Last update:
Wed Feb 19 07:30:21 MST 2025
Dieter Gollman and Catherine A. Meadows and Eiji Okamoto Editorial . . . . . . . . . . . . . . . 1--2 Carl E. Landwehr Computer security . . . . . . . . . . . 3--13 John McHugh Intrusion and intrusion detection . . . 14--35 Don Johnson and Alfred Menezes and Scott Vanstone The Elliptic Curve Digital Signature Algorithm (ECDSA) . . . . . . . . . . . 36--63 Carlo Blundo and Paolo D'Arco and Alfredo De Santis A $t$-private $k$-database information retrieval scheme . . . . . . . . . . . . 64--68
Fabian Monrose and Michael K. Reiter and Susanne Wetzel Password hardening based on keystroke dynamics . . . . . . . . . . . . . . . . 69--83 Ohad Rodeh and Kenneth P. Birman and Danny Dolev Using AVL trees for fault-tolerant group key management . . . . . . . . . . . . . 84--99 E. Damiani and S. De Capitani di Vimercati and S. Paraboschi and P. Samarati Securing SOAP e-services . . . . . . . . 100--115 Michiharu Kudo PBAC: Provision-based access control model . . . . . . . . . . . . . . . . . 116--130 Takaaki Mizuki and Hiroki Shizuya and Takao Nishizeki A complete characterization of a family of key exchange protocols . . . . . . . 131--142
Rainer Steinwandt and Willi Geiselmann and Regine Endsuleit Attacking a polynomial-based cryptosystem: Polly Cracker . . . . . . 143--148 Yukio Itakura and Masaki Hashiyada and Toshio Nagashima and Shigeo Tsujii Proposal on personal identifiers generated from the STR information of DNA . . . . . . . . . . . . . . . . . . 149--160 J. M. Gonzáles Nieto and K. Viswanathan and C. Boyd and A. Clark and E. Dawson Key recovery for the commercial environment . . . . . . . . . . . . . . 161--174 S. Kim and H. Oh A new electronic check system with reusable refunds . . . . . . . . . . . . 175--188 Ed Dawson and Kapali Viswanathan and Colin Boyd Compliant cryptologic protocols . . . . 189--202
Valery Korzhik and Guillermo Morales-Luna Hybrid authentication based on noisy channels . . . . . . . . . . . . . . . . 203--210 Chun Ruan and Vijay Varadharajan A formal graph based framework for supporting authorization delegations and conflict resolutions . . . . . . . . . . 211--222 Steve Kremer and Olivier Markowitch Fair multi-party non-repudiation protocols . . . . . . . . . . . . . . . 223--235 Barbara Carminati and Elena Ferrari Management of access control policies for XML document sources . . . . . . . . 236--260
Philip MacKenzie and Michael K. Reiter Networked cryptographic devices resilient to capture . . . . . . . . . . 1--20 Sigrid Gürgens and Javier Lopez and René Peralta Analysis of e-commerce protocols: Adapting a traditional technique . . . . 21--36 Joonsang Baek and Yuliang Zheng Zheng and Seberry's public key encryption scheme revisited . . . . . . 37--44 Elisa Bertino and Elena Ferrari and Andrea Perego Content-based filtering of Web documents: the MaX system and the EUFORBIA project . . . . . . . . . . . . 45--58 Willi Geiselmann and Willi Meier and Rainer Steinwandt An attack on the isomorphisms of polynomials problem with one secret . . 59--64
E. Dawson Preface to the special issue on PKI . . 65--65 B. Blakley and G. R. Blakley All sail, no anchor II: Acceptable high-end PKI . . . . . . . . . . . . . . 66--77 Selwyn Russell Theory and benefits of recursive certificate structures . . . . . . . . . 78--90 Javier Lopez and Antonio Maña and Jose A. Montenegro and Juan J. Ortega PKI design based on the use of on-line certification authorities . . . . . . . 91--102 C. S. Laih and K. Y. Chen Generating visible RSA public keys for PKI . . . . . . . . . . . . . . . . . . 103--109 Jose L. Muñoz and Jordi Forne and Oscar Esparza and Miguel Soriano Certificate revocation system implementation based on the Merkle hash tree . . . . . . . . . . . . . . . . . . 110--124
Corrado Priami Preface to the special issue on Security in Global Computing . . . . . . . . . . 125--125 David Teller and Pascal Zimmer and Daniel Hirschkoff Using ambients to control resources . . 126--144 Mikael Buchholtz and Hanne Riis Nielson and Flemming Nielson A calculus for control flow analysis of security protocols . . . . . . . . . . . 145--167 Roberto Gorrieri and Ruggero Lanotte and Andrea Maggiolo-Schettini and Fabio Martinelli and Simone Tini and Enrico Tronci Automated analysis of timed security: a case study on web privacy . . . . . . . 168--186 Massimo Bartoletti and Pierpaolo Degano and Gian Luigi Ferrari Stack inspection and secure program transformations . . . . . . . . . . . . 187--217 Philip MacKenzie and Michael K. Reiter Two-party generation of DSA signatures 218--239
Michael Waidner Preface . . . . . . . . . . . . . . . . 1--1 Philippa Hopcroft and Gavin Lowe Analysing a stream authentication protocol using model checking . . . . . 2--13 Joachim Biskup and Piero Bonatti Controlled query evaluation for enforcing confidentiality in complete information systems . . . . . . . . . . 14--27 Sean W. Smith Outbound authentication for programmable secure coprocessors . . . . . . . . . . 28--41 Michael Backes and Birgit Pfitzmann Computational probabilistic noninterference . . . . . . . . . . . . 42--60
Vanesa Daza and Javier Herranz and Germán Sáez Protocols useful on the Internet from distributed signature schemes . . . . . 61--69 Mark Burgess and Geoffrey Canright and Kenth Engò-Monsen A graph-theoretical model of computer security . . . . . . . . . . . . . . . . 70--85 Yvonne Hitchcock and Paul Montague and Gary Carter and Ed Dawson The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves . . . . . . . . . . . . 86--98 Antonio Maña and Javier Lopez and Juan J. Ortega and Ernesto Pimentel and Jose M. Troya A framework for secure execution of software . . . . . . . . . . . . . . . . 99--112 Habtamu Abie and Pål Spilling and Bent Foyn A distributed digital rights management model for secure information-distribution systems . . . . 113--128
Serge Autexier and Iliano Cervesato and Heiko Mantel Preface to the special issue of selected papers from FCS/VERIFY 2002 . . . . . . 1--1 Jay Ligatti and Lujo Bauer and David Walker Edit automata: enforcement mechanisms for run-time security policies . . . . . 2--16 Giampaolo Bella and Fabio Massacci and Lawrence C. Paulson An overview of the verification of SET 17--28 Joshua D. Guttman and Amy L. Herzog Rigorous automated network security management . . . . . . . . . . . . . . . 29--48 Ralf Küsters On the decidability of cryptographic protocols with open-ended data structures . . . . . . . . . . . . . . . 49--70 Kong-wei Lye and Jeannette M. Wing Game strategies in network security . . 71--86 Christian Skalka and Scott Smith Static use-based object confinement . . 87--104 Kyung-suk Lhee and Steve J. Chapin Detection of file-based race conditions 105--119 Yun Bai and Yan Zhang and Vijay Varadharajan On the sequence of authorization policy transformations . . . . . . . . . . . . 120--131
Einar Snekkenes Preface to the special issue on ESORICS 2003 . . . . . . . . . . . . . . . . . . 133--134 Michael Backes and Birgit Pfitzmann and Michael Waidner Symmetric authentication in a simulatable Dolev--Yao-style cryptographic library . . . . . . . . . 135--154 David von Oheimb and Volkmar Lotz and Georg Walter Analyzing SLE 88 memory management security using Interacting State Machines . . . . . . . . . . . . . . . . 155--171 Andrei Serjantov and Peter Sewell Passive-attack analysis for connection-based anonymity systems . . . 172--180 David Basin and Sebastian Mödersheim and Luca Vigan\`o OFMC: a symbolic model checker for security protocols . . . . . . . . . . . 181--208 Jonathan Trostle and Bill Gossman Techniques for improving the security and manageability of IPsec policy . . . 209--226
Colin Boyd and Wenbo Mao Preface to the special issue on ISC 2003 227--227 David Galindo and Sebasti\`a Martín and Paz Morillo and Jorge L. Villar Fujisaki--Okamoto hybrid encryption revisited . . . . . . . . . . . . . . . 228--241 Michael Backes and Birgit Pfitzmann and Michael Waidner Reactively secure signature schemes . . 242--252 Sigrid Gürgens and Carsten Rudolph and Holger Vogt On the security of fair non-repudiation protocols . . . . . . . . . . . . . . . 253--262 Adrian Baldwin and Simon Shiu Enabling shared audit data . . . . . . . 263--276 Mikhail J. Atallah and Jiangtao Li Secure outsourcing of sequence comparisons . . . . . . . . . . . . . . 277--287 Yukio Itakura and Shigeo Tsujii Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures . . . . . . . . . . . . . . . 288--296
Stefanos Gritzalis Public Key Infrastructure: Research and Applications . . . . . . . . . . . . . . 1--2 Gabriel Vanrenen and Sean Smith and John Marchesini Distributing security-mediated PKI . . . 3--17 Antonio Lioy and Marius Marian and Natalia Moltchanova and Massimiliano Pala PKI past, present and future . . . . . . 18--29 Jens-Matthias Bohli and Stefan Röhrich and Rainer Steinwandt Key substitution attacks revisited: Taking into account malicious signers 30--36 Jianying Zhou and Feng Bao and Robert Deng Minimizing TTP's involvement in signature validation . . . . . . . . . . 37--47 Ninghui Li and John C. Mitchell Understanding SPKI/SDSI using first-order logic . . . . . . . . . . . 48--64
Jianying Zhou and Javier Lopez Preface . . . . . . . . . . . . . . . . 65--66 Adam L. Young Cryptoviral extortion using Microsoft's Crypto API . . . . . . . . . . . . . . . 67--76 Stelios Sidiroglou and Angelos D. Keromytis Execution transactions for defending against software failures: use and evaluation . . . . . . . . . . . . . . . 77--91 Deholo Nali and Carlisle Adams and Ali Miri Hierarchical time-based information release . . . . . . . . . . . . . . . . 92--104 Dibyendu Chakrabarti and Subhamoy Maitra and Bimal Roy A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design . . . . . . . . 105--114 Gary S.-W. Yeo and Raphael C.-W. Phan On the security of the WinRAR encryption feature . . . . . . . . . . . . . . . . 115--123
Alain Mayer and Avishai Wool and Elisha Ziskind Offline firewall analysis . . . . . . . 125--144 Vino Fernando Crescini and Yan Zhang PolicyUpdater: a system for dynamic access control . . . . . . . . . . . . . 145--165 Yukiyasu Tsunoo and Etsuko Tsujihara and Maki Shigeri and Hiroyasu Kubo and Kazuhiko Minematsu Improving cache attacks by considering cipher structure . . . . . . . . . . . . 166--176 Katsuyuki Okeya and Tsuyoshi Takagi Security analysis of CRT-based cryptosystems . . . . . . . . . . . . . 177--185 Paul C. van Oorschot and Jean-Marc Robert and Miguel Vargas Martin A monitoring system for detecting repeated packets with applications to computer worms . . . . . . . . . . . . . 186--199
Felix Brandt How to obtain full privacy in auctions 201--216 S. S. Al-Riyami and J. Malone-Lee and N. P. Smart Escrow-free encryption supporting cryptographic workflow . . . . . . . . . 217--229 Jintai Ding and Dieter Schmidt and Zhijun Yin Cryptanalysis of the new TTS scheme in CHES 2004 . . . . . . . . . . . . . . . 231--240 Lan Nguyen and Rei Safavi-Naini and Kaoru Kurosawa Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security . . 241--255 Paolo Giorgini and Fabio Massacci and John Mylopoulos and Nicola Zannone Requirements engineering for trust management: model, methodology, and reasoning . . . . . . . . . . . . . . . 257--274
N. L. Clarke and S. M. Furnell Authenticating mobile phone users using keystroke analysis . . . . . . . . . . . 1--14 Carlo Blundo and Clemente Galdi and Giuseppe Persiano Low-randomness constant-round private XOR computations . . . . . . . . . . . . 15--26 Shujing Wang and Yan Zhang Handling distributed authorization with delegation through answer set programming . . . . . . . . . . . . . . 27--46 Elisavet Konstantinou and Yannis C. Stamatiou and Christos Zaroliagis Efficient generation of secure elliptic curves . . . . . . . . . . . . . . . . . 47--63
Theo Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve Schneider Guest Editors' Preface . . . . . . . . . 65--66 Lantian Zheng and Andrew C. Myers Dynamic security labels and static information flow control . . . . . . . . 67--84 Nicoletta De Francesco and Luca Martini Instruction-level security typing by abstract interpretation . . . . . . . . 85--106 Boris Köpf and Heiko Mantel Transformational typing and unification for automatically correcting insecure programs . . . . . . . . . . . . . . . . 107--131 J. G. Cederquist and R. Corin and M. A. C. Dekker and S. Etalle and J. I. den Hartog and G. Lenzini Audit-based compliance control . . . . . 133--151 Karl Krukow and Mogens Nielsen Trust structures . . . . . . . . . . . . 153--181 Rob Delicata and Steve Schneider An algebraic approach to the verification of a class of Diffie--Hellman protocols . . . . . . . 183--196
S. Gritzalis and A. N. Yannacopoulos and C. Lambrinoudakis and P. Hatzopoulos and S. K. Katsikas A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments . . . . . . . . 197--211 L. Chen and Z. Cheng and N. P. Smart Identity-based key agreement protocols from pairings . . . . . . . . . . . . . 213--241 Jens-Matthias Bohli and María Isabel González Vasco and Rainer Steinwandt Secure group key establishment revisited 243--254 Elisa Bertino and Elena Ferrari and Federica Paci and Loredana Parasiliti Provenza A system for securing push-based distribution of XML documents . . . . . 255--284
Scott Knight and Scott Buffett and Patrick C. K. Hung The \booktitleInternational Journal of Information Security Special Issue on privacy, security and trust technologies and E-business services . . . . . . . . 285--286 Zhengping Wu and Alfred C. Weaver Requirements of federated trust management for service-oriented architectures . . . . . . . . . . . . . 287--296 Jinshan Liu and Valérie Issarny An incentive compatible reputation mechanism for ubiquitous computing environments . . . . . . . . . . . . . . 297--311 Avner Levin Is workplace surveillance legal in Canada? . . . . . . . . . . . . . . . . 313--321 Thomas W. Lauer and Xiaodong Deng Building online trust through privacy practices . . . . . . . . . . . . . . . 323--331 Jie Zhang and Ali A. Ghorbani and Robin Cohen A familiarity-based trust model for effective selection of sellers in multiagent e-commerce systems . . . . . 333--344 Mohammad Zulkernine and Mathews Graves and Muhammad Umair Ahmed Khan Integrating software specifications into intrusion detection . . . . . . . . . . 345--357
Michael Backes and Stefanos Gritzalis and Bart Preneel Preface . . . . . . . . . . . . . . . . 359--360 Kostas G. Anagnostakis and Michael B. Greenwald and Sotiris Ioannidis and Angelos D. Keromytis COVERAGE: detecting and reacting to worm epidemics using cooperation and validation . . . . . . . . . . . . . . . 361--378 Luciano Bononi and Carlo Tacconi Intrusion detection for secure clustering and routing in Mobile Multi-hop Wireless Networks . . . . . . 379--392 George Danezis Breaking four mix-related schemes based on Universal Re-encryption . . . . . . . 393--402 Fernando Esponda and Elena S. Ackley and Paul Helman and Haixia Jia and Stephanie Forrest Protecting data privacy through hard-to-reverse negative databases . . . 403--415 Patrick Klinkoff and Engin Kirda and Christopher Kruegel and Giovanni Vigna Extending .NET security to unmanaged code . . . . . . . . . . . . . . . . . . 417--428
Pierpaolo Degano and Luca Vigan\`o Preface . . . . . . . . . . . . . . . . 1--1 Alessandro Armando and Luca Compagna SAT-based model-checking for security protocols analysis . . . . . . . . . . . 3--32 Michael Backes and Birgit Pfitzmann Limits of the BRSIM/UC soundness of Dolev--Yao-style XOR . . . . . . . . . . 33--54 Andrea Bracciali and Gianluigi Ferrari and Emilio Tuosto A symbolic framework for multi-faceted security protocol analysis . . . . . . . 55--84 Juan M. Estevez-Tapiador and Almudena Alcaide and Julio C. Hernandez-Castro and Arturo Ribagorda Bayesian rational exchange . . . . . . . 85--100
Dieter Gollmann Editorial . . . . . . . . . . . . . . . 101--101 J. G. Alfaro and N. Boulahia-Cuppens and F. Cuppens Complete analysis of configuration rules to guarantee reliable network security policies . . . . . . . . . . . . . . . . 103--122 Jason Crampton and Hemanth Khambhammettu Delegation in role-based access control 123--136 Philip W. L. Fong Discretionary capability confinement . . 137--154 Michael Backes and Markus Dürmuth and Dennis Hofheinz and Ralf Küsters Conditional reactive simulatability . . 155--169
Xinyi Huang and Willy Susilo and Yi Mu and Wei Wu Secure universal designated verifier signature without random oracles . . . . 171--183 Pei-Te Chen and Chi-Sung Laih IDSIC: an intrusion detection system with identification capability . . . . . 185--197 Joachim Biskup and Torben Weibert Keeping secrets in incomplete databases 199--217 Alessandro Aldini and Alessandra Di Pierro Estimating the maximum information leakage . . . . . . . . . . . . . . . . 219--242
XiaoFeng Wang and Michael K. Reiter A multi-layer framework for puzzle-based denial-of-service defense . . . . . . . 243--263 Christophe Tartary and Huaxiong Wang and Josef Pieprzyk A coding approach to the multicast stream authentication problem . . . . . 265--283 Frédéric Cuppens and Nora Cuppens-Boulahia Modeling contextual security policies 285--305
Esma A\"\imeur and Gilles Brassard and José M. Fernandez and Flavien Serge Mani Onana \sc Alambic: a privacy-preserving recommender system for electronic commerce . . . . . . . . . . . . . . . . 307--334 Cherita L. Corbett and Raheem A. Beyah and John A. Copeland Passive classification of wireless NICs during active scanning . . . . . . . . . 335--348 Alexander W. Dent A survey of certificateless encryption schemes and security models . . . . . . 349--377
Chang-An Zhao and Fangguo Zhang and Jiwu Huang A note on the Ate pairing . . . . . . . 379--382 Kenji Imamoto and Jianying Zhou and Kouichi Sakurai Achieving evenhandedness in certified email system for contract signing . . . 383--394 Theodoros Balopoulos and Stefanos Gritzalis and Sokratis K. Katsikas Specifying and implementing privacy-preserving cryptographic protocols . . . . . . . . . . . . . . . 395--420 Jeremy W. Bryans and Maciej Koutny and Laurent Mazaré and Peter Y. A. Ryan Opacity generalised to transition systems . . . . . . . . . . . . . . . . 421--435
Jiqiang Lu Related-key rectangle attack on 36 rounds of the XTEA block cipher . . . . 1--11 Masayuki Yoshino and Katsuyuki Okeya and Camille Vuillaume Bipartite modular multiplication with twice the bit-length of multipliers . . 13--23 Daxin Tian and Yanheng Liu and Yang Xiang Large-scale network intrusion detection based on distributed learning algorithm 25--35 Jiin-Chiou Cheng and Chi-Sung Laih Conference key agreement protocol with non-interactive fault-tolerance over broadcast network . . . . . . . . . . . 37--48 Atefeh Mashatan and Douglas R. Stinson Interactive two-channel message authentication based on Interactive--Collision Resistant hash functions . . . . . . . . . . . . . . . 49--60 M. Narasimha and J. Solis and G. Tsudik Privacy-preserving revocation checking 61--75
