Skip to main content

Cyber security cOmpeteNce fOr Research anD Innovation

Deliverables

1st year report on exploitation, dissemination, certification and standardization

First year report on exploitation, dissemination, certication and standardization

2nd year report on innovation, exploitation, dissemination, certification and standardization

Second year report on innovation, exploitation, dissemination, certification and standardization

2nd year report on liaison with stakeholders

Second year report on liaison with stakeholders

2nd year report on community building and sustainability

Second year report on community building and sustainability

2nd year report on cybersecurity threats

Second year report on cybersecurity threats

1st report on cybersecurity workforce diversity

First report on cybersecurity workforce diversity

1st year report on designing and developing ESRTE

1st year report on designing and developing an European Secure, Resilient and Trusted Ecosystem

1st year report on cybersecurity threats

First year report on cybersecurity threats

1st year annual report on community building

First year annual report on community building

1st year report on liaison with stakeholders

First year report on liaison with stakeholders

2nd year report on designing and developing an ESRTE

Second year report on designing and developing an European Secure, Resilient and Trusted Ecosystem

Searching for OpenAIRE data...

Publications

Measuring and visualizing cyber threat intelligence quality

Author(s): Daniel Schlette, Fabian Böhm, Marco Caselli, Günther Pernul
Published in: International Journal of Information Security, 2020, ISSN 1615-5262
DOI: 10.1007/s10207-020-00490-y

Evaluating the effects of access control policies within NoSQL systems

Author(s): Pietro Colombo, Elena Ferrari
Published in: Future Generation Computer Systems, Issue 114, 2021, Page(s) 491-505, ISSN 0167-739X
DOI: 10.1016/j.future.2020.08.026

ELSA: efficient long-term secure storage of large datasets (full version) ∗

Author(s): Philipp Muth, Matthias Geihs, Tolga Arul, Johannes Buchmann, Stefan Katzenbeisser
Published in: EURASIP Journal on Information Security, Issue 2020/1, 2020, ISSN 2510-523X
DOI: 10.1186/s13635-020-00108-9

Applying k-vertex cardinality constraints on a Neo4j graph database

Author(s): Martina Šestak, Marjan Heričko, Tatjana Welzer Družovec, Muhamed Turkanović
Published in: Future Generation Computer Systems, Issue 115, 2021, Page(s) 459-474, ISSN 0167-739X
DOI: 10.1016/j.future.2020.09.036

At Home and Abroad: The Use of Denial-ofservice Attacks during Elections in Nondemocratic Regimes

Author(s): Philipp M. Lutscher; Nils B. Weidmann; Margaret E. Roberts; Mattijs Jonker; Alistair King; Alberto Dainotti
Published in: Journal of Conflict Resolutions, Issue 11, 2019, ISSN 0022-0027
DOI: 10.1177/2F0022002719861676

Looking Beyond theHorizon: Thoughts onProactive Detection ofThreats

Author(s): Olivier van der Toorn and Anna Sperotto
Published in: Digital Threats: Research and Practice, 2020, ISSN 0001-0782

A novel approach for detecting vulnerable IoT devices connected behind a home NAT

Author(s): Yair Meidan, Vinay Sachidananda, Hongyi Peng, Racheli Sagron, Yuval Elovici, Asaf Shabtai
Published in: Computers & Security, Issue 97, 2020, Page(s) 101968, ISSN 0167-4048
DOI: 10.1016/j.cose.2020.101968

Retrofitting post-quantum cryptography in internet protocols

Author(s): Moritz Müller, Jins de Jong, Maran van Heesch, Benno Overeinder, Roland van Rijswijk-Deij
Published in: ACM SIGCOMM Computer Communication Review, Issue 50/4, 2020, Page(s) 49-57, ISSN 0146-4833
DOI: 10.1145/3431832.3431838

SAVTA: A Hybrid Vehicular Threat Model: Overview and Case Study

Author(s): Mohammad Hamad, Vassilis Prevelakis
Published in: Information, Issue 11/5, 2020, Page(s) 273, ISSN 2078-2489
DOI: 10.3390/info11050273

Attacking SRAM PUFs using very-low-temperature data remanence

Author(s): Nikolaos Athanasios Anagnostopoulos, Tolga Arul, Markus Rosenstihl, André Schaller, Sebastian Gabmeyer, Stefan Katzenbeisser
Published in: Microprocessors and Microsystems, Issue 71, 2019, Page(s) 102864, ISSN 0141-9331
DOI: 10.1016/j.micpro.2019.102864

A Responsible Internet to Increase Trust in the Digital World

Author(s): Cristian Hesselman, Paola Grosso, Ralph Holz, Fernando Kuipers, Janet Hui Xue, Mattijs Jonker, Joeri de Ruiter, Anna Sperotto, Roland van Rijswijk-Deij, Giovane C. M. Moura, Aiko Pras, Cees de Laat
Published in: Journal of Network and Systems Management, Issue 28/4, 2020, Page(s) 882-922, ISSN 1064-7570
DOI: 10.1007/s10922-020-09564-7

A nonproprietary language for the command and control of cyber defenses – OpenC2

Author(s): Vasileios Mavroeidis, Joe Brule
Published in: Computers & Security, Issue 97, 2020, Page(s) 101999, ISSN 0167-4048
DOI: 10.1016/j.cose.2020.101999

A trust assurance technique for Internet of things based on human behavior compliance

Author(s): Marco Anisetti, Claudio Agostino Ardagna, Ernesto Damiani, Alessandro Sala
Published in: Concurrency and Computation: Practice and Experience, 2019, ISSN 1532-0626
DOI: 10.1002/cpe.5355

Assessing Cybersecurity Threats and Risks in the Public Sector in Greece

Author(s): G. Drivas,  L. Maglaras, H Janicke, S Ioannidis
Published in: Journal of Information Warfare, V. 19(1), 2019, ISSN 1445-3312

Cost-effective deployment of certified cloud composite services

Author(s): Marco Anisetti, Claudio A. Ardagna, Ernesto Damiani, Filippo Gaudenzi, Gwanggil Jeon
Published in: Journal of Parallel and Distributed Computing, Issue 135, 2020, Page(s) 203-218, ISSN 0743-7315
DOI: 10.1016/j.jpdc.2019.09.003

