchains for IoT Data Streams

Auteurs: Sina Rafati Niya, Eryk Schiller, Ile Cepilov, Fabio Maddaloni, Kursat Aydinli, Timo Surbeck, Thomas Bocek, Burkhard Stiller
Publié dans: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2019, Page(s) 15-16, ISBN 978-1-7281-1328-9
Éditeur: IEEE
DOI: 10.1109/BLOC.2019.8751260

Robust and Efficient Privacy Preservation in Industrial IoT via correlation completion and tracking

Auteurs: Aris S. Lalos, Evangelos Vlachos, Kostas Berberidis, Apostolos Fournaris, Christos Koulamas
Publié dans: 2019 IEEE 17th International Conference on Industrial Informatics (INDIN), 2019, Page(s) 1225-1228, ISBN 978-1-7281-2927-3
Éditeur: IEEE
DOI: 10.1109/INDIN41052.2019.8972154

Signing Blockchain Transactions using Qualified Certificates

Auteurs: Muhamed Turkanović, Blaž Podgorelec
Publié dans: IEEE Internet Computing, 2020, ISSN 1089-7801
Éditeur: Institute of Electrical and Electronics Engineers

Automated Retrieval of ATT&CK Tactics and Techniques for Cyber Threat Reports

Auteurs: Valentine Legoy; Marco Caselli; Christin Seifert; Andreas Peter
Publié dans: CoRR, 3, 2020, ISSN 2331-8422
Éditeur: arXiv
DOI: 10.5281/zenodo.3925788

Measuring and visualizing cyber threat intelligence quality

Auteurs: Daniel Schlette, Fabian Böhm, Marco Caselli, Günther Pernul
Publié dans: International Journal of Information Security, 2020, ISSN 1615-5262
Éditeur: Springer Verlag
DOI: 10.1007/s10207-020-00490-y

Models of Privacy and Disclosure on Social Networking Sites: A Systematic Literature Review

Auteurs: Lili Nemec Zlatolas, Luka Hrgarek, Tatjana Welzer, Marko Hölbl
Publié dans: Mathematics, 2021, ISSN 2227-7390
Éditeur: MDPI
DOI: 10.3390/math10010146

Machine Learning Attacks and Countermeasures on Hardware Binary Edwards Curve Scalar Multipliers

Auteurs: Charis Dimopoulos, Apostolos P. Fournaris, Odysseas Koufopavlou
Publié dans: Journal of Sensor and Actuator Networks, 10/3, 2021, Page(s) 56, ISSN 2224-2708
Éditeur: mdpi
DOI: 10.3390/jsan10030056

Synergy of Blockchain Technology and Data Mining Techniques for Anomaly Detection

Auteurs: Kamišalić, A.; Kramberger, R.; Fister, I., Jr.
Publié dans: Applied Sciences, 2021, ISSN 2076-3417
Éditeur: MDPI
DOI: 10.3390/app11177987

Evaluating the effects of access control policies within NoSQL systems

Auteurs: Pietro Colombo, Elena Ferrari
Publié dans: Future Generation Computer Systems, 114, 2021, Page(s) 491-505, ISSN 0167-739X
Éditeur: Elsevier BV
DOI: 10.1016/j.future.2020.08.026

Efficient Cyber Attack Detection in Industrial Control Systems Using Lightweight Neural Networks and PCA

Auteurs: Moshe Kravchik, Asaf Shabtai
Publié dans: IEEE Transactions on Dependable and Secure Computing, 2021, Page(s) 1-1, ISSN 1545-5971
Éditeur: IEEE Computer Society
DOI: 10.1109/TDSC.2021.3050101

ELSA: efficient long-term secure storage of large datasets (full version) ∗

Auteurs: Philipp Muth, Matthias Geihs, Tolga Arul, Johannes Buchmann, Stefan Katzenbeisser
Publié dans: EURASIP Journal on Information Security, 2020/1, 2020, ISSN 2510-523X
Éditeur: eurasip
DOI: 10.1186/s13635-020-00108-9