Kalid Elmufti and Dasun Weerasinghe and M. Rajarajan and Veselin Rakocevic and Sanowar Khan and John A. MacDonald Mobile Web services authentication using SAML and 3GPP generic bootstrapping architecture . . . . . . . . . . . . . . 77--87 Jiangtao Li and Ninghui Li and XiaoFeng Wang and Ting Yu Denial of service attacks and defenses in decentralized trust management . . . 89--101 Karl Quinn and David Lewis and Declan O'Sullivan and Vincent P. Wade An analysis of accuracy experiments carried out over of a multi-faceted model of trust . . . . . . . . . . . . . 103--119 Eugene Y. Vasserman and Nicholas Hopper and James Tyra \sc SilentKnock: practical, provably undetectable authentication . . . . . . 121--135 David W. Chadwick and Sassa Otenko and Tuan Anh Nguyen Adding support to XACML for multi-domain user to user dynamic delegation of authority . . . . . . . . . . . . . . . 137--152
Yu-Sung Wu and Vinita Apte and Saurabh Bagchi and Sachin Garg and Navjot Singh Intrusion detection in voice over IP environments . . . . . . . . . . . . . . 153--172 Gabriel Kuper and Fabio Massacci and Nataliya Rassadko Generalized XML security views . . . . . 173--203 Lein Harn and Jian Ren and Changlu Lin Efficient identity-based GQ multisignatures . . . . . . . . . . . . 205--210 Debra L. Cook and Moti Yung and Angelos D. Keromytis Elastic block ciphers: method, security and instantiations . . . . . . . . . . . 211--231
Meharouech Sourour and Bouhoula Adel and Abbes Tarek Ensuring security in depth based on heterogeneous network security technologies . . . . . . . . . . . . . . 233--246 Abdelrahman Desoky Listega: list-based steganography methodology . . . . . . . . . . . . . . 247--261 Sangho Lee and Jong Kim and Sung Je Hong Redistributing time-based rights between consumer devices for content sharing in DRM system . . . . . . . . . . . . . . . 263--273 Richard Shay and Elisa Bertino A comprehensive simulation tool for the analysis of password policies . . . . . 275--289 Hristo Koshutanski and Aliaksandr Lazouski and Fabio Martinelli and Paolo Mori Enhancing grid security by fine-grained behavioral control and negotiation-based authorization . . . . . . . . . . . . . 291--314
Ernie Brickell and Liqun Chen and Jiangtao Li Simplified security notions of direct anonymous attestation and a concrete scheme from pairings . . . . . . . . . . 315--330 Fernando Esponda and Stephanie Forrest and Paul Helman Negative representations of information 331--345 Shingo Hasegawa and Shuji Isobe and Hiroki Shizuya and Katsuhiro Tashiro On the pseudo-freeness and the CDH assumption . . . . . . . . . . . . . . . 347--355 Erel Geron and Avishai Wool CRUST: cryptographic remote untrusted storage without public keys . . . . . . 357--377 Huawang Qin and Yuewei Dai and Zhiquan Wang A secret sharing scheme based on $ (t, n) $ threshold and adversary structure 379--385
Sonia Chiasson and Alain Forget and Robert Biddle and P. C. van Oorschot User interface design affects security: patterns in click-based graphical passwords . . . . . . . . . . . . . . . 387--398 Christian Hammer and Gregor Snelting Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs . . . . . . . . . . . . . . . . . 399--422 Xiangdong An and Dawn Jutla and Nick Cercone and Charnyote Pluempitiwiriyawej and Hai Wang Uncertain inference control in privacy protection . . . . . . . . . . . . . . . 423--431 Hedieh Sajedi and Mansour Jamzad Secure steganography based on embedding capacity . . . . . . . . . . . . . . . . 433--445 Rainer Plaga Biometric keys: suitable use cases and achievable information content . . . . . 447--454 Mario Kozina and Marin Golub and Stjepan Gros A method for identifying Web applications . . . . . . . . . . . . . . 455--467
Ruijuan Zheng and Mingchuan Zhang and Qingtao Wu and Shibao Sun and Jiexin Pu Analysis and application of Bio-Inspired Multi-Net Security Model . . . . . . . . 1--17 Shui-Hua Han and Chao-Hsien Chu Content-based image authentication: current status, issues, and challenges 19--32 David M. Goldschlag and Stuart G. Stubblebine and Paul F. Syverson Temporarily hidden bit commitment and lottery applications . . . . . . . . . . 33--50 Anindya Chakraborty and Arun K. Majumdar and Shamik Sural A column dependency-based approach for static and dynamic recovery of databases from malicious transactions . . . . . . 51--67 Duncan Bayly and Maurice Castro and Arathi Arakala and Jason Jeffers and Kathy Horadam Fractional biometrics: safeguarding privacy in biometric applications . . . 69--82
Giampaolo Bella The principle of guarantee availability for security protocol analysis . . . . . 83--97 João Porto de Albuquerque and Heiko Krumm and Paulo Lício de Geus Formal validation of automated policy refinement in the management of network security systems . . . . . . . . . . . . 99--125 Lars R. Knudsen and Charlotte V. Miolane Counting equations in algebraic attacks on block ciphers . . . . . . . . . . . . 127--135 Praveen Gauravaram and John Kelsey and Lars R. Knudsen and Sòren S. Thomsen On hash functions using checksums . . . 137--151
Ching Lin and Vijay Varadharajan MobileTrust: a trust enhanced security architecture for mobile agent systems 153--178 Amlan Kundu and Shamik Sural and A. K. Majumdar Database intrusion detection using sequence alignment . . . . . . . . . . . 179--191 Ileana Buhan and Jeroen Doumen and Pieter Hartel and Qian Tang and Raymond Veldhuis Embedding renewable cryptographic keys into noisy data . . . . . . . . . . . . 193--208 Meriam Ben-Ghorbel-Talbi and Frédéric Cuppens and Nora Cuppens-Boulahia and Adel Bouhoula A delegation model for extended RBAC . . 209--236
Xuhua Ding and Yanjiang Yang and Robert H. Deng and Shuhong Wang A new hardware-assisted PIR with $ O(n) $ shuffle cost . . . . . . . . . . . . . 237--252 Dan Lin and Prathima Rao and Elisa Bertino and Ninghui Li and Jorge Lobo EXAM: a comprehensive environment for the analysis of access control policies 253--273 Alwyn R. Pais and Shankar Joshi A new probabilistic rekeying method for secure multicast groups . . . . . . . . 275--286 Joseph K. Liu and Joonsang Baek and Jianying Zhou and Yanjiang Yang and Jun Wen Wong Efficient online/offline identity-based signature for wireless sensor network 287--296 Tsz Hon Yuen and Willy Susilo and Yi Mu How to construct identity-based signatures without the key escrow problem . . . . . . . . . . . . . . . . 297--311
Beno\^\it Dupasquier and Stefan Burschka and Kieran McLaughlin and Sakir Sezer Analysis of information leakage from encrypted Skype conversations . . . . . 313--325 Boris Skori\'c and Marc X. Makkes Flowchart description of security primitives for controlled physical unclonable functions . . . . . . . . . . 327--335 Hedieh Sajedi and Mansour Jamzad Using contourlet transform and cover selection for secure steganography . . . 337--352 Haiyong Chen and Hailiang Chen A hybrid scheme for securing fingerprint templates . . . . . . . . . . . . . . . 353--361 Yoo-Jin Baek Regular $ 2^w$-ary right-to-left exponentiation algorithm with very efficient DPA and FA countermeasures . . 363--370
Ivan Damgård and Mads Jurik and Jesper Buus Nielsen A generalization of Paillier's public-key system with applications to electronic voting . . . . . . . . . . . 371--385 Philip MacKenzie and Sarvar Patel and Ram Swaminathan Password-authenticated key exchange based on RSA . . . . . . . . . . . . . . 387--410 Moni Naor and Benny Pinkas Efficient trace and revoke schemes . . . 411--424
Alex Baumgarten and Michael Steffen and Matthew Clausman and Joseph Zambreno A case study in hardware Trojan design and implementation . . . . . . . . . . . 1--14 Hoon Wei Lim and Kenneth G. Paterson Identity-based cryptography for grid security . . . . . . . . . . . . . . . . 15--32 Kun Peng and Ed Dawson and Feng Bao Modification and optimisation of a shuffling scheme: stronger security, formal analysis and higher efficiency 33--47 Kun Peng A general and efficient countermeasure to relation attacks in mix-based e-voting . . . . . . . . . . . . . . . . 49--60
Anonymous Preface . . . . . . . . . . . . . . . . 61--61 George Coker and Joshua Guttman and Peter Loscocco and Amy Herzog and Jonathan Millen and Brian O'Hanlon and John Ramsdell and Ariel Segall and Justin Sheehy and Brian Sniffen Principles of remote attestation . . . . 63--81 Alessandra Di Pierro and Chris Hankin and Herbert Wiklicky Probabilistic timing covert channels: to close or not to close? . . . . . . . . . 83--106 Michael Backes and Iliano Cervesato and Aaron D. Jaggard and Andre Scedrov and Joe-Kai Tsay Cryptographically sound security proofs for basic and public-key Kerberos . . . 107--134 Anonymous Special issue on ``SCADA and control system security'' . . . . . . . . . . . 135--136
Jason Crampton and Hoon Wei Lim and Kenneth G. Paterson and Geraint Price User-friendly and certificate-free grid security infrastructure . . . . . . . . 137--153 Wen Tao Zhu and Yang Xiang and Jianying Zhou and Robert H. Deng and Feng Bao Secure localization with attack detection in wireless sensor networks 155--171 Peter Roelse Dynamic subtree tracing and its application in pay-TV systems . . . . . 173--187 Aniket Kate and Ian Goldberg Generalizing cryptosystems based on the subset sum problem . . . . . . . . . . . 189--199
Berkant Ustao\uglu Integrating identity-based and certificate-based authenticated key exchange protocols . . . . . . . . . . . 201--212 Nitesh Saxena and Jonathan Voris Data remanence effects on memory-based entropy collection for RFID systems . . 213--222 Yacine Bouzida and Luigi Logrippo and Serge Mankovski Concrete- and abstract-based access control . . . . . . . . . . . . . . . . 223--238 Nataliia Bielova and Fabio Massacci Do you really mean what you actually enforced? . . . . . . . . . . . . . . . 239--254 Neil Hanley and Michael Tunstall and William P. Marnane Using templates to distinguish multiplications from squaring operations 255--266
Sushil Jajodia and Jianying Zhou Message from the Guest Editors . . . . . 267--268 Deguang Kong and Yoon-Chan Jhi and Tao Gong and Sencun Zhu and Peng Liu and Hongsheng Xi SAS: semantics aware signature generation for polymorphic worm detection . . . . . . . . . . . . . . . 269--283 Ee-Chien Chang and Liming Lu and Yongzheng Wu and Roland H. C. Yap and Jie Yu Enhancing host security using external environment sensors . . . . . . . . . . 285--299 Luciana Marconi and Mauro Conti and Roberto Di Pietro CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection . . . . . . . . 301--319
John Charles Gyorffy and Andrew F. Tappenden and James Miller Token-based graphical password authentication . . . . . . . . . . . . . 321--336 William Bradley Glisson and Tim Storer and Gavin Mayall and Iain Moug and George Grispos Electronic retention: what does your mobile phone reveal about you? . . . . . 337--349 Sergio Sánchez García and Ana Gómez Oliva and Emilia Pérez Belleboni and Iván Pau de la Cruz Solving identity delegation problem in the e-government environment . . . . . . 351--372 Qiong Huang and Guomin Yang and Duncan S. Wong and Willy Susilo Efficient strong designated verifier signature schemes without random oracle or with non-delegatability . . . . . . . 373--385 Josep M. Miret and Francesc Sebé Cryptanalysis of an ad-hoc cryptosystem for mix-based e-voting robust against relation attacks . . . . . . . . . . . . 387--389 Peter Roelse Erratum to: Dynamic subtree tracing and its application in pay-TV systems . . . 391--391
D. Fiore and R. Gennaro and N. P. Smart Relations between the security models for certificateless encryption and ID-based key agreement . . . . . . . . . 1--22 Kun Peng Threshold distributed access control with public verification: a practical application of PVSS . . . . . . . . . . 23--31 Mikaël Ates and Francesco Buccafurri and Jacques Fayolle and Gianluca Lax A warning on how to implement anonymous credential protocols into the information card framework . . . . . . . 33--40 Yuanzhuo Wang and Min Yu and Jingyuan Li and Kun Meng and Chuang Lin and Xueqi Cheng Stochastic game net and applications in security analysis for enterprise network 41--52 Qiong Huang and Guomin Yang and Duncan S. Wong and Willy Susilo A new efficient optimistic fair exchange protocol without random oracles . . . . 53--63
J. Guerra-Casanova and C. Sánchez-Ávila and G. Bailador and A. de Santos Sierra Authentication in mobile devices through hand gesture recognition . . . . . . . . 65--83 Koji Nuida Short collusion-secure fingerprint codes against three pirates . . . . . . . . . 85--102 Elena Andreeva and Andrey Bogdanov and Bart Mennink and Bart Preneel and Christian Rechberger On security arguments of the second round SHA-3 candidates . . . . . . . . . 103--120 Dimitris Gritzalis and Panagiotis Katsaros and Stylianos Basagiannis and Yannis Soupionis Formal analysis for robust anti-SPIT protection using model checking . . . . 121--135
Robert Niebuhr and Mohammed Meziani and Stanislav Bulygin and Johannes Buchmann Selecting parameters for secure McEliece-based cryptosystems . . . . . . 137--147 Elena Andreeva and Bart Mennink and Bart Preneel The parazoa family: generalizing the sponge hash functions . . . . . . . . . 149--165 Rinku Dewri and Indrajit Ray and Nayot Poolsappasit and Darrell Whitley Optimal security hardening on attack tree models of networks: a cost-benefit analysis . . . . . . . . . . . . . . . . 167--188 Ashok Kumar Das A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks . . . . . . 189--211
Irfan Ahmed and Martin Naedele and Bradley Schatz and Ryoichi Sasaki and Andrew West Message from the guest editors . . . . . 213--213 Bradley Reaves and Thomas Morris An open virtual testbed for industrial control system security research . . . . 215--229 Dina Hadziosmanovi\'c and Damiano Bolzoni and Pieter H. Hartel A log mining approach for process monitoring in SCADA . . . . . . . . . . 231--251 Marc Solé and Victor Muntés-Mulero and Jordi Nin Efficient microaggregation techniques for large numerical data volumes . . . . 253--267 Qussai Yaseen and Brajendra Panda Insider threat mitigation: preventing unauthorized knowledge acquisition . . . 269--280 Michael Huber Perfect secrecy systems immune to spoofing attacks . . . . . . . . . . . . 281--289
Jianying Zhou and Xuejia Lai and Hui Li Message from the Guest Editors . . . . . 291--292 Zhi Xin and Huiyu Chen and Xinche Wang and Peng Liu and Sencun Zhu and Bing Mao and Li Xie Replacement attacks: automatically evading behavior-based software birthmark . . . . . . . . . . . . . . . 293--304 Liqun Chen and Yu Chen The $n$-Diffie--Hellman problem and multiple-key encryption . . . . . . . . 305--320 Georgios Kontaxis and Michalis Polychronakis and Evangelos P. Markatos Minimizing information disclosure to third parties in social login platforms 321--332 Jovan Dj. Goli\'c A new authentication model for ad hoc networks . . . . . . . . . . . . . . . . 333--347 Philippe Camacho and Alejandro Hevia and Marcos Kiwi and Roberto Opazo Strong accumulators from collision-resistant hashing . . . . . . 349--363
Alejandro Pérez-Méndez and Fernando Pereñíguez-García and Rafael Marín-López and Gabriel López-Millán A cross-layer SSO solution for federating access to kerberized services in the eduroam/DAMe network . . . . . . 365--388 Jinguang Han and Willy Susilo and Yi Mu and Jun Yan New constructions of OSBE schemes and their applications in oblivious access control . . . . . . . . . . . . . . . . 389--401 Dan Bogdanov and Margus Niitsoo and Tomas Toft and Jan Willemson High-performance secure multi-party computation for data mining applications 403--418 Nasour Bagheri and Praveen Gauravaram and Lars R. Knudsen and Erik Zenner The suffix-free-prefix-free hash function construction and its indifferentiability security analysis 419--434
Paolo D'Arco and Angel Perez del Pozo Toward tracing and revoking schemes secure against collusion and any form of secret information leakage . . . . . . . 1--17 Masayuki Abe and Sherman S. M. Chow and Kristiyan Haralambiev and Miyako Ohkubo Double-trapdoor anonymous tags for traceable signatures . . . . . . . . . . 19--31 Dario Catalano and Mario Di Raimondo and Dario Fiore and Rosario Gennaro and Orazio Puglisi Fully non-interactive onion routing with forward secrecy . . . . . . . . . . . . 33--47 Emiliano De Cristofaro and Mark Manulis and Bertram Poettering Private discovery of common social contacts . . . . . . . . . . . . . . . . 49--65
Félix Gómez Mármol and Christoph Sorge and Ronald Petrlic and Osman Ugus and Dirk Westhoff and Gregorio Martínez Pérez Privacy-enhanced architecture for smart metering . . . . . . . . . . . . . . . . 67--82 Hassan Jameel Asghar and Shujun Li and Josef Pieprzyk and Huaxiong Wang Cryptanalysis of the convex hull click human identification protocol . . . . . 83--96 Mansour Alsaleh and P. C. van Oorschot Evaluation in the absence of absolute ground truth: toward reliable evaluation methodology for scan detectors . . . . . 97--110 Imad M. Abbadi A framework for establishing trust in Cloud provenance . . . . . . . . . . . . 111--128 David Rebollo-Monedero and Javier Parra-Arnau and Claudia Diaz and Jordi Forné On the measurement of privacy as an attacker's estimation error . . . . . . 129--149 Panagiotis Rizomiliotis and Stefanos Gritzalis On the security of AUTH, a provably secure authentication protocol based on the subspace LPN problem . . . . . . . . 151--154
Wenjuan Xu and Mohamed Shehab and Gail-Joon Ahn Visualization-based policy analysis for SELinux: framework and user study . . . 155--171 Ginés Dólera Tormo and Gabriel López Millán and Gregorio Martínez Pérez Definition of an advanced identity management infrastructure . . . . . . . 173--200 Nikos Vrakas and Costas Lambrinoudakis An intrusion detection and prevention system for IMS and VoIP services . . . . 201--217 D. Bernhard and G. Fuchsbauer and E. Ghadafi and N. P. Smart and B. Warinschi Anonymous attestation with user-controlled linkability . . . . . . 219--249
Duong-Hieu Phan and David Pointcheval and Siamak F. Shahandashti and Mario Strefler Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts . . . . . . . . . . . . . . 251--265 C. Brzuska and M. Fischlin and N. P. Smart and B. Warinschi and S. C. Williams Less is more: relaxed yet composable security notions for key exchange . . . 267--297 G. Draper-Gil and J. Zhou and J. L. Ferrer-Gomila and M. F. Hinarejos An optimistic fair exchange protocol with active intermediaries . . . . . . . 299--318 Dani\`ele Beauquier and Joëlle Cohen and Ruggero Lanotte Security policies enforcement using finite and pushdown edit automata . . . 319--336 Kun Peng A shuffle to achieve high efficiency through pre-computation and batch verification . . . . . . . . . . . . . . 337--345
Daniel Boteanu and José M. Fernandez A comprehensive study of queue management as a DoS counter-measure . . 347--382 Pu Wang and Marta C. González and Ronaldo Menezes and Albert-László Barabási Understanding the spread of malicious mobile-phone programs and their damage potential . . . . . . . . . . . . . . . 383--392 Z. Cliffe Schreuders and Christian Payne and Tanya McGill The functionality-based application confinement model . . . . . . . . . . . 393--422 Hessam Zakerzadeh and Sylvia L. Osborn Delay-sensitive approaches for anonymizing numerical streaming data . . 423--437
Emmanuel Bresson and Dario Catalano and Mario Di Raimondo and Dario Fiore and Rosario Gennaro Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results . . . . . . . . . . . . . . . . 439--465 Ashish Kundu and Elisa Bertino Privacy-preserving authentication of trees and graphs . . . . . . . . . . . . 467--494 Yu-Shian Chen and Chin-Laung Lei Aggregate message authentication codes (AMACs) with on-the-fly verification . . 495--504 F. Pereñíguez-García and R. Marín-López and G. Kambourakis and A. Ruiz-Martínez and S. Gritzalis and A. F. Skarmeta-Gómez KAMU: providing advanced user privacy in Kerberos multi-domain scenarios . . . . 505--525