A Model of Perception of Privacy, Trust, and Self-Disclosure on Online Social Networks

Author(s): Nemec Zlatolas, Welzer, Hölbl, Heričko, Kamišalić
Published in: Entropy, Issue 21/8, 2019, Page(s) 772, ISSN 1099-4300
DOI: 10.3390/e21080772

A Machine Learning-Based Method for Automated Blockchain Transaction Signing Including Personalized Anomaly Detection

Author(s): Blaž Podgorelec, Muhamed Turkanović, Sašo Karakatič
Published in: Sensors, Issue 20/1, 2020, Page(s) 147, ISSN 1424-8220
DOI: 10.3390/s20010147

A deep learning model for Twitter spam detection

Author(s): Zulfikar Alom, Barbara Carminati, Elena Ferrari
Published in: Online Social Networks and Media, Issue 18, 2020, Page(s) 100079, ISSN 2468-6964
DOI: 10.1016/j.osnem.2020.100079

The Seven Deadly Sins of the HTML5 WebAPI

Author(s): Michalis Diamantaris, Francesco Marcantoni, Sotiris Ioannidis, Jason Polakis
Published in: ACM Transactions on Privacy and Security, Issue 23/4, 2020, Page(s) 1-31, ISSN 2471-2566
DOI: 10.1145/3403947

ARIMA Supplemented Security Metrics for Quality Assurance and Situational Awareness

Author(s): Jan Kohlrausch, Eugene A. Brin
Published in: Digital Threats: Research and Practice, Issue 1/1, 2020, Page(s) 1-21, ISSN 2576-5337
DOI: 10.1145/3376926

State Channel as a Service Based on a Distributed and Decentralized Web

Author(s): Blaz Podgorelec, Marjan Herieko, Muhamed Turkanovic
Published in: IEEE Access, Issue 8, 2020, Page(s) 64678-64691, ISSN 2169-3536
DOI: 10.1109/access.2020.2984378

anomaly detection trusted hardware sensors for critical infrastructure legacy devices

Author(s): Apostolos P. Fournaris; Charalambos Dimopoulos; Konstantinos Lampropoulos; Odysseas Koufopavlou
Published in: Volume 20, Issue 11, 2020, ISSN 1424-8220
DOI: 10.20944/preprints202002.0241.v1

Privacy Preservation in Industrial IoT via Fast Adaptive Correlation Matrix Completion

Author(s): Aris S. Lalos; Evangelos Vlachos; Kostas Berberidis; Apostolos Fournaris; Christos Koulamas
Published in: IEEE Transactions on Industrial Informatics, Issue 7, 2020, ISSN 1551-3203
DOI: 10.1109/TII.2019.2960275100

Transparent and Service-Agnostic Monitoring ofEncrypted Web Traffic

Author(s): Pierre-Olivier Brissaud, Jérôme François, Isabelle Chrisment, Thibault Cholez and Olivier Bettan
Published in: IEEE Transactions on Network and Service Management, 2019, ISSN 1932-4537

Blockchain Signaling System (BloSS): Cooperative Signalingof Distributed Denial-of-Service Attacks

Author(s): Bruno Rodrigues, Eder Scheid, Christian Killer, Muriel Franco, Burkhard Stiller
Published in: Journal of Network and Systems Management (JNSM) 2020, 2020, ISSN 1064-7570

A novel Intrusion Detection System against spoofing attacks in connected Electric Vehicles

Author(s): Dimitrios Kosmanos, Apostolos Pappas, Leandros Maglaras, Sotiris Moschoyiannis, Francisco J. Aparicio-Navarro, Antonios Argyriou, Helge Janicke
Published in: Array, Issue 5, 2020, Page(s) 100013, ISSN 2590-0056
DOI: 10.1016/j.array.2019.100013

Generative Adversarial Networks in AI-Enabled Safety-Critical Systems: Friend or Foe?

Author(s): Apostolos P. Fournaris, Aris S. Lalos, Dimitrios Serpanos
Published in: Computer, Issue 52/9, 2019, Page(s) 78-81, ISSN 0018-9162
DOI: 10.1109/MC.2019.2924546

DDoS Hide & Seek - On the Effectiveness of a Booter Services Takedown

Author(s): Daniel Kopp, Matthias Wichtlhuber, Ingmar Poese, Jair Santanna, Oliver Hohlfeld, Christoph Dietzel
Published in: Proceedings of the Internet Measurement Conference, 2019, Page(s) 65-72
DOI: 10.1145/3355369.3355590

Cooperative Signaling of DDoS Attacks in a Blockchain-based Network

Author(s): Bruno Rodrigues, Burkhard Stiller
Published in: Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos on - SIGCOMM Posters and Demos '19, 2019, Page(s) 39-41
DOI: 10.1145/3342280.3342300

Secure SemanticInteroperability for IoTApplications with LinkedData

Author(s): G. Hatzivasilis, O. Soultatos, E. Lakka, S. Ioannidis, D. Anicic, A. Broring, L. Ciechomski, M. Falchetto, K. Fysarakis, G. Spanoudakis
Published in: IEEE Global Communications Conference (GLOBECOM 2019), 2019

RPKI is Coming of Age - A Longitudinal Study of RPKI Deployment and Invalid Route Origins

Author(s): Taejoong Chung, Emile Aben, Tim Bruijnzeels, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Roland van Rijswijk-Deij, John Rula, Nick Sullivan
Published in: Proceedings of the Internet Measurement Conference, 2019, Page(s) 406-419
DOI: 10.1145/3355369.3355596

Security Concept forUnoccupied Aerial Systems

Author(s): Cora Perner, Corinna Schmitt
Published in: Proc. of Digital Avionic Systems Conference (DASC), 2020

Red-Zone: Towards an Intrusion Response Framework for Intra-Vehicle System

Author(s): Mohammad Hamad, Marinos Tsantekidis and Vassilis Prevelakis
Published in: 5th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS), 2019

Roll, Roll, Roll your Root: AComprehensive Analysis ofthe First Ever DNSSEC RootKSK Rollover.