WeTrace: A privacy-preserving tracing approach

Auteurs: Muriel Franco, Bruno Rodrigues, Christian Killer, Eder John Scheid, Alessandro De Carli, Andreas Gassmann, David Schonbachler, Burkhard Stiller
Publié dans: Journal of Communications and Networks, 23/5, 2021, Page(s) 374-389, ISSN 1229-2370
Éditeur: Korean Institute of Communication Sciences
DOI: 10.23919/jcn.2021.000021

Applying k-vertex cardinality constraints on a Neo4j graph database

Auteurs: Martina Šestak, Marjan Heričko, Tatjana Welzer Družovec, Muhamed Turkanović
Publié dans: Future Generation Computer Systems, 115, 2021, Page(s) 459-474, ISSN 0167-739X
Éditeur: Elsevier BV
DOI: 10.1016/j.future.2020.09.036

At Home and Abroad: The Use of Denial-ofservice Attacks during Elections in Nondemocratic Regimes

Auteurs: Philipp M. Lutscher; Nils B. Weidmann; Margaret E. Roberts; Mattijs Jonker; Alistair King; Alberto Dainotti
Publié dans: Journal of Conflict Resolutions, 11, 2019, ISSN 0022-0027
Éditeur: SAGE Publications
DOI: 10.1177/2F0022002719861676

Looking Beyond theHorizon: Thoughts onProactive Detection ofThreats

Auteurs: Olivier van der Toorn and Anna Sperotto
Publié dans: Digital Threats: Research and Practice, 2020, ISSN 0001-0782
Éditeur: Association for Computing Machinary, Inc.

Blockchain-Based Reputation Systems: Implementation Challenges and Mitigation

Auteurs: Ammar Battah, Youssef Iraqi, Ernesto Damiani
Publié dans: Electronics, 10/3, 2021, Page(s) 289, ISSN 2079-9292
Éditeur: MDPI
DOI: 10.3390/electronics10030289

Policy-based Blockchain Selection

Auteurs: Eder J. Scheid, Bruno Rodrigues, Burkhard Stiller
Publié dans: IEEE Communications Maganize, 2021, ISSN 1558-1896
Éditeur: IEEE

A novel approach for detecting vulnerable IoT devices connected behind a home NAT

Auteurs: Yair Meidan, Vinay Sachidananda, Hongyi Peng, Racheli Sagron, Yuval Elovici, Asaf Shabtai
Publié dans: Computers & Security, 97, 2020, Page(s) 101968, ISSN 0167-4048
Éditeur: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2020.101968

Retrofitting post-quantum cryptography in internet protocols

Auteurs: Moritz Müller, Jins de Jong, Maran van Heesch, Benno Overeinder, Roland van Rijswijk-Deij
Publié dans: ACM SIGCOMM Computer Communication Review, 50/4, 2020, Page(s) 49-57, ISSN 0146-4833
Éditeur: ACM
DOI: 10.1145/3431832.3431838

Regulating data sharing across MQTT environments

Auteurs: Pietro Colombo, Elena Ferrari, Engin Deniz Tümer
Publié dans: Journal of Network and Computer Applications, 174, 2021, Page(s) 102907, ISSN 1084-8045
Éditeur: Academic Press
DOI: 10.1016/j.jnca.2020.102907

SAVTA: A Hybrid Vehicular Threat Model: Overview and Case Study

Auteurs: Mohammad Hamad, Vassilis Prevelakis
Publié dans: Information, 11/5, 2020, Page(s) 273, ISSN 2078-2489
Éditeur: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/info11050273

PAutoBotCatcher: A blockchain-based privacy-preserving botnet detector for Internet of Things

Auteurs: Ahmed Lekssays, Luca Landa, Barbara Carminati, Elena Ferrari
Publié dans: Computer Networks, 200, 2021, Page(s) 108512, ISSN 1389-1286
Éditeur: Elsevier BV
DOI: 10.1016/j.comnet.2021.108512

MaskDGA: An Evasion Attack Against DGA Classifiers and Adversarial Defenses

Auteurs: Lior Sidi, Asaf Nadler, Asaf Shabtai
Publié dans: IEEE Access, 8, 2020, Page(s) 161580-161592, ISSN 2169-3536
Éditeur: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/ACCESS.2020.3020964

Big Data Analytics-as-a-Service: Bridging the gap between security experts and data scientists

