Skip to main content

Cyber security cOmpeteNCe fOr Research anD InnovAtion

Deliverables

1st year report on exploitation, dissemination, certification and standardization

First year report on exploitation, dissemination, certication and standardization

3rd year report on cybersecurity threats

Third year report on cybersecurity threats

3rd year report on community building and sustainability

Third year report on community building and sustainability

2nd year report on innovation, exploitation, dissemination, certification and standardization

Second year report on innovation, exploitation, dissemination, certification and standardization

2nd year report on liaison with stakeholders

Second year report on liaison with stakeholders

2nd year report on community building and sustainability

Second year report on community building and sustainability

3rd year report on innovation, exploitation, dissemination, certification and standardization

Third year report on innovation exploitation dissemination certification and standardization

3rd year report on liaison with stakeholders

Third year report on liaison with stakeholders

2nd year report on cybersecurity threats

Second year report on cybersecurity threats

1st report on cybersecurity workforce diversity

First report on cybersecurity workforce diversity

1st year report on designing and developing ESRTE

1st year report on designing and developing an European Secure, Resilient and Trusted Ecosystem

1st year report on cybersecurity threats

First year report on cybersecurity threats

1st year annual report on community building

First year annual report on community building

1st year report on liaison with stakeholders

First year report on liaison with stakeholders

2nd year report on designing and developing an ESRTE

Second year report on designing and developing an European Secure, Resilient and Trusted Ecosystem

3rd year report on designing and developing an ESRTE

Third year report on designing and developing an European Secure Resilient and Trusted Ecosystem

Searching for OpenAIRE data...

Publications

Obfuscation-Resilient Executable Payload Extraction From Packed Malware

Author(s): Binlin Cheng, Jiang Ming, Erika A. Leal, Haotian Zhang, Jianming Fu, Guojun Peng, Jean-Yves Marion
Published in: USENIX Security Symposium, 2021
Publisher: USENIX
DOI: 10.5281/zenodo.5653364

DDoS Hide & Seek - On the Effectiveness of a Booter Services Takedown

Author(s): Daniel Kopp, Matthias Wichtlhuber, Ingmar Poese, Jair Santanna, Oliver Hohlfeld, Christoph Dietzel
Published in: Proceedings of the Internet Measurement Conference, 2019, Page(s) 65-72, ISBN 9781450369480
Publisher: ACM
DOI: 10.1145/3355369.3355590

Fragmentation, truncation, and timeouts: are large DNS messages falling to bits?

Author(s): Giovane C. M. Moura, Moritz Müller, Marco Davids, Maarten Wullink, Cristian Hesselman
Published in: Passive and Active Measurement Conference 2021, 2021
Publisher: Springer

BIIT: Standardization of Blockchain-based I 2 oT Systems in the I4 Era

Author(s): Sina Rafati Niya, Eryk Schiller, Ile Cepilov, Burkhard Stiller
Published in: NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, 2020, Page(s) 1-9, ISBN 978-1-7281-4973-8
Publisher: IEEE
DOI: 10.1109/noms47738.2020.9110379

Binary level toolchain provenance identification with graph neural networks

Author(s): Tristan Benoit, Jean-Yves Marion, Sébastien Bardin
Published in: SANER, 2021
Publisher: IEEE

Blockchain on MSP430 with IEEE 802.15.4

Author(s): Eryk Schiller; Elfat Esati; Sina Rafati Niya; Burkhard Stiller
Published in: The 45th IEEE Conference on Local Computer Networks (LCN), 2, 2020
Publisher: IEEE
DOI: 10.5167/uzh-190887

(How Much) Does a Private WAN Improve Cloud Performance?

Author(s): Todd Arnold; Ege Gu ̈rmeric ̧liler; Georgia Essig; Arpit Gupta; Matt Calder; Vasileios Giotsas; Ethan Katz-Bassett
Published in: IEEE INFOCOM 2020, 2, 2020
Publisher: IEEE
DOI: 10.1109/INFOCOM41043.2020.9155428

Ageing@home: A Secure 5G Welfare Technology Solution for Elderlies

Author(s): Boning Feng, Birgitta Langhammer, Van Thuan Do, Niels Jacot, Bernardo Santos, Bruno Dzogovic, Per Jonny Nesse, Thanh van Do
Published in: EAI Goodtechs 2021, 2021
Publisher: Springer
DOI: 10.1007/978-3-030-91421-9_16

Cooperative Signaling of DDoS Attacks in a Blockchain-based Network

Author(s): Bruno Rodrigues, Burkhard Stiller
Published in: Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos on - SIGCOMM Posters and Demos '19, 2019, Page(s) 39-41, ISBN 9781450368865
Publisher: ACM Press
DOI: 10.1145/3342280.3342300

Reining in the Web's Inconsistencies with Site Policy

Author(s): Stefano Calzavara; Tobias Urban; Dennis Tatang; Marius Steffens; Ben Stock
Published in: Network and Distributed System Security Symposium (NDSS), 4, 2020
Publisher: ISOC
DOI: 10.5281/zenodo.4312470

Revisiting RPKI Route Origin Validation on the Data Plane.

Author(s): Rodday, N., Cunha, Í., Bush, R., Katz-Bassett, E., Rodosek, G.D., Schmidt, T.C. and Wählisch, M.
Published in: In Proc. of Network Traffic Measurement and Analysis Conference (TMA). IFIP, 2021
Publisher: IFIP
DOI: 10.5281/zenodo.5643400

Secure SemanticInteroperability for IoTApplications with LinkedData

Author(s): G. Hatzivasilis, O. Soultatos, E. Lakka, S. Ioannidis, D. Anicic, A. Broring, L. Ciechomski, M. Falchetto, K. Fysarakis, G. Spanoudakis
Published in: IEEE Global Communications Conference (GLOBECOM 2019), 2019
Publisher: IEEE

A Methodology for Non-Functional Property Evaluation of Machine Learning Models

Author(s): Marco Anisetti, Claudio A. Ardagna, Ernesto Damiani, Paolo G. Panero
Published in: Proceedings of the 12th International Conference on Management of Digital EcoSystems, 2020, Page(s) 38-45, ISBN 9781450381154
Publisher: ACM
DOI: 10.1145/3415958.3433101

DeepStream: autoencoder-based stream temporal clustering

Author(s): Harush, Shimon and Meidan, Yair and Shabtai, Asaf
Published in: Proceedings of the 36th Annual ACM Symposium on Applied Computing, 2021, ISBN 978-1-4503-8104-8
Publisher: ACM
DOI: 10.1145/3412841.3442083

A Practical Analysis on Mirai Botnet Traffic

Author(s): Getoar Gallopeni, Bruno Rodrigues, Muriel Franco, Burkhard Stiller
Published in: IFIP Networking 2020, 2020
Publisher: IFIP
DOI: 10.5281/zenodo.5642822

RPKI is Coming of Age - A Longitudinal Study of RPKI Deployment and Invalid Route Origins

Author(s): Taejoong Chung, Emile Aben, Tim Bruijnzeels, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Roland van Rijswijk-Deij, John Rula, Nick Sullivan
Published in: Proceedings of the Internet Measurement Conference, 2019, Page(s) 406-419, ISBN 9781450369480
Publisher: ACM
DOI: 10.1145/3355369.3355596

Security Concept forUnoccupied Aerial Systems

Author(s): Cora Perner, Corinna Schmitt
Published in: Proc. of Digital Avionic Systems Conference (DASC), 2020
Publisher: IEEE

Red-Zone: Towards an Intrusion Response Framework for Intra-Vehicle System

Author(s): Mohammad Hamad, Marinos Tsantekidis and Vassilis Prevelakis
Published in: 5th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS), 2019
Publisher: SciTePress

PPFL: Privacy-preserving Federated Learning with Trusted Execution Environments

Author(s): Fan Mo, Hamed Haddadi, Kleomenis Katevas, Eduard Marin, Diego Perino, Nicolas Kourtellis
Published in: The 19th ACM International Conference on Mobile Systems, Applications, and Services, 2021
Publisher: ACM
DOI: 10.1145/3458864.3466628

Be Your Neighbor's Miner: Building Trust in Ledger Content via Reciprocally Useful Work

Author(s): Lara Mauri, Ernesto Damiani, Stelvio Cimato
Published in: 2020 IEEE 13th International Conference on Cloud Computing (CLOUD), 2020, Page(s) 53-62, ISBN 978-1-7281-8780-8
Publisher: IEEE
DOI: 10.1109/cloud49709.2020.00021

On the Aggression Diffusion Modeling and Minimization in Twitter

Author(s): Poiitis, Marinos and Vakali, Athena and Kourtellis, Nicolas
Published in: ACM Transactions on the Web, 2021
Publisher: ACM

A Brief Review of Database Solution used within Blockchain Platforms

Author(s): Blaž Podgorelec, Muhamed Turkanović, Martina Šestak
Published in: 2020
Publisher: Springer

Fast Kernel Error Propagation Analysis in Virtualized Environments

Author(s): Nicolas Coppik; Oliver Schwahn; Neeraj Suri
Published in: 10, 2021
Publisher: IEEE
DOI: 10.5281/zenodo.4442963

Roll, Roll, Roll your Root: AComprehensive Analysis ofthe First Ever DNSSEC RootKSK Rollover.

Author(s): Moritz Müller, Matthew Thomas, Duane Wessels, Wes Hardaker, Taejoong Chung, Willem Toorop, and Roland van Rijswijk-Deij
Published in: Internet Measurement Conference (IMC '19), 2019
Publisher: IMC

OpenMTD: A Frameworkfor Efficient Network-LevelMTD Evaluation

Author(s): Richard Poschinger, Nils Rodday, Raphael Labaca Castro and Gabi Dreo Rodosek
Published in: ACM 27th Conference on Computer and Communications Security (CCS) - MTD Workshop, 2020
Publisher: ACM

Dynamic NetworkReconfiguration in Safety-Critical AeronauticalSystems

Author(s): Cora Perner, Corinna Schmitt, Georg Carle
Published in: Proc. of Digital Avionic Systems Conference (DASC), 2020
Publisher: IEEE

User tracking in the post-cookie era: How websites bypass gdpr consent to track users

Author(s): Emmanouil Papadogiannakis, Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos P Markatos
Published in: The Web Conference 2021, 2021
Publisher: ACM
DOI: 10.1145/3442381.3450056

Real-time Thread Isolation and Trusted Execution on Embedded RISC-V

Author(s): Samuel Lindemer, Gustav Midéus, Shahid Raza
Published in: 2020
Publisher: IEEE

Proverum: A Hybrid Public Verifiability and Decentralized Identity Management

Author(s): Killer, Christian; Thorbecke, Lucas; Rodrigues, Bruno; Scheid, Eder; Franco, Muriel; Stiller, Burkhard
Published in: 45th Conference on Local Computer Networks (LCN), 1, 2020
Publisher: IEEE

Tangled: A Cooperative Anycast Testbed

Author(s): Leandro M. Bertholdo (Universiteit Twente) , Joao M. Ceron (SIDN Labs) , Wouter B. de Vries (Tesorion) , Ricardo de Oliveira Schmidt (University of Passo), Lisandro Zambenedetti Granville (Federal University of Rio Grande do Sul), Roland van Rijswijk-Deij (Universiteit Twente), Aiko Pras (Universiteit Twente)
Published in: 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM 2021), experience track, 2021
Publisher: IFIP/IEEE

OpenMTD: A Framework for Efficient Network-Level MTD Evaluation.