Author(s): Moritz Müller, Matthew Thomas, Duane Wessels, Wes Hardaker, Taejoong Chung, Willem Toorop, and Roland van Rijswijk-Deij
Published in: Internet Measurement Conference (IMC '19), 2019

OpenMTD: A Frameworkfor Efficient Network-LevelMTD Evaluation

Author(s): Richard Poschinger, Nils Rodday, Raphael Labaca Castro and Gabi Dreo Rodosek
Published in: ACM 27th Conference on Computer and Communications Security (CCS) - MTD Workshop, 2020

Dynamic NetworkReconfiguration in Safety-Critical AeronauticalSystems

Author(s): Cora Perner, Corinna Schmitt, Georg Carle
Published in: Proc. of Digital Avionic Systems Conference (DASC), 2020

Real-time Thread Isolation and Trusted Execution on Embedded RISC-V

Author(s): Samuel Lindemer, Gustav Midéus, Shahid Raza
Published in: 2020

Proverum: A Hybrid Public Verifiability and Decentralized Identity Management

Author(s): Killer, Christian; Thorbecke, Lucas; Rodrigues, Bruno; Scheid, Eder; Franco, Muriel; Stiller, Burkhard
Published in: 45th Conference on Local Computer Networks (LCN), Issue 1, 2020

Using Blockchains to Enable Big Data Analysis of Private Information

Author(s): Konstantinos Lampropoulos, Giorgos Georgakakos, Sotiris Ioannidis
Published in: 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2019, Page(s) 1-6
DOI: 10.1109/CAMAD.2019.8858468

IoT Device Identification Using Deep Learning

Author(s): Jaidip Kotak, Yuval Elovici
Published in: 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020), 2020

Secure Data Exchange forComputationally ConstrainedDevices

Author(s): Vassilis Prevelakis, Mohammad Hamad, Jihane Najar, and Ilias Spais
Published in: International workshop on Information & Operational Technology (IT & OT) security systems (IOSec 2019), 2019

A Brief Review of Database Solutions Used within Blockchain Platforms

Author(s): Blaž Podgorelec, Muhamed Turkanović, Martina Šestak
Published in: 2nd International Congress on Blockchain and Applications, 2020

Cybersecurity Evaluation of Enterprise Architectures: The e-SENS Case

Author(s): Tanja Pavleska; Helder Aranha; Massimiliano Masi; Massimiliano Masi; Giovanni Paolo Sellitto
Published in: Issue 7, 2019
DOI: 10.5281/zenodo.3677533

Blockchain-based controlledinformation sharing in interorganizationalworkflows

Author(s): Christian Rondanini, Federico Daidone, Barbara Carminati, Elena Ferrari
Published in: International Conference on Services Computing (SCC 2020), 2020

MobileTrust: Secure Knowledge Integration in VANETs

Author(s): GEORGE HATZIVASILIS; OTHONAS SOULTATOS; SOTIRIS IOANNIDIS; GEORGE SPANOUDAKIS; VASILIOS KATOS; GIORGOS DEMETRIOU
Published in: Issue 11, 2019
DOI: 10.5281/zenodo.3675111

MENTOR: The Design and Evaluation of a Protection Services Recommender System

Author(s): Franco, Muriel; Rodrigues, Bruno; Stiller, Burkhard
Published in: Issue 45, 2019
DOI: 10.5281/zenodo.3674270

AIMED: Evolving Malware with Genetic Programming to Evade Detection

Author(s): Raphael Labaca Castro, Corinna Schmitt, Gabi Dreo
Published in: 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2019, Page(s) 240-247
DOI: 10.1109/TrustCom/BigDataSE.2019.00040

Improving Detection ofMalicious Office Documentsusing One-Side Classifiers

Author(s): Silviu Constantin Vitel, Gheorghe Balan, Dumitru Bogdan Prelipcean
Published in: 21st International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC2019), 2019

BIIT: Standardization ofBlockchain-based I2oTSystems in the I4 Era

Author(s): Sina Rafati-Niya, Eryk Schiller, Ile Cepilov, Burkhard Stiller
Published in: IEEE/IFIP Network Operations and Management Symposium (NOMS 2020), 2020

DANTE: A framework for mining and monitoring darknet traffic

Author(s): Dvir Cohen; Yisroel Mirsky; Yuval Elovici; Rami Puzis; Asaf Shabtai; Manuel Kamp; Tobias Martin
Published in: Issue 1, 2020
DOI: 10.5281/zenodo.3941842

Software System Exploration using Library Call Analysis

Author(s): Marinos Tsantekidis and Vassilis Prevelakis
Published in: 2nd Workshop on Model-driven Simulation and Training Environments for Cybersecurity (MSTEC), 2020

Head(er)Hunter: FastIntrusion Detection usingPacket Metadata Signatures

Author(s): Eva Papadogiannaki, Dimitris Deyannis, Sotiris Ioannidis
Published in: IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD2020), 2020

TrustAV - Practical and Privacy Preserving Malware Analysis in the Cloud

Author(s): Dimitris Deyannis, Eva Papadogiannaki, Giorgos Kalivianakis, Giorgos Vasiliadis, Sotiris Ioannidis
Published in: Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy, 2020, Page(s) 39-48
DOI: 10.1145/3374664.3375748

Securing Mobile e-Health Environments by Design: A Holistic Architectural Approach

Author(s): Helder Aranha, Massimiliano Masi, Tanja Pavleska, Giovanni Paolo Sellitto
Published in: 2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2019, Page(s) 1-6
DOI: 10.1109/WiMOB.2019.8923479

MikroTik Devices Landscape, Realistic Honeypots, and Automated Attack Classification

Author(s): Joao M. Ceron, Christian Scholten, Aiko Pras, Jair Santanna
Published in: NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, 2020, Page(s) 1-9
DOI: 10.1109/NOMS47738.2020.9110336

Towards Adversarial Resilience in Proactive Detection of Botnet Domain Names by using MTD

Author(s): Christian Dietz, Gabi Dreo, Anna Sperotto, Aiko Pras
Published in: NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, 2020, Page(s) 1-5
DOI: 10.1109/NOMS47738.2020.9110332

Poster - Attacking Malware Classifiers by Crafting Gradient-Attacks that Preserve Functionality

Author(s): Raphael Labaca-Castro, Battista Biggio, Gabi Dreo Rodosek
Published in: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, Page(s) 2565-2567
DOI: 10.1145/3319535.3363257