Auteurs: Claudio A. Ardagna, Valerio Bellandi, Ernesto Damiani, Michele Bezzi, Cedric Hebert
Publié dans: Computers & Electrical Engineering, 93, 2021, Page(s) 107215, ISSN 0045-7906
Éditeur: Pergamon Press Ltd.
DOI: 10.1016/j.compeleceng.2021.107215

Modeling aggression propagation on social media

Auteurs: Chrysoula Terizi, Despoina Chatzakou Evaggelia Pitoura Panayiotis Tsaparas Nicolas Kourtellis
Publié dans: Online Social Networks and Media, 24, 2021, ISSN 2468-6964
Éditeur: Elsevier

Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber

Auteurs: Mike Hamburg, Julius Hermelink, Robert Primas, Simona Samardjiska, Thomas Schamberger, Silvan Streit, Emanuele Strieder, Christine Van Vredendaal
Publié dans: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, Page(s) 88-113, ISSN 2569-2925
Éditeur: RUB
DOI: 10.46586/tches.v2021.i4.88-113

Spotting Political Social Bots in Twitter: A Use Case of the 2019 Spanish General Election

Auteurs: Javier Pastor-Galindo, Mattia Zago, Pantaleone Nespoli, Sergio Lopez Bernal, Alberto Huertas Celdran, Manuel Gil Perez, Jose A. Ruiperez-Valiente, Gregorio Martinez Perez, Felix Gomez Marmol
Publié dans: IEEE Transactions on Network and Service Management, 17/4, 2020, Page(s) 2156-2170, ISSN 1932-4537
Éditeur: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TNSM.2020.3031573

Attacking SRAM PUFs using very-low-temperature data remanence

Auteurs: Nikolaos Athanasios Anagnostopoulos, Tolga Arul, Markus Rosenstihl, André Schaller, Sebastian Gabmeyer, Stefan Katzenbeisser
Publié dans: Microprocessors and Microsystems, 71, 2019, Page(s) 102864, ISSN 0141-9331
Éditeur: Elsevier BV
DOI: 10.1016/j.micpro.2019.102864

A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures

Auteurs: Eva Papadogiannaki, Sotiris Ioannidis
Publié dans: ACM Computing Surveys, 54/6, 2021, Page(s) 1-35, ISSN 0360-0300
Éditeur: Association for Computing Machinary, Inc.
DOI: 10.1145/3457904

A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem

Auteurs: Stelvio Cimato, Gabriele Gianini, Maryam Sepehri, Rasool Asal, Ernesto Damiani
Publié dans: Journal of Information Security and Applications, 51, 2020, Page(s) 102462, ISSN 2214-2126
Éditeur: Elsevier
DOI: 10.1016/j.jisa.2020.102462

A Responsible Internet to Increase Trust in the Digital World

Auteurs: Cristian Hesselman, Paola Grosso, Ralph Holz, Fernando Kuipers, Janet Hui Xue, Mattijs Jonker, Joeri de Ruiter, Anna Sperotto, Roland van Rijswijk-Deij, Giovane C. M. Moura, Aiko Pras, Cees de Laat
Publié dans: Journal of Network and Systems Management, 28/4, 2020, Page(s) 882-922, ISSN 1064-7570
Éditeur: Kluwer Academic Publishers
DOI: 10.1007/s10922-020-09564-7

A nonproprietary language for the command and control of cyber defenses – OpenC2

Auteurs: Vasileios Mavroeidis, Joe Brule
Publié dans: Computers & Security, 97, 2020, Page(s) 101999, ISSN 0167-4048
Éditeur: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2020.101999

PCaaD: Towards automated determination and exploitation of industrial systems

Auteurs: Benjamin Green, Richard Derbyshire, Marina Krotofil, William Knowles, Daniel Prince, Neeraj Suri
Publié dans: Computers & Security, 110, 2021, Page(s) 102424, ISSN 0167-4048
Éditeur: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2021.102424

A trust assurance technique for Internet of things based on human behavior compliance