Qi Liao and Zhen Li Portfolio optimization of computer and mobile botnets . . . . . . . . . . . . . 1--14 Takaaki Mizuki and Hiroki Shizuya A formalization of card-based cryptographic protocols via abstract machine . . . . . . . . . . . . . . . . 15--23 Mark Manulis and Bertram Poettering and Douglas Stebila Plaintext awareness in identity-based key encapsulation . . . . . . . . . . . 25--49 Keita Emura and Goichiro Hanaoka and Yusuke Sakai and Jacob C. N. Schuldt Group signature implies public-key encryption with non-interactive opening 51--62 Gustavo Gonzalez Granadillo and Malek Belhaouane and Hervé Debar and Grégoire Jacob RORI-based countermeasure selection using the OrBAC formalism . . . . . . . 63--79 Navajit Saikia and Prabin K. Bora Perceptual hash function for scalable video . . . . . . . . . . . . . . . . . 81--93
Anonymous Security in cloud computing . . . . . . 95--96 Antonios Gouglidis and Ioannis Mavridis and Vincent C. Hu Security policy verification for multi-domains in cloud systems . . . . . 97--111 Diogo A. B. Fernandes and Liliana F. B. Soares and João V. Gomes and Mário M. Freire and Pedro R. M. Inácio Security issues in cloud environments: a survey . . . . . . . . . . . . . . . . . 113--170 Adam Bates and Benjamin Mood and Joe Pletcher and Hannah Pruse and Masoud Valafar and Kevin Butler On detecting co-resident cloud instances using network flow watermarking techniques . . . . . . . . . . . . . . . 171--189 Aiiad Albeshri and Colin Boyd and Juan González Nieto Enhanced GeoProof: improved geographic assurance for data in the cloud . . . . 191--198 David Nuñez and Isaac Agudo BlindIdM: a privacy-preserving approach for identity management as a service . . 199--215
Nikos Mavrogiannopoulos and Andreas Pashalidis and Bart Preneel Toward a secure Kerberos key exchange with smart cards . . . . . . . . . . . . 217--228 Fudong Li and Nathan Clarke and Maria Papadaki and Paul Dowland Active authentication for mobile devices utilising behaviour profiling . . . . . 229--244 Tzong-Sun Wu and Ming-Lun Lee and Han-Yu Lin and Chao-Yuan Wang Shoulder-surfing-proof graphical password authentication scheme . . . . . 245--254 Chengpo Mu and Meng Yu and Yingjiu Li and Wanyu Zang Risk balance defense approach against intrusions for network server . . . . . 255--269 Bin Lian and Gongliang Chen and Jianhua Li Provably secure E-cash system with practical and efficient complete tracing 271--289 Robert P. McEvoy and Michael Tunstall and Claire Whelan and Colin C. Murphy and William P. Marnane All-or-Nothing Transforms as a countermeasure to differential side-channel analysis . . . . . . . . . 291--304
Kee Sung Kim and Ik Rae Jeong Efficient verifiably encrypted signatures from lattices . . . . . . . . 305--314 Reza Sepahi and Ron Steinfeld and Josef Pieprzyk Lattice-based certificateless public-key encryption in the standard model . . . . 315--333 Guido Bertoni and Joan Daemen and Michaël Peeters and Gilles Van Assche Sufficient conditions for sound tree and sequential hashing modes . . . . . . . . 335--353 Amerah Alabrah and Jeffrey Cashion and Mostafa Bassiouni Enhancing security of cookie-based sessions in mobile networks using sparse caching . . . . . . . . . . . . . . . . 355--366 Alireza Shameli-Sendi and Michel Dagenais ARITO: Cyber-attack response system using accurate risk impact tolerance . . 367--390 Mousa Mousazadeh and Behrouz Tork Ladani Randomized gossip algorithms under attack . . . . . . . . . . . . . . . . . 391--402
Flavio D. Garcia and Gerhard de Koning Gans and Roel Verdult Wirelessly lockpicking a smart card reader . . . . . . . . . . . . . . . . . 403--420 Luigi Catuogno and Clemente Galdi Analysis of a two-factor graphical password scheme . . . . . . . . . . . . 421--437 Meng Zhang and Anand Raghunathan and Niraj K. Jha A defense framework against malware and vulnerability exploits . . . . . . . . . 439--452 Rehana Yasmin and Eike Ritter and Guilin Wang Provable security of a pairing-free one-pass authenticated key establishment protocol for wireless sensor networks 453--465 Weizheng Gao and Kashi Neupane and Rainer Steinwandt Tuning a two-round group key agreement 467--476 Sooyeon Shin and Taekyoung Kwon AAnA: Anonymous authentication and authorization based on short traceable signatures . . . . . . . . . . . . . . . 477--495
Javier Herranz and Jordi Nin Secure and efficient anonymization of distributed confidential databases . . . 497--512 Ming-Feng Lee and Nigel P. Smart and Bogdan Warinschi and Gaven J. Watson Anonymity guarantees of the UMTS/LTE authentication and connection protocol 513--527 Meilof Veeningen and Benne de Weger and Nicola Zannone Data minimisation in communication protocols: a formal analysis framework and application to identity management 529--569 Vladimir Jovanovikj and Dusan Gabrijelcic and Tomaz Klobucar A conceptual model of security context 571--581 Sevil Sen Using instance-weighted naive Bayes for adapting concept drift in masquerade detection . . . . . . . . . . . . . . . 583--590
Kyoung Soo Han and Jae Hyun Lim and Boojoong Kang and Eul Gyu Im Malware analysis using visualized images and entropy graphs . . . . . . . . . . . 1--14 Antonio Nappa and M. Zubair Rafique and Juan Caballero The MALICIA dataset: identification and analysis of drive-by download operations 15--33 Helber Silva and Aldri Santos and Michele Nogueira Routing management for performance and security tradeoff in wireless mesh networks . . . . . . . . . . . . . . . . 35--46 Egor Dolzhenko and Jay Ligatti and Srikar Reddy Modeling runtime enforcement with mandatory results automata . . . . . . . 47--60 Michael Valenzuela and Ferenc Szidarovszky and Jerzy Rozenblit A multiresolution approach for optimal defense against random attacks . . . . . 61--72 Rafael Tonicelli and Anderson C. A. Nascimento and Rafael Dowsley and Jörn Müller-Quade and Hideki Imai and Goichiro Hanaoka and Akira Otsuka Information-theoretically secure oblivious polynomial evaluation in the commodity-based model . . . . . . . . . 73--84 Alex Arbit and Yoel Livne and Yossef Oren and Avishai Wool Implementing public-key cryptography on passive RFID tags is practical . . . . . 85--99
Giampaolo Bella and Helge Janicke Special issue on the Security Track at the ACM Symposium on Applied Computing 2013 . . . . . . . . . . . . . . . . . . 101--102 Jean Everson Martina and Eduardo dos Santos and Marcelo Carlomagno Carlos and Geraint Price and Ricardo Felipe Custódio An adaptive threat model for security ceremonies . . . . . . . . . . . . . . . 103--121 Alessandro Armando and Gabriele Costa and Alessio Merlo and Luca Verderame Formal modeling and automatic enforcement of Bring Your Own Device policies . . . . . . . . . . . . . . . . 123--140 Michael Spreitzenbarth and Thomas Schreck and Florian Echtler and Daniel Arp and Johannes Hoffmann Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques . . . . . . . . . . . . . . . 141--153 Michael Riecker and Sebastian Biedermann and Rachid El Bansarkhani and Matthias Hollick Lightweight energy consumption-based intrusion detection system for wireless sensor networks . . . . . . . . . . . . 155--167 André Egners and Patrick Herrmann and Ulrike Meyer Multi-operator wireless mesh networks secured by an all-encompassing security architecture . . . . . . . . . . . . . . 169--186 Jean Everson Martina and Lawrence Charles Paulson Verifying multicast-based security protocols using the inductive method . . 187--204
Sambuddho Chakravarty and Georgios Portokalidis and Michalis Polychronakis and Angelos D. Keromytis Detection and analysis of eavesdropping in anonymous communication networks . . 205--220 Younes Seifi and Suriadi Suriadi and Ernest Foo and Colin Boyd Analysis of two authorization protocols using Colored Petri Nets . . . . . . . . 221--247 Joshua I. James and Pavel Gladyshev Automated inference of past action instances in digital investigations . . 249--261 Dennis Giffhorn and Gregor Snelting A new algorithm for low-deterministic security . . . . . . . . . . . . . . . . 263--287 Giorgos Vasiliadis and Michalis Polychronakis and Sotiris Ioannidis GPU-assisted malware . . . . . . . . . . 289--297
Nikolaos Pitropakis and Aggelos Pikrakis and Costas Lambrinoudakis Behaviour reflects personality: detecting co-residence attacks on Xen-based cloud environments . . . . . . 299--305 Yong Yu and Man Ho Au and Yi Mu and Shaohua Tang and Jian Ren and Willy Susilo and Liju Dong Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage . . . . . . . . . . . . . 307--318 Marco Casassa-Mont and Ilaria Matteucci and Marinella Petrocchi and Marco Luca Sbodio Towards safer information sharing in the cloud . . . . . . . . . . . . . . . . . 319--334 Andreu Pere Isern-Dey\`a and Llorenç Huguet-Rotger and M. Magdalena Payeras-Capell\`a and Maci\`a Mut-Puigserver On the practicability of using group signatures on mobile devices: implementation and performance analysis on the Android platform . . . . . . . . 335--345 Tanveer Mustafa and Karsten Sohr Understanding the implemented access control policy of Android system services with slicing and extended static checking . . . . . . . . . . . . 347--366 Abdeljebar Ameziane El Hassani and Anas Abou El Kalam and Adel Bouhoula and Ryma Abassi and Abdellah Ait Ouahman Integrity-OrBAC: a new model to preserve Critical Infrastructures integrity . . . 367--385 Mohammed I. Al-Saleh and Fatima M. AbuHjeela and Ziad A. Al-Sharif Investigating the detection capabilities of antiviruses under concurrent attacks 387--396
Lei Wei and Michael K. Reiter Toward practical encrypted email that supports private, regular-expression searches . . . . . . . . . . . . . . . . 397--416 Lan Zhou and Vijay Varadharajan and Michael Hitchens Generic constructions for role-based encryption . . . . . . . . . . . . . . . 417--430 Han-Yu Lin RPCAE: a novel revocable proxy convertible authenticated encryption scheme . . . . . . . . . . . . . . . . . 431--441 Tzipora Halevi and Nitesh Saxena Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios . . . . . . 443--456 Tao Li and Aiqun Hu Trusted mobile model based on DTE technology . . . . . . . . . . . . . . . 457--469 Hanieh Azkia and Nora Cuppens-Boulahia and Frédéric Cuppens and Gouenou Coatrieux and Said Oulmakhzoune Deployment of a posteriori access control using IHE ATNA . . . . . . . . . 471--483
Elisa Bertino and Robert H. Deng and Xinyi Huang and Jianying Zhou Security and privacy of electronic health information systems . . . . . . . 485--486 Huiling Qian and Jiguo Li and Yichen Zhang and Jinguang Han Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation . . . . . . . . . . . . . . . 487--497 Bo Qin and Hua Deng and Qianhong Wu and Josep Domingo-Ferrer and David Naccache and Yunya Zhou Flexible attribute-based encryption applicable to secure e-healthcare records . . . . . . . . . . . . . . . . 499--511 Mohammad Ali Hadavi and Rasool Jalili and Ernesto Damiani and Stelvio Cimato Security and searchability in secret sharing-based data outsourcing . . . . . 513--529 Liina Kamm and Jan Willemson Secure floating point arithmetic and private satellite collision analysis . . 531--548 Thang Hoang and Deokjai Choi and Thuc Nguyen Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme . . . . . . . . . . . 549--560 Alice Kozakevicius and Cristian Cappo and Bruno A. Mozzaquatro and Raul Ceretta Nunes and Christian E. Schaerer URL query string anomaly sensor designed with the bidimensional Haar wavelet transform . . . . . . . . . . . . . . . 561--581
Liang Liu and Xiaofeng Chen and Wenjing Lou Secure three-party computational protocols for triangle area . . . . . . 1--13 Yu Chen and Qiong Huang and Zongyang Zhang Sakai--Ohgishi--Kasahara identity-based non-interactive key exchange revisited and more . . . . . . . . . . . . . . . . 15--33 Weiran Liu and Jianwei Liu and Qianhong Wu and Bo Qin and Yan Li Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption . . . . . . . . . . . . . . . 35--50 Petr Susil and Pouyan Sepehrdad and Serge Vaudenay and Nicolas Courtois On selection of samples in algebraic attacks and a new technique to find hidden low degree equations . . . . . . 51--65 Yuyu Wang and Keisuke Tanaka Strongly simulation-extractable leakage-resilient NIZK . . . . . . . . . 67--79 Y. Sreenivasa Rao and Ratna Dutta Efficient attribute-based signature and signcryption realizing expressive access structures . . . . . . . . . . . . . . . 81--109
Ronald De Keulenaer and Jonas Maebe and Koen De Bosschere and Bjorn De Sutter Link-time smart card code hardening . . 111--130 Randa Jabeur Ben Chikha and Tarek Abbes and Wassim Ben Chikha and Adel Bouhoula Behavior-based approach to detect spam over IP telephony attacks . . . . . . . 131--143 Vahid R. Karimi and Paulo S. C. Alencar and Donald D. Cowan A uniform approach for access control and business models with explicit rule realization . . . . . . . . . . . . . . 145--171 Elie Raad and Bechara Al Bouna and Richard Chbeir Preventing sensitive relationships disclosure for better social media preservation . . . . . . . . . . . . . . 173--194 Alberto Huertas Celdrán and Ginés Dólera Tormo and Félix Gómez Mármol and Manuel Gil Pérez and Gregorio Martínez Pérez Resolving privacy-preserving relationships over outsourced encrypted data storages . . . . . . . . . . . . . 195--209 Víctor Mateu and Josep M. Miret and Francesc Sebé A hybrid approach to vector-based homomorphic tallying remote voting . . . 211--221 Guomin Yang and Willy Susilo and Yi Mu Message from the Guest Editors . . . . . 223--224
Hatem A. Rashwan and Agusti Solanas and Dom\`enec Puig and Antoni Martínez-Ballesté Understanding trust in privacy-aware video surveillance systems . . . . . . . 225--234 Tytus Kurek and Marcin Niemiec and Artur Lason Taking back control of privacy: a novel framework for preserving cloud-based firewall policy confidentiality . . . . 235--250 Cengiz Orencik and Ayse Selcuk and Erkay Savas and Murat Kantarcio\uglu Multi-keyword search over encrypted data with scoring and search pattern obfuscation . . . . . . . . . . . . . . 251--269 Clémentine Gritti and Willy Susilo and Thomas Plantard and Kaitai Liang and Duncan S. Wong Broadcast encryption with dealership . . 271--283 Bart Mennink and Bart Preneel Efficient parallelizable hashing using small non-compressing primitives . . . . 285--300 Tarek Abbes and Adel Bouhoula and Michaël Rusinowitch Detection of firewall configuration errors with updatable tree . . . . . . . 301--317 P. Salini and S. Kanmani Effectiveness and performance analysis of model-oriented security requirements engineering to elicit security requirements: a systematic solution for developing secure software systems . . . 319--334
Leyli Javid Khayati and Cengiz Orencik and Erkay Savas and Berkant Ustao\uglu A practical privacy-preserving targeted advertising scheme for IPTV users . . . 335--360 Qiguang Miao and Jiachen Liu and Ying Cao and Jianfeng Song Malware detection using bilayer behavior abstraction and improved one-class support vector machines . . . . . . . . 361--379 Boris Skori\'c and Sebastiaan J. A. de Hoogh and Nicola Zannone Flow-based reputation with uncertainty: evidence-based subjective logic . . . . 381--402 István Vajda On the analysis of time-aware protocols in universal composability framework . . 403--412 Sandra Díaz-Santiago and Lil María Rodríguez-Henríquez and Debrup Chakraborty A cryptographic study of tokenization systems . . . . . . . . . . . . . . . . 413--432 Avleen Malhi and Shalini Batra Privacy-preserving authentication framework using Bloom filter for secure vehicular communications . . . . . . . . 433--453
Marios Anagnostopoulos and Georgios Kambourakis and Stefanos Gritzalis New facets of mobile botnet: architecture and evaluation . . . . . . 455--473 Abdullah Almaatouq and Erez Shmueli and Mariam Nouh and Ahmad Alabdulkareem and Vivek K. Singh and Mansour Alsaleh and Abdulrahman Alarifi and Anas Alfaris and Alex `Sandy' Pentland If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts . . . . . . . . . . . . . 475--491 Marina Blanton and Everaldo Aguiar Private and oblivious set and multiset operations . . . . . . . . . . . . . . . 493--518 Mehmet Sabir Kiraz and Osmanbey Uzunkol Efficient and verifiable algorithms for secure outsourcing of cryptographic computations . . . . . . . . . . . . . . 519--537 Changhui Hu and Lidong Han Efficient wildcard search over encrypted data . . . . . . . . . . . . . . . . . . 539--547 Kohei Kasamatsu and Takahiro Matsuda and Keita Emura and Nuttapong Attrapadung and Goichiro Hanaoka and Hideki Imai Time-specific encryption from forward-secure encryption: generic and direct constructions . . . . . . . . . . 549--571
Liqun Chen and Chris Mitchell Message from the guest editors . . . . . 573--574 Paul D. Rowe and Joshua D. Guttman and Moses D. Liskov Measuring protocol strength with security goals . . . . . . . . . . . . . 575--596 Mark Manulis and Douglas Stebila and Franziskus Kiefer and Nick Denham Secure modular password authentication for the web using channel bindings . . . 597--620 Christopher W. Brown and Michael Jenkins Analyzing proposals for improving authentication on the TLS-/SSL-protected Web . . . . . . . . . . . . . . . . . . 621--635 Jean Paul Degabriele and Victoria Fehr and Marc Fischlin and Tommaso Gagliardoni and Felix Günther and Giorgia Azzurra Marson and Arno Mittelbach and Kenneth G. Paterson Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol . . . . . . . . 637--657 Cas Cremers and Marko Horvat Improving the ISO/IEC 11770 standard for key management techniques . . . . . . . 659--673
Bertram Poettering and Douglas Stebila Double-authentication-preventing signatures . . . . . . . . . . . . . . . 1--22 Lichun Li and Anwitaman Datta Write-only oblivious RAM-based privacy-preserved access of outsourced data . . . . . . . . . . . . . . . . . . 23--42 Vahid R. Karimi and Paulo S. C. Alencar and Donald D. Cowan A formal modeling and analysis approach for access control rules, policies, and their combinations . . . . . . . . . . . 43--74 Davide Alberto Albertini and Barbara Carminati and Elena Ferrari An extended access control mechanism exploiting data dependencies . . . . . . 75--89 Riaz Ahmed Shaikh and Kamel Adi and Luigi Logrippo A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets 91--113
Matija Stevanovic and Jens Myrup Pedersen and Alessandro D'Alconzo and Stefan Ruehrup A method for identifying compromised clients based on DNS traffic analysis 115--132 Maryam Mehrnezhad and Abbas Ghaemi Bafghi and Ahad Harati and Ehsan Toreini PiSHi: click the images and I tell if you are a human . . . . . . . . . . . . 133--149 Colin Boyd and Cas Cremers and Mich\`ele Feltz and Kenneth G. Paterson and Bertram Poettering and Douglas Stebila ASICS: authenticated key exchange security incorporating certification systems . . . . . . . . . . . . . . . . 151--171 Marco Tiloca and Christian Gehrmann and Ludwig Seitz On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake . . . . . . . . . 173--193 Ankit Singh and Hervais C. Simo Fhom Restricted usage of anonymous credentials in vehicular ad hoc networks for misbehavior detection . . . . . . . 195--211 Christopher Mann and Daniel Loebenberger Two-factor authentication for the Bitcoin protocol . . . . . . . . . . . . 213--226