Author(s): Poschinger, R., Rodday, N., Labaca-Castro, R. and Dreo Rodosek, G.
Published in: In Proceedings of the 7th ACM Workshop on Moving Target Defense, 2020
Publisher: ACM
DOI: 10.1145/3411496.3421223

Edge2BC: a Practical Approach for Edge-to-Blockchain IoT Transactions

Author(s): Eder John Scheid, Andreas Knecht, Tim Strasser, Christian Killer, Muriel Franco, Bruno Rodrigues, Burkhard Stiller
Published in: 2021
Publisher: IEEE

Advanced 5G Network Slicing Isolation Using Enhanced VPN+ for Healthcare Verticals

Author(s): Bruno Dzogovic, Tariq Mahmood, Bernardo Santos, Boning Feng, Van Thuan Do, Niels Jacot, Thanh Van Do
Published in: EAI Goodtechs 2021, 2021
Publisher: Springer
DOI: 10.1007/978-3-030-91421-9_10

Under the Spotlight: Web Tracking in Indian Partisan News Websites

Author(s): Vibhor Agarwal, Yash Vekaria, Pushkal Agarwal, Sangeeta Mahapatra, Shounak Set, Sakthi Balan Muthiah, Nishanth Sastry, Nicolas Kourtellis
Published in: Proceedings of the Fifteenth International AAAI Conference on Web and Social Media(ICWSM 2021), 2021
Publisher: AAAI
DOI: 10.5281/zenodo.5653541

Forecasting the Impact of IXP Outages Using Anycas

Author(s): Bertholdo, Leandro M and Ceron, Joao M and Granville, Lisandro Z and van Rijswijk-Deij, Roland
Published in: In Proceedings of the 2021 Network Traffic Measurement and Analysis Conference (TMA 2021), 2021
Publisher: IFIP
DOI: 10.5281/zenodo.5645355

Using Blockchains to Enable Big Data Analysis of Private Information

Author(s): Konstantinos Lampropoulos, Giorgos Georgakakos, Sotiris Ioannidis
Published in: 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2019, Page(s) 1-6, ISBN 978-1-7281-1016-5
Publisher: IEEE
DOI: 10.1109/CAMAD.2019.8858468

IoT Device Identification Using Deep Learning

Author(s): Jaidip Kotak, Yuval Elovici
Published in: 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020), 2020
Publisher: Springer

Secure Data Exchange forComputationally ConstrainedDevices

Author(s): Vassilis Prevelakis, Mohammad Hamad, Jihane Najar, and Ilias Spais
Published in: International workshop on Information & Operational Technology (IT & OT) security systems (IOSec 2019), 2019
Publisher: Springer

A Brief Review of Database Solutions Used within Blockchain Platforms

Author(s): Blaž Podgorelec, Muhamed Turkanović, Martina Šestak
Published in: 2nd International Congress on Blockchain and Applications, 2020
Publisher: Springer

An Assurance-Based Risk Management Framework for Distributed Systems

Author(s): Marco Anisetti, Claudio A. Ardagna, Nicola Bena, Andrea Foppiani
Published in: 2021 IEEE International Conference on Web Services (ICWS), 2021, Page(s) 482-492, ISBN 978-1-6654-1681-8
Publisher: IEEE
DOI: 10.1109/icws53863.2021.00068

tsuNAME: exploiting misconfiguration and vulnerability to DDoS DNS

Author(s): Giovane Moura, Sebastian Castro, John Heidemann Wes Hardaker
Published in: ACM Internet Measurement Conference 2021, 2021
Publisher: ACM

The Rise and Fall of Fake News sites: A Traffic Analysis

Author(s): Manolis Chalkiadakis, Alexandros Kornilakis, Panagiotis Papadopoulos, Evangelos Markatos, Nicolas Kourtellis
Published in: 13th ACM Web Science Conference 2021, 2021
Publisher: ACM
DOI: 10.1145/3447535.3462510

The Far Side of DNS Amplification: Tracing the DDoS Attack Ecosystem from the Internet Core

Author(s): Marcin Nawrocki, Mattijs Jonker, Thomas C. Schmidt, Matthias Wählisch
Published in: In Proceedings of the 2021 Internet Measurement Conference (IMC 2021), 2021
Publisher: acm
DOI: 10.5281/zenodo.5645127

Cybersecurity Evaluation of Enterprise Architectures: The e-SENS Case

Author(s): Tanja Pavleska; Helder Aranha; Massimiliano Masi; Massimiliano Masi; Giovanni Paolo Sellitto
Published in: 7, 2019
Publisher: Springer Link
DOI: 10.5281/zenodo.3677533

Characterization of Anycast Adoption in the DNS Authoritative Infrastructure

Author(s): Raffaele Sommese, Gautam Akiwate, Mattijs Jonker, Giovane C. M. Moura, Marco Davids, Roland van Rijswijk-Deij, Geoffrey M. Voelker, Stefan Savage, K.C. Claffy, Anna Sperotto
Published in: In Proceedings of the 2021 Network Traffic Measurement and Analysis Conference (TMA 2021), 2021
Publisher: FIP
DOI: 10.5281/zenodo.5645314

Blockchain-based controlledinformation sharing in interorganizationalworkflows

Author(s): Christian Rondanini, Federico Daidone, Barbara Carminati, Elena Ferrari
Published in: International Conference on Services Computing (SCC 2020), 2020
Publisher: IEEE

KYoT: Self-sovereign IoT Identification with a Physically Unclonable Function

Author(s): Sina Rafati Niya; Benjamin Jeffrey; Burkhard Stiller
Published in: The 45th IEEE Conference on Local Computer Networks (LCN), 2, 2020
Publisher: IEEE
DOI: 10.5167/uzh-191961

Cluster-based anonymization of knowledge graphs

Author(s): Anh-Tu Hoang, Barbara Carminati, and Elena Ferrari
Published in: Applied Cryptography and Network Security, 2020
Publisher: Springer
DOI: 10.1007/978-3-030-57878-7_6

High-Level Synthesis design approach for Number-Theoretic Transform Implementations

Author(s): Alexander ElKady, Apostolos P. Fournaris, Thanasis Tsakoulis, Haleplidis Evangelos, Vassilis Paliouras
Published in: 29th IFIP/IEEE International Conference on Very Large Scale Integration, 2021
Publisher: Springer
DOI: 10.1109/vlsi-soc53125.2021.9607003

MobileTrust: Secure Knowledge Integration in VANETs

Author(s): GEORGE HATZIVASILIS; OTHONAS SOULTATOS; SOTIRIS IOANNIDIS; GEORGE SPANOUDAKIS; VASILIOS KATOS; GIORGOS DEMETRIOU
Published in: 11, 2019
Publisher: ACM
DOI: 10.5281/zenodo.3675111

MENTOR: The Design and Evaluation of a Protection Services Recommender System

Author(s): Franco, Muriel; Rodrigues, Bruno; Stiller, Burkhard
Published in: 45, 2019
Publisher: IFIP
DOI: 10.5281/zenodo.3674270

AIMED: Evolving Malware with Genetic Programming to Evade Detection

Author(s): Raphael Labaca Castro, Corinna Schmitt, Gabi Dreo
Published in: 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2019, Page(s) 240-247, ISBN 978-1-7281-2777-4
Publisher: IEEE
DOI: 10.1109/TrustCom/BigDataSE.2019.00040

Applying Metamorphic Testing to Homomorphic Cryptography

Author(s): Melvin Wolf, Jurgen Schonwalder
Published in: 2021 IEEE/ACM 6th International Workshop on Metamorphic Testing (MET), 2021, Page(s) 24-31, ISBN 978-1-6654-4464-4
Publisher: IEEE
DOI: 10.1109/met52542.2021.00011

Improving Detection ofMalicious Office Documentsusing One-Side Classifiers

Author(s): Silviu Constantin Vitel, Gheorghe Balan, Dumitru Bogdan Prelipcean
Published in: 21st International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC2019), 2019
Publisher: IEEE

Do You Really Like Me? Anycast Latency and Root DNS Popularity

Author(s): John Heidemann(USC/ISI, USC/Computers) Giovane Moura (SIDN Labs), Wes Hardaker (USC/ISI)
Published in: DINR 2021 Workshop, 2021
Publisher: -
DOI: 10.5281/zenodo.5793117

BIIT: Standardization ofBlockchain-based I2oTSystems in the I4 Era

Author(s): Sina Rafati-Niya, Eryk Schiller, Ile Cepilov, Burkhard Stiller
Published in: IEEE/IFIP Network Operations and Management Symposium (NOMS 2020), 2020
Publisher: IEEE

DANTE: A framework for mining and monitoring darknet traffic

Author(s): Dvir Cohen; Yisroel Mirsky; Yuval Elovici; Rami Puzis; Asaf Shabtai; Manuel Kamp; Tobias Martin
Published in: 1, 2020
Publisher: Springer
DOI: 10.5281/zenodo.3941842

When parents and children disagree: Diving into DNS delegation inconsistency

Author(s): Raffaele Sommese, Giovane C. M. Moura, Mattijs Jonker, Roland van Rijswijk-Deij, Alberto Dainotti, KC Claffy, Anna Sperotto
Published in: 2020
Publisher: Springer

Towards Efficient and Secure Analysis of Large Datasets

Author(s): Stelvio Cimato, Stefano Nicolo
Published in: 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC), 2020, Page(s) 1351-1356, ISBN 978-1-7281-7303-0
Publisher: IEEE
DOI: 10.1109/compsac48688.2020.00-68

Software System Exploration using Library Call Analysis

Author(s): Marinos Tsantekidis and Vassilis Prevelakis
Published in: 2nd Workshop on Model-driven Simulation and Training Environments for Cybersecurity (MSTEC), 2020
Publisher: ESORICS

Challenges in Identifying Network Attacks Using Netflow Data

Author(s): Edward Chuah, Neeraj Suri, Arshad Jhumka and Samantha Alt
Published in: IEEE International Symposium on Network Computing and Applications (NCA), 2021
Publisher: IEEE
DOI: 10.5281/zenodo.5866276

Head(er)Hunter: FastIntrusion Detection usingPacket Metadata Signatures

Author(s): Eva Papadogiannaki, Dimitris Deyannis, Sotiris Ioannidis
Published in: IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD2020), 2020
Publisher: IEEE

Studying OpenCL-based Number Theoretic Transform for heterogeneous platforms

Author(s): Evangelos Haleplidis, Thanasis Tsakoulis, Alexander El-Kady, Charis Dimopoulos, Odysseas Koufopavlou, Apostolos P. Fournaris
Published in: 2021 24th Euromicro Conference on Digital System Design (DSD), 2021
Publisher: IEEE
DOI: 10.1109/dsd53832.2021.00058

TrustAV - Practical and Privacy Preserving Malware Analysis in the Cloud

Author(s): Dimitris Deyannis, Eva Papadogiannaki, Giorgos Kalivianakis, Giorgos Vasiliadis, Sotiris Ioannidis
Published in: Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy, 2020, Page(s) 39-48, ISBN 9781450371070
Publisher: ACM
DOI: 10.1145/3374664.3375748

Failure Diagnosis for Cluster Systems using Partial Correlations

Author(s): Edward Chuah, Arshad Jhumka, Samantha Alt, Todd Evans, Neeraj Suri
Published in: The 19th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA'21), 2021
Publisher: IEEE
DOI: 10.5281/zenodo.5509414

Securing Mobile e-Health Environments by Design: A Holistic Architectural Approach

Author(s): Helder Aranha, Massimiliano Masi, Tanja Pavleska, Giovanni Paolo Sellitto
Published in: 2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2019, Page(s) 1-6, ISBN 978-1-7281-3316-4
Publisher: IEEE
DOI: 10.1109/WiMOB.2019.8923479

ProtectDDoS: A Platform for Trustworthy Offering and Recommendation of Protections

Author(s): Muriel Franco, Erion Sula, Bruno Rodrigues, Eder Scheid, Burkhard Stiller
Published in: International Conference on Economics of Grids, Clouds, Software and Services (GECON 2020), 2020
Publisher: Springer
DOI: 10.5281/zenodo.4134089

YouTubing at Home: Media Sharing Behavior Change as Proxy for MobilityAround COVID-19 Lockdowns

Author(s): Mejova, Yelena; Kourtellis, Nicolas
Published in: 13th ACM Web Science Conference 2021, 2021
Publisher: ACM
DOI: 10.1145/3447535.3462494

MikroTik Devices Landscape, Realistic Honeypots, and Automated Attack Classification

Author(s): Joao M. Ceron, Christian Scholten, Aiko Pras, Jair Santanna
Published in: NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, 2020, Page(s) 1-9, ISBN 978-1-7281-4973-8
Publisher: IEEE
DOI: 10.1109/NOMS47738.2020.9110336

ANYway: Measuring the Amplification DDoS Potential of Domains

Author(s): Olivier van der Toorn, Johannes Krupp, Mattijs Jonker, Roland van Rijswijk-Deij, Christian Rossow, Anna Sperotto
Published in: In Proceedings of the 17th International Conference on Network and Service Management (CNSM 2021), 2021
Publisher: IEEE/IFIP
DOI: 10.5281/zenodo.5645149