Auteurs: Marco Anisetti, Claudio Agostino Ardagna, Ernesto Damiani, Alessandro Sala
Publié dans: Concurrency and Computation: Practice and Experience, 2019, ISSN 1532-0626
Éditeur: John Wiley & Sons Inc.
DOI: 10.1002/cpe.5355

Assessing Cybersecurity Threats and Risks in the Public Sector in Greece

Auteurs: G. Drivas,  L. Maglaras, H Janicke, S Ioannidis
Publié dans: Journal of Information Warfare, V. 19(1), 2019, ISSN 1445-3312
Éditeur: Peregrine Technical Solutions, LLC

Cost-effective deployment of certified cloud composite services

Auteurs: Marco Anisetti, Claudio A. Ardagna, Ernesto Damiani, Filippo Gaudenzi, Gwanggil Jeon
Publié dans: Journal of Parallel and Distributed Computing, 135, 2020, Page(s) 203-218, ISSN 0743-7315
Éditeur: Academic Press
DOI: 10.1016/j.jpdc.2019.09.003

A Model of Perception of Privacy, Trust, and Self-Disclosure on Online Social Networks

Auteurs: Nemec Zlatolas, Welzer, Hölbl, Heričko, Kamišalić
Publié dans: Entropy, 21/8, 2019, Page(s) 772, ISSN 1099-4300
Éditeur: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/e21080772

A Machine Learning-Based Method for Automated Blockchain Transaction Signing Including Personalized Anomaly Detection

Auteurs: Blaž Podgorelec, Muhamed Turkanović, Sašo Karakatič
Publié dans: Sensors, 20/1, 2020, Page(s) 147, ISSN 1424-8220
Éditeur: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s20010147

A deep learning model for Twitter spam detection

Auteurs: Zulfikar Alom, Barbara Carminati, Elena Ferrari
Publié dans: Online Social Networks and Media, 18, 2020, Page(s) 100079, ISSN 2468-6964
Éditeur: Elsevier
DOI: 10.1016/j.osnem.2020.100079

The Seven Deadly Sins of the HTML5 WebAPI

Auteurs: Michalis Diamantaris, Francesco Marcantoni, Sotiris Ioannidis, Jason Polakis
Publié dans: ACM Transactions on Privacy and Security, 23/4, 2020, Page(s) 1-31, ISSN 2471-2566
Éditeur: ACM
DOI: 10.1145/3403947

ARIMA Supplemented Security Metrics for Quality Assurance and Situational Awareness

Auteurs: Jan Kohlrausch, Eugene A. Brin
Publié dans: Digital Threats: Research and Practice, 1/1, 2020, Page(s) 1-21, ISSN 2576-5337
Éditeur: Association for Computing Machinery
DOI: 10.1145/3376926

State Channel as a Service Based on a Distributed and Decentralized Web

Auteurs: Blaz Podgorelec, Marjan Herieko, Muhamed Turkanovic
Publié dans: IEEE Access, 8, 2020, Page(s) 64678-64691, ISSN 2169-3536
Éditeur: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2020.2984378

anomaly detection trusted hardware sensors for critical infrastructure legacy devices

Auteurs: Apostolos P. Fournaris; Charalambos Dimopoulos; Konstantinos Lampropoulos; Odysseas Koufopavlou
Publié dans: Volume 20, 11, 2020, ISSN 1424-8220
Éditeur: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.20944/preprints202002.0241.v1

From Trustworthy Data to Trustworthy IoT

Auteurs: Claudio A. Ardagna, Rasool Asal, Ernesto Damiani, Nabil El Ioini, Mehdi Elahi, Claus Pahl
Publié dans: ACM Transactions on Cyber-Physical Systems, 5/1, 2021, Page(s) 1-26, ISSN 2378-962X
Éditeur: ACM
DOI: 10.1145/3418686

Privacy Preservation in Industrial IoT via Fast Adaptive Correlation Matrix Completion

Auteurs: Aris S. Lalos; Evangelos Vlachos; Kostas Berberidis; Apostolos Fournaris; Christos Koulamas
Publié dans: IEEE Transactions on Industrial Informatics, 7, 2020, ISSN 1551-3203
Éditeur: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TII.2019.2960275100