Munkhbayar Bat-Erdene and Hyundo Park and Hongzhe Li and Heejo Lee and Mahn-Soo Choi Entropy analysis to classify unknown packing algorithms for malware detection 227--248 Riccardo Bernardini and Roberto Rinaldo Making random permutations from physically unclonable constants . . . . 249--261 Minchul Kim and Younghoon Jung and Junghwan Song A modified exhaustive search on a password system using SHA-1 . . . . . . 263--269 Hani Ragab-Hassen and Esma Lounes A key management scheme evaluation using Markov processes . . . . . . . . . . . . 271--280 Felix Günther and Bertram Poettering Linkable message tagging: solving the key distribution problem of signature schemes . . . . . . . . . . . . . . . . 281--297 Jianchang Lai and Yi Mu and Fuchun Guo Efficient identity-based online/offline encryption and signcryption with short ciphertext . . . . . . . . . . . . . . . 299--311 Panayiotis Kotzanikolaou and George Chatzisofroniou and Mike Burmester Broadcast anonymous routing (BAR): scalable real-time anonymous communication . . . . . . . . . . . . . 313--326 Dario Catalano and Dario Fiore and Rosario Gennaro A certificateless approach to onion routing . . . . . . . . . . . . . . . . 327--343
Aliaksandr Lazouski and Fabio Martinelli and Paolo Mori and Andrea Saracino Stateful Data Usage Control for Android Mobile Devices . . . . . . . . . . . . . 345--369 A. Ruiz-Heras and P. García-Teodoro and L. Sánchez-Casado ADroid: anomaly-based detection of malicious events in Android platforms 371--384 Shree Garg and Sateesh K. Peddoju and Anil K. Sarje Network-based detection of Android malicious apps . . . . . . . . . . . . . 385--400 Constantinos Kolias and Vasilis Kolias and Georgios Kambourakis TermID: a distributed swarm intelligence-based approach for wireless intrusion detection . . . . . . . . . . 401--416 Raghav V. Sampangi and Srinivas Sampalli HiveSec: security in resource-constrained wireless networks inspired by beehives and bee swarms . . 417--433 Nuno Antunes and Marco Vieira Designing vulnerability testing tools for web services: approach, components, and tools . . . . . . . . . . . . . . . 435--457
Khamphao Sisaat and Surin Kittitornkun and Hiroaki Kikuchi and Chaxiong Yukonhiatou and Masato Terada and Hiroshi Ishii A spatio-temporal malware and country clustering algorithm: 2012 IIJ MITF case study . . . . . . . . . . . . . . . . . 459--473 Patrick Duessel and Christian Gehl and Ulrich Flegel and Sven Dietrich and Michael Meier Detecting zero-day attacks using context-aware anomaly detection at the application-layer . . . . . . . . . . . 475--490 Myrto Arapinis and Loretta Ilaria Mancini and Eike Ritter and Mark Dermot Ryan Analysis of privacy in mobile telephony systems . . . . . . . . . . . . . . . . 491--523 Cheng-Ta Huang and Yu-Hong Zhang and Li-Chiun Lin and Wei-Jen Wang and Shiuh-Jeng Wang Mutual authentications to parties with QR-code applications in mobile systems 525--540 Janaka Alawatugoda Generic construction of an eCK-secure key exchange protocol in the standard model . . . . . . . . . . . . . . . . . 541--557 Lei Zhang and Qianhong Wu and Bo Qin and Hua Deng and Jiangtao Li and Jianwei Liu and Wenchang Shi Certificateless and identity-based authenticated asymmetric group key agreement . . . . . . . . . . . . . . . 559--576
Mehrdad Aliasgari and Marina Blanton and Fattaneh Bayatbabolghani Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model . . . 577--601 Lichun Li and Michael Militzer and Anwitaman Datta rPIR: ramp secret sharing-based communication-efficient private information retrieval . . . . . . . . . 603--625 Alireza Esfahani and Georgios Mantas and Jonathan Rodriguez and José Carlos Neves An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks . . . . . . . . . . . 627--639 Shahrzad Kananizadeh and Kirill Kononenko Development of dynamic protection against timing channels . . . . . . . . 641--651 Apostolos Malatras and Dimitris Geneiatakis and Ioannis Vakalis On the efficiency of user identification: a system-based approach 653--671 HyunChul Joh and Yashwant K. Malaiya Periodicity in software vulnerability discovery, patching and exploitation . . 673--690
Alfredo Rial and George Danezis and Markulf Kohlweiss Privacy-preserving smart metering revisited . . . . . . . . . . . . . . . 1--31 Hua Deng and Yunya Zhou and Qianhong Wu and Bo Qin and Jianwei Liu Secure pay-TV for chained hotels . . . . 33--42 Kazuki Yoneyama Formal modeling of random oracle programmability and verification of signature unforgeability using task-PIOAs . . . . . . . . . . . . . . . 43--66 Riccardo Bernardini and Roberto Rinaldo Generalized Elias schemes for efficient harvesting of truly random bits . . . . 67--81 Samiha Ayed and Muhammad Sabir Idrees and Nora Cuppens and Frederic Cuppens Achieving dynamicity in security policies enforcement using aspects . . . 83--103 G. Deepa and P. Santhi Thilagam and Furqan Ahmed Khan and Amit Praseed and Alwyn R. Pais and Nushafreen Palsetia Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications . . . . . . . . . . 105--120
Ankit Shah and Rajesh Ganesan and Sushil Jajodia and Hasan Cam A methodology to measure and monitor level of operational effectiveness of a CSOC . . . . . . . . . . . . . . . . . . 121--134 Mitsuaki Akiyama and Takeshi Yagi and Takeo Hariu and Youki Kadobayashi HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle . . . . . . . . . 135--151 G. Kirubavathi and R. Anitha Structural analysis and detection of Android botnets using machine learning techniques . . . . . . . . . . . . . . . 153--167 A. Gruber and I. Ben-Gal Using targeted Bayesian network learning for suspect identification in communication networks . . . . . . . . . 169--181 Tsung-Min Kuo and Sung-Ming Yen and Meng-Che Han Dynamic reversed accumulator . . . . . . 183--191 Jae Hong Seo and Keita Emura and Keita Xagawa and Kazuki Yoneyama Accumulable optimistic fair exchange from verifiably encrypted homomorphic signatures . . . . . . . . . . . . . . . 193--220 Aron Laszka and Yevgeniy Vorobeychik and Xenofon Koutsoukos A game-theoretic approach for integrity assurance in resource-bounded systems 221--242
Josep Domingo-Ferrer and Alberto Blanco-Justicia and Carla R\`afols Dynamic group size accreditation and group discounts preserving anonymity . . 243--260 Ying Luo and Sen-ching S. Cheung and Riccardo Lazzeretti and Tommaso Pignata and Mauro Barni Anonymous subject identification and privacy information management in video surveillance . . . . . . . . . . . . . . 261--278 Antoni Martínez-Ballesté and Hatem Rashwan and Domenec Puig and Agusti Solanas Design and implementation of a secure and trustworthy platform for privacy-aware video surveillance . . . . 279--290 Maryam Mehrnezhad and Ehsan Toreini and Siamak F. Shahandashti and Feng Hao Stealing PINs via mobile sensors: actual risk versus user perception . . . . . . 291--313 Sangita Roy and Ashok Singh Sairam Distributed star coloring of network for IP traceback . . . . . . . . . . . . . . 315--326 Sebastian Faust and Carmit Hazay and Daniele Venturi Outsourced pattern matching . . . . . . 327--346 Yujue Wang and HweeHwa Pang and Robert H. Deng Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management 347--363
Francisco-Javier González-Serrano and Adrián Amor-Martín and Jorge Casamayón-Antón Supervised machine learning using encrypted training data . . . . . . . . 365--377 HyoungMin Ham and JongHyup Lee and JooSeok Song Improved yoking proof protocols for preserving anonymity . . . . . . . . . . 379--393 Jean-Louis Lanet and Hél\`ene Le Bouder and Mohammed Benattou and Axel Legay When time meets test . . . . . . . . . . 395--409 Syed Taha Ali and Patrick McCorry and Peter Hyun-Jeen Lee and Feng Hao ZombieCoin 2.0: managing next-generation botnets using Bitcoin . . . . . . . . . 411--422 Zheng Yang and Chao Liu and Wanping Liu and Daigu Zhang and Song Luo A new strong security model for stateful authenticated group key exchange . . . . 423--440 Miguel Morales-Sandoval and Jose Luis Gonzalez-Compean and Arturo Diaz-Perez and Victor J. Sosa-Sosa A pairing-based cryptographic approach for data security in the cloud . . . . . 441--461 Yinhao Jiang and Willy Susilo and Yi Mu and Fuchun Guo Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts . . . . . . . . . . . . . . 463--475 Hongyong Jia and Yue Chen and Julong Lan and Kaixiang Huang and Jun Wang Efficient revocable hierarchical identity-based encryption using cryptographic accumulators . . . . . . . 477--490
Liqun Chen and Jinguang Han and Chris Mitchell Message from the Guest Editors . . . . . 491--492 Kazuya Imamura and Kazuhiko Minematsu and Tetsu Iwata Integrity analysis of authenticated encryption based on stream ciphers . . . 493--511 Kazuki Yoneyama and Reo Yoshida and Yuto Kawahara and Tetsutaro Kobayashi and Hitoshi Fuji and Tomohide Yamamoto Multi-cast key distribution: scalable, dynamic and provably secure construction 513--532 Yinhao Jiang and Willy Susilo and Yi Mu and Fuchun Guo Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes . . . . . . . . . . . . . . . 533--548 Yuxi Li and Fucai Zhou and Yuhai Qin and Muqing Lin and Zifeng Xu Integrity-verifiable conjunctive keyword searchable encryption in cloud storage 549--568 Carlos Ribeiro and Herbert Leitold and Simon Esposito and David Mitzam STORK: a real, heterogeneous, large-scale eID management system . . . 569--585 Franco Frattolillo Watermarking protocols: an excursus to motivate a new approach . . . . . . . . 587--601 Lanfranco Lopriore Access right management by extended password capabilities . . . . . . . . . 603--612
Ehab ElSalamouny and Sébastien Gambs Optimal noise functions for location privacy on continuous regions . . . . . 613--630 Keisuke Murakami and Takeaki Uno Optimization algorithm for $k$-anonymization of datasets with low information loss . . . . . . . . . . . . 631--644 Nolen Scaife and Henry Carter and Lyrissa Lidsky and Rachael L. Jones and Patrick Traynor OnionDNS: a seizure-resistant top-level domain . . . . . . . . . . . . . . . . . 645--660 Daiki Chiba and Takeshi Yagi and Mitsuaki Akiyama and Toshiki Shibahara and Tatsuya Mori and Shigeki Goto DomainProfiler: toward accurate and early discovery of domain names abused in future . . . . . . . . . . . . . . . 661--680 Gaute Wangen and Christoffer Hallstensen and Einar Snekkenes A framework for estimating information security risk assessment method completeness . . . . . . . . . . . . . . 681--699 Nina Bindel and Johannes Buchmann and Susanne Rieß Comparing apples with apples: performance analysis of lattice-based authenticated key exchange protocols . . 701--718 Aniello Cimitile and Francesco Mercaldo and Vittoria Nardone and Antonella Santone and Corrado Aaron Visaggio Talos: no more ransomware victims with formal methods . . . . . . . . . . . . . 719--738
Debasish Das and Utpal Sharma and D. K. Bhattacharyya Defeating SQL injection attack in authentication security: an experimental study . . . . . . . . . . . . . . . . . 1--22 Dipankar Dasgupta and Abhijit Kumar Nag and Denise Ferebee and Sanjib Kumar Saha and Kul Prasad Subedi and Arunava Roy and Alvaro Madero and Abel Sanchez and John R. Williams Design and implementation of Negative Authentication System . . . . . . . . . 23--48 Anastasios Stasinopoulos and Christoforos Ntantogian and Christos Xenakis Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications . . 49--72 Gerson de Souza Faria and Hae Yong Kim Differential audio analysis: a new side-channel attack on PIN pads . . . . 73--84 Abdelhak Mesbah and Jean-Louis Lanet and Mohamed Mezghiche Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM . . . . . . . . . . . . . . . . . 85--100 M. Francisca Hinarejos and Andreu-Pere Isern-Dey\`a and Josep-Lluís Ferrer-Gomila and Llorenç Huguet-Rotger Deployment and performance evaluation of mobile multicoupon solutions . . . . . . 101--124
Gábor György Gulyás and Sándor Imre Hiding information against structural re-identification . . . . . . . . . . . 125--139 Jian-Wu Zheng and Jing Zhao and Xin-Ping Guan Identifier discrimination: realizing selective-ID HIBE with authorized delegation and dedicated encryption privacy . . . . . . . . . . . . . . . . 141--162 Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya Cryptanalytic time-memory trade-off for password hashing schemes . . . . . . . . 163--180 Kamil Kluczniak and Jianfeng Wang and Xiaofeng Chen and Miroslaw Kutylowski Multi-device anonymous authentication 181--197 Ankit Shah and Rajesh Ganesan and Sushil Jajodia A methodology for ensuring fair allocation of CSOC effort for alert investigation . . . . . . . . . . . . . 199--218 Miguel Ros-Martín and Julián Salas and Jordi Casas-Roma Scalable non-deterministic clustering-based $k$-anonymization for rich networks . . . . . . . . . . . . . 219--238 Zeinab Joudaki and Julie Thorpe and Miguel Vargas Martin Enhanced Tacit Secrets: System-assigned passwords you can't write down, but don't need to . . . . . . . . . . . . . 239--255
Mario Luca Bernardi and Marta Cimitile Damiano Distante and Fabio Martinelli and Francesco Mercaldo Dynamic malware detection and phylogeny analysis using process mining . . . . . 257--284 Krzysztof Grining and Marek Klonowski and Piotr Syga On practical privacy-preserving fault-tolerant data aggregation . . . . 285--304 Aishwarya Vipul Vora and Saumya Hegde Keyword-based private searching on cloud data along with keyword association and dissociation using cuckoo filter . . . . 305--319 Ge Wu and Yi Mu and Willy Susilo and Fuchun Guo and Futai Zhang Threshold privacy-preserving cloud auditing with multiple uploaders . . . . 321--331 Benedikt Hiemenz and Michel Krämer Dynamic searchable symmetric encryption for storing geospatial data in the cloud 333--354 Wen Gao and Liqun Chen and Yupu Hu and Christopher J. P. Newton and Baocang Wang and Jiangshan Chen Lattice-based deniable ring signatures 355--370 Mohammad Hasan Samadani and Mehdi Berenjkoob and Marina Blanton Secure pattern matching based on bit parallelism . . . . . . . . . . . . . . 371--391
Yusuf Kulah and Berkay Dincer and Cemal Yilmaz and Erkay Savas SpyDetector: an approach for detecting side-channel attacks at runtime . . . . 393--422 Mohammad R. Faghani and Uyen T. Nguyen Mobile botnets meet social networks: design and analysis of a new type of botnet . . . . . . . . . . . . . . . . . 423--449 Cristina Pérez-Sol\`a and Sergi Delgado-Segura and Guillermo Navarro-Arribas and Jordi Herrera-Joancomartí Double-spending prevention for Bitcoin zero-confirmation transactions . . . . . 451--463 Mohsen Rezvani and David Rajaratnam and Aleksandar Ignjatovic and Maurice Pagnucco and Sanjay Jha Analyzing XACML policies using answer set programming . . . . . . . . . . . . 465--479 Anil Saini and Manoj Singh Gaur and Vijay Laxmi and Mauro Conti You click, I steal: analyzing and detecting click hijacking attacks in web pages . . . . . . . . . . . . . . . . . 481--504 João S. Resende and Patrícia R. Sousa and Rolando Martins and Luís Antunes Breaking MPC implementations through compression . . . . . . . . . . . . . . 505--518 Héctor Marco-Gisbert and Ismael Ripoll-Ripoll SSPFA: effective stack smashing protection for Android OS . . . . . . . 519--532
Oriol Farr\`as and Jordi Ribes-González Provably secure public-key encryption with conjunctive and subset keyword search . . . . . . . . . . . . . . . . . 533--548 James Dyer and Martin Dyer and Jie Xu Practical homomorphic encryption over the integers for secure computation in the cloud . . . . . . . . . . . . . . . 549--579 Kenta Takahashi and Takahiro Matsuda and Takao Murakami and Goichiro Hanaoka and Masakatsu Nishigaki Signature schemes with a fuzzy private key . . . . . . . . . . . . . . . . . . 581--617 Parvin Rastegari and Willy Susilo and Mohammad Dakhilalian Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model 619--635 Ricard Garra and Dominik Leibenger and Josep M. Miret and Francesc Sebé Repairing an aggregation-based smart metering system . . . . . . . . . . . . 637--646 Xiaoying Yu and Qi Liao Understanding user passwords through password prefix and postfix (P3) graph analysis and visualization . . . . . . . 647--663 Amel Meddeb Makhlouf and Mohsen Guizani SE-AOMDV: secure and efficient AOMDV routing protocol for vehicular communications . . . . . . . . . . . . . 665--676
Yixian Cai and George Karakostas and Alan Wassyng Secure and trusted partial grey-box verification . . . . . . . . . . . . . . 677--700 Tao Zhang and Wang Hao Lee and Mingyuan Gao and Jianying Zhou File Guard: automatic format-based media file sanitization . . . . . . . . . . . 701--713 R. Riesco and V. A. Villagrá Leveraging cyber threat intelligence for a dynamic risk framework . . . . . . . . 715--739 M. Yildirim and I. Mackie Encouraging users to improve password security and memorability . . . . . . . 741--759 Muhammad Aamir and Syed Mustafa Ali Zaidi DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation . . 761--785 Constantinos Patsakis and Fran Casino Hydras and IPFS: a decentralised playground for malware . . . . . . . . . 787--799 Ehsan Toreini and Siamak F. Shahandashti and Maryam Mehrnezhad and Feng Hao DOMtegrity: ensuring web page integrity against malicious browser extensions . . 801--814
Takeshi Takahashi and Rodrigo Roman Castro and Bilhanan Silverajan and Ryan K. L. Ko and Said Tabet Message from the guest editors . . . . . 1--2 Peter Aufner The IoT security gap: a look down into the valley between threat models and their implementation . . . . . . . . . . 3--14 Hiroaki Anada and Akira Kanaoka and Natsume Matsuzaki and Yohei Watanabe Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments) . . . . . . . . . . . . . 15--38 Raz Ben Yehuda and Nezer Jacob Zaidenberg Protection against reverse engineering in ARM . . . . . . . . . . . . . . . . . 39--51 Ili Ko and Desmond Chambers and Enda Barrett Feature dynamic deep learning approach for DDoS mitigation within the ISP domain . . . . . . . . . . . . . . . . . 53--70 Hayate Takase and Ryotaro Kobayashi and Masahiko Kato and Ren Ohmura A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information . . . . . . . . . 71--81 Seiichi Ozawa and Tao Ban and Naoki Hashimoto and Junji Nakazato and Jumpei Shimamura A study of IoT malware activities using association rule learning for darknet sensor data . . . . . . . . . . . . . . 83--92 Behshid Shayesteh and Vesal Hakami and Ahmad Akbari A trust management scheme for IoT-enabled environmental health/accessibility monitoring services 93--110 Davide Ferraris and Carmen Fernandez-Gago TrUStAPIS: a trust requirements elicitation method for IoT . . . . . . . 111--127 K. Sowjanya and Mou Dasgupta and Sangram Ray An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems . . . . . . . . . . . . . . . . 129--146
Rajendra Patil and Harsha Dudeja and Chirag Modi Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing . . . . . . . . . . . . . . . 147--162 Hasiba Ben Attia and Laid Kahloul Saber Benharzallah and Samir Bourekkache Using Hierarchical Timed Coloured Petri Nets in the formal study of TRBAC security policies . . . . . . . . . . . 163--187 Sridhar Adepu and Nandha Kumar Kandasamy and Jianying Zhou and Aditya Mathur Attacks on smart grid: power supply interruption and malicious power generation . . . . . . . . . . . . . . . 189--211 Peng Cheng and Ibrahim Ethem Bagci and Utz Roedig and Jeff Yan SonarSnoop: active acoustic side-channel attacks . . . . . . . . . . . . . . . . 213--228 Sanjeet Kumar Nayak and Somanath Tripathy SEDS: secure and efficient server-aided data deduplication scheme for cloud storage . . . . . . . . . . . . . . . . 229--240 Hasiba Ben Attia and Laid Kahloul and Saber Benharzallah and Samir Bourekkache Correction to: Using Hierarchical Timed Coloured Petri Nets in the formal study of TRBAC security policies . . . . . . . 241--241