Enriching DNS Flows with Host-Based Events to Bypass Future Protocol Encryption

Author(s): Stanislav Špaček, Daniel Tovarňák, Pavel Čeleda
Published in: IFIP International Conference on ICT Systems Security and Privacy Protection, 2021, ISBN 978-3-030-78119-4
Publisher: IFIP/IEEEE
DOI: 10.1007/978-3-030-78120-0

Towards Adversarial Resilience in Proactive Detection of Botnet Domain Names by using MTD

Author(s): Christian Dietz, Gabi Dreo, Anna Sperotto, Aiko Pras
Published in: NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, 2020, Page(s) 1-5, ISBN 978-1-7281-4973-8
Publisher: IEEE
DOI: 10.1109/NOMS47738.2020.9110332

Poster - Attacking Malware Classifiers by Crafting Gradient-Attacks that Preserve Functionality

Author(s): Raphael Labaca-Castro, Battista Biggio, Gabi Dreo Rodosek
Published in: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, Page(s) 2565-2567, ISBN 9781450367479
Publisher: ACM
DOI: 10.1145/3319535.3363257

Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems

Author(s): Moshe Kravchik; Battista Biggio; Asaf Shabtai
Published in: 15, 2021
Publisher: ACM
DOI: 10.1145/3412841.3441892

FLaaS - Federated Learning as a Service

Author(s): Nicolas Kourtellis, Kleomenis Katevas, Diego Perino
Published in: Proceedings of the 1st Workshop on Distributed Machine Learning, 2020, Page(s) 7-13, ISBN 9781450381826
Publisher: ACM
DOI: 10.1145/3426745.3431337

Blockchain-based bug bounty framework

Author(s): Badash, L., Tapas, N., Nadler, A., Longo, F. and Shabtai, A.
Published in: Proceedings of the 36th Annual ACM Symposium on Applied Computing, 2021, ISBN 978-1-4503-8104-8
Publisher: ACM
DOI: 10.1145/3412841.3441906

Differential Tracking Across Topical Webpages of Indian News Media

Author(s): Yash Vekaria, Vibhor Agarwal, Pushkal Agarwal, Sangeeta Mahapatra, Sakthi Balan Muthiah, Nishanth Sastry, Nicolas Kourtellis
Published in: 13th ACM Web Science Conference 2021, 2021
Publisher: ACM
DOI: 10.1145/3447535.3462497

Exploring Content Moderation in the Decentralised Web: The Pleroma Case

Author(s): Anaobi Ishaku Hassan, Aravindh Raman, Ignacio Castro, Haris Bin Zia, Emiliano De Cristofaro, Nishanth Sastry, and Gareth Tyson
Published in: ACM CONEXT, 2021
Publisher: ACM
DOI: 10.1145/3485983.3494838

Cybersecurity in the Era of Digital Transformation: The case of Greece

Author(s): Leandros Maglaras; George Drivas; Nestoras Chouliaras; Eerke Boiten; Costas Lambrinoudakis; Sotiris Ioannidis
Published in: 7, 2021, Page(s) 1-5, ISBN 978-1-7281-9301-4
Publisher: IEEE
DOI: 10.5281/zenodo.4462523

ITrade: A Blockchain-based, Self-Sovereign, and Scalable Marketplace for IoT Data Streams

Author(s): Sina Rafati Niya, Danijel Dordevic, Burkhard Stiller
Published in: International Symposium on Integrated Network Management (IM 2021), 2021
Publisher: IFIP/IEEE
DOI: 10.1109/sa51175.2021.9507182

Wireless SDN for Highly Utilized MANETs

Author(s): Klement Streit, Nils Rodday, Florian Steuber, Corinna Schmitt, Gabi Dreo Rodosek
Published in: 2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2019, Page(s) 226-234, ISBN 978-1-7281-3316-4
Publisher: IEEE
DOI: 10.1109/WiMOB.2019.8923172

Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning

Author(s): Benjamin Zi Hao Zhao, Mohamed Ali Kaafar, Nicolas Kourtellis
Published in: CCSW 2020: The ACM Cloud Computing Security Workshop, 2020
Publisher: ACM

SecBot: a Business-Driven Conversational Agent for Cybersecurity Planning and Management

Author(s): Muriel Franco, Bruno Rodrigues, Eder John Scheid, Arthur Jacobs, Christian Killer, Lisandro Granville, Burkhard Stiller
Published in: 16th International Conference on Network and Service Management (CNSM 2020), 2020
Publisher: IFIP
DOI: 10.23919/cnsm50824.2020.9269037

Leveraging eBPF to preserveuser privacy for DNS, DoT,and DoH queries

Author(s): Sean Rivera, Vijay Gurbani, Sofiane Lagraa, Antonio Ken Iannillo and Radu State
Published in: ARES 2020/CUING 2020, 2020
Publisher: ARES

Reliable measurements withBGP and RPKI

Author(s): Mattijs Jonker, Nils Rodday
Published in: IEEE/IFIP Network Operations and Management Symposium (NOMS), 2020
Publisher: IEEE

Towards Automating Security Enhancement for Cloud Services

Author(s): Mohamed Oulaaffart, Remi Badonnel, Olivier Festor
Published in: IFIP/IEEE International Symposium on Integrated Network Managemen( IFIP/IEEE IM), 2021
Publisher: IFIP/IEEE
DOI: 10.5281/zenodo.5718102

Towards Cybersecurity MOOC Certification

Author(s): Matthias Beckerle, Argyro Chatzopoulou, and Simone Fischer-Hübner
Published in: SECOND INTERNATIONAL WORKSHOP ON CYBERSECURITY CERTIFICATION, 6th IEEE European Symposium on Security and Privacy, 2021, ISBN 978-1-6654-1012-0
Publisher: IEEE
DOI: 10.1109/eurospw54576.2021.00008

When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures

Author(s): Fidel, Gil; Bitton, Ron; Shabtai, Asaf
Published in: 6, 2020
Publisher: IEEE
DOI: 10.5281/zenodo.3941781

Modeling aggression propagation on social media

Author(s): Chrysoula Terizi and Despoina Chatzakou and Evaggelia Pitoura and Panayiotis Tsaparas and Nicolas Kourtellis
Published in: Online Social Networks and Media, 2021
Publisher: Elsevier
DOI: 10.1016/j.osnem.2021.100137

A Risk Assessment Mechanism for Android Apps

Author(s): Ha Xuan Son, Barbara Carminati, Elena Ferrari
Published in: 2021 IEEE International Conference on Smart Internet of Things (SmartIoT), 2021, Page(s) 237-244, ISBN 978-1-6654-4511-5
Publisher: IEEE
DOI: 10.1109/smartiot52359.2021.00044

On the Deployment of Default Routes in Inter-domain Routing.

Author(s): Rodday, N., Kaltenbach, L., Cunha, I., Bush, R., Katz-Bassett, E., Rodosek, G.D., Schmidt, T.C. and Wählisch, M.
Published in: In Proceedings of the ACM SIGCOMM 2021 Workshop on Technologies, Applications, and Uses of a Responsible Internet, 2021
Publisher: ACM
DOI: 10.1145/3472951.3473505

Reconfiguring the Functionality of IoT Edge/End nodes using FPGA based System on Chips

Author(s): Apostolos P. Fournaris, Aris Lalos, Christos Koulamas
Published in: 2019 First International Conference on Societal Automation (SA), 2019, Page(s) 1-5, ISBN 978-1-7281-3345-4
Publisher: IEEE
DOI: 10.1109/sa47457.2019.8938038

Æternum: A Decentralized Voting System with Unconditional Privacy

Author(s): Christian Killer, Markus Knecht, Claude Müller, Bruno Rodrigues, Eder John Scheid, Muriel Franco, Burkhard Stiller
Published in: 2021
Publisher: IEEE

Who’s Got Your Mail? Characterizing Mail Service Provider Usage

Author(s): Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Stefan Savage, Geoffrey M. Voelker
Published in: In Proceedings of the 2021 Internet Measurement Conference (IMC 2021), 2021
Publisher: ACM
DOI: 10.1145/3487552.3487820

IoT-based Access Management Supported by AI and Blockchains

Author(s): Eryk Schiller, Elfat Esati, Burkhard Stiller
Published in: 17th International Conference on Network and Service Management, 2021
Publisher: IFIP
DOI: 10.5167/uzh-205714

SC-FLARE: CooperativeDDoS Signalingbased on Smart Contracts

Author(s): Bruno Rodrigues, Spasen Trendafilov, Eder Scheid, Burkhard Stiller
Published in: IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2020), 2020
Publisher: IEEE

Stop tracking me Bro! Differential Tracking of User Demographics on Hyper-Partisan Websites

Author(s): Agarwal, Pushkal and Joglekar, Sagar and Papadopoulos, Panagiotis and Sastry, Nishanth and Kourtellis, Nicolas T
Published in: International Web Conference (WWW), 2020
Publisher: ACM

Tangled: A Cooperative Anycast Testbed

Author(s): Bertholdo, Leandro M.; Ceron, Joao M.; Vries, Wouter B. de; Schmitt, Ricardo de O.; Granville, Lisandro Zambenedetti; Rijswijk-Deij, Roland van; Pras, Aiko
Published in: In Proceedings of the 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM 2021), 2021
Publisher: IEEE/IFIP

How to kill symbolic deobfuscation for free (or: unleashing the potential of path-oriented protections)

Author(s): Mathilde Ollivier, Sébastien Bardin, Richard Bonichon, Jean-Yves Marion
Published in: Proceedings of the 35th Annual Computer Security Applications Conference, 2019, Page(s) 177-189, ISBN 9781450376280
Publisher: ACM
DOI: 10.1145/3359789.3359812

SaCI: a Blockchain-based Cyber Insurance Approach for the Deployment and Management of a Contract Coverage

Author(s): Muriel Franco, Noah Berni, Eder John Scheid, Bruno Rodrigues, Christian Killer, Burkhard Stiller
Published in: 8th International Conference on the Economics of Grids, Clouds, Systems and Services (GECON 2021), 2021
Publisher: IEEE
DOI: 10.5281/zenodo.5642663

ProtectDDoS: A Platform forTrustworthyOffering andRecommendation ofProtections

Author(s): Muriel Franco, Erion, Sula, Bruno Rodrigues, Eder Scheid, Burkhard Stiller
Published in: International Conference on Economics of Grids, Clouds, Software and Services (GECON 2020), 2020
Publisher: Springer

Non-IID data re-balancing at IoT edge with peer-to-peer federated learning for anomaly detection

Author(s): Han Wang, Luis Muñoz-González, David Eklund, Shahid Raza
Published in: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2021, Page(s) 153-163, ISBN 9781450383493
Publisher: ACM
DOI: 10.1145/3448300.3467827

Requirements and Challenges for Secure and Trustworthy UAS Collaboration

Author(s): Marco Anisetti; Claudio A. Ardagna; Barbara Carminati; Elena Ferrari; Cora Lisa Perner
Published in: 2, 2021, Page(s) 89-98, ISBN 978-1-7281-8543-9
Publisher: IEEE
DOI: 10.1109/TPS-ISA50397.2020.00022

Encrypted HTTP/2 Traffic Monitoring: Standing the Test of Time and Space

Author(s): Pierre-Olivier Brissaud; Jérôme François; Isabelle Chrisment; Thibault Cholez; Olivier Bettan
Published in: Proceedings of the 12th IEEE International Workshop on Information Forensics and Security (WIFS) 2020, 2, 2020, Page(s) 1-6, ISBN 978-1-7281-9930-6
Publisher: IEEE
DOI: 10.5281/zenodo.4311959

The Million DollarHandshake: Secure andAttested Communications inthe Cloud

Author(s): Nikolaos Chalkiadakis, Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis, Sotiris Ioannidis
Published in: IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (IEEE Cloud 2020), 2020
Publisher: IEEE

Preventing File-less Attackswith Machine LearningTechniques

Author(s): Alexandru Gabriel Bucevschi, Gheorghe Balan, Dumitru Bogdan Prelipcean
Published in: 21st International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC2019), 2019
Publisher: IEEE

Security Certification Scheme for Content-centric Networks

Author(s): Marco Anisetti, Claudio A. Ardagna, Filippo Berto, Ernesto Damiani
Published in: 2021 IEEE International Conference on Services Computing (SCC), 2021, Page(s) 203-212, ISBN 978-1-6654-1683-2
Publisher: IEEE
DOI: 10.1109/scc53864.2021.00033