Transparent and Service-Agnostic Monitoring ofEncrypted Web Traffic

Auteurs: Pierre-Olivier Brissaud, Jérôme François, Isabelle Chrisment, Thibault Cholez and Olivier Bettan
Publié dans: IEEE Transactions on Network and Service Management, 2019, ISSN 1932-4537
Éditeur: Institute of Electrical and Electronics Engineers

Blockchain-based Privacy Enforcement in the IoT domain

Auteurs: Federico Daidone, Barbara Carminati, Elena Ferrari
Publié dans: IEEE Transactions on Dependable and Secure Computing, 2020, Page(s) 1-1, ISSN 1545-5971
Éditeur: IEEE Computer Society
DOI: 10.1109/tdsc.2021.3110181

2 Years in the anti-phishing group of a large company

Auteurs: Luigi Gallo, Alessandro Maiello, Alessio Botta, Giorgio Ventre
Publié dans: Computers & Security, 105, 2021, Page(s) 102259, ISSN 0167-4048
Éditeur: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2021.102259

The DNS in IoT: Opportunities, Risks, and Challenges

Auteurs: Cristian Hesselman, Merike Kaeo, Lyman Chapin, Kimberly Claffy, Mark Seiden, Danny McPherson, Dave Piscitello, Andrew McConachie, Tim April, Jacques Latour, Rod Rasmussen
Publié dans: IEEE Internet Computing, 24/4, 2020, Page(s) 23-32, ISSN 1089-7801
Éditeur: Institute of Electrical and Electronics Engineers
DOI: 10.1109/MIC.2020.3005388

Blockchain Signaling System (BloSS): Cooperative Signalingof Distributed Denial-of-Service Attacks

Auteurs: Bruno Rodrigues, Eder Scheid, Christian Killer, Muriel Franco, Burkhard Stiller
Publié dans: Journal of Network and Systems Management (JNSM) 2020, 2020, ISSN 1064-7570
Éditeur: Kluwer Academic Publishers

O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs

Auteurs: Vasileios Giotsas, George Nomikos, Vasileios Kotronis, Pavlos Sermpezis, Petros Gigis, Lefteris Manassakis, Christoph Dietzel, Stavros Konstantaras, Xenofontas Dimitropoulos
Publié dans: IEEE/ACM Transactions on Networking, 2020, Page(s) 1-16, ISSN 1063-6692
Éditeur: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TNET.2020.3025945

Extracting New Temporal Features to Improve the Interpretability of Undiagnosed Type 2 Diabetes Mellitus Prediction Models

Auteurs: Simon Kocbek, Primož Kocbek, Lucija Gosak, Nino Fijačko, Gregor Štiglic
Publié dans: Journal of Personalized Medicine, 2022, ISSN 2075-4426
Éditeur: MDPI
DOI: 10.3390/jpm12030368

A novel Intrusion Detection System against spoofing attacks in connected Electric Vehicles

Auteurs: Dimitrios Kosmanos, Apostolos Pappas, Leandros Maglaras, Sotiris Moschoyiannis, Francisco J. Aparicio-Navarro, Antonios Argyriou, Helge Janicke
Publié dans: Array, 5, 2020, Page(s) 100013, ISSN 2590-0056
Éditeur: Elsevier
DOI: 10.1016/j.array.2019.100013

Generative Adversarial Networks in AI-Enabled Safety-Critical Systems: Friend or Foe?

Auteurs: Apostolos P. Fournaris, Aris S. Lalos, Dimitrios Serpanos
Publié dans: Computer, 52/9, 2019, Page(s) 78-81, ISSN 0018-9162
Éditeur: Institute of Electrical and Electronics Engineers
DOI: 10.1109/MC.2019.2924546

Extracting Safe Thread Schedules from Incomplete Model Checking Results

Auteurs: Patrick Metzler, Neeraj Suri, Georg Weissenbacher
Publié dans: Model Checking Software - 26th International Symposium, SPIN 2019, Beijing, China, July 15–16, 2019, Proceedings, 11636, 2019, Page(s) 153-171, ISBN 978-3-030-30922-0
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-30923-7_9

Blockchains and Distributed Ledgers Uncovered: Clarifications, Achievements, and Open Issues