Kuo-Hui Yeh and Chunhua Su and Robert H. Deng and Moti Yung and Miroslaw Kutylowski Special issue on security and privacy of blockchain technologies . . . . . . . . 243--244 Chun-I Fan and Yi-Fan Tseng and Hui-Po Su and Ruei-Hau Hsu and Hiroaki Kikuchi Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks . . . . . . . . . . . . . . . . 245--255 Alexander Yohan and Nai-Wei Lo FOTB: a secure blockchain-based firmware update framework for IoT environment . . 257--278 Weizhi Meng and Wenjuan Li and Laurence T. Yang and Peng Li Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain . . . . 279--290 Or Sattath On the insecurity of quantum Bitcoin mining . . . . . . . . . . . . . . . . . 291--302 Yuanjian Zhou and Yining Liu and Chengshun Jiang and Shulan Wang An improved FOO voting scheme using blockchain . . . . . . . . . . . . . . . 303--310 Zijian Bao and Wenbo Shi and Saru Kumari and Zhi-yin Kong and Chien-Ming Chen Lockmix: a secure and privacy-preserving mix service for Bitcoin anonymity . . . 311--321 Shufan Zhang and Lili Wang and Hu Xiong Chaintegrity: blockchain-enabled large-scale e-voting system with robustness and universal verifiability 323--341
Marco Tiloca and Gianluca Dini and Kiki Rizki and Shahid Raza Group rekeying based on member join history . . . . . . . . . . . . . . . . 343--381 Minhye Seo and Suhri Kim and Dong Hoon Lee and Jong Hwan Park EMBLEM: (R)LWE-based key encapsulation with a new multi-bit encoding method . . 383--399 Michael Hölzl and Michael Roland and Omid Mir and René Mayrhofer Disposable dynamic accumulators: toward practical privacy-preserving mobile eIDs with scalable revocation . . . . . . . . 401--417 Wakaha Ogata and Takaaki Otemori Security analysis of secure kNN and ranked keyword search over encrypted data . . . . . . . . . . . . . . . . . . 419--425 M. Pilz and F. Baghaei Naeini and K. Grammont and C. Smagghe and M. Davis and J.-C. Nebel and L. Al-Fagih and E. Pfluegel Security attacks on smart grid scheduling and their defences: a game-theoretic approach . . . . . . . . 427--443 Itaru Ueda and Daiki Miyahara and Akihiro Nishimura and Yu-ichi Hayashi and Takaaki Mizuki and Hideaki Sone Secure implementations of a random bisection cut . . . . . . . . . . . . . 445--452 Chunhui Wu and Xiaofeng Chen and Willy Susilo Concise ID-based mercurial functional commitments and applications to zero-knowledge sets . . . . . . . . . . 453--464 Jordi Casas-Roma DUEF-GA: data utility and privacy evaluation framework for graph anonymization . . . . . . . . . . . . . 465--478 Dimitris Mitropoulos and Thodoris Sotiropoulos and Nikos Koutsovasilis and Diomidis Spinellis PDGuard: an architecture for the control and secure processing of personal data 479--498
Mina Sheikhalishahi and Andrea Saracino and Fabio Martinelli and Antonio La Marra and Mohammed Mejri and Nadia Tawbi Digital Waste Disposal: an automated framework for analysis of spam emails 499--522 Areej Alzaidi and Suhair Alshehri and Seyed M. Buhari DroidRista: a highly precise static data flow analysis framework for Android applications . . . . . . . . . . . . . . 523--536 Vicenç Torra Random dictatorship for privacy-preserving social choice . . . . 537--545 Riccardo Bernardini and Roberto Rinaldo Analysis of some simple stabilizers for physically obfuscated keys . . . . . . . 547--565 Huy-Trung Nguyen and Quoc-Dung Ngo and Van-Hoang Le A novel graph-based approach for IoT botnet detection . . . . . . . . . . . . 567--577 Ahmed M. Manasrah and Areej R. AL-Rabadi and Najib A. Kofahi Key pre-distribution approach using block $ L U $ decomposition in wireless sensor network . . . . . . . . . . . . . 579--596 Sona Taheri and Adil M. Bagirov and Iqbal Gondal and Simon Brown Cyberattack triage using incremental clustering for intrusion detection systems . . . . . . . . . . . . . . . . 597--607
Britta Hale User-mediated authentication protocols and unforgeability in key collision . . 609--621 Pablo Picazo-Sanchez and Juan Tapiador and Gerardo Schneider After you, please: browser extensions order attacks and countermeasures . . . 623--638 Yanting Zhang and Jianwei Liu and Zongyang Zhang and Weiran Liu FDCO: attribute-based fast data cloud-outsourcing scheme for mobile devices . . . . . . . . . . . . . . . . 639--656 Kamalakanta Sethi and E. Sai Rupesh and Rahul Kumar and Padmalochan Bera and Y. Venu Madhav A context-aware robust intrusion detection system: a reinforcement learning-based approach . . . . . . . . 657--678 Reem Melki and Hassan N. Noura and Ali Chehab Lightweight multi-factor mutual authentication protocol for IoT devices 679--694 Tina Tavizi and Mehdi Shajari A language and a pattern system for temporal property specification: advanced metering infrastructure case study . . . . . . . . . . . . . . . . . 695--710 Lixue Sun and Chunxiang Xu and Yuan Zhang and Kefei Chen Public data integrity auditing without homomorphic authenticators from indistinguishability obfuscation . . . . 711--720
Iraklis Leontiadis and Ming Li Secure and collusion-resistant data aggregation from convertible tags . . . 1--20 Daniel Schlette and Fabian Böhm and Marco Caselli and Günther Pernul Measuring and visualizing cyber threat intelligence quality . . . . . . . . . . 21--38 Mohamed A. El-Zawawy and Eleonora Losiouk and Mauro Conti Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps 39--58 Pengfei Liu and Weiping Wang and Xi Luo and Haodong Wang and Chushu Liu NSDroid: efficient multi-classification of Android malware using neighborhood signature in local function call graphs 59--71 Jens Van den Broeck and Bart Coppens and Bjorn De Sutter Obfuscated integration of software protections . . . . . . . . . . . . . . 73--101 Huiwen Jia and Chunming Tang Cryptanalysis of a non-interactive deniable ring signature scheme . . . . . 103--112 Prajna Deshanta Ibnugraha and Lukito Edi Nugroho and Paulus Insap Santosa Risk model development for information security in organization environment based on business perspectives . . . . . 113--126
Wenjuan Li and Yu Wang and Man Ho Au Toward a blockchain-based framework for challenge-based collaborative intrusion detection . . . . . . . . . . . . . . . 127--139 Jia Xu and Jianying Zhou Strong leakage-resilient encryption: enhancing data confidentiality by hiding partial ciphertext . . . . . . . . . . . 141--159 Abu Faisal and Mohammad Zulkernine A secure architecture for TCP/UDP-based cloud communications . . . . . . . . . . 161--179 Jesus Solano and Luis Camacho and Martín Ochoa Combining behavioral biometrics and session context analytics to enhance risk-based static authentication in web applications . . . . . . . . . . . . . . 181--197 Sanjit Chatterjee and Manish Kesarwani and Akash Shah Secure and efficient wildcard search over encrypted data . . . . . . . . . . 199--244 Cristóbal Medina-López and L. G. Casado and Yuansong Qiao An SDN approach to detect targeted attacks in P2P fully connected overlays 245--255 Yuntao Wang and Tsuyoshi Takagi Studying lattice reduction algorithms improved by quick reordering technique 257--268
Abdelmadjid Benarfa and Muhammad Hassan and Eleonora Losiouk and Alberto Compagno and Mohamed Bachir Yagoubi and Mauro Conti ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN . . . . . . . . 269--285 M. Manulis and C. P. Bridges and R. Harrison and V. Sekar and A. Davis Cyber security in New Space . . . . . . 287--311 Harel Berger and Amit Z. Dvir and Moti Geva A wrinkle in time: a case study in DNS poisoning . . . . . . . . . . . . . . . 313--329 Soo-Yeon Ji and Bong-Keun Jeong and Dong Hyun Jeong Evaluating visualization approaches to detect abnormal activities in network traffic data . . . . . . . . . . . . . . 331--345 Georgios Spathoulas and Georgios Theodoridis and Georgios-Paraskevas Damiris Using homomorphic encryption for privacy-preserving clustering of intrusion detection alerts . . . . . . . 347--370 Gregorio Pitolli and Giuseppe Laurenza and Leonardo Aniello and Leonardo Querzoni and Roberto Baldoni MalFamAware: automatic family identification and malware classification through online clustering 371--386 Soosan Naderi Mighan and Mohsen Kahani A novel scalable intrusion detection system based on deep learning . . . . . 387--403 Mriganka Mandal Anonymity in traceable cloud data broadcast system with simultaneous individual messaging . . . . . . . . . . 405--430 Fawad Khan and Hui Li and Yinghui Zhang and Haider Abbas and Tahreem Yaqoob Efficient attribute-based encryption with repeated attributes optimization 431--444 Leonardo Aniello and Basel Halak and Peter Chai and Riddhi Dhall and Mircea Mihalea and Adrian Wilczynski Anti-BlUFf: towards counterfeit mitigation in IC supply chains using blockchain and PUF . . . . . . . . . . . 445--460
Toshihiro Yamauchi and Yohei Akao and Ryota Yoshitani and Yuichi Nakamura and Masaki Hashimoto Additional kernel observer: privilege escalation attack prevention mechanism focusing on system call privilege changes . . . . . . . . . . . . . . . . 461--473 Hyoseung Kim and Kwangsu Lee and Jong Hwan Park and Dong Hoon Lee Improving the security of direct anonymous attestation under host corruptions . . . . . . . . . . . . . . 475--492 Mouna Jouini and Latifa Ben Arfa Rabai and Ridha Khedri A quantitative assessment of security risks based on a multifaceted classification approach . . . . . . . . 493--510 Fatemeh Deldar and Mahdi Abadi Enhancing spatial and temporal utilities in differentially private moving objects database release . . . . . . . . . . . . 511--533 Kun Bi and Dezhi Han and Guichen Zhang and Kuan-Ching Li and Aniello Castiglione $K$ maximum probability attack paths generation algorithm for target nodes in networked systems . . . . . . . . . . . 535--551 Thomas Sermpinis and George Vlahavas and Konstantinos Karasavvas and Athena Vakali DeTRACT: a decentralized, transparent, immutable and open PKI certificate framework . . . . . . . . . . . . . . . 553--570 Davide Ferraris and Daniel Bastos and Carmen Fernandez-Gago and Fadi El-Moussa A trust model for popular smart home devices . . . . . . . . . . . . . . . . 571--587 Tian-Fu Lee and Hong-Ze Li and Yi-Pei Hsieh A blockchain-based medical data preservation scheme for telecare medical information systems . . . . . . . . . . 589--601 Trushna Parida and Suvrojit Das PageDumper: a mechanism to collect page table manipulation information at run-time . . . . . . . . . . . . . . . . 603--619 Mikaëla Ngamboé and Paul Berthier and Nader Ammari and Katia Dyrda and José M. Fernandez Risk assessment of cyber-attacks on telemetry-enabled cardiac implantable electronic devices (CIED) . . . . . . . 621--645
Juan Manuel Castelo Gómez and Javier Carrillo Mondéjar and José Roldán Gómez and José Luis Martínez Martínez A context-centered methodology for IoT forensic investigations . . . . . . . . 647--673 Liqun Chen and Kaibin Huang and Mark Manulis and Venkkatesh Sekar Password-authenticated searchable encryption . . . . . . . . . . . . . . . 675--693 Sabrina Sicari and Alessandra Rizzardi and Gianluca Dini and Pericle Perazzo and Michele La Manna and Alberto Coen-Porisini Attribute-based encryption and sticky policies for data access control in a smart home scenario: a comparison on networked smart object middleware . . . 695--713 Ricard Borges and Francesc Sebé An efficient privacy-preserving pay-by-phone system for regulated parking areas . . . . . . . . . . . . . 715--727 Daiki Miyahara and Itaru Ueda and Yu-ichi Hayashi and Takaaki Mizuki and Hideaki Sone Evaluating card-based protocols in terms of execution time . . . . . . . . . . . 729--740 Florian Menges and Benedikt Putz and Günther Pernul DEALER: decentralized incentives for threat intelligence reporting and exchange . . . . . . . . . . . . . . . . 741--761 Federica Granese and Daniele Gorla and Catuscia Palamidessi Enhanced models for privacy and utility in continuous-time diffusion networks 763--782
Edwin Franco Myloth Josephlal and Sridhar Adepu and Zheng Yang and Jianying Zhou Enabling isolation and recovery in PLC redundancy framework of metro train systems . . . . . . . . . . . . . . . . 783--795 Huseyin Alecakir and Burcu Can and Sevil Sen Attention: there is an inconsistency between Android permissions and application metadata! . . . . . . . . . 797--815 Pal-Stefan Murvay and Lucian Popa and Bogdan Groza Securing the controller area network with covert voltage channels . . . . . . 817--831 Yuta Imamura and Rintaro Orito and Hiroyuki Uekawa and Kritsana Chaikaew and Pattara Leelaprute and Masaya Sato and Toshihiro Yamauchi Web access monitoring mechanism via Android WebView for threat analysis . . 833--847 Benjamin Yankson Continuous improvement process (CIP)-based privacy-preserving framework for smart connected toys . . . . . . . . 849--869 Louis Cianciullo and Hossein Ghodosi Outsourced cheating detection for secret sharing . . . . . . . . . . . . . . . . 871--878 Charlotte Bonte and Nigel P. Smart and Titouan Tanguy Thresholdizing HashEdDSA: MPC to the Rescue . . . . . . . . . . . . . . . . . 879--894
Hee Yeon Kim and Ji Hoon Kim and Kyounggon Kim DAPP: automatic detection and analysis of prototype pollution vulnerability in \pkgNode.js modules . . . . . . . . . . 1--23 Hansub Shin and Sungyong Sim and Younho Lee A new smart smudge attack using CNN . . 25--36 George Stergiopoulos and Panagiotis Dedousis and Dimitris Gritzalis Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0 . . . . . . . . . . . . . . 37--59 Christos Lyvas and Christoforos Ntantogian and Christos Xenakis \pkg[m]allotROPism: a metamorphic engine for malicious software variation development . . . . . . . . . . . . . . 61--78 Mina Sheikhalishahi and Andrea Saracino and Antonio La Marra Privacy preserving data sharing and analysis for edge-based architectures 79--101 An Braeken Public key versus symmetric key cryptography in client--server authentication protocols . . . . . . . . 103--114 Jean-Paul A. Yaacoub and Hassan N. Noura and Ali Chehab Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations . . 115--158 Anonymous Track for surveys . . . . . . . . . . . 159--159
Aun Yichiet and Yen-Min Jasmina Khaw and Vasaki Ponnusamy A semantic-aware log generation method for network activities . . . . . . . . . 161--177 Franco Tommasi and Christian Catalano and Ivan Taurino Browser-in-the-Middle (BitM) attack . . 179--189 Roberto Vasconcelos Melo and Douglas D. J. de Macedo and Mauricio Martinuzzi Fiorenza ISM-AC: an immune security model based on alert correlation and software-defined networking . . . . . . 191--205 Hector B. Hougaard and Atsuko Miyaji Authenticated logarithmic-order supersingular isogeny group key exchange 207--221 Kindson Munonye and Martinek Péter Machine learning approach to vulnerability detection in OAuth 2.0 authentication and authorization flow 223--237 Metehan Yildirim and Emin Anarim Mitigating insider threat by profiling users based on mouse usage pattern: ensemble learning and frequency domain analysis . . . . . . . . . . . . . . . . 239--251 Alexander Bajic and Georg T. Becker Automated benchmark network diversification for realistic attack simulation with application to moving target defense . . . . . . . . . . . . . 253--278 Mamoru Mimura and Ryo Ito Applying NLP techniques to malware detection in a practical environment . . 279--291 László Erd\Hodi and Fabio Massimo Zennaro The Agent Web Model: modeling web hacking for reinforcement learning . . . 293--309 Junwon Lee and Heejo Lee An SSH predictive model using machine learning with web proxy session logs . . 311--322 Taha Elamine Hadjadj and Adel Bouhoula and Riadh Ksantini Optimization of parallel firewalls filtering rules . . . . . . . . . . . . 323--340 Zheng Zhang and Shaohao Xie and Fangguo Zhang Topology-hiding garbled circuits without universal circuits . . . . . . . . . . . 341--356 Ioannis Kazoleas and Panagiotis Karampelas A novel malicious remote administration tool using stealth and self-defense techniques . . . . . . . . . . . . . . . 357--378 Tahir Ahmad and Umberto Morelli and Nicola Zannone Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system . . . . . . . . . . . . . . 379--408 Zach Parish and Connor Cushing and Julie Thorpe Password guessers under a microscope: an in-depth analysis to inform deployments 409--425
Sairath Bhattacharjya and Hossein Saiedian Establishing and validating secured keys for IoT devices: using P3 connection model on a cloud-based architecture . . 427--436 Aaron Spence and Shaun Bangay Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures . . . 437--453 Cheolhee Park and Dowon Hong and Changho Seo Evaluating differentially private decision tree model over model inversion attack . . . . . . . . . . . . . . . . . 1--14 Saleh A. Alghamdi Novel trust-aware intrusion detection and prevention system for 5G MANET-Cloud 469--488 Amal Ghorbel and Mahmoud Ghorbel and Mohamed Jmaiel Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain . . . 489--508 Lu Zhang and Arie Taal and Paola Grosso A risk-level assessment system based on the STRIDE/DREAD model for digital data marketplaces . . . . . . . . . . . . . . 509--525 Jaya Singh and Ayush Sinha and Om Prakash Vyas Insider attack mitigation in a smart metering infrastructure using reputation score and blockchain technology . . . . 527--546 Mahdi Soltani and Mahdi Jafari Siavoshani and Amir Hossein Jahangir A content-based deep intrusion detection system . . . . . . . . . . . . . . . . . 547--562 Ferucio Laurentiu Tiplea Narrow privacy and desynchronization in Vaudenay's RFID model . . . . . . . . . 563--575 Haibat Khan and Benjamin Dowling and Keith M. Martin Pragmatic authenticated key agreement for IEEE Std 802.15.6 . . . . . . . . . 577--595 Bradley Potteiger and Feiyang Cai and Xenofon Koutsoukos Data space randomization for securing cyber-physical systems . . . . . . . . . 597--610 Noureddine Amraoui and Belhassen Zouari Anomalous behavior detection-based approach for authenticating smart home system users . . . . . . . . . . . . . . 611--636 Ankit Shah and Rajesh Ganesan and Hasan Cam Maintaining the level of operational effectiveness of a CSOC under adverse conditions . . . . . . . . . . . . . . . 637--651 Maryam Zulfiqar and Muhammad Umar Janjua and Jack W. Stokes Tracking adoption of revocation and cryptographic features in X.509 certificates . . . . . . . . . . . . . . 653--668 P. D'Arco and R. De Prisco and R. Zaccagnino Gossamer: weaknesses and performance . . 669--687 Xiaokuan Zhang and Jihun Hamm and Yinqian Zhang Defeating traffic analysis via differential privacy: a case study on streaming traffic . . . . . . . . . . . 689--706