A Unified Graph-Based Approach to Disinformation Detection using Contextual and Semantic Relations

Author(s): Marius Paraschiv, Nikos Salamanos, Costas Iordanou, Nikolaos Laoutaris, Michael Sirivianos
Published in: International AAAI Conference on Web and Social Media (ICWSM 2022), 2022
Publisher: ICWSM
DOI: 10.5281/zenodo.5534294

Assessing the state and improving the art of parallel testing for C

Author(s): Oliver Schwahn, Nicolas Coppik, Stefan Winter, Neeraj Suri
Published in: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis - ISSTA 2019, 2019, Page(s) 123-133, ISBN 9781-450362245
Publisher: ACM Press
DOI: 10.1145/3293882.3330573

Extracting Safe Thread Schedules from Incomplete Model Checking Results

Author(s): Patrick Metzler, Neeraj Suri and Georg Weissenbacher
Published in: Proc. of SPIN, 2019
Publisher: IEEE

Analysing and Improving Customer-Side Cloud Security Certifiability

Author(s): Shujie Zhao, Yiqun Chen, Stefan Winter and Neeraj Suri
Published in: Proc. of ISSRE/WoSOCER Workshop, 2019, 2019
Publisher: IEEE

Gyro: A Modular Scale-Out Layer for Single-Server DBMSs

Author(s): Habib Saissi, Marco Serafini and Neeraj Suri
Published in: Proc. of SRDS, 2019
Publisher: IEEE

Inferring Performance Bug Patterns from Developer Commits

Author(s): Yiqun Chen, Stefan Winter and Neeraj Suri
Published in: IEEE Proc. of ISSRE, 2019, 2019
Publisher: IEEE

Counterfighting Counterfeit: detecting and taking down fraudulent webshops at a ccTLD

Author(s): Thymen Wabeke; Giovane C. M. Moura; Nanneke Franken; Cristian Hesselman
Published in: 2020
Publisher: LNCS
DOI: 10.5281/zenodo.3678750

A NIS Directive compliant Cybersecurity Maturity Assessment Framework

Author(s): G. Drivas,  A. Chatzopoulou, L. Maglaras, C. Lambrinoudakis, Allan Cook, H. Janicke
Published in:  Computer Society Signature Conference on Computers, Software and Applications (COMPSAC 2020), 2020
Publisher: IEEE
DOI: 10.1109/compsac48688.2020.00-20

Cybersecurity in the public sector in Greece

Author(s): George Drivas, Leandros Maglaras, Helge Janicke, Sotiris Ioannidis
Published in: 2019
Publisher: ECCWS

A Continuous Certification Methodology for DevOps

Author(s): Marco Anisetti, Claudio A. Ardagna, Filippo Gaudenzi, Ernesto Damiani
Published in: Proceedings of the 11th International Conference on Management of Digital EcoSystems, 2019, Page(s) 205-212, ISBN 9781-450362382
Publisher: ACM
DOI: 10.1145/3297662.3365827

Trustworthy IoT: An Evidence Collection Approach Based on Smart Contracts

Author(s): Claudio Agostino Ardagna, Rasool Asal, Ernesto Damiani, Nabil El Ioini, Claus Pahl
Published in: 2019 IEEE International Conference on Services Computing (SCC), 2019, Page(s) 46-50, ISBN 978-1-7281-2720-0
Publisher: IEEE
DOI: 10.1109/SCC.2019.00020

Secure Healthcare: 5G-enabled Network Slicing for Elderly Care

Author(s): Bruno Dzogovic, Van Thuan Do, Bernardo Santos, Niels Jacot, Boning Feng, Thanh Van Do
Published in: 2020 5th International Conference on Computer and Communication Systems (ICCCS), 2020, Page(s) 864-868, ISBN 978-1-7281-6136-5
Publisher: IEEE
DOI: 10.1109/icccs49078.2020.9118583

Improving Cellular IoT Security with Identity Federation and Anomaly Detection

Author(s): Bernardo Santos, Bruno Dzogovic, Boning Feng, Niels Jacot, Van Thuan Do, Thanh Van Do
Published in: 2020 5th International Conference on Computer and Communication Systems (ICCCS), 2020, Page(s) 776-780, ISBN 978-1-7281-6136-5
Publisher: IEEE
DOI: 10.1109/ICCCS49078.2020.9118438

Connecting Remote eNodeB with Containerized 5G C-RANs in OpenStack Cloud

Author(s): Bruno Dzogovic, Bernardo Santos, Van Thuan Do, Boning Feng, Niels Jacot, Thanh Van Do
Published in: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019, Page(s) 14-19, ISBN 978-1-7281-1661-7
Publisher: IEEE
DOI: 10.1109/cscloud/edgecom.2019.00013

Bringing 5G Into User's Smart Home

Author(s): Bruno Dzogovic, Bernardo Santos, Thanh Van Do, Boning Feng, Thuan Van Do, Niels Jacot
Published in: 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), 2019, Page(s) 782-787, ISBN 978-1-7281-3024-8
Publisher: IEEE
DOI: 10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00145

Thunderbolt-3 Backbone for Augmented 5G Network Slicing in Cloud-Radio Access Networks

Author(s): Bruno Dzogovic, Thanh van Do, Bernardo Santos, Do Van Thuan, Boning Feng, Niels Jacot
Published in: 2019 IEEE 2nd 5G World Forum (5GWF), 2019, Page(s) 415-420, ISBN 978-1-7281-3627-1
Publisher: IEEE
DOI: 10.1109/5gwf.2019.8911710

Towards Achieving a Secure Authentication Mechanism for IoT Devices in 5G Networks

Author(s): Bernardo de Matos Patrocinio dos Santos, Bruno Dzogovic, Boning Feng, Van Thuan Do, Niels Jacot, Thanh Van Do
Published in: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019, Page(s) 130-135, ISBN 978-1-7281-1661-7
Publisher: IEEE
DOI: 10.1109/cscloud/edgecom.2019.000-7

Demo: Blockchain for the Simplification and Automation of KYC Result Sharing

Author(s): Robert Norvill, Mathis Steichen, Wazen M. Shbair, Radu State
Published in: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2019, Page(s) 9-10, ISBN 978-1-7281-1328-9
Publisher: IEEE
DOI: 10.1109/BLOC.2019.8751480

BlockZoom: Large-Scale Blockchain Testbed

Author(s): Wazen M. Shbair, Mathis Steichen, Jerome Francois, Radu State
Published in: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2019, Page(s) 5-6, ISBN 978-1-7281-1328-9
Publisher: IEEE
DOI: 10.1109/BLOC.2019.8751230

Talon: An Automated Framework for Cross-Device Tracking Detection

Author(s): Solomos, Konstantinos; Ilia, Panagiotis; Ioannidis, Sotiris; Kourtellis, Nicolas
Published in: 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 8, 2019
Publisher: USENIX
DOI: 10.5281/zenodo.3598091

Cookie Synchronization: Everything You Always Wanted to Know But Were Afraid to Ask

Author(s): Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos Markatos
Published in: The World Wide Web Conference on - WWW '19, 2019, Page(s) 1432-1442, ISBN 9781-450366748
Publisher: ACM Press
DOI: 10.1145/3308558.3313542

No More ChasingWaterfalls: A Measurement Study of the Header Bidding Ad-Ecosystem

Author(s): Michalis Pachilakis; Panagiotis Papadopoulos; Evangelos P. Markatos; Nicolas Kourtellis
Published in: Proceedings of the Internet Measurement Conference, 70, 2019
Publisher: ACM
DOI: 10.5281/zenodo.3598095

Disinformation Warfare: Understanding State-Sponsored Trolls on Twitter and Their Influence on the Web

Author(s): Savvas Zannettou, Tristan Caulfield, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini, Jeremy Blackburn
Published in: Companion Proceedings of The 2019 World Wide Web Conference, 2019, Page(s) 218-226, ISBN 9781-450366755
Publisher: ACM
DOI: 10.1145/3308560.3316495

Who Let The Trolls Out? - Towards Understanding State-Sponsored Trolls

Author(s): Savvas Zannettou, Tristan Caulfield, William Setzer, Michael Sirivianos, Gianluca Stringhini, Jeremy Blackburn
Published in: Proceedings of the 10th ACM Conference on Web Science - WebSci '19, 2019, Page(s) 353-362, ISBN 9781-450362023
Publisher: ACM Press
DOI: 10.1145/3292522.3326016

Complexity Analysis of Decentralized Application Development Using Integration Tools

Author(s): PATRIK REK, BLAZ PODGORELEC, and MUHAMED TURKANOVIC
Published in: Proceedings of the Eighth Workshop on Software Quality Analysis, Monitoring, Improvement, and Applications, September 22-25, 2019, 2019
Publisher: CEUR
DOI: 10.5281/zenodo.3674326

Cyber Insurance of Information Systems: Security and Privacy Cyber Insurance Contracts for ICT and Helathcare Organizations

Author(s): George Hatzivasilis, Panos Chatziadam, Nikos Petroulakis, Sotiris Ioannidis, Matteo Mangini, Christos Kloukinas, Artsiom Yautsiukhin, Michalis Antoniou, Dimitrios G. Katehakis, Marios Panayiotou
Published in: 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2019, Page(s) 1-6, ISBN 978-1-7281-1016-5
Publisher: IEEE
DOI: 10.1109/camad.2019.8858165

TradeMap: A FINMA-compliant Anonymous Management of an End-2-end Trading Market Place

Author(s): Rafati Niya, Sina; Allemann, Sebastian; Gabay, Arik; Stiller, Burkhard
Published in: 2019
Publisher: IEEE
DOI: 10.5281/zenodo.3677142

Beyond content analysis - detecting targeted ads via distributed counting

Author(s): Costas Iordanou, Nicolas Kourtellis, Juan Miguel Carrascosa, Claudio Soriente, Ruben Cuevas, Nikolaos Laoutaris
Published in: Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, 2019, Page(s) 110-122, ISBN 9781-450369985
Publisher: ACM
DOI: 10.1145/3359989.3365428

Cluster-Based Anonymization of Directed Graphs

Author(s): Anh-Tu Hoang, Barbara Carminati, Elena Ferrari
Published in: 2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC), 2019, Page(s) 91-100, ISBN 978-1-7281-6739-8
Publisher: IEEE
DOI: 10.1109/cic48465.2019.00020

“How over is it?” Understanding the Incel Community on YouTube

Author(s): Kostantinos Papadamou, Savvas Zannettou, Jeremy Blackburny, Emiliano De Cristofaroz, Gianluca Stringhini, Michael Sirivianos
Published in: 2020
Publisher: CSCW
DOI: 10.5281/zenodo.3898038

Stop tracking me Bro! Differential Tracking of User Demographics on Hyper-Partisan Websites

Author(s): Pushkal Agarwal, Sagar Joglekar, Panagiotis Papadopoulos, Nishanth Sastry, Nicolas Kourtellis
Published in: Proceedings of The Web Conference 2020, 2020, Page(s) 1479-1490, ISBN 9781-450370233
Publisher: ACM
DOI: 10.1145/3366423.3380221

Clash of the Trackers: Measuring the Evolution of the Online Tracking Ecosystem

Author(s): Konstantinos Solomos; Panagiotis Ilia; Sotiris Ioannidis; Nicolas Kourtellis
Published in: ACM Network Traffic Measurement and Analysis Conference, 2020
Publisher: ACM/IFIP
DOI: 10.5281/zenodo.3925659

A Proposal for Security Assessment of Trustzone-M Based Software

Author(s): Antonio Ken Iannillo, Radu State
Published in: 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2019, Page(s) 126-127, ISBN 978-1-7281-5138-0
Publisher: IEEE
DOI: 10.1109/ISSREW.2019.00110

Auto-Encoding Robot State Against Sensor Spoofing Attacks

Author(s): Sean Rivera, Sofiane Lagraa, Antonio Ken Iannillo, Radu State
Published in: 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2019, Page(s) 252-257, ISBN 978-1-7281-5138-0
Publisher: IEEE
DOI: 10.1109/ISSREW.2019.00080

Mobile App to SGX Enclave Secure Channel

Author(s): Fernando Kaway Carvalho Ota, Jorge Augusto Meira, Cyril Renaud Cassagnes, Radu State
Published in: 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2019, Page(s) 258-263, ISBN 978-1-7281-5138-0
Publisher: IEEE
DOI: 10.1109/issrew.2019.00081