Auteurs: Eder J. Scheid, Bruno B. Rodrigues, Christian Killer, Muriel F. Franco, Sina Rafati, Burkhard Stiller
Publié dans: Advancing Research in Information and Communication Technology - IFIP's Exciting First 60+ Years, Views from the Technical Committees and Working Groups, 600, 2021, Page(s) 289-317, ISBN 978-3-030-81700-8
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-81701-5_12

Counterfighting Counterfeit: Detecting and Taking down Fraudulent Webshops at a ccTLD

Auteurs: Thymen Wabeke, Giovane C. M. Moura, Nanneke Franken, Cristian Hesselman
Publié dans: Passive and Active Measurement - 21st International Conference, PAM 2020, Eugene, Oregon, USA, March 30–31, 2020, Proceedings, 12048, 2020, Page(s) 158-174, ISBN 978-3-030-44080-0
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-44081-7_10

An Assurance Framework and Process for Hybrid Systems

Auteurs: Marco Anisetti, Claudio A. Ardagna, Nicola Bena, Ernesto Damiani
Publié dans: E-Business and Telecommunications - 17th International Conference on E-Business and Telecommunications, ICETE 2020, Online Event, July 8–10, 2020, Revised Selected Papers, 1484, 2021, Page(s) 79-101, ISBN 978-3-030-90427-2
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-90428-9_4

An Analysis of Cryptographic Algorithms in IoT

Auteurs: Samed Bajrić
Publié dans: Smart Devices, Applications, and Protocols for the IoT, 2019, Page(s) 83-104, ISBN 9781522578116
Éditeur: IGI Global
DOI: 10.4018/978-1-5225-7811-6.ch005

When Parents and Children Disagree: Diving into DNS Delegation Inconsistency

Auteurs: Raffaele Sommese, Giovane C. M. Moura, Mattijs Jonker, Roland van Rijswijk-Deij, Alberto Dainotti, K. C. Claffy, Anna Sperotto
Publié dans: Passive and Active Measurement - 21st International Conference, PAM 2020, Eugene, Oregon, USA, March 30–31, 2020, Proceedings, 12048, 2020, Page(s) 175-189, ISBN 978-3-030-44080-0
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-44081-7_11

Multi-sector Assessment Framework – a New Approach to Analyse Cybersecurity Challenges and Opportunities

Auteurs: Salvatore Marco Pappalardo, Marcin Niemiec, Maya Bozhilova, Nikolai Stoianov, Andrzej Dziech, Burkhard Stiller
Publié dans: Multimedia Communications, Services and Security - 10th International Conference, MCSS 2020, Kraków, Poland, October 8-9, 2020, Proceedings, 1284, 2020, Page(s) 1-15, ISBN 978-3-030-58999-8
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-59000-0_1

Architectures for Blockchain-IoT Integration

Auteurs: Sina Rafati Niya,Eryk Schiller,Burkhard Stiller
Publié dans: Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning, 2021, ISBN 9781119675525
Éditeur: IEEE/Wiley
DOI: 10.1002/9781119675525.ch13

A First Look at the Misuse and Abuse of the IPv4 Transfer Market

Auteurs: Vasileios Giotsas, Ioana Livadariu, Petros Gigis
Publié dans: Passive and Active Measurement - 21st International Conference, PAM 2020, Eugene, Oregon, USA, March 30–31, 2020, Proceedings, 12048, 2020, Page(s) 88-103, ISBN 978-3-030-44080-0
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-44081-7_6

Certified Machine-Learning Models

Auteurs: Ernesto Damiani, Claudio A. Ardagna
Publié dans: SOFSEM 2020: Theory and Practice of Computer Science - 46th International Conference on Current Trends in Theory and Practice of Informatics, SOFSEM 2020, Limassol, Cyprus, January 20–24, 2020, Proceedings, 12011, 2020, Page(s) 3-15, ISBN 978-3-030-38918-5
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-38919-2_1

Enhancing Security of Cellular IoT with Identity Federation

Auteurs: Bernardo Santos, Bruno Dzogovic, Boning Feng, Van Thuan Do, Niels Jacot, Thanh Van Do
Publié dans: Advances in Intelligent Networking and Collaborative Systems - The 11th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2019), 1035, 2020, Page(s) 257-268, ISBN 978-3-030-29034-4
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-29035-1_25