Cybersecurity in the Era of Digital Transformation: The case of Greece

Author(s): Leandros Maglaras; George Drivas; Nestoras Chouliaras; Eerke Boiten; Costas Lambrinoudakis; Sotiris Ioannidis
Published in: Issue 7, 2021, Page(s) 1-5
DOI: 10.5281/zenodo.4462523

Wireless SDN for Highly Utilized MANETs

Author(s): Klement Streit, Nils Rodday, Florian Steuber, Corinna Schmitt, Gabi Dreo Rodosek
Published in: 2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2019, Page(s) 226-234
DOI: 10.1109/WiMOB.2019.8923172

Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning

Author(s): Benjamin Zi Hao Zhao, Mohamed Ali Kaafar, Nicolas Kourtellis
Published in: CCSW 2020: The ACM Cloud Computing Security Workshop, 2020

Leveraging eBPF to preserveuser privacy for DNS, DoT,and DoH queries

Author(s): Sean Rivera, Vijay Gurbani, Sofiane Lagraa, Antonio Ken Iannillo and Radu State
Published in: ARES 2020/CUING 2020, 2020

Reliable measurements withBGP and RPKI

Author(s): Mattijs Jonker, Nils Rodday
Published in: IEEE/IFIP Network Operations and Management Symposium (NOMS), 2020

When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures

Author(s): Fidel, Gil; Bitton, Ron; Shabtai, Asaf
Published in: Issue 6, 2020
DOI: 10.5281/zenodo.3941781

Reconfiguring the Functionality of IoT Edge/End nodes using FPGA based System on Chips

Author(s): Apostolos P. Fournaris, Aris Lalos, Christos Koulamas
Published in: 2019 First International Conference on Societal Automation (SA), 2019, Page(s) 1-5
DOI: 10.1109/sa47457.2019.8938038

SC-FLARE: CooperativeDDoS Signalingbased on Smart Contracts

Author(s): Bruno Rodrigues, Spasen Trendafilov, Eder Scheid, Burkhard Stiller
Published in: IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2020), 2020

How to kill symbolic deobfuscation for free (or: unleashing the potential of path-oriented protections)

Author(s): Mathilde Ollivier, Sébastien Bardin, Richard Bonichon, Jean-Yves Marion
Published in: Proceedings of the 35th Annual Computer Security Applications Conference, 2019, Page(s) 177-189
DOI: 10.1145/3359789.3359812

ProtectDDoS: A Platform forTrustworthyOffering andRecommendation ofProtections

Author(s): Muriel Franco, Erion, Sula, Bruno Rodrigues, Eder Scheid, Burkhard Stiller
Published in: International Conference on Economics of Grids, Clouds, Software and Services (GECON 2020), 2020

Requirements and Challenges for Secure and Trustworthy UAS Collaboration

Author(s): Marco Anisetti; Claudio A. Ardagna; Barbara Carminati; Elena Ferrari; Cora Lisa Perner
Published in: Issue 2, 2021, Page(s) 89-98
DOI: 10.1109/TPS-ISA50397.2020.00022

The Million DollarHandshake: Secure andAttested Communications inthe Cloud

Author(s): Nikolaos Chalkiadakis, Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis, Sotiris Ioannidis
Published in: IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (IEEE Cloud 2020), 2020

Preventing File-less Attackswith Machine LearningTechniques

Author(s): Alexandru Gabriel Bucevschi, Gheorghe Balan, Dumitru Bogdan Prelipcean
Published in: 21st International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC2019), 2019

Assessing the state and improving the art of parallel testing for C

Author(s): Oliver Schwahn, Nicolas Coppik, Stefan Winter, Neeraj Suri
Published in: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis - ISSTA 2019, 2019, Page(s) 123-133
DOI: 10.1145/3293882.3330573

Extracting Safe Thread Schedules from Incomplete Model Checking Results

Author(s): Patrick Metzler, Neeraj Suri and Georg Weissenbacher
Published in: Proc. of SPIN, 2019

Analysing and Improving Customer-Side Cloud Security Certifiability

Author(s): Shujie Zhao, Yiqun Chen, Stefan Winter and Neeraj Suri
Published in: Proc. of ISSRE/WoSOCER Workshop, 2019, 2019

Gyro: A Modular Scale-Out Layer for Single-Server DBMSs

Author(s): Habib Saissi, Marco Serafini and Neeraj Suri
Published in: Proc. of SRDS, 2019

Inferring Performance Bug Patterns from Developer Commits

Author(s): Yiqun Chen, Stefan Winter and Neeraj Suri
Published in: IEEE Proc. of ISSRE, 2019, 2019

Counterfighting Counterfeit: detecting and taking down fraudulent webshops at a ccTLD

Author(s): Thymen Wabeke; Giovane C. M. Moura; Nanneke Franken; Cristian Hesselman
Published in: 2020
DOI: 10.5281/zenodo.3678750

A NIS Directive compliant Cybersecurity Maturity Assessment Framework

Author(s): G. Drivas,  A. Chatzopoulou, L. Maglaras, C. Lambrinoudakis, Allan Cook, H. Janicke
Published in:  Computer Society Signature Conference on Computers, Software and Applications (COMPSAC 2020), 2020
DOI: 10.1109/compsac48688.2020.00-20

Cybersecurity in the public sector in Greece

Author(s): George Drivas, Leandros Maglaras, Helge Janicke, Sotiris Ioannidis
Published in: 2019

A Continuous Certification Methodology for DevOps

Author(s): Marco Anisetti, Claudio A. Ardagna, Filippo Gaudenzi, Ernesto Damiani
Published in: Proceedings of the 11th International Conference on Management of Digital EcoSystems, 2019, Page(s) 205-212
DOI: 10.1145/3297662.3365827

Trustworthy IoT: An Evidence Collection Approach Based on Smart Contracts

Author(s): Claudio Agostino Ardagna, Rasool Asal, Ernesto Damiani, Nabil El Ioini, Claus Pahl
Published in: 2019 IEEE International Conference on Services Computing (SCC), 2019, Page(s) 46-50
DOI: 10.1109/SCC.2019.00020