Helping Users Managing Context-Based Privacy Preferences

Author(s): Md. Zulfikar Alom, Barbara Carminati, Elena Ferrari
Published in: 2019 IEEE International Conference on Services Computing (SCC), 2019, Page(s) 100-107, ISBN 978-1-7281-2720-0
Publisher: IEEE
DOI: 10.1109/scc.2019.00027

Adapting Users' Privacy Preferences in Smart Environments

Author(s): Md. Zulfikar Alom, Barbara Carminati, Elena Ferrari
Published in: 2019 IEEE International Congress on Internet of Things (ICIOT), 2019, Page(s) 165-172, ISBN 978-1-7281-2714-9
Publisher: IEEE
DOI: 10.1109/iciot.2019.00036

Confidential Discovery of IoT Devices through Blockchain

Author(s): Christian Rondanini, Barbara Carminati, Elena Ferrari
Published in: 2019 IEEE International Congress on Internet of Things (ICIOT), 2019, Page(s) 1-8, ISBN 978-1-7281-2714-9
Publisher: IEEE
DOI: 10.1109/iciot.2019.00014

Analysis of Fault Tolerance in Permissioned Blockchain Networks

Author(s): Blaz Podgorelec, Vid Kersic, Muhamed Turkanovic
Published in: 2019 XXVII International Conference on Information, Communication and Automation Technologies (ICAT), 2019, Page(s) 1-6, ISBN 978-1-7281-4543-3
Publisher: IEEE
DOI: 10.1109/ICAT47117.2019.8938836

A Resource Efficient Implementation of the RESTCONF Protocol for OpenWrt Systems

Author(s): Malte Granderath, Jurgen Schonwalder
Published in: NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, 2020, Page(s) 1-6, ISBN 978-1-7281-4973-8
Publisher: IEEE
DOI: 10.1109/noms47738.2020.9110458

An Example of a Cybersecurity Education Model

Author(s): Muhamed Turkanovic, Tatjana Welzer, Marko Holbl
Published in: 2019 29th Annual Conference of the European Association for Education in Electrical and Information Engineering (EAEEIE), 2019, Page(s) 1-4, ISBN 978-1-7281-3222-8
Publisher: IEEE
DOI: 10.1109/eaeeie46886.2019.9000440

Cultural Diversity in Database Teaching

Author(s): Tatjana Welzer, Marjan Druzovec, Marko Kompara, Marko Holbl
Published in: 2019 29th Annual Conference of the European Association for Education in Electrical and Information Engineering (EAEEIE), 2019, Page(s) 1-4, ISBN 978-1-7281-3222-8
Publisher: IEEE
DOI: 10.1109/EAEEIE46886.2019.9000471

Using TLS Fingerprints for OS Identification in Encrypted Traffic

Author(s): Martin Lastovicka, Stanislav Spacek, Petr Velan, Pavel Celeda
Published in: NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, 2020, Page(s) 1-6, ISBN 978-1-7281-4973-8
Publisher: IEEE
DOI: 10.1109/noms47738.2020.9110319

Optimizing 5G VPN+ Transport Networks with Vector Packet Processing and FPGA Cryptographic Offloading

Author(s): Bruno Dzogovic, Bernardo Santos, Boning Feng, Van Thuan Do, Niels Jacot, Thanh Van Do
Published in: MobiWIS 2021, 2021
Publisher: Springer
DOI: 10.1007/978-3-030-83164-6_7

Revisiting Rowhammerattacks in Embedded

Author(s): Lidia Pocero Fraile, Apostolos P. Fournaris and Odysseas Koufopavlou
Published in: 14th IEEE International Conference on Design & Technology of Integrated Systems in Nanoscale Era, 2019
Publisher: IEEE

ICS Testbed Tetris: Practical Building Blocks Towards a Cyber Security Resource

Author(s): Benjamin Green; Richard Derbyshire; William Knowles; James Boorman; Pierre Ciholas; Daniel Prince; David Hutchison
Published in: 1, 2020
Publisher: Usenix
DOI: 10.5281/zenodo.4311806

Fair and accurate age prediction using distribution aware data curation and augmentation

Author(s): Cao, Y., Berend, D., Tolmach, P., Levy, M., Amit, G., Liu, Y., Shabtai A., and Elovici Y.
Published in: 2022 IEEE Winter Conference on Applications of Computer Vision (WACV), 2022
Publisher: IEEE
DOI: 10.5281/zenodo.5833886

A Streaming Machine Learning Framework for Online Aggression Detection on Twitter

Author(s): Herodotos Herodotou, Despoina Chatzakou, Nicolas Kourtellis
Published in: International Conference on Big Data (IEEE BigData), 2020
Publisher: IEEE

Fault-Enabled Chosen-Ciphertext Attacks on Kyber

Author(s): Julius Hermelink, Peter Pessl, and Thomas Poeppelmann
Published in: 22nd International Conference on Cryptology in India, 2021
Publisher: Springer
DOI: 10.5281/zenodo.5718027

MMU-based Access Control for Libraries

Author(s): Marinos Tsantekidis and Vassilis Prevelakis
Published in: 18th International Conference on Security and Cryptography (SECRYPT), 2021, ISBN 978-989-758-524-1
Publisher: SCITEPRESS
DOI: 10.5220/0010536706860691

A Comprehensive Study of the Bitcoin P2P Network

Author(s): Jean-Philippe Eisenbarth, Thibault Cholez, Olivier Perrin
Published in: 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2021
Publisher: IEEE
DOI: 10.5281/zenodo.5574869

SecBot: a Business-Driven Conversational Agent for Cybersecurity Planning and Management

Author(s): Muriel Franco, Bruno Rodrigues, Eder Scheid, Arthur Jacobs, Christian Killer, Lisandro Granville, Burkhard Stiller
Published in: 2020
Publisher: IFIP

Decentralized, Secure and Cognitive Architecture for Automotive CyberPhysical System of Systems

Author(s): Apostolos P. Fournaris, Aris Lalos, Petros Kapsalas, Christos Koulamas
Published in: 2020 9th Mediterranean Conference on Embedded Computing (MECO), 2020, Page(s) 1-5, ISBN 978-1-7281-6949-1
Publisher: Springer
DOI: 10.1109/MECO49872.2020.9134336

YourAdvalue: Measuring Advertising Price Dynamics without Bankrupting User Privacy

Author(s): Pachilakis, Michalis; Papadopoulos, Panagiotis; Laoutaris, Nikolaos; Markatos, Evangelos P; Kourtellis, Nicolas
Published in: ACM Measurement and Analysis of Computing Systems (POMACS), 2021
Publisher: ACM
DOI: 10.1145/10.1145/3491044

HSM-based Key Management Solution for Ethereum Blockchain

Author(s): Wazen Shbair, Eugene Gavrilov, and Radu State
Published in: 2021
Publisher: IEEE

Blockchain-based controlled information sharing in inter-organizational workflows

Author(s): Christian Rondanini, Barbara Carminati, Federico Daidone, and Elena Ferrari
Published in: The 2020 IEEE International Conference on Services Computing (SCC), 2020
Publisher: IEEE
DOI: 10.1109/scc49832.2020.00056

Efficient Monitoring ofLibrary Call Invocation

Author(s): Marinos Tsantekidis und Vassilis Prevelakis
Published in: The 2nd IEEE International Symposium on Future Cyber Security Technologies (FCST), 2019
Publisher: IEEE

TraceSanitizer – Eliminating the Effects of Non-determinism on Error Propagation Analysis

Author(s): Habib Saissi; Stefan Winter; Oliver Schwahn; Karthik Pattabiraman; Neeraj Suri
Published in: 3, 2020
Publisher: IEEE
DOI: 10.5281/zenodo.3795366

TradeMap: A FINMA-compliant Anonymous Management of an End-2-end Trading Market Place

Author(s): Sina Rafati Niya, Sebastian Allemann, Arik Gabay, Burkhard Stiller
Published in: 2019 15th International Conference on Network and Service Management (CNSM), 2019, Page(s) 1-5, ISBN 978-3-903176-24-9
Publisher: IEEE
DOI: 10.23919/cnsm46954.2019.9012706

Clash of the trackers: measuring the evolution of the online tracking ecosystem

Author(s): Kostantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis, Nicolas Kourtellis
Published in: International Conference on Network Traffic Measurement and Analysis Conference, 2020
Publisher: ACM, IFIP

Scalable Transport Mechanisms for Blockchain IoT Applications

Author(s): Schiller, Eryk Jerzy; Rafati Niya, Sina; Surbeck, Timo; Stiller, Burkhard
Published in: Schiller, Eryk Jerzy; Rafati Niya, Sina; Surbeck, Timo; Stiller, Burkhard (2019). Scalable Transport Mechanisms for Blockchain IoT Applications. In: 44th IEEE Conference on Local Computer Networks (LCN 2019), Osnabrück, Germany, 14 October 2019 - 17 October 2019., 11, 2019
Publisher: IEEE
DOI: 10.5167/uzh-174017

Design and implementation of cast-as-intended verifiability for a blockchain-based voting system

Author(s): Christian Killer, Bruno Rodrigues, Raphael Matile, Eder Scheid, Burkhard Stiller
Published in: Proceedings of the 35th Annual ACM Symposium on Applied Computing, 2020, Page(s) 286-293, ISBN 9781450368667
Publisher: ACM
DOI: 10.1145/3341105.3373884

Security Management and Visualization in a Blockchain-based Collaborative Defense

Author(s): Christian Killer, Bruno Rodrigues, Burkhard Stiller
Published in: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2019, Page(s) 108-111, ISBN 978-1-7281-1328-9
Publisher: IEEE
DOI: 10.1109/bloc.2019.8751272

Stay Thrifty, Stay Secure: AVPN-Based AssuranceFramework for HybridSystems

Author(s): Marco Anisetti, Claudio A. Ardagna, Nicola Bena, Ernesto Damiani
Published in: 17th International Conference on Security and Cryptography (SECRYPT 2020), 2020
Publisher: SCITEPRESS

The Reality of Algorithm Agility - Studying the DNSSEC Algorithm Life-Cycle

Author(s): Moritz Müller, Willem Toorop, Taejoong Chung, Jelte Jansen, Roland van Rijswijk-Deij
Published in: Proceedings of the ACM Internet Measurement Conference, 2020, Page(s) 295-308, ISBN 9781450381383
Publisher: ACM
DOI: 10.1145/3419394.3423638

Be Your Neighbor’s Miner:Building Trust in LedgerContent via ReciprocallyUseful Work

Author(s): Lara Mauri, Ernesto Damiani and Stelvio Cimato
Published in: 2020 IEEE International Conference on Cloud Computing (CLOUD 2020), 2020
Publisher: IEEE

AR-PUFs: Advanced Security Primitives for the Internet of Things and Cyber-Physical Systems

Author(s): Nikolaos Athanasios Anagnostopoulos, Tolga Arul, Yufan Fan, Manish Kumar, Stefan Katzenbeisser
Published in: 2019 IEEE International Conference on Consumer Electronics (ICCE), 2019, Page(s) 1-5, ISBN 978-1-5386-7910-4
Publisher: IEEE
DOI: 10.1109/ICCE.2019.8661840

End-to-End Semantic Interoperability Mechanisms for IoT

Author(s): Eftychia Lakka, Nikolaos E. Petroulakis, George Hatzivasilis, Othonas Soultatos, Manolis Michalodimitrakis, Urszula Rak, Karolina Waledzik, Darko Anicic, Vivek Kulkarni
Published in: 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2019, Page(s) 1-6, ISBN 978-1-7281-1016-5
Publisher: IEEE
DOI: 10.1109/CAMAD.2019.8858501

Creating Trusted SecuritySensors for AnomalyDetection Systems usingHardware components

Author(s): Apostolos Fournaris, Charis Dimopoulos, and Odysseas Koufopavlou
Published in: TRUDEVICE 2020: Workshop on Trustworthy Manufacturing and Utilization of Secure Devices, Design, Automation and Test in Europe Conference (DATE 2020), 2020
Publisher: Springer

An enclave assisted snapshot-based kernel integrity monitor

Author(s): Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis, Sotiris Ioannidis
Published in: Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and Networking, 2020, Page(s) 19-24, ISBN 9781450371322
Publisher: ACM
DOI: 10.1145/3378679.3394539

Analyzing the Viability of UAV Missions Facing Cyber Attacks

Author(s): Jukka Soikkeli, Cora Perner, Emil C. Lupu
Published in: 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2021, Page(s) 103-112, ISBN 978-1-6654-1012-0
Publisher: IEEE
DOI: 10.1109/eurospw54576.2021.00018

Securing Runtime Memory via MMU manipulation

Author(s): Marinos Tsantekidis and Vassilis Prevelakis
Published in: 15th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), 2021, ISBN 978-1-61208-919-5
Publisher: IARIA XPS Press
DOI: 10.5281/zenodo.5834070

No More Chasing Waterfalls:A Measurement Study of theHeader Bidding Ad-Ecosystem

Author(s): Michalis Pachilakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis
Published in: 19th ACM on Internet Measurement Conference, 2019
Publisher: ACM

Clouding up the Internet - how centralized is DNS traffic becoming?