You Shall Not Register! Detecting Privacy Leaks Across Registration Forms

Auteurs: Manolis Chatzimpyrros, Konstantinos Solomos, Sotiris Ioannidis
Publié dans: Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers, 11981, 2020, Page(s) 91-104, ISBN 978-3-030-42050-5
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-42051-2_7

Towards the Insurance of Healthcare Systems

Auteurs: George Hatzivasilis, Panos Chatziadam, Andreas Miaoudakis, Eftychia Lakka, Sotiris Ioannidis, Alessia Alessio, Michail Smyrlis, George Spanoudakis, Artsiom Yautsiukhin, Michalis Antoniou, Nikos Stathiakis
Publié dans: Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers, 11981, 2020, Page(s) 185-198, ISBN 978-3-030-42050-5
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-42051-2_13

Correlation Between Students’ Background and the Knowledge on Conceptual Database Modelling

Auteurs: Lili Nemec Zlatolas, Aida Kamišalić, Muhamed Turkanović
Publié dans: New Trends in Databases and Information Systems - ADBIS 2019 Short Papers, Workshops BBIGAP, QAUCA, SemBDM, SIMPDA, M2P, MADEISD, and Doctoral Consortium, Bled, Slovenia, September 8–11, 2019, Proceedings, 1064, 2019, Page(s) 45-51, ISBN 978-3-030-30277-1
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-30278-8_6

Automated Orchestration of Security Chains Driven by Process Learning

Auteurs: Nicolas Schnepf, Rémi Badonnel, Abdelkader Lahmadi, Stephan Merz
Publié dans: Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning, 2021, ISBN 9781119675525
Éditeur: IEEE/Wiley

"""It is just a flu"": Assessing the Effect of Watch History on YouTube's Pseudoscientific Video Recommendations"

Auteurs: Kostantinos Papadamou, Savvas Zannettou, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Michael Sirivianos
Publié dans: 2020
Éditeur: arXiv
DOI: 10.5281/zenodo.4306569

On the Influence of Twitter Trolls during the 2016 US Presidential Election

Auteurs: Nikos Salamanos, Michael J. Jensen, Xinlei He, Yang Chen, Michael Sirivianos
Publié dans: 2019
Éditeur: arXiv
DOI: 10.5281/zenodo.3674304

Blockchain-based Anonymous P2P Trading System

Auteurs: Sina Rafati Niya; Sebastian Allemann; Arik Gabay; Burkhard Stiller
Publié dans: 2019
Éditeur: University of Zurich
DOI: 10.5281/zenodo.3677160

Performance analysis of fact-checking organizations and initiatives in Europe: A critical overview of online platforms fighting fake news

Auteurs: Tanja Pavleska; Andrej Školkay; Bissera Zankova; Nelson Ribeiro; Anja Bechmann
Publié dans: Disinformation and Digital Media as a Challenge for Democracy, 2019
Éditeur: Intersentia
DOI: 10.5281/zenodo.3677439

Angry Birds Flock Together: Aggression Propagation on Social Media

Auteurs: Chrysoula Terizi; Despoina Chatzakou; Evaggelia Pitoura; Panayiotis Tsaparas; Nicolas Kourtellis
Publié dans: 2020
Éditeur: arXiv
DOI: 10.5281/zenodo.3692844

On the Aggression Diffusion Modeling and Minimization in Online Social Networks

Auteurs: Marinos Poiitis, Athena Vakali, Nicolas Kourtellis
Publié dans: 2020
Éditeur: arXiv
DOI: 10.5281/zenodo.3925683

Did State-sponsored Trolls Shape the US Presidential Election Discourse? Quantifying Influence on Twitter

Auteurs: Nikos Salamanos, Michael J. Jensen, Xinlei He, Yang Chen, Costas Iordanou, Michael Sirivianos
Publié dans: 2020
Éditeur: arXiv
DOI: 10.5281/zenodo.3902669

Distributed Systems Security Knowledge Area

Auteurs: Neeraj Suri
Publié dans: 6, 2019
Éditeur: cybok
DOI: 10.5281/zenodo.3941853