Secure Healthcare: 5G-enabled Network Slicing for Elderly Care

Author(s): Bruno Dzogovic, Van Thuan Do, Bernardo Santos, Niels Jacot, Boning Feng, Thanh Van Do
Published in: 2020 5th International Conference on Computer and Communication Systems (ICCCS), 2020, Page(s) 864-868
DOI: 10.1109/icccs49078.2020.9118583

Improving Cellular IoT Security with Identity Federation and Anomaly Detection

Author(s): Bernardo Santos, Bruno Dzogovic, Boning Feng, Niels Jacot, Van Thuan Do, Thanh Van Do
Published in: 2020 5th International Conference on Computer and Communication Systems (ICCCS), 2020, Page(s) 776-780
DOI: 10.1109/ICCCS49078.2020.9118438

Connecting Remote eNodeB with Containerized 5G C-RANs in OpenStack Cloud

Author(s): Bruno Dzogovic, Bernardo Santos, Van Thuan Do, Boning Feng, Niels Jacot, Thanh Van Do
Published in: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019, Page(s) 14-19
DOI: 10.1109/cscloud/edgecom.2019.00013

Bringing 5G Into User's Smart Home

Author(s): Bruno Dzogovic, Bernardo Santos, Thanh Van Do, Boning Feng, Thuan Van Do, Niels Jacot
Published in: 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), 2019, Page(s) 782-787
DOI: 10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00145

Thunderbolt-3 Backbone for Augmented 5G Network Slicing in Cloud-Radio Access Networks

Author(s): Bruno Dzogovic, Thanh van Do, Bernardo Santos, Do Van Thuan, Boning Feng, Niels Jacot
Published in: 2019 IEEE 2nd 5G World Forum (5GWF), 2019, Page(s) 415-420
DOI: 10.1109/5gwf.2019.8911710

Towards Achieving a Secure Authentication Mechanism for IoT Devices in 5G Networks

Author(s): Bernardo de Matos Patrocinio dos Santos, Bruno Dzogovic, Boning Feng, Van Thuan Do, Niels Jacot, Thanh Van Do
Published in: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019, Page(s) 130-135
DOI: 10.1109/cscloud/edgecom.2019.000-7

Demo: Blockchain for the Simplification and Automation of KYC Result Sharing

Author(s): Robert Norvill, Mathis Steichen, Wazen M. Shbair, Radu State
Published in: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2019, Page(s) 9-10
DOI: 10.1109/BLOC.2019.8751480

BlockZoom: Large-Scale Blockchain Testbed

Author(s): Wazen M. Shbair, Mathis Steichen, Jerome Francois, Radu State
Published in: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2019, Page(s) 5-6
DOI: 10.1109/BLOC.2019.8751230

Talon: An Automated Framework for Cross-Device Tracking Detection

Author(s): Solomos, Konstantinos; Ilia, Panagiotis; Ioannidis, Sotiris; Kourtellis, Nicolas
Published in: 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Issue 8, 2019
DOI: 10.5281/zenodo.3598091

Cookie Synchronization: Everything You Always Wanted to Know But Were Afraid to Ask

Author(s): Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos Markatos
Published in: The World Wide Web Conference on - WWW '19, 2019, Page(s) 1432-1442
DOI: 10.1145/3308558.3313542

No More ChasingWaterfalls: A Measurement Study of the Header Bidding Ad-Ecosystem

Author(s): Michalis Pachilakis; Panagiotis Papadopoulos; Evangelos P. Markatos; Nicolas Kourtellis
Published in: Proceedings of the Internet Measurement Conference, Issue 70, 2019
DOI: 10.5281/zenodo.3598095

Disinformation Warfare: Understanding State-Sponsored Trolls on Twitter and Their Influence on the Web

Author(s): Savvas Zannettou, Tristan Caulfield, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini, Jeremy Blackburn
Published in: Companion Proceedings of The 2019 World Wide Web Conference, 2019, Page(s) 218-226
DOI: 10.1145/3308560.3316495

Who Let The Trolls Out? - Towards Understanding State-Sponsored Trolls

Author(s): Savvas Zannettou, Tristan Caulfield, William Setzer, Michael Sirivianos, Gianluca Stringhini, Jeremy Blackburn
Published in: Proceedings of the 10th ACM Conference on Web Science - WebSci '19, 2019, Page(s) 353-362
DOI: 10.1145/3292522.3326016

Complexity Analysis of Decentralized Application Development Using Integration Tools

Author(s): PATRIK REK, BLAZ PODGORELEC, and MUHAMED TURKANOVIC
Published in: Proceedings of the Eighth Workshop on Software Quality Analysis, Monitoring, Improvement, and Applications, Issue September 22-25, 2019, 2019
DOI: 10.5281/zenodo.3674326

Cyber Insurance of Information Systems: Security and Privacy Cyber Insurance Contracts for ICT and Helathcare Organizations

Author(s): George Hatzivasilis, Panos Chatziadam, Nikos Petroulakis, Sotiris Ioannidis, Matteo Mangini, Christos Kloukinas, Artsiom Yautsiukhin, Michalis Antoniou, Dimitrios G. Katehakis, Marios Panayiotou
Published in: 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2019, Page(s) 1-6
DOI: 10.1109/camad.2019.8858165

TradeMap: A FINMA-compliant Anonymous Management of an End-2-end Trading Market Place

Author(s): Rafati Niya, Sina; Allemann, Sebastian; Gabay, Arik; Stiller, Burkhard
Published in: 2019
DOI: 10.5281/zenodo.3677142

Beyond content analysis - detecting targeted ads via distributed counting

Author(s): Costas Iordanou, Nicolas Kourtellis, Juan Miguel Carrascosa, Claudio Soriente, Ruben Cuevas, Nikolaos Laoutaris
Published in: Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, 2019, Page(s) 110-122
DOI: 10.1145/3359989.3365428

Cluster-Based Anonymization of Directed Graphs

Author(s): Anh-Tu Hoang, Barbara Carminati, Elena Ferrari
Published in: 2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC), 2019, Page(s) 91-100
DOI: 10.1109/cic48465.2019.00020

Stop tracking me Bro! Differential Tracking of User Demographics on Hyper-Partisan Websites

Author(s): Pushkal Agarwal, Sagar Joglekar, Panagiotis Papadopoulos, Nishanth Sastry, Nicolas Kourtellis
Published in: Proceedings of The Web Conference 2020, 2020, Page(s) 1479-1490
DOI: 10.1145/3366423.3380221