Author(s): Giovane C. M. Moura, Sebastian Castro, Wes Hardaker, Maarten Wullink, Cristian Hesselman
Published in: Proceedings of the ACM Internet Measurement Conference, 2020, Page(s) 42-49, ISBN 9781450381383
Publisher: ACM
DOI: 10.1145/3419394.3423625

DLIT: A Scalable Distributed Ledger for IoT Data

Author(s): Sina Rafati Niya, Raphael Beckmann, Burkhard Stiller
Published in: 2020 Second International Conference on Blockchain Computing and Applications (BCCA), 2020, Page(s) 100-107, ISBN 978-1-7281-8370-1
Publisher: IEEE
DOI: 10.1109/BCCA50787.2020.9274456

Distributed DDoS Defense:A collaborative Approach at Internet Scale

Author(s): Jessica Steinberger, Anna Sperotto, Harald Baier, Aiko Pras
Published in: NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, 2020, Page(s) 1-6, ISBN 978-1-7281-4973-8
Publisher: IEEE
DOI: 10.1109/NOMS47738.2020.9110300

A Secure 5G Eldercare Solution Using Millimeterwave Sensors

Author(s): Boning Feng, Akihiro Kajiwara, Van Thuan Do, Niels Jacot, Bernardo Santos, Bruno Dzogovic, Thanh Van Do
Published in: MobiWIS 2021, 2021
Publisher: Springer
DOI: 10.1007/978-3-030-83164-6_1

Decentralized RuntimeMonitoring ApproachRelying on the EthereumBlockchain Infrastructure

Author(s): Ahmed Taha, Ahmed Zakaria, Dongseong Kim, Neeraj Suri
Published in: Proc. of Intl. Conference on Cloud Engineering, 2020, 2020
Publisher: IEEE

DeepStream: Autoencoder-Based Stream Temporal Clustering

Author(s): Harush, s., Meidan, Y., and Shabtai, A.
Published in: 2021
Publisher: ACM

Helix: DGA Domain Embeddings for Tracking and Exploring Botnets

Author(s): Sidi, L., Mirsky, Y., Nadler, A., Elovici, Y. and Shabtai, A.
Published in: Proceedings of the 29th ACM International Conference on Information & Knowledge Management, 2020, ISBN 978-1-4503-6859-9
Publisher: ACM
DOI: 10.1145/3340531.3416022

BGP Anycast Tuner: Intuitive Route Management for Anycast Services

Author(s): Leandro M. Bertholdo, Joao M. Ceron, Lisandro Z. Granville, Giovane C. M. Moura, Cristian Hesselman, Roland van Rijswijk-Deij
Published in: 2020 16th International Conference on Network and Service Management (CNSM), 2020, Page(s) 1-7, ISBN 978-3-903176-31-7
Publisher: IEEE
DOI: 10.23919/CNSM50824.2020.9269102

Anomaly Detection in Cellular IoT with Machine Learning

Author(s): Bernardo Santos, Imran Qayyrm Khan, Bruno Dzogovic, Boning Feng, Van Thuan Do, Niels Jacot, Thanh Van Do
Published in: EAI Goodtechs 2021, 2021
Publisher: Springer
DOI: 10.1007/978-3-030-91421-9_5

Hard edges: Hardware-based Control-Flow Integrity for Embedded Devices

Author(s): Christou, George and Vasiliadis, Giorgos and Athanasopoulos, Elias and Ioannidis, Sotiris
Published in: International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation, 2021
Publisher: Springer
DOI: 10.5281/zenodo.5653420

Enabling Digital ForensicsReadiness for Internet ofVehicles

Author(s): C. Alexakosa, C. Katsinia , K. Votisb , A. Lalasb , D. Tzovarasb , D. Serpanos
Published in: 23rd EURO Working Group on Transportation Meeting, EWGT 2020, 16-18 September 2020, Paphos, Cyprus, 2020
Publisher: EWGT

A Practical Analysis on Mirai Botnet Traffic

Author(s): Getoar Gallopeni; Bruno Rodrigues; Muriel Franco; Burkhard Stiller
Published in: 11, 2020
Publisher: IFIP
DOI: 10.5281/zenodo.3966899

Evaluating TCP Connection Healthiness

Author(s): Nils Rodday, Raphael Labaca Castro, Klement Streit, Gabi Dreo Rodosek
Published in: 2019 29th International Telecommunication Networks and Applications Conference (ITNAC), 2019, Page(s) 1-4, ISBN 978-1-7281-3673-8
Publisher: IEEE
DOI: 10.1109/ITNAC46935.2019.9078021

Python-Based TinyIPFIX in Wireless Sensor Networks

Author(s): Eryk Schiller, Ramon Huber, Burkhard Stiller
Published in: IEEE 46th Conference on Local Computer Networks (LCN), 2021
Publisher: IEEE
DOI: 10.1109/lcn52139.2021.9525017

SecGrid: A Visual System for the Analysis and ML-Based Classification of Cyberattack Traffic

Author(s): Muriel Franco, Jan Von der Assen, Luc Boillat, Christian Killer, Bruno Rodrigues, Eder John Scheid, Lisandro Granville, Burkhard Stiller
Published in: IEEE 46th Conference on Local Computer Networks (LCN 2021), 2021
Publisher: IEEE
DOI: 10.1109/lcn52139.2021.9524932

Privacy-Preserving Sequential Publishing of Knowledge Graphs

Author(s): Anh-Tu Hoang, Barbara Carminati, Elena Ferrari
Published in: 2021 IEEE 37th International Conference on Data Engineering (ICDE), 2021, Page(s) 2021-2026, ISBN 978-1-7281-9184-3
Publisher: IEEE
DOI: 10.1109/icde51399.2021.00194

Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning

Author(s): Benjamin Zi Hao Zhao, Mohamed Ali Kaafar, Nicolas Kourtellis
Published in: Cloud Computing Security Workshop (CCSW), 2020
Publisher: ACM

Mammoth: Monitoring the ABAC Monitor of MQTT-based Internet of Things ecosystems

Author(s): Pietro Colombo, Elena Ferrari, Samuele Salvia
Published in: The 25th ACM Symposium on Access Control Models and Technologies (SACMAT 2020), 2020
Publisher: ACM

Blockchains in the Age ofSoftwarization - Hands-onExperiences withProgramming SmartContracts and Their SecurityPitfalls

Author(s): Bruno Rodrigues, Eder Scheid, Burkhard Stiller
Published in: IEEE/IFIP Network Operations and Management Symposium (NOMS), 2020
Publisher: IEEE

Forecasting the Impact of IXP Outages Using Anycast

Author(s): Leandro M. Bertholdo (Universiteit Twente), João M. Ceron (SIDN Labs), Lisandro Z. Granville (Federal University of Rio Grande do Sul), Roland van Rijswijk-Deij(NLnet Labs)
Published in: Network Traffic Measurement and Analysis Conference 2021, 2021
Publisher: IFIP/IEEE

Enabling Security-by-Design in Smart Grids: An Architecture-Based Approach

Author(s): Helder Aranha, Massimiliano Masi, Tanja Pavleska, Giovanni Paolo Sellitto
Published in: 2019 15th European Dependable Computing Conference (EDCC), 2019, Page(s) 177-179, ISBN 978-1-7281-3929-6
Publisher: IEEE
DOI: 10.1109/edcc.2019.00042

Machine Learning for Security at the IoT Edge - A Feasibility Study

Author(s): Han Wang; Luis Barriga; Arash Vahidi; Shahid Raza
Published in: 2, 2019
Publisher: IEEE
DOI: 10.5281/zenodo.3677348

DDoS Mitigation: AMeasurement-BasedApproach

Author(s): Mattijs Jonker, Anna Sperotto, Aiko Pras
Published in: 2020 IEEE/IFIP Network Operations and Management Symposium, 2020
Publisher: IEEE Press

Catching them red-handed: Real-time Aggression Detection on Social Media

Author(s): Herodotos Herodotou; Despoina Chatzakou; Nicolas Kourtellis
Published in: 1, 2020
Publisher: IEEE
DOI: 10.5281/zenodo.4323436

Cluster-BasedAnonymization ofKnowledge Graphs

Author(s): Anh-Tu Hoang, Barbara Carminati and Elena Ferrar
Published in: 18th International Conference on Applied Cryptography and Network Security, 2020
Publisher: Springer

Adaptation of Proof-of-Stake-based Blockchains for IoT Data Streams

Author(s): Sina Rafati Niya, Eryk Schiller, Ile Cepilov, Fabio Maddaloni, Kursat Aydinli, Timo Surbeck, Thomas Bocek, Burkhard Stiller
Published in: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2019, Page(s) 15-16, ISBN 978-1-7281-1328-9
Publisher: IEEE
DOI: 10.1109/BLOC.2019.8751260

Robust and Efficient Privacy Preservation in Industrial IoT via correlation completion and tracking

Author(s): Aris S. Lalos, Evangelos Vlachos, Kostas Berberidis, Apostolos Fournaris, Christos Koulamas
Published in: 2019 IEEE 17th International Conference on Industrial Informatics (INDIN), 2019, Page(s) 1225-1228, ISBN 978-1-7281-2927-3
Publisher: IEEE
DOI: 10.1109/INDIN41052.2019.8972154

Signing Blockchain Transactions using Qualified Certificates

Author(s): Muhamed Turkanović, Blaž Podgorelec
Published in: IEEE Internet Computing, 2020, ISSN 1089-7801
Publisher: Institute of Electrical and Electronics Engineers

Automated Retrieval of ATT&CK Tactics and Techniques for Cyber Threat Reports

Author(s): Valentine Legoy; Marco Caselli; Christin Seifert; Andreas Peter
Published in: CoRR, 3, 2020, ISSN 2331-8422
Publisher: arXiv
DOI: 10.5281/zenodo.3925788

Measuring and visualizing cyber threat intelligence quality

Author(s): Daniel Schlette, Fabian Böhm, Marco Caselli, Günther Pernul
Published in: International Journal of Information Security, 2020, ISSN 1615-5262
Publisher: Springer Verlag
DOI: 10.1007/s10207-020-00490-y

Models of Privacy and Disclosure on Social Networking Sites: A Systematic Literature Review

Author(s): Lili Nemec Zlatolas, Luka Hrgarek, Tatjana Welzer, Marko Hölbl
Published in: Mathematics, 2021, ISSN 2227-7390
Publisher: MDPI
DOI: 10.3390/math10010146

Machine Learning Attacks and Countermeasures on Hardware Binary Edwards Curve Scalar Multipliers

Author(s): Charis Dimopoulos, Apostolos P. Fournaris, Odysseas Koufopavlou
Published in: Journal of Sensor and Actuator Networks, 10/3, 2021, Page(s) 56, ISSN 2224-2708
Publisher: mdpi
DOI: 10.3390/jsan10030056

Synergy of Blockchain Technology and Data Mining Techniques for Anomaly Detection

Author(s): Kamišalić, A.; Kramberger, R.; Fister, I., Jr.
Published in: Applied Sciences, 2021, ISSN 2076-3417
Publisher: MDPI
DOI: 10.3390/app11177987

Evaluating the effects of access control policies within NoSQL systems

Author(s): Pietro Colombo, Elena Ferrari
Published in: Future Generation Computer Systems, 114, 2021, Page(s) 491-505, ISSN 0167-739X
Publisher: Elsevier BV
DOI: 10.1016/j.future.2020.08.026