Andrea Huszti and Szabolcs Kovács and Norbert Oláh Scalable, password-based and threshold authentication for smart homes . . . . . 707--723 Jinsung Kim and Younghoon Ban and Jeong Hyun Yi MAPAS: a practical deep learning-based Android malware detection system . . . . 725--738 Mahdieh Zabihimayvan and Derek Doran A first look at references from the dark to the surface web world: a case study in Tor . . . . . . . . . . . . . . . . . 739--755 Kazuki Koike and Ryotaro Kobayashi and Masahiko Katoh IoT-oriented high-efficient anti-malware hardware focusing on time series metadata extractable from inside a processor core . . . . . . . . . . . . . 1--19 Ryan Karl and Hannah Burchfield and Taeho Jung Developing non-interactive MPC with trusted hardware for enhanced security 777--797 Qian Gong and Phil DeMar and Mine Altunay ThunderSecure: deploying real-time intrusion detection for 100G research networks by leveraging stream-based features and one-class classification network . . . . . . . . . . . . . . . . 799--812 Kengo Zenitani A multi-objective cost-benefit optimization algorithm for network hardening . . . . . . . . . . . . . . . 813--832 Yuichi Komano and Takaaki Mizuki Coin-based Secure Computations . . . . . 833--846 Munshi Saifuzzaman and Tajkia Nuri Ananna and Farida Chowdhury A systematic literature review on wearable health data publishing under differential privacy . . . . . . . . . . 847--872 Ankit Agrawal and Ashutosh Bhatia and Rekha Kaushik A survey on analyzing encrypted network traffic of mobile devices . . . . . . . 873--915 Unsub Zia and Mark McCartney and Ali Sajjad Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains . . . . . . . 917--935 Teik Guan Tan and Pawel Szalachowski and Jianying Zhou Challenges of post-quantum digital signing in real-world applications: a survey . . . . . . . . . . . . . . . . . 937--952
Jai Hyun Park and Jung Hee Cheon and Dongwoo Kim Efficient verifiable computation over quotient polynomial rings . . . . . . . 953--971 Christos Lyvas and Costas Lambrinoudakis and Dimitris Geneiatakis \pkgIntentAuth: Securing Android's intent-based inter-process communication 973--982 Ram Govind Singh and Ananya Shrivastava and Sushmita Ruj A Digital Asset Inheritance Model to Convey Online Persona Posthumously . . . 983--1003 E. Agostini and M. Bernaschi BitCracker: BitLocker meets GPUs . . . . 1005--1018 Ilyes Ahmim and Nacira Ghoualmi-Zine and Marwa Ahmim Security analysis on ``Three-factor authentication protocol using physical unclonable function for IoV'' . . . . . 1019--1026 Marcel Armour and Bertram Poettering Algorithm substitution attacks against receivers . . . . . . . . . . . . . . . 1027--1050 Seyit Camtepe and Jarek Duda and Josef Pieprzyk ANS-based compression and encryption with 128-bit security . . . . . . . . . 1051--1067 Rosa Peric\`as-Gornals and Maci\`a Mut-Puigserver and M. Magdalena Payeras-Capell\`a Highly private blockchain-based management system for digital COVID-19 certificates . . . . . . . . . . . . . . 1069--1090 Vasileios Vlachos and Yannis C. Stamatiou and Sotiris Nikoletseas The SAINT observatory subsystem: an open-source intelligence tool for uncovering cybersecurity threats . . . . 1091--1106 Beyza Cevik and Nur Altiparmak and Sevil Sen Lib2Desc: automatic generation of security-centric Android app descriptions using third-party libraries 1107--1125 Hiroki Inayoshi and Shohei Kakei and Shoichi Saito Value-utilized taint propagation: toward precise detection of apps' information flows across Android API calls . . . . . 1127--1149 Ricard Borges and Francesc Sebé and Magda Valls An anonymous and unlinkable electronic toll collection system . . . . . . . . . 1151--1162 Rabari Jeet and P. Arun Raj Kumar A survey on interest packet flooding attacks and its countermeasures in named data networking . . . . . . . . . . . . 1163--1187 Andrew D. Syrmakesis and Cristina Alcaraz and Nikos D. Hatziargyriou Classifying resilience approaches for protecting smart grids against cyber threats . . . . . . . . . . . . . . . . 1189--1210
Irini Lygerou and Shreyas Srinivasa and Dimitris Gritzalis A decentralized honeypot for IoT Protocols based on Android devices . . . 1211--1222 Bingxue Fu and Xing Yu and Tao Feng CT-GCN: a phishing identification model for blockchain cryptocurrency transactions . . . . . . . . . . . . . . 1223--1232 Matthias Templ and Murat Sariyar A systematic overview on methods to protect sensitive data provided for various analyses . . . . . . . . . . . . 1233--1246 Abdenour Kifouche and Mohamed Salah Azzaz and Remy Kocik Design and implementation of a new lightweight chaos-based cryptosystem to secure IoT communications . . . . . . . 1247--1262 C. Prajisha and A. R. Vasudevan An efficient intrusion detection system for MQTT-IoT using enhanced chaotic salp swarm algorithm and LightGBM . . . . . . 1263--1282 Pablo Picazo-Sanchez and Lara Ortiz-Martin and Andrei Sabelfeld Are chrome extensions compliant with the spirit of least privilege? . . . . . . . 1283--1297 Kayode S. Adewole and Vicenç Torra DFTMicroagg: a dual-level anonymization algorithm for smart grid data . . . . . 1299--1321 Florian Skopik and Arndt Bonitz and Günter Göhler From scattered data to actionable knowledge: flexible cyber security reporting in the military domain . . . . 1323--1347 Vicenç Torra and Edgar Galván and Guillermo Navarro-Arribas PSO + FL = PAASO: particle swarm optimization + federated learning = privacy-aware agent swarm optimization 1349--1359 Xiaodong Yang and Wenjia Wang and Caifen Wang Security analysis and improvement of a privacy-preserving authentication scheme in VANET . . . . . . . . . . . . . . . . 1361--1371 Mohammad Abdussami and Ruhul Amin and Satyanarayana Vollala LASSI: a lightweight authenticated key agreement protocol for fog-enabled IoT deployment . . . . . . . . . . . . . . . 1373--1387 R. Kishore and I. Ioannou and A. Pitsillides A security protocol for D2D communications in 5G networks using elliptic curve cryptography . . . . . . 1389--1408 Raju Kumar and Aruna Bhat A study of machine learning-based models for detection, control, and mitigation of cyberbullying in online social media 1409--1431
Gulab Sah and Subhasish Banerjee and Sweety Singh Intrusion detection system over real-time data traffic using machine learning methods with feature selection approaches . . . . . . . . . . . . . . . 1--27 Pablo Picazo-Sanchez and Magnus Almgren Gridchain: an investigation of privacy for the future local distribution grid 29--46 Abdelhakim Hannousse and Mohamed Cherif Nait-Hamoud and Salima Yahiouche A deep learner model for multi-language webshell detection . . . . . . . . . . . 47--61 Seema Sangari and Eric Dallal and Michael Whitman Modeling reporting delays in cyber incidents: an industry-level comparison 63--76 Branislav Raji\'c and Zarko Stanisavljevi\'c and Pavle Vuleti\'c Early web application attack detection using network traffic analysis . . . . . 77--91 Nemi Chandra Rathore and Somanath Tripathy Restricting data-leakage using fine-grained access control on OSN objects . . . . . . . . . . . . . . . . 93--106 Pinar G. Balikcioglu and Melih Sirlanci and Ozge A. Kucuk and Bulut Ulukapi and Ramazan K. Turkmen and Cengiz Acarturk Malicious code detection in Android: the role of sequence characteristics and disassembling methods . . . . . . . . . 107--118 Amit Sharma and Brij B. Gupta and Awadhesh Kumar Singh and V. K. Saraswat A novel approach for detection of APT malware using multi-dimensional hybrid Bayesian belief network . . . . . . . . 119--135 Sajad Hamzenejadi and Mahdieh Ghazvini and Seyedamiryousef Hosseini Mobile botnet detection: a comprehensive survey . . . . . . . . . . . . . . . . . 137--175 Shubhangi Rastogi and Divya Bansal A review on fake news detection 3T's: typology, time of detection, taxonomies 177--212 Emre Süren and Fredrik Heiding and Johannes Olegård and Robert Lagerström PatrIoT: practical and agile threat research for IoT . . . . . . . . . . . . 213--233 Safa Mohamed and Ridha Ejbali Deep SARSA-based reinforcement learning approach for anomaly network intrusion detection system . . . . . . . . . . . . 235--247 Ahmed Amro and Vasileios Gkioulos Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth . . . . . . . . . . . . 249--288 Luay Alawneh and Mohammad Al-Zinati and Mahmoud Al-Ayyoub User identification using deep learning and human activity mobile sensor data 289--301 Irini Lygerou and Shreyas Srinivasa and Emmanouil Vasilomanolakis and George Stergiopoulos and Dimitris Gritzalis Correction to: A decentralized honeypot for IoT Protocols based on Android devices . . . . . . . . . . . . . . . . 303--303
Qin An and Wilson Cheong Hin Hong and XiaoShu Xu and Yunfeng Zhang and Kimberly Kolletar-Zhu How education level influences Internet security knowledge, behaviour, and attitude: a comparison among undergraduates, postgraduates and working graduates . . . . . . . . . . . 305--317 Murat Kuzlu and Ferhat Ozgur Catak and Umit Cali and Evren Catak and Ozgur Guler Adversarial security mitigations of mmWave beamforming prediction models using defensive distillation and adversarial retraining . . . . . . . . . 319--332 Swati and Sangita Roy and Jawar Singh and Jimson Mathew Design and analysis of DDoS mitigating network architecture . . . . . . . . . . 333--345 Efstratios Chatzoglou and Vasileios Kouliaridis and Georgios Karopoulos and Georgios Kambourakis Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study . . . . . . . . . . . . . . . . . 347--365 Reza Mohammadi and Chhagan Lal and Mauro Conti HTTPScout: a Machine Learning based Countermeasure for HTTP Flood Attacks in SDN . . . . . . . . . . . . . . . . . . 367--379 Panagiotis Andriotis and Myles Kirby and Atsuhiro Takasu \pkgBu-Dash: a universal and dynamic graphical password scheme (extended version) . . . . . . . . . . . . . . . . 381--401 Kailash Chandra Mishra and Subrata Dutta A simple and secure user authentication scheme using Map Street View with usability analysis based on ISO/IEC 25022 . . . . . . . . . . . . . . . . . 403--415 Kapilan Kulayan Arumugam Gandhi and Chamundeswari Arumugam Toward a unified and secure approach for extraction of forensic digital evidence from an IoT device . . . . . . . . . . . 417--431 Hanxun Zhou and Longyu Kang and Hong Pan and Guo Wei and Yong Feng An intrusion detection approach based on incremental long short-term memory . . . 433--446 Gorka Guardiola-Múzquiz and Enrique Soriano-Salvador SealFSv2: combining storage-based and ratcheting for tamper-evident logging 447--466 Bander Alzahrani and Nikos Fotiou and Aiiad Albeshri and Abdullah Almuhaimeed and Khalid Alsubhi Distributed access control for information-centric networking architectures using verifiable credentials . . . . . . . . . . . . . . 467--478 Melike Burakgazi Bilgen and Osman Abul and Kemal Bicakci Authentication-enabled attribute-based access control for smart homes . . . . . 479--495 Kai Wang and Jinxia Wu and Tianqing Zhu and Wei Ren and Ying Hong Defense against membership inference attack in graph neural networks through graph perturbation . . . . . . . . . . . 497--509 Hira Ahmad and Muhammad Ahtazaz Ahsan and Adnan Noor Mian Trends in publishing blockchain surveys: a bibliometric perspective . . . . . . . 511--523 Haya Brama and Lihi Dery and Tal Grinshpoun Evaluation of neural networks defenses and attacks using NDCG and reciprocal rank metrics . . . . . . . . . . . . . . 525--540
Alberto Huertas Celdrán and Pedro Miguel Sánchez Sánchez and Miguel Azor\'ìn Castillo and Gérôme Bovet and Gregorio Mart\'ìnez Pérez and Burkhard Stiller Intelligent and behavioral-based detection of malware in IoT spectrum sensors . . . . . . . . . . . . . . . . 541--561 Aida Akbarzadeh and Sokratis K. Katsikas Dependency-based security risk assessment for cyber-physical systems 563--578 Martin Higgins and Wangkun Xu and Fei Teng and Thomas Parisini Cyber-physical risk assessment for false data injection attacks considering moving target defences . . . . . . . . . 579--589 Eranga Bandara and Xueping Liang and Sachin Shetty and Ravi Mukkamala and Peter Foytik and Nalin Ranasinghe and Kasun De Zoysa Octopus: privacy preserving peer-to-peer transactions system with InterPlanetary file system (IPFS) . . . . . . . . . . . 591--609 Taher Al-Shehari and Rakan A. Alsowail Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection . . 611--629 Marmar Orooji and Seyedeh Shaghayegh Rabbanian and Gerald M. Knapp Flexible adversary disclosure risk measure for identity and attribute disclosure attacks . . . . . . . . . . . 631--645 Imdad Ullah and Roksana Boreli and Salil S. Kanhere Privacy in targeted advertising on mobile devices: a survey . . . . . . . . 647--678 Yingchun Chen and Jinguo Li and Naiwang Guo Efficient and interpretable SRU combined with TabNet for network intrusion detection in the big data environment 679--689 Juan Miguel López Velásquez and Sergio Mauricio Mart\'ìnez Monterrubio and Luis Enrique Sánchez Crespo and David Garcia Rosado Systematic review of SIEM technology: SIEM--SC birth . . . . . . . . . . . . . 691--711 Rudolf Lovrenci\'c and Dejan Skvorc Multi-cloud applications: data and code fragmentation for improved security . . 713--721 Guangjia Song and Jianhua Hu and Hui Wang A novel frame switching model based on virtual MAC in SDN . . . . . . . . . . . 723--736 Aggeliki Tsohou and Vasiliki Diamantopoulou and Stefanos Gritzalis and Costas Lambrinoudakis Cyber insurance: state of the art, trends and future directions . . . . . . 737--748
Jasleen Kaur and Alka Agrawal and Raees Ahmad Khan P2ADF: a privacy-preserving attack detection framework in fog-IoT environment . . . . . . . . . . . . . . 749--762 Ruqayah Al-ani and Thar Baker and Bo Zhou and Qi Shi Privacy and safety improvement of VANET data via a safety-related privacy scheme 763--783 Eirini Molla and Panagiotis Rizomiliotis and Stefanos Gritzalis Efficient searchable symmetric encryption supporting range queries . . 785--798 Shweta Mittal and Mohona Ghosh A novel two-level secure access control approach for blockchain platform in healthcare . . . . . . . . . . . . . . . 799--817 Panagiotis Grontas and Aris Pagourtzis Anonymity and everlasting privacy in electronic voting . . . . . . . . . . . 819--832 Francisco T. Chimuco and João B. F. Sequeiros and Carolina Galvão Lopes and Tiago M. C. Simões and Mário M. Freire and Pedro R. M. Inácio Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation . . . . . . . . . . 833--867 Leonardo Dias Menezes and Luciano Vieira de Araújo and Marislei Nishijima Blockchain and smart contract architecture for notaries services under civil law: a Brazilian experience . . . 869--880 Pankaj Pandey and Nishchol Mishra Phish-Sight: a new approach for phishing detection using dominant colors on web pages and machine learning . . . . . . . 881--891 Brandon Bowen and Anitha Chennamaneni and Ana Goulart and Daisy Lin BLoCNet: a hybrid, dataset-independent intrusion detection system using deep learning . . . . . . . . . . . . . . . . 893--917 Zhen Yang and Shisong Yang and Yunbo Huang and José-Fernán Mart\'ìnez and Lourdes López and Yuwen Chen AAIA: an efficient aggregation scheme against inverting attack for federated learning . . . . . . . . . . . . . . . . 919--930 Srividya Bhaskara and Santosh Singh Rathore Causal effect analysis-based intrusion detection system for IoT applications 931--946 Mohanad Sarhan and Siamak Layeghy and Marcus Gallagher and Marius Portmann From zero-shot machine learning to zero-day attack detection . . . . . . . 947--959 Abhay Deep Seth and Santosh Biswas and Amit Kumar Dhar LDES: detector design for version number attack detection using linear temporal logic based on discrete event system . . 961--985 Omer Faruk Tuna and Ferhat Ozgur Catak and M. Taner Eskil TENET: a new hybrid network architecture for adversarial defense . . . . . . . . 987--1004 M. N. Katsantonis and A. Manikas and I. Mavridis and D. Gritzalis Cyber range design framework for cyber security education and training . . . . 1005--1027 Mitra Alidoosti and Alireza Nowroozi and Ahmad Nickabadi Business-layer client-side racer: dynamic security testing of the web application against client-side race condition in the business layer . . . . 1029--1054 Nizamud Din and Abdul Waheed and Shamsher Ullah and Noor Ul Amin and Gautam Srivastava and Farhan Ullah and Jerry Chun-Wei Lin A typology of secure multicast communication over 5 G/6 G networks . . 1055--1073 Hayette Zeghida and Mehdi Boulaiche and Ramdane Chikh Securing MQTT protocol for IoT environment using IDS based on ensemble learning . . . . . . . . . . . . . . . . 1075--1086
Moon-Seok Kim and Sungho Kim and Sang-Kyung Yoo and Bong-Soo Lee and Ji-Man Yu and Il-Woong Tcho and Yang-Kyu Choi Error reduction of SRAM-based physically unclonable function for chip authentication . . . . . . . . . . . . . 1087--1098 Feiyang Cai and Xenofon Koutsoukos Real-time detection of deception attacks in cyber-physical systems . . . . . . . 1099--1114 Sibo Shi and Shengwei Tian and Bo Wang and Tiejun Zhou and Guanxin Chen SFCGDroid: Android malware detection based on sensitive function call graph 1115--1124 Oluwadamilare Harazeem Abdulganiyu and Taha Ait Tchakoucht and Yakub Kayode Saheed A systematic literature review for network intrusion detection system (IDS) 1125--1162 Reza Mohammadi A comprehensive Blockchain-oriented secure framework for SDN/Fog-based IoUT 1163--1175 Shahriar Mohammadi and Mehdi Babagoli A novel hybrid hunger games algorithm for intrusion detection systems based on nonlinear regression modeling . . . . . 1177--1195 Suhail Ahmad and Ajaz Hussain Mir Protection of centralized SDN control plane from high-rate Packet--In messages 1197--1206 Or Naim and Doron Cohen and Irad Ben-Gal Malicious website identification using design attribute learning . . . . . . . 1207--1217 Wenjuan Li and Yu Wang and Jin Li A blockchain-enabled collaborative intrusion detection framework for SDN-assisted cyber-physical systems . . 1219--1230 Andreas Grüner and Alexander Mühle and Niko Lockenvitz and Christoph Meinel Analyzing and comparing the security of self-sovereign identity management systems through threat modeling . . . . 1231--1248 Denghui Zhang and Zhaoquan Gu and Lijing Ren and Muhammad Shafiq An interpretability security framework for intelligent decision support systems based on saliency map . . . . . . . . . 1249--1260 Suryakanta Panda and Samrat Mondal and Ashok Kumar Das and Willy Susilo Secure access privilege delegation using attribute-based encryption . . . . . . . 1261--1276 Sara Baradaran and Mahdi Heidari and Ali Kamali and Maryam Mouzarani A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes . . 1277--1290 Thomas Prantl and André Bauer and Lukas Iffländer and Christian Krupitzer and Samuel Kounev Recommendation of secure group communication schemes using multi-objective optimization . . . . . . 1291--1332 Alexandros Zacharis and Constantinos Patsakis AiCEF: an AI-assisted cyber exercise content generation framework using named entity recognition . . . . . . . . . . . 1333--1354 Md. Mumtahin Habib Ullah Mazumder and Md. Eusha Kadir and Sadia Sharmin and Md. Shariful Islam and Muhammad Mahbub Alam cFEM: a cluster based feature extraction method for network intrusion detection 1355--1369 S. Asha and P. Vinod and Varun G. Menon A defensive framework for deepfake detection under adversarial settings using temporal and spatial features . . 1371--1382 Feiyang Cai and Xenofon Koutsoukos Correction: Real-time detection of deception attacks in cyber-physical systems . . . . . . . . . . . . . . . . 1383--1383 Hamed Sepehrzadeh A method for insider threat assessment by modeling the internal employee interactions . . . . . . . . . . . . . . 1385--1393 Cristina Alcaraz and Jesus Cumplido and Alicia Triviño OCPP in the spotlight: threats and countermeasures for electric vehicle charging infrastructures 4.0 . . . . . . 1395--1421 Runzheng Wang and Jian Gao and Shuhua Huang AIHGAT: a novel method of malware detection and homology analysis using assembly instruction heterogeneous graph 1423--1443 Mar Gimenez-Aguilar and Jose Maria de Fuentes and Lorena Gonzalez-Manzano Malicious uses of blockchains by malware: from the analysis to Smart--Zephyrus . . . . . . . . . . . . 1445--1480 Taqwa Ahmed Alhaj and Maheyzah Md Siraj and Anazida Zainal and Inshirah Idris and Anjum Nazir and Fatin Elhaj and Tasneem Darwish An effective attack scenario construction model based on identification of attack steps and stages . . . . . . . . . . . . . . . . . 1481--1496 Yin Sheng Zhang Analysis of OSPU security effect and data assembly verification under semi-network OS architecture . . . . . . 1497--1509 Alexandros Papanikolaou and Aggelos Alevizopoulos and Christos Ilioudis and Konstantinos Demertzis and Konstantinos Rantos An autoML network traffic analyzer for cyber threat detection . . . . . . . . . 1511--1530