Clash of the Trackers: Measuring the Evolution of the Online Tracking Ecosystem

Author(s): Konstantinos Solomos; Panagiotis Ilia; Sotiris Ioannidis; Nicolas Kourtellis
Published in: ACM Network Traffic Measurement and Analysis Conference, 2020
DOI: 10.5281/zenodo.3925659

A Proposal for Security Assessment of Trustzone-M Based Software

Author(s): Antonio Ken Iannillo, Radu State
Published in: 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2019, Page(s) 126-127
DOI: 10.1109/ISSREW.2019.00110

Auto-Encoding Robot State Against Sensor Spoofing Attacks

Author(s): Sean Rivera, Sofiane Lagraa, Antonio Ken Iannillo, Radu State
Published in: 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2019, Page(s) 252-257
DOI: 10.1109/ISSREW.2019.00080

Mobile App to SGX Enclave Secure Channel

Author(s): Fernando Kaway Carvalho Ota, Jorge Augusto Meira, Cyril Renaud Cassagnes, Radu State
Published in: 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2019, Page(s) 258-263
DOI: 10.1109/issrew.2019.00081

Helping Users Managing Context-Based Privacy Preferences

Author(s): Md. Zulfikar Alom, Barbara Carminati, Elena Ferrari
Published in: 2019 IEEE International Conference on Services Computing (SCC), 2019, Page(s) 100-107
DOI: 10.1109/scc.2019.00027

Adapting Users' Privacy Preferences in Smart Environments

Author(s): Md. Zulfikar Alom, Barbara Carminati, Elena Ferrari
Published in: 2019 IEEE International Congress on Internet of Things (ICIOT), 2019, Page(s) 165-172
DOI: 10.1109/iciot.2019.00036

Confidential Discovery of IoT Devices through Blockchain

Author(s): Christian Rondanini, Barbara Carminati, Elena Ferrari
Published in: 2019 IEEE International Congress on Internet of Things (ICIOT), 2019, Page(s) 1-8
DOI: 10.1109/iciot.2019.00014

Analysis of Fault Tolerance in Permissioned Blockchain Networks

Author(s): Blaz Podgorelec, Vid Kersic, Muhamed Turkanovic
Published in: 2019 XXVII International Conference on Information, Communication and Automation Technologies (ICAT), 2019, Page(s) 1-6
DOI: 10.1109/ICAT47117.2019.8938836

A Resource Efficient Implementation of the RESTCONF Protocol for OpenWrt Systems

Author(s): Malte Granderath, Jurgen Schonwalder
Published in: NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, 2020, Page(s) 1-6
DOI: 10.1109/noms47738.2020.9110458

An Example of a Cybersecurity Education Model

Author(s): Muhamed Turkanovic, Tatjana Welzer, Marko Holbl
Published in: 2019 29th Annual Conference of the European Association for Education in Electrical and Information Engineering (EAEEIE), 2019, Page(s) 1-4
DOI: 10.1109/eaeeie46886.2019.9000440

Cultural Diversity in Database Teaching

Author(s): Tatjana Welzer, Marjan Druzovec, Marko Kompara, Marko Holbl
Published in: 2019 29th Annual Conference of the European Association for Education in Electrical and Information Engineering (EAEEIE), 2019, Page(s) 1-4
DOI: 10.1109/EAEEIE46886.2019.9000471

Using TLS Fingerprints for OS Identification in Encrypted Traffic

Author(s): Martin Lastovicka, Stanislav Spacek, Petr Velan, Pavel Celeda
Published in: NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, 2020, Page(s) 1-6
DOI: 10.1109/noms47738.2020.9110319

Revisiting Rowhammerattacks in Embedded

Author(s): Lidia Pocero Fraile, Apostolos P. Fournaris and Odysseas Koufopavlou
Published in: 14th IEEE International Conference on Design & Technology of Integrated Systems in Nanoscale Era, 2019

SecBot: a Business-Driven Conversational Agent for Cybersecurity Planning and Management

Author(s): Muriel Franco, Bruno Rodrigues, Eder Scheid, Arthur Jacobs, Christian Killer, Lisandro Granville, Burkhard Stiller
Published in: 2020

Decentralized, Secure and Cognitive Architecture for Automotive CyberPhysical System of Systems

Author(s): Apostolos P. Fournaris, Aris Lalos, Petros Kapsalas, Christos Koulamas
Published in: 2020 9th Mediterranean Conference on Embedded Computing (MECO), 2020, Page(s) 1-5
DOI: 10.1109/MECO49872.2020.9134336

Efficient Monitoring ofLibrary Call Invocation

Author(s): Marinos Tsantekidis und Vassilis Prevelakis
Published in: The 2nd IEEE International Symposium on Future Cyber Security Technologies (FCST), 2019

TraceSanitizer – Eliminating the Effects of Non-determinism on Error Propagation Analysis

Author(s): Habib Saissi; Stefan Winter; Oliver Schwahn; Karthik Pattabiraman; Neeraj Suri
Published in: Issue 3, 2020
DOI: 10.5281/zenodo.3795366

Scalable Transport Mechanisms for Blockchain IoT Applications

Author(s): Schiller, Eryk Jerzy; Rafati Niya, Sina; Surbeck, Timo; Stiller, Burkhard
Published in: Schiller, Eryk Jerzy; Rafati Niya, Sina; Surbeck, Timo; Stiller, Burkhard (2019). Scalable Transport Mechanisms for Blockchain IoT Applications. In: 44th IEEE Conference on Local Computer Networks (LCN 2019), Osnabrück, Germany, 14 October 2019 - 17 October 2019., Issue 11, 2019
DOI: 10.5167/uzh-174017

Design and implementation of cast-as-intended verifiability for a blockchain-based voting system

Author(s): Christian Killer, Bruno Rodrigues, Raphael Matile, Eder Scheid, Burkhard Stiller
Published in: Proceedings of the 35th Annual ACM Symposium on Applied Computing, 2020, Page(s) 286-293
DOI: 10.1145/3341105.3373884

Security Management and Visualization in a Blockchain-based Collaborative Defense