Efficient Cyber Attack Detection in Industrial Control Systems Using Lightweight Neural Networks and PCA

Author(s): Moshe Kravchik, Asaf Shabtai
Published in: IEEE Transactions on Dependable and Secure Computing, 2021, Page(s) 1-1, ISSN 1545-5971
Publisher: IEEE Computer Society
DOI: 10.1109/TDSC.2021.3050101

ELSA: efficient long-term secure storage of large datasets (full version) ∗

Author(s): Philipp Muth, Matthias Geihs, Tolga Arul, Johannes Buchmann, Stefan Katzenbeisser
Published in: EURASIP Journal on Information Security, 2020/1, 2020, ISSN 2510-523X
Publisher: eurasip
DOI: 10.1186/s13635-020-00108-9

WeTrace: A privacy-preserving tracing approach

Author(s): Muriel Franco, Bruno Rodrigues, Christian Killer, Eder John Scheid, Alessandro De Carli, Andreas Gassmann, David Schonbachler, Burkhard Stiller
Published in: Journal of Communications and Networks, 23/5, 2021, Page(s) 374-389, ISSN 1229-2370
Publisher: Korean Institute of Communication Sciences
DOI: 10.23919/jcn.2021.000021

Applying k-vertex cardinality constraints on a Neo4j graph database

Author(s): Martina Šestak, Marjan Heričko, Tatjana Welzer Družovec, Muhamed Turkanović
Published in: Future Generation Computer Systems, 115, 2021, Page(s) 459-474, ISSN 0167-739X
Publisher: Elsevier BV
DOI: 10.1016/j.future.2020.09.036

At Home and Abroad: The Use of Denial-ofservice Attacks during Elections in Nondemocratic Regimes

Author(s): Philipp M. Lutscher; Nils B. Weidmann; Margaret E. Roberts; Mattijs Jonker; Alistair King; Alberto Dainotti
Published in: Journal of Conflict Resolutions, 11, 2019, ISSN 0022-0027
Publisher: SAGE Publications
DOI: 10.1177/2F0022002719861676

Looking Beyond theHorizon: Thoughts onProactive Detection ofThreats

Author(s): Olivier van der Toorn and Anna Sperotto
Published in: Digital Threats: Research and Practice, 2020, ISSN 0001-0782
Publisher: Association for Computing Machinary, Inc.

Blockchain-Based Reputation Systems: Implementation Challenges and Mitigation

Author(s): Ammar Battah, Youssef Iraqi, Ernesto Damiani
Published in: Electronics, 10/3, 2021, Page(s) 289, ISSN 2079-9292
Publisher: MDPI
DOI: 10.3390/electronics10030289

Policy-based Blockchain Selection

Author(s): Eder J. Scheid, Bruno Rodrigues, Burkhard Stiller
Published in: IEEE Communications Maganize, 2021, ISSN 1558-1896
Publisher: IEEE

A novel approach for detecting vulnerable IoT devices connected behind a home NAT

Author(s): Yair Meidan, Vinay Sachidananda, Hongyi Peng, Racheli Sagron, Yuval Elovici, Asaf Shabtai
Published in: Computers & Security, 97, 2020, Page(s) 101968, ISSN 0167-4048
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2020.101968

Retrofitting post-quantum cryptography in internet protocols

Author(s): Moritz Müller, Jins de Jong, Maran van Heesch, Benno Overeinder, Roland van Rijswijk-Deij
Published in: ACM SIGCOMM Computer Communication Review, 50/4, 2020, Page(s) 49-57, ISSN 0146-4833
Publisher: ACM
DOI: 10.1145/3431832.3431838

Regulating data sharing across MQTT environments

Author(s): Pietro Colombo, Elena Ferrari, Engin Deniz Tümer
Published in: Journal of Network and Computer Applications, 174, 2021, Page(s) 102907, ISSN 1084-8045
Publisher: Academic Press
DOI: 10.1016/j.jnca.2020.102907

SAVTA: A Hybrid Vehicular Threat Model: Overview and Case Study

Author(s): Mohammad Hamad, Vassilis Prevelakis
Published in: Information, 11/5, 2020, Page(s) 273, ISSN 2078-2489
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/info11050273

PAutoBotCatcher: A blockchain-based privacy-preserving botnet detector for Internet of Things

Author(s): Ahmed Lekssays, Luca Landa, Barbara Carminati, Elena Ferrari
Published in: Computer Networks, 200, 2021, Page(s) 108512, ISSN 1389-1286
Publisher: Elsevier BV
DOI: 10.1016/j.comnet.2021.108512

MaskDGA: An Evasion Attack Against DGA Classifiers and Adversarial Defenses

Author(s): Lior Sidi, Asaf Nadler, Asaf Shabtai
Published in: IEEE Access, 8, 2020, Page(s) 161580-161592, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/ACCESS.2020.3020964

Big Data Analytics-as-a-Service: Bridging the gap between security experts and data scientists

Author(s): Claudio A. Ardagna, Valerio Bellandi, Ernesto Damiani, Michele Bezzi, Cedric Hebert
Published in: Computers & Electrical Engineering, 93, 2021, Page(s) 107215, ISSN 0045-7906
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.compeleceng.2021.107215

Modeling aggression propagation on social media

Author(s): Chrysoula Terizi, Despoina Chatzakou Evaggelia Pitoura Panayiotis Tsaparas Nicolas Kourtellis
Published in: Online Social Networks and Media, 24, 2021, ISSN 2468-6964
Publisher: Elsevier

Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber

Author(s): Mike Hamburg, Julius Hermelink, Robert Primas, Simona Samardjiska, Thomas Schamberger, Silvan Streit, Emanuele Strieder, Christine Van Vredendaal
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, Page(s) 88-113, ISSN 2569-2925
Publisher: RUB
DOI: 10.46586/tches.v2021.i4.88-113

Spotting Political Social Bots in Twitter: A Use Case of the 2019 Spanish General Election

Author(s): Javier Pastor-Galindo, Mattia Zago, Pantaleone Nespoli, Sergio Lopez Bernal, Alberto Huertas Celdran, Manuel Gil Perez, Jose A. Ruiperez-Valiente, Gregorio Martinez Perez, Felix Gomez Marmol
Published in: IEEE Transactions on Network and Service Management, 17/4, 2020, Page(s) 2156-2170, ISSN 1932-4537
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TNSM.2020.3031573

Attacking SRAM PUFs using very-low-temperature data remanence

Author(s): Nikolaos Athanasios Anagnostopoulos, Tolga Arul, Markus Rosenstihl, André Schaller, Sebastian Gabmeyer, Stefan Katzenbeisser
Published in: Microprocessors and Microsystems, 71, 2019, Page(s) 102864, ISSN 0141-9331
Publisher: Elsevier BV
DOI: 10.1016/j.micpro.2019.102864

A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures

Author(s): Eva Papadogiannaki, Sotiris Ioannidis
Published in: ACM Computing Surveys, 54/6, 2021, Page(s) 1-35, ISSN 0360-0300
Publisher: Association for Computing Machinary, Inc.
DOI: 10.1145/3457904

A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem

Author(s): Stelvio Cimato, Gabriele Gianini, Maryam Sepehri, Rasool Asal, Ernesto Damiani
Published in: Journal of Information Security and Applications, 51, 2020, Page(s) 102462, ISSN 2214-2126
Publisher: Elsevier
DOI: 10.1016/j.jisa.2020.102462

A Responsible Internet to Increase Trust in the Digital World

Author(s): Cristian Hesselman, Paola Grosso, Ralph Holz, Fernando Kuipers, Janet Hui Xue, Mattijs Jonker, Joeri de Ruiter, Anna Sperotto, Roland van Rijswijk-Deij, Giovane C. M. Moura, Aiko Pras, Cees de Laat
Published in: Journal of Network and Systems Management, 28/4, 2020, Page(s) 882-922, ISSN 1064-7570
Publisher: Kluwer Academic Publishers
DOI: 10.1007/s10922-020-09564-7

A nonproprietary language for the command and control of cyber defenses – OpenC2

Author(s): Vasileios Mavroeidis, Joe Brule
Published in: Computers & Security, 97, 2020, Page(s) 101999, ISSN 0167-4048
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2020.101999

PCaaD: Towards automated determination and exploitation of industrial systems

Author(s): Benjamin Green, Richard Derbyshire, Marina Krotofil, William Knowles, Daniel Prince, Neeraj Suri
Published in: Computers & Security, 110, 2021, Page(s) 102424, ISSN 0167-4048
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2021.102424

A trust assurance technique for Internet of things based on human behavior compliance

Author(s): Marco Anisetti, Claudio Agostino Ardagna, Ernesto Damiani, Alessandro Sala
Published in: Concurrency and Computation: Practice and Experience, 2019, ISSN 1532-0626
Publisher: John Wiley & Sons Inc.
DOI: 10.1002/cpe.5355

Assessing Cybersecurity Threats and Risks in the Public Sector in Greece

Author(s): G. Drivas,  L. Maglaras, H Janicke, S Ioannidis
Published in: Journal of Information Warfare, V. 19(1), 2019, ISSN 1445-3312
Publisher: Peregrine Technical Solutions, LLC

Cost-effective deployment of certified cloud composite services

Author(s): Marco Anisetti, Claudio A. Ardagna, Ernesto Damiani, Filippo Gaudenzi, Gwanggil Jeon
Published in: Journal of Parallel and Distributed Computing, 135, 2020, Page(s) 203-218, ISSN 0743-7315
Publisher: Academic Press
DOI: 10.1016/j.jpdc.2019.09.003

A Model of Perception of Privacy, Trust, and Self-Disclosure on Online Social Networks

Author(s): Nemec Zlatolas, Welzer, Hölbl, Heričko, Kamišalić
Published in: Entropy, 21/8, 2019, Page(s) 772, ISSN 1099-4300
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/e21080772

A Machine Learning-Based Method for Automated Blockchain Transaction Signing Including Personalized Anomaly Detection

Author(s): Blaž Podgorelec, Muhamed Turkanović, Sašo Karakatič
Published in: Sensors, 20/1, 2020, Page(s) 147, ISSN 1424-8220
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s20010147

A deep learning model for Twitter spam detection

Author(s): Zulfikar Alom, Barbara Carminati, Elena Ferrari
Published in: Online Social Networks and Media, 18, 2020, Page(s) 100079, ISSN 2468-6964
Publisher: Elsevier
DOI: 10.1016/j.osnem.2020.100079

The Seven Deadly Sins of the HTML5 WebAPI

Author(s): Michalis Diamantaris, Francesco Marcantoni, Sotiris Ioannidis, Jason Polakis
Published in: ACM Transactions on Privacy and Security, 23/4, 2020, Page(s) 1-31, ISSN 2471-2566
Publisher: ACM
DOI: 10.1145/3403947

ARIMA Supplemented Security Metrics for Quality Assurance and Situational Awareness

Author(s): Jan Kohlrausch, Eugene A. Brin
Published in: Digital Threats: Research and Practice, 1/1, 2020, Page(s) 1-21, ISSN 2576-5337
Publisher: Association for Computing Machinery
DOI: 10.1145/3376926

State Channel as a Service Based on a Distributed and Decentralized Web

Author(s): Blaz Podgorelec, Marjan Herieko, Muhamed Turkanovic
Published in: IEEE Access, 8, 2020, Page(s) 64678-64691, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2020.2984378

anomaly detection trusted hardware sensors for critical infrastructure legacy devices

Author(s): Apostolos P. Fournaris; Charalambos Dimopoulos; Konstantinos Lampropoulos; Odysseas Koufopavlou
Published in: Volume 20, 11, 2020, ISSN 1424-8220
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.20944/preprints202002.0241.v1

From Trustworthy Data to Trustworthy IoT

Author(s): Claudio A. Ardagna, Rasool Asal, Ernesto Damiani, Nabil El Ioini, Mehdi Elahi, Claus Pahl
Published in: ACM Transactions on Cyber-Physical Systems, 5/1, 2021, Page(s) 1-26, ISSN 2378-962X
Publisher: ACM
DOI: 10.1145/3418686

Privacy Preservation in Industrial IoT via Fast Adaptive Correlation Matrix Completion

Author(s): Aris S. Lalos; Evangelos Vlachos; Kostas Berberidis; Apostolos Fournaris; Christos Koulamas
Published in: IEEE Transactions on Industrial Informatics, 7, 2020, ISSN 1551-3203
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TII.2019.2960275100