Nabin Chowdhury and Vasileios Gkioulos A personalized learning theory-based cyber-security training exercise . . . . 1531--1546 Ngoc T. Luong and Doan Hoang BAPRP: a machine learning approach to blackhole attacks prevention routing protocol in vehicular Ad Hoc networks 1547--1566 Lorena González-Manzano and José M. de Fuentes and Flavio Lombardi and Cristina Ramos A technical characterization of APTs by leveraging public resources . . . . . . 1567--1584 Rabie Barhoun and Maryam Ed-daibouni Trust modeling in a distributed collaborative environment: application to a collaborative healthcare system . . 1585--1604 Lorenzo Rovida Fast but approximate homomorphic $k$-means based on masking technique . . 1605--1619 Ankur Shukla and Basel Katt and Muhammad Mudassar Yamin A quantitative framework for security assurance evaluation and selection of cloud services: a case study . . . . . . 1621--1650 Taiwo Blessing Ogunseyi and Cossi Blaise Avoussoukpo and Yiqiang Jiang A systematic review of privacy techniques in recommendation systems . . 1651--1664 Christian López and Jesús Solano and Esteban Rivera and Lizzy Tengana and Johana Florez-Lozano and Alejandra Castelblanco and Mart\'ìn Ochoa Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques . . . . . . . . . . . . . . . 1665--1685 Mo'ath Zyout and Raed Shatnawi and Hassan Najadat Malware classification approaches utilizing binary and text encoding of permissions . . . . . . . . . . . . . . 1687--1712 Mathias Ekstedt and Zeeshan Afzal and Preetam Mukherjee and Simon Hacks and Robert Lagerström Yet another cybersecurity risk assessment framework . . . . . . . . . . 1713--1729 K. S. Kuppusamy and G. Balayogi Accessible password strength assessment method for visually challenged users . . 1731--1741 Saurabh Pandey and Nitesh Kumar and Anand Handa and Sandeep Kumar Shukla Evading malware classifiers using RL agent with action-mask . . . . . . . . . 1743--1763 Zhenyu Guan and Lixin Zhang and Bohan Huang and Bihe Zhao and Song Bian Adaptive hyperparameter optimization for black-box adversarial attack . . . . . . 1765--1779 Muhammad Ali and Mansoor-ul- Haque and Muhammad Hanif Durad and Anila Usman and Syed Muhammad Mohsin and Hana Mujlid and Carsten Maple Effective network intrusion detection using stacking-based ensemble approach 1781--1798 Srinidhi Madabhushi and Rinku Dewri A survey of anomaly detection methods for power grids . . . . . . . . . . . . 1799--1832 Ahmed Fraz Baig and Sigurd Eskeland and Bian Yang Privacy-preserving continuous authentication using behavioral biometrics . . . . . . . . . . . . . . . 1833--1847 Nasir Ibrahim and Harin Sellahewa A cross-setting study of user unlocking behaviour in a graphical authentication scheme: a case study on Android Pattern Unlock . . . . . . . . . . . . . . . . . 1849--1863 Kristijan Ziza and Predrag Tadi\'c and Pavle Vuleti\'c DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviour . . . . . 1865--1880 M. Sneha and A. Keerthan Kumar and Nikhil V. Hegde and A. S. Anish and G. Shobha RADS: a real-time anomaly detection model for software-defined networks using machine learning . . . . . . . . . 1881--1891 Christos Smiliotopoulos and Georgios Kambourakis and Konstantia Barbatsalou On the detection of lateral movement through supervised machine learning and an open-source tool to create turnkey datasets from Sysmon logs . . . . . . . 1893--1919 Dmitry Levshun and Olga Tushkanova and Andrey Chechulin Two-model active learning approach for inappropriate information classification in social networks . . . . . . . . . . . 1921--1936 Najet Hamdi Federated learning-based intrusion detection system for Internet of Things 1937--1948 Sarabjeet Kaur and Amanpreet Kaur Sandhu and Abhinav Bhandari Investigation of application layer DDoS attacks in legacy and software-defined networks: a comprehensive review . . . . 1949--1988 Saida Farhat and Manel Abdelkader and Amel Meddeb-Makhlouf and Faouzi Zarai CADS-ML/DL: efficient cloud-based multi-attack detection system . . . . . 1989--2013 Vicenç Torra and Guillermo Navarro-Arribas Attribute disclosure risk for $k$-anonymity: the case of numerical data . . . . . . . . . . . . . . . . . . 2015--2024
Arun Sekar Rajasekaran and M. Azees A fog-based anonymous authentication scheme with location privacy for wireless body area network with FPGA implementation . . . . . . . . . . . . . 1--13 Hakima Rym Rahal and Sihem Slatnia and Okba Kazar and Ezedin Barka and Saad Harous Blockchain-based multi-diagnosis deep learning application for various diseases classification . . . . . . . . 15--30 Stefano Silvestri and Shareful Islam and Dmitry Amelin and Gabriele Weiler and Spyridon Papastergiou and Mario Ciampi Cyber threat assessment and management for securing healthcare ecosystems using natural language processing . . . . . . 31--50 Osama Bassam J. Rabie and Shitharth Selvarajan and Tawfiq Hasanin and Gouse Baig Mohammed and Abddulrhman M. Alshareef and Mueen Uddin A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs) . . . . . . . . 51--80 Afnan A. Alharbi Federated transfer learning for attack detection for Internet of Medical Things 81--100 Alexandre Rekeraho and Daniel Tudor Cotfas and Petru Adrian Cotfas and Titus Constantin B\ualan and Emmanuel Tuyishime and Rebecca Acheampong Cybersecurity challenges in IoT-based smart renewable energy . . . . . . . . . 101--117 Sofiane Lagraa and Martin Husák and Hamida Seba and Satyanarayana Vuppala and Radu State and Moussa Ouedraogo A review on graph-based approaches for network security monitoring and botnet detection . . . . . . . . . . . . . . . 119--140 Believe Ayodele and Victor Buttigieg SDN as a defence mechanism: a comprehensive survey . . . . . . . . . . 141--185 Konstantinos Adamos and George Stergiopoulos and Michalis Karamousadakis and Dimitris Gritzalis Enhancing attack resilience of cyber-physical systems through state dependency graph models . . . . . . . . 187--198 K. Dinesh and S. V. N. Santhosh Kumar Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network . . . . . . . . . . . . . . . . 199--223 Åvald Åslaugson Sommervoll and László Erd\Hodi and Fabio Massimo Zennaro Simulating all archetypes of SQL injection vulnerability exploitation using reinforcement learning agents . . 225--246 Hakan Kekül and Burhan Ergen and Halil Arslan Estimating vulnerability metrics with word embedding and multiclass classification methods . . . . . . . . . 247--270 Silviu Vi\ctel and Marilena Lupa\cscu and Drago\cs Teodor Gavrilu\ct and Henri Luchian Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware . . . . . . . 271--297 Gwonsang Ryu and Daeseon Choi Detection of adversarial attacks based on differences in image entropy . . . . 299--314 Bhavya Dhingra and Vidhi Jain and Deepak Kumar Sharma and Koyel Datta Gupta and Deepika Kukreja RLET: a lightweight model for ubiquitous multi-class intrusion detection in sustainable and secured smart environment . . . . . . . . . . . . . . 315--330 Philgeun Jin and Namjun Kim and Sangjin Lee and Doowon Jeong Forensic investigation of the dark web on the Tor network: pathway toward the surface web . . . . . . . . . . . . . . 331--346 Aristeidis Farao and Georgios Paparis and Sakshyam Panda and Emmanouil Panaousis and Apostolis Zarras and Christos Xenakis INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain . . . . . 347--371 Fabrice Mvah and Vianney Kengne Tchendji and Clémentin Tayou Djamegni and Ahmed H. Anwar and Deepak K. Tosh and Charles Kamhoua GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks . . . . . . . 373--387 Jun Narita and Takao Murakami and Hideitsu Hino and Masakatsu Nishigaki and Tetsushi Ohki Synthesizing differentially private location traces including co-locations 389--410 Tao Feng and Wentao Jin and Minghu Zhang and Lu Zheng Security assessment and improvement of smart grid NIKE protocol . . . . . . . . 411--429 Oussama Amine and Karim Baghery and Zaira Pindado and Carla R\`afols Simulation extractable versions of Groth's zk-SNARK revisited . . . . . . . 431--445 Easwar Vivek Mangipudi and Krutarth Rao and Jeremy Clark and Aniket Kate Pepal: Penalizing multimedia breaches and partial leakages . . . . . . . . . . 447--465 Marius Elmiger and Mouad Lemoudden and Nikolaos Pitropakis and William J. Buchanan Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant . . . . . . . . . 467--485 Partha Sarathi Chakraborty and Somanath Tripathy and Sanjeet Kumar Nayak BASPED: Blockchain assisted searchable public key encryption over outsourced data . . . . . . . . . . . . . . . . . . 487--503 Muhammad Adnan and Muhammad Osama Imam and Muhammad Furqan Javed and Iqbal Murtza Improving spam email classification accuracy using ensemble techniques: a stacking approach . . . . . . . . . . . 505--517 Poornima M. Chanal and Mahabaleshwar S. Kakkasageri Blockchain-based data integrity framework for Internet of Things . . . . 519--532 Md. Ahsan Ayub and Ambareen Siraj and Bobby Filar and Maanak Gupta RWArmor: a static-informed dynamic analysis approach for early detection of cryptographic windows ransomware . . . . 533--556 Vikas Kumar Jain and Meenakshi Tripathi An integrated deep learning model for Ethereum smart contract vulnerability detection . . . . . . . . . . . . . . . 557--575 Anjum and Rahul Katarya Hate speech, toxicity detection in online social media: a recent survey of state of the art and opportunities . . . 577--608 Aikaterini Triakosia and Panagiotis Rizomiliotis and Cecilia Tonelli and Fabio Federici and Valerio Senni Secure outsourcing of manufacturing compliance checks . . . . . . . . . . . 609--627 Junichiro Hayata and Jacob C. N. Schuldt and Goichiro Hanaoka and Kanta Matsuura On private information retrieval supporting range queries . . . . . . . . 629--647 Vidhi Bansal and Niyati Baliyan and Mohona Ghosh MLChain: a privacy-preserving model learning framework using blockchain . . 649--677 Muralidhara Rao Patruni and Abdul Gaffar Humayun PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks . . . . . . . . . . . . . . . . 679--698
Constantinos Patsakis and Eugenia Politou and Efthimios Alepis and Julio Hernandez-Castro Cashing out crypto: state of practice in ransom payments . . . . . . . . . . . . 699--712 Ahlem Hamdi and Lamia Fourati and Samiha Ayed Vulnerabilities and attacks assessments in blockchain 1.0, 2.0 and 3.0: tools, analysis and countermeasures . . . . . . 713--757 Houssam Zouhri and Ali Idri and Ahmed Ratnani Evaluating the impact of filter-based feature selection in intrusion detection systems . . . . . . . . . . . . . . . . 759--785 Miguel Angel Olivero and Antonia Bertolino and Francisco José Dominguez-Mayo and María José Escalona and Ilaria Matteucci A systematic mapping study on security for systems of systems . . . . . . . . . 787--817 Richa Goenka and Meenu Chawla and Namita Tiwari A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy 819--848 Mamatha Maddu and Yamarthi Narasimha Rao Network intrusion detection and mitigation in SDN using deep learning models . . . . . . . . . . . . . . . . . 849--862 Auwal Shehu Ali and Zarul Fitri Zaaba and Manmeet Mahinderjit Singh The rise of ``security and privacy'': bibliometric analysis of computer privacy research . . . . . . . . . . . . 863--885 Ehab Alkhateeb and Ali Ghorbani and Arash Habibi Lashkari A survey on run-time packers and mitigation techniques . . . . . . . . . 887--913 Pradeepkumar Bhale and Santosh Biswas and Sukumar Nandi A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks . . . . . . . . . . . . . . . . 915--934 Gaurav Tyagi and Rahul Kumar An efficient user authentication and key agreement scheme for wireless sensor networks using physically unclonable function . . . . . . . . . . . . . . . . 935--962 Antonio Villalón-Huerta and Ismael Ripoll-Ripoll and Hector Marco-Gisbert A survey and characterization of Close Access Cyberspace Operations . . . . . . 963--980 Ehsan Toreini and Maryam Mehrnezhad and Aad van Moorsel Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems . . . . . . 981--997 Peng Xun and Ziyu Yang and Haoyang Zhu and Zhu Tang Locating collaborative attack targets based on physical invariants toward cyber-physical systems . . . . . . . . . 999--1017 Muralidhara Rao Patruni and Abdul Gaffar Humayun Publisher Correction: PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks . . . 1019--1019 Ricardo Martins Gonçalves and Miguel Mira da Silva and Paulo Rupino da Cunha Olympus: a GDPR compliant blockchain system . . . . . . . . . . . . . . . . . 1021--1036 Jalaiah Saikam and Koteswararao Ch An ensemble approach-based intrusion detection system utilizing ISHO--HBA and SE--ResNet152 . . . . . . . . . . . . . 1037--1054 Subhash Ariyadasa and Shantha Fernando and Subha Fernando SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks . . . . . . . . . . . . . . . . 1055--1076 Lei Xu and Junhai Zhai Generating adversarial examples with collaborative generative models . . . . 1077--1091 Juan Manuel Castelo Gómez and Sergio Ruiz-Villafranca Integrating the edge computing paradigm into the development of IoT forensic methodologies . . . . . . . . . . . . . 1093--1116 Kenan Ince Exploring the potential of deep learning and machine learning techniques for randomness analysis to enhance security on IoT . . . . . . . . . . . . . . . . . 1117--1130 Firas Hamila and Mohammad Hamad and Daniel Costa Salgado and Sebastian Steinhorst Enhancing security in Fiat--Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication . . . . . . . . . . . . . 1131--1148 Thomas Prantl and Lukas Horn and Simon Engel and Lukas Iffländer and Lukas Beierlieb and Christian Krupitzer and André Bauer and Mansi Sakarvadia and Ian Foster and Samuel Kounev De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem . . . . 1149--1169 Jessica B. Heluany and Vasileios Gkioulos A review on digital twins for power generation and distribution . . . . . . 1171--1195 Rao Faizan Ali and P. D. D. Dominic and Sadaf Hina and Sheraz Naseer Fostering information security policies compliance with ISA-95-based framework: an empirical study of oil and gas employees . . . . . . . . . . . . . . . 1197--1213 Philip Empl and Daniel Schlette and Lukas Stöger and Günther Pernul Generating ICS vulnerability playbooks with open standards . . . . . . . . . . 1215--1230 Habib El Amin and Lina Oueidat and Maroun Chamoun and Abed Ellatif Samhat and Antoine Feghali Blockchain-based multi-organizational cyber risk management framework for collaborative environments . . . . . . . 1231--1249 Himanshu Nandanwar and Rahul Katarya TL-BILSTM IoT: transfer learning model for prediction of intrusion detection system in IoT environment . . . . . . . 1251--1277 Dimmiti Srinivasa Rao and Ajith Jubilson Emerson Cyberattack defense mechanism using deep learning techniques in software-defined networks . . . . . . . . . . . . . . . . 1279--1291 Sepideh Niktabe and Arash Habibi Lashkari and Dilli Prasad Sharma Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition . . . . 1293--1316 Rupshali Dasgupta and Meghabriti Pramanik and Pabitra Mitra and Dipanwita Roy Chowdhury Intrusion detection for power grid: a review . . . . . . . . . . . . . . . . . 1317--1329 H. Asad and S. Adhikari and Ilir Gashi A perspective-retrospective analysis of diversity in signature-based open-source network intrusion detection systems . . 1331--1346 Sultan S. Alqahtani Security bug reports classification using fasttext . . . . . . . . . . . . . 1347--1358 Fatna El Mendili and Mohammed Fattah and Nisrine Berros and Youness Filaly and Youn\`es El Bouzekri El Idrissi Enhancing detection of malicious profiles and spam tweets with an automated honeypot framework powered by deep learning . . . . . . . . . . . . . 1359--1388 Sohail Abbas and Manar Abu Talib and Qassim Nasir and Sally Idhis and Mariam Alaboudi and Ali Mohamed Radio frequency fingerprinting techniques for device identification: a survey . . . . . . . . . . . . . . . . . 1389--1427 Ferney Martínez and Luis Enrique S\`anchez and Antonio Santos-Olmo and David G. Rosado and Eduardo Fern\`andez-Medina Maritime cybersecurity: protecting digital seas . . . . . . . . . . . . . . 1429--1457 Ndukwe Ukeje and Jairo Gutierrez and Krassie Petrova Information security and privacy challenges of cloud computing for government adoption: a systematic review 1459--1475 Aybars Oruc and Nabin Chowdhury and Vasileios Gkioulos A modular cyber security training programme for the maritime domain . . . 1477--1512 Fei Zuo and Junghwan Rhee Vulnerability discovery based on source code patch commit mining: a systematic literature review . . . . . . . . . . . 1513--1526 Fulvio Frati and Georgiana Darau and Nikos Salamanos and Pantelitsa Leonidou and Costas Iordanou and Dimitris Plachouris and Efstratios Syrmas and Evangelos Floros and George Nikitakis and George Spanoudakis and Konstantinos Kalais and Stella Tsichlaki and Ernesto Damiani and George C. Kagadis and Jihane Najar and Michael Sirivianos Cybersecurity training and healthcare: the AERAS approach . . . . . . . . . . . 1527--1539 Arzu Gorgulu Kakisim A deep learning approach based on multi-view consensus for SQL injection detection . . . . . . . . . . . . . . . 1541--1556