Author(s): Christian Killer, Bruno Rodrigues, Burkhard Stiller
Published in: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2019, Page(s) 108-111
DOI: 10.1109/bloc.2019.8751272

Stay Thrifty, Stay Secure: AVPN-Based AssuranceFramework for HybridSystems

Author(s): Marco Anisetti, Claudio A. Ardagna, Nicola Bena, Ernesto Damiani
Published in: 17th International Conference on Security and Cryptography (SECRYPT 2020), 2020

Be Your Neighbor’s Miner:Building Trust in LedgerContent via ReciprocallyUseful Work

Author(s): Lara Mauri, Ernesto Damiani and Stelvio Cimato
Published in: 2020 IEEE International Conference on Cloud Computing (CLOUD 2020), 2020

AR-PUFs: Advanced Security Primitives for the Internet of Things and Cyber-Physical Systems

Author(s): Nikolaos Athanasios Anagnostopoulos, Tolga Arul, Yufan Fan, Manish Kumar, Stefan Katzenbeisser
Published in: 2019 IEEE International Conference on Consumer Electronics (ICCE), 2019, Page(s) 1-5
DOI: 10.1109/ICCE.2019.8661840

End-to-End Semantic Interoperability Mechanisms for IoT

Author(s): Eftychia Lakka, Nikolaos E. Petroulakis, George Hatzivasilis, Othonas Soultatos, Manolis Michalodimitrakis, Urszula Rak, Karolina Waledzik, Darko Anicic, Vivek Kulkarni
Published in: 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2019, Page(s) 1-6
DOI: 10.1109/CAMAD.2019.8858501

Creating Trusted SecuritySensors for AnomalyDetection Systems usingHardware components

Author(s): Apostolos Fournaris, Charis Dimopoulos, and Odysseas Koufopavlou
Published in: TRUDEVICE 2020: Workshop on Trustworthy Manufacturing and Utilization of Secure Devices, Design, Automation and Test in Europe Conference (DATE 2020), 2020

An enclave assisted snapshot-based kernel integrity monitor

Author(s): Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis, Sotiris Ioannidis
Published in: Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and Networking, 2020, Page(s) 19-24
DOI: 10.1145/3378679.3394539

No More Chasing Waterfalls:A Measurement Study of theHeader Bidding Ad-Ecosystem

Author(s): Michalis Pachilakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis
Published in: 19th ACM on Internet Measurement Conference, 2019

Distributed DDoS Defense:A collaborative Approach at Internet Scale

Author(s): Jessica Steinberger, Anna Sperotto, Harald Baier, Aiko Pras
Published in: NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, 2020, Page(s) 1-6
DOI: 10.1109/NOMS47738.2020.9110300

Decentralized RuntimeMonitoring ApproachRelying on the EthereumBlockchain Infrastructure

Author(s): Ahmed Taha, Ahmed Zakaria, Dongseong Kim, Neeraj Suri
Published in: Proc. of Intl. Conference on Cloud Engineering, 2020, 2020

BGP Anycast Tuner: Intuitive Route Management for Anycast Services

Author(s): Leandro M. Bertholdo, Joao M. Ceron, Lisandro Z. Granville, Giovane C. M. Moura, Cristian Hesselman, Roland van Rijswijk-Deij
Published in: 2020 16th International Conference on Network and Service Management (CNSM), 2020, Page(s) 1-7
DOI: 10.23919/CNSM50824.2020.9269102

A Practical Analysis on Mirai Botnet Traffic

Author(s): Getoar Gallopeni; Bruno Rodrigues; Muriel Franco; Burkhard Stiller
Published in: Issue 11, 2020
DOI: 10.5281/zenodo.3966899

Evaluating TCP Connection Healthiness

Author(s): Nils Rodday, Raphael Labaca Castro, Klement Streit, Gabi Dreo Rodosek
Published in: 2019 29th International Telecommunication Networks and Applications Conference (ITNAC), 2019, Page(s) 1-4
DOI: 10.1109/ITNAC46935.2019.9078021

Mammoth: Monitoring the ABAC Monitor of MQTT-based Internet of Things ecosystems

Author(s): Pietro Colombo, Elena Ferrari, Samuele Salvia
Published in: The 25th ACM Symposium on Access Control Models and Technologies (SACMAT 2020), 2020

Blockchains in the Age ofSoftwarization - Hands-onExperiences withProgramming SmartContracts and Their SecurityPitfalls

Author(s): Bruno Rodrigues, Eder Scheid, Burkhard Stiller
Published in: IEEE/IFIP Network Operations and Management Symposium (NOMS), 2020

Enabling Security-by-Design in Smart Grids: An Architecture-Based Approach

Author(s): Helder Aranha, Massimiliano Masi, Tanja Pavleska, Giovanni Paolo Sellitto
Published in: 2019 15th European Dependable Computing Conference (EDCC), 2019, Page(s) 177-179
DOI: 10.1109/edcc.2019.00042

Machine Learning for Security at the IoT Edge - A Feasibility Study

Author(s): Han Wang; Luis Barriga; Arash Vahidi; Shahid Raza
Published in: Issue 2, 2019
DOI: 10.5281/zenodo.3677348

DDoS Mitigation: AMeasurement-BasedApproach

Author(s): Mattijs Jonker, Anna Sperotto, Aiko Pras
Published in: 2020 IEEE/IFIP Network Operations and Management Symposium, 2020

Cluster-BasedAnonymization ofKnowledge Graphs

Author(s): Anh-Tu Hoang, Barbara Carminati and Elena Ferrar
Published in: 18th International Conference on Applied Cryptography and Network Security, 2020

Adaptation of Proof-of-Stake-based Blockchains for IoT Data Streams

Author(s): Sina Rafati Niya, Eryk Schiller, Ile Cepilov, Fabio Maddaloni, Kursat Aydinli, Timo Surbeck, Thomas Bocek, Burkhard Stiller
Published in: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2019, Page(s) 15-16
DOI: 10.1109/BLOC.2019.8751260

Robust and Efficient Privacy Preservation in Industrial IoT via correlation completion and tracking

Author(s): Aris S. Lalos, Evangelos Vlachos, Kostas Berberidis, Apostolos Fournaris, Christos Koulamas
Published in: 2019 IEEE 17th International Conference on Industrial Informatics (INDIN), 2019, Page(s) 1225-1228
DOI: 10.1109/INDIN41052.2019.8972154