Transparent and Service-Agnostic Monitoring ofEncrypted Web Traffic

Author(s): Pierre-Olivier Brissaud, Jérôme François, Isabelle Chrisment, Thibault Cholez and Olivier Bettan
Published in: IEEE Transactions on Network and Service Management, 2019, ISSN 1932-4537
Publisher: Institute of Electrical and Electronics Engineers

Blockchain-based Privacy Enforcement in the IoT domain

Author(s): Federico Daidone, Barbara Carminati, Elena Ferrari
Published in: IEEE Transactions on Dependable and Secure Computing, 2020, Page(s) 1-1, ISSN 1545-5971
Publisher: IEEE Computer Society
DOI: 10.1109/tdsc.2021.3110181

2 Years in the anti-phishing group of a large company

Author(s): Luigi Gallo, Alessandro Maiello, Alessio Botta, Giorgio Ventre
Published in: Computers & Security, 105, 2021, Page(s) 102259, ISSN 0167-4048
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2021.102259

The DNS in IoT: Opportunities, Risks, and Challenges

Author(s): Cristian Hesselman, Merike Kaeo, Lyman Chapin, Kimberly Claffy, Mark Seiden, Danny McPherson, Dave Piscitello, Andrew McConachie, Tim April, Jacques Latour, Rod Rasmussen
Published in: IEEE Internet Computing, 24/4, 2020, Page(s) 23-32, ISSN 1089-7801
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/MIC.2020.3005388

Blockchain Signaling System (BloSS): Cooperative Signalingof Distributed Denial-of-Service Attacks

Author(s): Bruno Rodrigues, Eder Scheid, Christian Killer, Muriel Franco, Burkhard Stiller
Published in: Journal of Network and Systems Management (JNSM) 2020, 2020, ISSN 1064-7570
Publisher: Kluwer Academic Publishers

O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs

Author(s): Vasileios Giotsas, George Nomikos, Vasileios Kotronis, Pavlos Sermpezis, Petros Gigis, Lefteris Manassakis, Christoph Dietzel, Stavros Konstantaras, Xenofontas Dimitropoulos
Published in: IEEE/ACM Transactions on Networking, 2020, Page(s) 1-16, ISSN 1063-6692
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TNET.2020.3025945

Extracting New Temporal Features to Improve the Interpretability of Undiagnosed Type 2 Diabetes Mellitus Prediction Models

Author(s): Simon Kocbek, Primož Kocbek, Lucija Gosak, Nino Fijačko, Gregor Štiglic
Published in: Journal of Personalized Medicine, 2022, ISSN 2075-4426
Publisher: MDPI
DOI: 10.3390/jpm12030368

A novel Intrusion Detection System against spoofing attacks in connected Electric Vehicles

Author(s): Dimitrios Kosmanos, Apostolos Pappas, Leandros Maglaras, Sotiris Moschoyiannis, Francisco J. Aparicio-Navarro, Antonios Argyriou, Helge Janicke
Published in: Array, 5, 2020, Page(s) 100013, ISSN 2590-0056
Publisher: Elsevier
DOI: 10.1016/j.array.2019.100013

Generative Adversarial Networks in AI-Enabled Safety-Critical Systems: Friend or Foe?

Author(s): Apostolos P. Fournaris, Aris S. Lalos, Dimitrios Serpanos
Published in: Computer, 52/9, 2019, Page(s) 78-81, ISSN 0018-9162
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/MC.2019.2924546

Extracting Safe Thread Schedules from Incomplete Model Checking Results

Author(s): Patrick Metzler, Neeraj Suri, Georg Weissenbacher
Published in: Model Checking Software - 26th International Symposium, SPIN 2019, Beijing, China, July 15–16, 2019, Proceedings, 11636, 2019, Page(s) 153-171, ISBN 978-3-030-30922-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-30923-7_9

Blockchains and Distributed Ledgers Uncovered: Clarifications, Achievements, and Open Issues

Author(s): Eder J. Scheid, Bruno B. Rodrigues, Christian Killer, Muriel F. Franco, Sina Rafati, Burkhard Stiller
Published in: Advancing Research in Information and Communication Technology - IFIP's Exciting First 60+ Years, Views from the Technical Committees and Working Groups, 600, 2021, Page(s) 289-317, ISBN 978-3-030-81700-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-81701-5_12

Counterfighting Counterfeit: Detecting and Taking down Fraudulent Webshops at a ccTLD

Author(s): Thymen Wabeke, Giovane C. M. Moura, Nanneke Franken, Cristian Hesselman
Published in: Passive and Active Measurement - 21st International Conference, PAM 2020, Eugene, Oregon, USA, March 30–31, 2020, Proceedings, 12048, 2020, Page(s) 158-174, ISBN 978-3-030-44080-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-44081-7_10

An Assurance Framework and Process for Hybrid Systems

Author(s): Marco Anisetti, Claudio A. Ardagna, Nicola Bena, Ernesto Damiani
Published in: E-Business and Telecommunications - 17th International Conference on E-Business and Telecommunications, ICETE 2020, Online Event, July 8–10, 2020, Revised Selected Papers, 1484, 2021, Page(s) 79-101, ISBN 978-3-030-90427-2
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-90428-9_4

An Analysis of Cryptographic Algorithms in IoT

Author(s): Samed Bajrić
Published in: Smart Devices, Applications, and Protocols for the IoT, 2019, Page(s) 83-104, ISBN 9781522578116
Publisher: IGI Global
DOI: 10.4018/978-1-5225-7811-6.ch005

When Parents and Children Disagree: Diving into DNS Delegation Inconsistency

Author(s): Raffaele Sommese, Giovane C. M. Moura, Mattijs Jonker, Roland van Rijswijk-Deij, Alberto Dainotti, K. C. Claffy, Anna Sperotto
Published in: Passive and Active Measurement - 21st International Conference, PAM 2020, Eugene, Oregon, USA, March 30–31, 2020, Proceedings, 12048, 2020, Page(s) 175-189, ISBN 978-3-030-44080-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-44081-7_11

Multi-sector Assessment Framework – a New Approach to Analyse Cybersecurity Challenges and Opportunities

Author(s): Salvatore Marco Pappalardo, Marcin Niemiec, Maya Bozhilova, Nikolai Stoianov, Andrzej Dziech, Burkhard Stiller
Published in: Multimedia Communications, Services and Security - 10th International Conference, MCSS 2020, Kraków, Poland, October 8-9, 2020, Proceedings, 1284, 2020, Page(s) 1-15, ISBN 978-3-030-58999-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-59000-0_1

Architectures for Blockchain-IoT Integration

Author(s): Sina Rafati Niya,Eryk Schiller,Burkhard Stiller
Published in: Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning, 2021, ISBN 9781119675525
Publisher: IEEE/Wiley
DOI: 10.1002/9781119675525.ch13

A First Look at the Misuse and Abuse of the IPv4 Transfer Market

Author(s): Vasileios Giotsas, Ioana Livadariu, Petros Gigis
Published in: Passive and Active Measurement - 21st International Conference, PAM 2020, Eugene, Oregon, USA, March 30–31, 2020, Proceedings, 12048, 2020, Page(s) 88-103, ISBN 978-3-030-44080-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-44081-7_6

Certified Machine-Learning Models

Author(s): Ernesto Damiani, Claudio A. Ardagna
Published in: SOFSEM 2020: Theory and Practice of Computer Science - 46th International Conference on Current Trends in Theory and Practice of Informatics, SOFSEM 2020, Limassol, Cyprus, January 20–24, 2020, Proceedings, 12011, 2020, Page(s) 3-15, ISBN 978-3-030-38918-5
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-38919-2_1

Enhancing Security of Cellular IoT with Identity Federation

Author(s): Bernardo Santos, Bruno Dzogovic, Boning Feng, Van Thuan Do, Niels Jacot, Thanh Van Do
Published in: Advances in Intelligent Networking and Collaborative Systems - The 11th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2019), 1035, 2020, Page(s) 257-268, ISBN 978-3-030-29034-4
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-29035-1_25

You Shall Not Register! Detecting Privacy Leaks Across Registration Forms

Author(s): Manolis Chatzimpyrros, Konstantinos Solomos, Sotiris Ioannidis
Published in: Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers, 11981, 2020, Page(s) 91-104, ISBN 978-3-030-42050-5
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-42051-2_7

Towards the Insurance of Healthcare Systems

Author(s): George Hatzivasilis, Panos Chatziadam, Andreas Miaoudakis, Eftychia Lakka, Sotiris Ioannidis, Alessia Alessio, Michail Smyrlis, George Spanoudakis, Artsiom Yautsiukhin, Michalis Antoniou, Nikos Stathiakis
Published in: Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers, 11981, 2020, Page(s) 185-198, ISBN 978-3-030-42050-5
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-42051-2_13

Correlation Between Students’ Background and the Knowledge on Conceptual Database Modelling

Author(s): Lili Nemec Zlatolas, Aida Kamišalić, Muhamed Turkanović
Published in: New Trends in Databases and Information Systems - ADBIS 2019 Short Papers, Workshops BBIGAP, QAUCA, SemBDM, SIMPDA, M2P, MADEISD, and Doctoral Consortium, Bled, Slovenia, September 8–11, 2019, Proceedings, 1064, 2019, Page(s) 45-51, ISBN 978-3-030-30277-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-30278-8_6

Automated Orchestration of Security Chains Driven by Process Learning

Author(s): Nicolas Schnepf, Rémi Badonnel, Abdelkader Lahmadi, Stephan Merz
Published in: Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning, 2021, ISBN 9781119675525
Publisher: IEEE/Wiley

"""It is just a flu"": Assessing the Effect of Watch History on YouTube's Pseudoscientific Video Recommendations"

Author(s): Kostantinos Papadamou, Savvas Zannettou, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Michael Sirivianos
Published in: 2020
Publisher: arXiv
DOI: 10.5281/zenodo.4306569

On the Influence of Twitter Trolls during the 2016 US Presidential Election

Author(s): Nikos Salamanos, Michael J. Jensen, Xinlei He, Yang Chen, Michael Sirivianos
Published in: 2019
Publisher: arXiv
DOI: 10.5281/zenodo.3674304

Blockchain-based Anonymous P2P Trading System

Author(s): Sina Rafati Niya; Sebastian Allemann; Arik Gabay; Burkhard Stiller
Published in: 2019
Publisher: University of Zurich
DOI: 10.5281/zenodo.3677160

Performance analysis of fact-checking organizations and initiatives in Europe: A critical overview of online platforms fighting fake news

Author(s): Tanja Pavleska; Andrej Školkay; Bissera Zankova; Nelson Ribeiro; Anja Bechmann
Published in: Disinformation and Digital Media as a Challenge for Democracy, 2019
Publisher: Intersentia
DOI: 10.5281/zenodo.3677439

Angry Birds Flock Together: Aggression Propagation on Social Media

Author(s): Chrysoula Terizi; Despoina Chatzakou; Evaggelia Pitoura; Panayiotis Tsaparas; Nicolas Kourtellis
Published in: 2020
Publisher: arXiv
DOI: 10.5281/zenodo.3692844

On the Aggression Diffusion Modeling and Minimization in Online Social Networks

Author(s): Marinos Poiitis, Athena Vakali, Nicolas Kourtellis
Published in: 2020
Publisher: arXiv
DOI: 10.5281/zenodo.3925683

Did State-sponsored Trolls Shape the US Presidential Election Discourse? Quantifying Influence on Twitter

Author(s): Nikos Salamanos, Michael J. Jensen, Xinlei He, Yang Chen, Costas Iordanou, Michael Sirivianos
Published in: 2020
Publisher: arXiv
DOI: 10.5281/zenodo.3902669

Distributed Systems Security Knowledge Area

Author(s): Neeraj Suri
Published in: 6, 2019
Publisher: cybok
DOI: 10.5281/zenodo.3941853

WeTrace -- A Privacy-preserving Mobile COVID-19 Tracing Approach and Application

Author(s): De Carli, A.; Franco, M.; Gassmann, A.; Killer, C.; Rodrigues, B.; Scheid, E.; Schoenbaechler, D.; Stiller, B.
Published in: 13, 2020
Publisher: arXiv

Improving Anycast with Measurements

Author(s): Wouter de Vries
Published in: 2019
Publisher: University of Twente
DOI: 10.3990/1.9789036548977