WeTrace -- A Privacy-preserving Mobile COVID-19 Tracing Approach and Application

Auteurs: De Carli, A.; Franco, M.; Gassmann, A.; Killer, C.; Rodrigues, B.; Scheid, E.; Schoenbaechler, D.; Stiller, B.
Publié dans: 13, 2020
Éditeur: arXiv

Improving Anycast with Measurements

Auteurs: Wouter de Vries
Publié dans: 2019
Éditeur: University of Twente
DOI: 10.3990/1.9789036548977

Ensemble de données

CADeSH Dataset: Collaborative Anomaly Detection for Smart Homes

Auteurs: Meidan, Yair; Avraham, Dan; Libhaber, Hanan; Shabtai, Asaf
Publié dans: Zenodo

Discovery and classification of Twitter bots

Auteurs: Shevtsov, Alexander; Oikonomidou, Maria; Antonakaki, Despoina; Pratikakis, Polyvios; Kanterakis, Alexandros; Sotiris Ioannidis; Fragopoulou, Paraskevi
Publié dans: Zenodo

Dataset Using TLS Fingerprints for OS Identification in Encrypted Traffic

Auteurs: Laštovička Martin; Špaček Stanislav; Velan Petr; Čeleda Pavel
Publié dans: Zenodo

The complete corpus of #COVID-19 Twitter dataset

Auteurs: Despoina Antonakaki
Publié dans: Zenodo

IoT-deNAT: Outbound flow-based network traffic data of IoT and non-IoT devices behind a home NAT

Auteurs: Meidan, Yair; Sachidananda, Vinay; Peng, Hongyi; Sagron, Racheli; Elovici, Yuval; Shabtai, Asaf
Publié dans: Zenodo

Dataset for: "How over is it?" Understanding the Incel Community on YouTube

Auteurs: Kostantinos Papadamou; Savvas Zannettou; Jeremy Blackburn; Emiliano De Cristofaro; Gianluca Stringhini; Michael Sirivianos
Publié dans: Zenodo

Dataset for: "It is just a flu: Assessing the Effect of Watch History on YouTube's Pseudoscientific Video Recommendations"

Auteurs: Papadamou, Kostantinos; Zannettou, Savvas; Blackburn, Jeremy; De Cristofaro, Emiliano; Stringhini, Gianluca; Sirivianos, Michael
Publié dans: Zenodo

Dataset for "Who Let The Trolls Out? Towards Understanding State-Sponsored Trolls"

Auteurs: Zannettou, Savvas; Caulfield, Tristan; Setzer, William; Sirivianos, Michael; Stringhini, Gianluca; Blackburn, Jeremy
Publié dans: Zenodo

Public Dataset for "Did State-sponsored Trolls Shape the 2016 US Presidential Election Discourse? Quantifying Influence on Twitter"

Auteurs: Salamanos, Nikos; Jensen, Michael J.; Iordanou, Costas; Sirivianos, Michael
Publié dans: Zenodo

Logiciel

HTTPS Event-Flow Correlation Improving Situational Awareness in Encrypted Web Traffic - Data and Code

Auteurs: Špaček, Stanislav; Velan, Petr; Čeleda, Pavel; Tovarňák, Daniel
DOI: 10.5281/zenodo.5821814; 10.5281/zenodo.5821815
Éditeur: Zenodo

Software for: "It is just a flu: Assessing the Effect of Watch History on YouTube's Pseudoscientific Video Recommendations"

Auteurs: Papadamou, Kostantinos; Zannettou, Savvas; Blackburn, Jeremy; De Cristofaro, Emiliano; Stringhini, Gianluca; Sirivianos, Michael
DOI: 10.5281/zenodo.4580999; 10.5281/zenodo.4580892; 10.5281/zenodo.4580891
Éditeur: Zenodo

Software for "Who Let The Trolls Out? Towards Understanding State-Sponsored Trolls"

Auteurs: Savvas Zannettou; Tristan Caulfield; William Setzer; Michael Sirivianos; Gianluca Stringhini; Jeremy Blackburn
DOI: 10.5281/zenodo.2563838; 10.5281/zenodo.2563839
Éditeur: Zenodo