Extracting Safe Thread Schedules from Incomplete Model Checking Results

Author(s): Patrick Metzler, Neeraj Suri, Georg Weissenbacher
Published in: Model Checking Software - 26th International Symposium, SPIN 2019, Beijing, China, July 15–16, 2019, Proceedings, Issue 11636, 2019, Page(s) 153-171
DOI: 10.1007/978-3-030-30923-7_9

An Analysis of Cryptographic Algorithms in IoT

Author(s): Samed Bajrić
Published in: Smart Devices, Applications, and Protocols for the IoT, 2019, Page(s) 83-104
DOI: 10.4018/978-1-5225-7811-6.ch005

When Parents and Children Disagree: Diving into DNS Delegation Inconsistency

Author(s): Raffaele Sommese, Giovane C. M. Moura, Mattijs Jonker, Roland van Rijswijk-Deij, Alberto Dainotti, K. C. Claffy, Anna Sperotto
Published in: Passive and Active Measurement - 21st International Conference, PAM 2020, Eugene, Oregon, USA, March 30–31, 2020, Proceedings, Issue 12048, 2020, Page(s) 175-189
DOI: 10.1007/978-3-030-44081-7_11

Certified Machine-Learning Models

Author(s): Ernesto Damiani, Claudio A. Ardagna
Published in: SOFSEM 2020: Theory and Practice of Computer Science - 46th International Conference on Current Trends in Theory and Practice of Informatics, SOFSEM 2020, Limassol, Cyprus, January 20–24, 2020, Proceedings, Issue 12011, 2020, Page(s) 3-15
DOI: 10.1007/978-3-030-38919-2_1

Enhancing Security of Cellular IoT with Identity Federation

Author(s): Bernardo Santos, Bruno Dzogovic, Boning Feng, Van Thuan Do, Niels Jacot, Thanh Van Do
Published in: Advances in Intelligent Networking and Collaborative Systems - The 11th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2019), Issue 1035, 2020, Page(s) 257-268
DOI: 10.1007/978-3-030-29035-1_25

You Shall Not Register! Detecting Privacy Leaks Across Registration Forms

Author(s): Manolis Chatzimpyrros, Konstantinos Solomos, Sotiris Ioannidis
Published in: Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers, Issue 11981, 2020, Page(s) 91-104
DOI: 10.1007/978-3-030-42051-2_7

Towards the Insurance of Healthcare Systems

Author(s): George Hatzivasilis, Panos Chatziadam, Andreas Miaoudakis, Eftychia Lakka, Sotiris Ioannidis, Alessia Alessio, Michail Smyrlis, George Spanoudakis, Artsiom Yautsiukhin, Michalis Antoniou, Nikos Stathiakis
Published in: Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers, Issue 11981, 2020, Page(s) 185-198
DOI: 10.1007/978-3-030-42051-2_13

Correlation Between Students’ Background and the Knowledge on Conceptual Database Modelling

Author(s): Lili Nemec Zlatolas, Aida Kamišalić, Muhamed Turkanović
Published in: New Trends in Databases and Information Systems - ADBIS 2019 Short Papers, Workshops BBIGAP, QAUCA, SemBDM, SIMPDA, M2P, MADEISD, and Doctoral Consortium, Bled, Slovenia, September 8–11, 2019, Proceedings, Issue 1064, 2019, Page(s) 45-51
DOI: 10.1007/978-3-030-30278-8_6

Automated Retrieval of ATT&CK Tactics and Techniques for Cyber Threat Reports

Author(s): Valentine Legoy; Marco Caselli; Christin Seifert; Andreas Peter
Published in: CoRR, Issue 3, 2020, ISSN 2331-8422
DOI: 10.5281/zenodo.3925788

Improving Anycast with Measurements

Author(s): Wouter de Vries
Published in: 2019
DOI: 10.3990/1.9789036548977

On the Influence of Twitter Trolls during the 2016 US Presidential Election

Author(s): Nikos Salamanos, Michael J. Jensen, Xinlei He, Yang Chen, Michael Sirivianos
Published in: 2019
DOI: 10.5281/zenodo.3674304

Blockchain-based Anonymous P2P Trading System

Author(s): Sina Rafati Niya; Sebastian Allemann; Arik Gabay; Burkhard Stiller
Published in: 2019
DOI: 10.5281/zenodo.3677160

Performance analysis of fact-checking organizations and initiatives in Europe: A critical overview of online platforms fighting fake news

Author(s): Tanja Pavleska; Andrej Školkay; Bissera Zankova; Nelson Ribeiro; Anja Bechmann
Published in: Disinformation and Digital Media as a Challenge for Democracy, 2019
DOI: 10.5281/zenodo.3677439

Angry Birds Flock Together: Aggression Propagation on Social Media

Author(s): Chrysoula Terizi; Despoina Chatzakou; Evaggelia Pitoura; Panayiotis Tsaparas; Nicolas Kourtellis
Published in: 2020
DOI: 10.5281/zenodo.3692844

Understanding the Incel Community on YouTube

Author(s): Kostantinos Papadamou, Savvas Zannettou, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Michael Sirivianos
Published in: 2020
DOI: 10.5281/zenodo.3898038

On the Aggression Diffusion Modeling and Minimization in Online Social Networks

Author(s): Marinos Poiitis, Athena Vakali, Nicolas Kourtellis
Published in: 2020
DOI: 10.5281/zenodo.3925683

Did State-sponsored Trolls Shape the US Presidential Election Discourse? Quantifying Influence on Twitter

Author(s): Nikos Salamanos, Michael J. Jensen, Xinlei He, Yang Chen, Costas Iordanou, Michael Sirivianos
Published in: 2020
DOI: 10.5281/zenodo.3902669

Distributed Systems Security Knowledge Area

Author(s): Neeraj Suri
Published in: Issue 6, 2019
DOI: 10.5281/zenodo.3941853

WeTrace -- A Privacy-preserving Mobile COVID-19 Tracing Approach and Application

Author(s): De Carli, A.; Franco, M.; Gassmann, A.; Killer, C.; Rodrigues, B.; Scheid, E.; Schoenbaechler, D.; Stiller, B.
Published in: Issue 13, 2020