Yakub Kayode Saheed and Sanjay Misra A voting gray wolf optimizer-based ensemble learning models for intrusion detection in the Internet of Things . . 1557--1581 Elham Ebrahimpour and Shahram Babaie Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review . . . . . . 1583--1602 Awais Yousaf and Jianying Zhou From sinking to saving: MITRE ATT&CK and D3FEND frameworks for maritime cybersecurity . . . . . . . . . . . . . 1603--1618 Yesi Novaria Kunang and Siti Nurmaini and Deris Stiawan and Bhakti Yudho Suprapto An end-to-end intrusion detection system with IoT dataset using deep learning with unsupervised feature extraction . . 1619--1648 Lokendra Vishwakarma and Debasis Das BLISS: blockchain-based integrated security system for Internet of Things (IoT) applications . . . . . . . . . . . 1649--1665 Upendra Singh and Sumit Kumar Sharma and Mukul Shukla and Preeti Jha Blockchain-based BATMAN protocol using mobile ad hoc network (MANET) with an ensemble algorithm . . . . . . . . . . . 1667--1677 Giddeon Njamngang Angafor and Iryna Yevseyeva and Leandros Maglaras Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns . . . . . . . . . . . . . . . 1679--1693 Vasiliki Tzavara and Savvas Vassiliadis Tracing the evolution of cyber resilience: a historical and conceptual review . . . . . . . . . . . . . . . . . 1695--1719 Marie Haugli-Sandvik and Mass Soldal Lund and Fròy Birte Bjòrneseth Maritime decision-makers and cyber security: deck officers' perception of cyber risks towards IT and OT systems 1721--1739 Rafa\l Leszczyna Activity-based payments: alternative (anonymous) online payment model . . . . 1741--1759 Nikola Andeli\'c and Sandi Baressi \vSegota and Zlatan Car Robust password security: a genetic programming approach with imbalanced dataset handling . . . . . . . . . . . . 1761--1786 Redhwan M. A. Saad and Mohammed Anbar and Selvakumar Manickam and Samir I. Shaheen and Iznan H. Hasbullah Neighbor discovery protocol anomaly-based detection system using neural network algorithm . . . . . . . . 1787--1803 Rohini G. Pise and Sonali Patil Pioneering automated vulnerability detection for smart contracts in blockchain using KEVM: Guardian ADRGAN 1805--1819 Michail Smyrlis and Evangelos Floros and Ioannis Basdekis and Dumitru-Bogdan Prelipcean and Aristeidis Sotiropoulos and Herve Debar and Apostolis Zarras and George Spanoudakis RAMA: a risk assessment solution for healthcare organizations . . . . . . . . 1821--1838 Christopher Jun Wen Chew and Vimal Kumar and Panos Patros and Robi Malik Real-time system call-based ransomware detection . . . . . . . . . . . . . . . 1839--1858 Joel Höglund and Simon Bouget and Martin Furuhed and John Preuß Mattsson and Göran Selander and Shahid Raza AutoPKI: public key infrastructure for IoT with automated trust transfer . . . 1859--1875 Yash Sharma and Anshul Arora A comprehensive review on permissions-based Android malware detection . . . . . . . . . . . . . . . 1877--1912 Rajiv Shah and Deniz Cemiloglu and Cagatay Yucel and Raian Ali and Vasilis Katos Is cyber hygiene a remedy to IPTV infringement? A study of online streaming behaviours and cyber security practices . . . . . . . . . . . . . . . 1913--1926 W. M. A. B. Wijesundara and Joong-Sun Lee and Dara Tith and Eleni Aloupogianni and Hiroyuki Suzuki and Takashi Obi Security-enhanced firmware management scheme for smart home IoT devices using distributed ledger technologies . . . . 1927--1937 Eslam Abdelkreem and Sherif Hussein and Ashraf Tammam Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network . . . . . . . . 1939--1961 Josep-Lluís Ferrer-Gomila and M. Francisca Hinarejos Abuse-freeness in contract signing: a blockchain-based proposal . . . . . . . 1963--1974 Vagner E. Quincozes and Silvio E. Quincozes and Juliano F. Kazienko and Simone Gama and Omar Cheikhrouhou and Anis Koubaa A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT) 1975--2002 Hussain Al-Aqrabi and Ahmed M. Manasrah and Richard Hill and Mohammed Q. Shatnawi and Mohammad Sh Daoud and Hoda Alkhzaimi Dynamic authentication for intelligent sensor clouds in the Internet of Things 2003--2021 Diana-Elena Petrean and Rodica Potolea Random forest evaluation using multi-key homomorphic encryption and lookup tables 2023--2041 Anil Kumar Chillara and Paresh Saxena and Rajib Ranjan Maiti and Manik Gupta and Raghu Kondapalli and Zhichao Zhang and Krishnakumar Kesavan Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards 2043--2061 Amir Aliabadian and Mohammadreza Zahabi and Majid Mobini Spatial de-correlation of generated keys from wireless channels using adversarial deep learning . . . . . . . . . . . . . 2063--2073 Eric Hilario and Sami Azam and Jawahar Sundaram and Khwaja Imran Mohammed and Bharanidharan Shanmugam Generative AI for pentesting: the good, the bad, the ugly . . . . . . . . . . . 2075--2097 Mohammed Nasereddin and Raad Al-Qassas A new approach for detecting process injection attacks using memory analysis 2099--2121 Ala Mughaid and Ibrahim Obeidat and Laith Abualigah and Shadi Alzubi and Mohammad Sh. Daoud and Hazem Migdady Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things . . . . . . . . . . . 2123--2137 Md. Alamin Talukder and Selina Sharmin and Md Ashraf Uddin and Md Manowarul Islam and Sunil Aryal MLSTL-WSN: machine learning-based intrusion detection using SMOTETomek in WSNs . . . . . . . . . . . . . . . . . . 2139--2158 Rahul Dwivedi International journal of information security: a bibliometric study, 2007--2023 . . . . . . . . . . . . . . . 2159--2187 Stylianos Karagiannis and Christoforos Ntantogian and Emmanouil Magkos and Aggeliki Tsohou and Luís Landeiro Ribeiro Mastering data privacy: leveraging K-anonymity for robust health data sharing . . . . . . . . . . . . . . . . 2189--2201 Davide Micale and Ilaria Matteucci and Florian Fenzl and Roland Rieke and Giuseppe Patan\`e A context-aware on-board intrusion detection system for smart vehicles . . 2203--2223 Emmanuel Kwarteng and Mumin Cebe MEDICALHARM: A threat modeling designed for modern medical devices and a comprehensive study on effectiveness, user satisfaction, and security perspectives . . . . . . . . . . . . . . 2225--2268 Hossein Abedi Khorasgani and Noman Mohammed and Yang Wang Attribute inference privacy protection for pre-trained models . . . . . . . . . 2269--2285 Ramesh Upreti and Pedro G. Lind and Ahmed Elmokashfi and Anis Yazidi Trustworthy machine learning in the context of security and privacy . . . . 2287--2314 Joaquín Navajas-Adán and Eul\`alia Badia-Gelabert and Laura Jiménez-Saurina and Ma. Jesús Marijuán-Martín and Rafael Mayo-García Perceptions and dilemmas around cyber-security in a Spanish research center after a cyber-attack . . . . . . 2315--2331 Nadisha Madhushanie and Sugandima Vidanagamachchi and Nalin Arachchilage Selfish mining attack in blockchain: a systematic literature review . . . . . . 2333--2351 Kousik Barik and Sanjay Misra and Luis Fernandez-Sanz Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network . . . . . . 2353--2376 Abdullah Hamad N. Almoqbil Anomaly detection for early ransomware and spyware warning in nuclear power plant systems based on FusionGuard . . . 2377--2394 M. Amutha and K. R. Kavitha Enhancing security in QCA-based circuits using optimal key gate placement . . . . 2395--2405 Saeed Banaeian Far and Maryam Rajabzadeh Asaar and Afrooz Haghbin A generic framework for blockchain-assisted on-chain auditing for off-chain storage . . . . . . . . . 2407--2435 Aikaterini Soumelidou and Aggeliki Tsohou Validation and extension of two domain-specific information privacy competency models . . . . . . . . . . . 2437--2455 N. D. Patel and B. M. Mehtre and Rajeev Wankar A computationally efficient dimensionality reduction and attack classification approach for network intrusion detection . . . . . . . . . . 2457--2487 Osama Bassam J. Rabie and Shitharth Selvarajan and Tawfiq Hasanin and Gouse Baig Mohammed and Abddulrhman M. Alshareef and Mueen Uddin Correction: A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs) . . . . 2489--2489
Guangyu Qian and Jinyuan Li and Wei He and Wei Zhang and You Cao An online intrusion detection method for industrial control systems based on extended belief rule base . . . . . . . 2491--2514 Ahmed M. Asfahani Perceptions of organizational responsibility for cybersecurity in Saudi Arabia: a moderated mediation analysis . . . . . . . . . . . . . . . . 2515--2530 Raja Zeeshan Haider and Baber Aslam and Haider Abbas and Zafar Iqbal C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks . . . . . . . . . . . . . 2531--2545 Parthajit Borah and Upasana Sarmah and D. K. Bhattacharyya and J. K. Kalita Unmasking the common traits: an ensemble approach for effective malware detection 2547--2557 Uneneibotejit Otokwala and Andrei Petrovski and Harsha Kalutarage Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of Things . . . . . . . . . . . 2559--2581 Mustafa Ahmed Elberri and Ümit Toke\cser and Javad Rahebi and Jose Manuel Lopez-Guede A cyber defense system against phishing attacks with deep learning game theory and LSTM--CNN with African vulture optimization algorithm (AVOA) . . . . . 2583--2606 Indy Haverkamp and Dipti K. Sarmah Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis . . . . . . . . . . 2607--2635 Tzer-Long Chen and Chia-Hui Liu and Ya-Hui Ou and Yao-Min Huang and Zhen-Yu Wu An improved and efficient coercion-resistant measure for electronic voting system . . . . . . . . 2637--2654 Pavlos Cheimonidis and Konstantinos Rantos Dynamic vulnerability severity calculator for industrial control systems . . . . . . . . . . . . . . . . 2655--2676 Guru Prasad Bhandari and Gebremariam Assres and Nikola Gavric and Andrii Shalaginov and Tor-Morten Grònli IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications . . . . . . . . . . 2677--2690 Alexandros Zacharis and Vasilios Katos and Constantinos Patsakis Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle . . . . . . . . . . 2691--2710 Ashish Bajaj and Dinesh Kumar Vishwakarma Non-Alpha-Num: a novel architecture for generating adversarial examples for bypassing NLP-based clickbait detection mechanisms . . . . . . . . . . . . . . . 2711--2737 Aida Akbarzadeh and Laszlo Erdodi and Siv Hilde Houmb and Tore Geir Soltvedt Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation . . . . . . . . . . . . . . . 2739--2758 Mirza Kamrul Bashar Shuhan and Syed Md. Hasnayeen and Tanmoy Krishna Das and Md. Nazmus Sakib and Md Sadek Ferdous Decentralised identity federations using blockchain . . . . . . . . . . . . . . . 2759--2782 Nadisha Madhushanie and Sugandima Vidanagamachchi and Nalin Arachchilage BA-flag: a self-prevention mechanism of selfish mining attacks in blockchain technology . . . . . . . . . . . . . . . 2783--2792 Antonio Paya and Vicente-García and Alberto Gómez Securesdp: a novel software-defined perimeter implementation for enhanced network security and scalability . . . . 2793--2808 Chun-Fu Chen and Bill Moriarty and Shaohan Hu and Sean Moran and Marco Pistoia and Vincenzo Piuri and Pierangela Samarati Model-Agnostic Utility-Preserving Biometric Information Anonymization . . 2809--2826 Sandeep Pirbhulal and Sabarathinam Chockalingam and Ankur Shukla and Habtamu Abie IoT cybersecurity in 5G and beyond: a systematic literature review . . . . . . 2827--2879 Kashif Junaid and Muhammad Umar Janjua and Junaid Qadir A compliance-based ranking of certificate authorities using probabilistic approaches . . . . . . . . 2881--2910 Thomas Oakley Browne and Mohammad Abedin and Mohammad Jabed Morshed Chowdhury A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications . . . . . . . . . . . . . . 2911--2938 Sanjeev Shukla and Manoj Misra and Gaurav Varshney Email bombing attack detection and mitigation using machine learning . . . 2939--2949 George Hatzivasilis and Eftychia Lakka and Manos Athanatos and Sotiris Ioannidis and Grigoris Kalogiannis and Manolis Chatzimpyrros and George Spanoudakis and Spyros Papastergiou and Stylianos Karagiannis and Andreas Alexopoulos and Dimitry Amelin and Stephan Kiefer Swarm-intelligence for the modern ICT ecosystems . . . . . . . . . . . . . . . 2951--2975 Beibei Cui and Wei He and Yan Cui A dynamic C-V2X anonymous authentication and group key agreement protocol . . . . 2977--2989 Chong Xiao and Ming Tang Acnn: arbitrary trace attacks based on leakage area detection . . . . . . . . . 2991--3006 Efstratios Vasilellis and Vasileios Botsos and Argiro Anagnostopoulou and Dimitris Gritzalis Gaming the system: tetromino-based covert channel and its impact on mobile security . . . . . . . . . . . . . . . . 3007--3027 Wei She and Haige Feng and Zhao Tian and Xinpeng Rong and Tianxiang Ma and Wei Liu Multi-party codebook distribution strategy based on secret sharing . . . . 3029--3042 Francisco T. Chimuco and Jo\=ao B. F. Sequeiros and Tiago M. C. Simões and Mário M. Freire and Pedro R. M. Inácio Expediting the design and development of secure cloud-based mobile apps . . . . . 3043--3064 Shirin Abbasi and Navid Khaledian and Amir Masoud Rahmani Trust management in the internet of vehicles: a systematic literature review of blockchain integration . . . . . . . 3065--3088 Rudri Kalaria and A. S. M. Kayes and Wenny Rahayu and Eric Pardede and Ahmad Salehi Shahraki Adaptive context-aware access control for IoT environments leveraging fog computing . . . . . . . . . . . . . . . 3089--3107
Marco Rasori and Andrea Saracino and Paolo Mori and Marco Tiloca Using the ACE framework to enforce access and usage control with notifications of revoked access rights 3109--3133 Süleyman Muhammed Arikan and Aynur Koçak and Mustafa Alkan Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system . . . . 3135--3151 Ivar Moen and Aybars Oruc and Ahmed Amro and Vasileios Gkioulos and Georgios Kavallieratos Survey-based analysis of cybersecurity awareness of Turkish seafarers . . . . . 3153--3178 Mariam Masmoudi and Ikram Amous and Corinne Amel Zayani and Florence S\`edes Trust attack prevention based on Spark-blockchain in social IoT: a survey 3179--3198 Zubair Ahmad and Stefano Calzavara and Samuele Casarin and Ben Stock Information flow control for comparative privacy analyses . . . . . . . . . . . . 3199--3216 Stylianos Gerasimou and Konstantinos Limniotis A study on privacy and security aspects of personalised apps . . . . . . . . . . 3217--3239 Yahui Wang and Zhiyong Zhang and Kejing Zhao and Peng Wang and Ruirui Wu A few-shot learning based method for industrial internet intrusion detection 3241--3252 Håvard Jakobsen Ofte The awareness of operators: a goal-directed task analysis in SOCs for critical infrastructure . . . . . . . . 3253--3282 Tanjila Mawla and Maanak Gupta and Safwa Ameer and Ravi Sandhu The ACAC$_D$ model for mutable activity control and chain of dependencies in smart and connected systems . . . . . . 3283--3310 Yuejun Guo and Seifeddine Bettaieb and Fran Casino A comprehensive analysis on software vulnerability detection datasets: trends, challenges, and road ahead . . . 3311--3327 Aulia Arif Wardana and Grzegorz Ko\laczek and Arkadiusz Warzy\'nski and Parman Sukarno Collaborative intrusion detection using weighted ensemble averaging deep neural network for coordinated attack detection in heterogeneous network . . . . . . . . 3329--3349 Hiroki Kuzuno and Toshihiro Yamauchi Mitigation of privilege escalation attack using kernel data relocation mechanism . . . . . . . . . . . . . . . 3351--3367 Efstratios Vasilellis and Grigoris Gkionis and Dimitris Gritzalis Press play, install malware: a study of rhythm game-based malware dropping . . . 3369--3391 Shuhei Enomoto and Hiroki Kuzuno and Hiroshi Yamada and Yoshiaki Shiraishi and Masakatu Morii Early mitigation of CPU-optimized ransomware using monitoring encryption instructions . . . . . . . . . . . . . . 3393--3413 Sorour Sheidani and Alireza Zarei Privacy-preserving two-party computation of line segment intersection . . . . . . 3415--3432
Yogesh and Lalit Mohan Goyal Deep learning based network intrusion detection system: a systematic literature review and future scopes . . 3433--3463 Beytüllah Yi\ugit and Gürkan Gür and Bernhard Tellenbach and Fatih Alagöz Unmasking SDN flow table saturation: fingerprinting, attacks and defenses . . 3465--3479 Stefano Bistarelli and Andrea Imparato and Francesco Santini A TCP-based covert channel with integrity check and retransmission . . . 3481--3512 Van-Hau Pham and Do Thi Thu Hien and Hien Do Hoang and Phan The Duy Defect-scanner: a comparative empirical study on language model and deep learning approach for software vulnerability detection . . . . . . . . 3513--3526 Manesh Thankappan and Helena Rif\`a-Pous and Carles Garrigues A distributed and cooperative signature-based intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi--Fi networks . . . . . . . 3527--3546 Stephen Cook and Maryam Mehrnezhad and Ehsan Toreini Bluetooth security analysis of general and intimate health IoT devices and apps: the case of FemTech . . . . . . . 3547--3567 Abdulrahman K. Alnaim Securing 5G virtual networks: a critical analysis of SDN, NFV, and network slicing security . . . . . . . . . . . . 3569--3589 Pedro Antunes and Nuno Guimarães Guiding the implementation of data privacy with microservices . . . . . . . 3591--3608 Takeshi Nakai and Kazumasa Shinagawa Secure multi-party computation with legally-enforceable fairness . . . . . . 3609--3623 Mohamed Amine Merzouk and Christopher Neal and Joséphine Delas and Reda Yaich and Nora Boulahia-Cuppens and Frédéric Cuppens Adversarial robustness of deep reinforcement learning-based intrusion detection . . . . . . . . . . . . . . . 3625--3651 Safiullah Khan and Kashif Inayat and Fahad Bin Muslim and Yasir Ali Shah and Muhammad Atif Ur Rehman and Ayesha Khalid and Malik Imran and Akmalbek Abdusalomov Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher . . . . . . . . . . . 3653--3664 Mohamed Abomhara and Livinus Obiora Nweke and Sule Yildirim Yayilgan and Debora Comparin and Kristel Teyras and Stéphanie de Labriolle Enhancing privacy protections in national identification systems: an examination of stakeholders' knowledge, attitudes, and practices of privacy by design . . . . . . . . . . . . . . . . . 3665--3689 Jihane Jebrane and Saiida Lazaar An enhanced and verifiable lightweight authentication protocol for securing the Internet of Medical Things (IoMT) based on CP--ABE encryption . . . . . . . . . 3691--3710 \`Alex Miranda-Pascual and Patricia Guerra-Balboa and Javier Parra-Arnau and Jordi Forné and Thorsten Strufe An overview of proposals towards the privacy-preserving publication of trajectory data . . . . . . . . . . . . 3711--3747 Patricia Callejo and Ignacio Gómez Fernández and Marcelo Bagnulo ``Animation'' URL in NFT marketplaces considered harmful for privacy . . . . . 3749--3763 Martin Bedoya and Sara Palacios and Daniel Díaz-López and Estefania Laverde and Pantaleone Nespoli Enhancing DevSecOps practice with Large Language Models and Security Chaos Engineering . . . . . . . . . . . . . . 3765--3788
Manika Garg and Anita Goel A comprehensive approach for mitigating impersonation in online assessment: integrity policy and random authentication . . . . . . . . . . . . . ?? Shriniwas Patil and Keyur Parmar Novel mechanism for anonymous reporting and anonymous rewarding using blockchain technology . . . . . . . . . . . . . . . ?? Max Landauer and Florian Skopik and Branka Stojanovi\'c and Andreas Flatscher and Torsten Ullrich A review of time-series analysis for cyber security analytics: from intrusion detection to attack prediction . . . . . ?? Md Shafiul Alam and Saif Ahmed and Mohsin Dhali and Syed Shah Alam Citizens' engagement with cybersecurity measures in Bangladesh: a cross-sectional study . . . . . . . . . ?? Mohamed Aly Bouke and Omar Imhemed Alramli and Azizol Abdullah XAIRF-WFP: a novel XAI-based random forest classifier for advanced email spam detection . . . . . . . . . . . . . ?? Sajal Aggarwal and Ashish Bajaj and Dinesh Kumar Vishwakarma HOMOGRAPH: a novel textual adversarial attack architecture to unmask the susceptibility of linguistic acceptability classifiers . . . . . . . ?? Vitalina Holubenko and Diogo Gaspar and Rúben Leal and Paulo Silva Autonomous intrusion detection for IoT: a decentralized and privacy preserving approach . . . . . . . . . . . . . . . . ?? Pablo Perez-Tirador and Madhav Desai and Alejandro Rodriguez and Elena Berral and Teresa Romero and Gabriel Caffarena and Ruzica Jevtic Side-channel attacks and countermeasures for heart rate retrieval from ECG characterization device . . . . . . . . ?? Manal Jlil and Kaoutar Jouti and Jaouad Boumhidi and Chakir Loqman Improving traceability in e-governance file-sharing systems: the Moroccan justice system as a use case . . . . . . ?? Debrup Chakraborty and Avishek Majumder and Subhabrata Samajder Making searchable symmetric encryption schemes smaller and faster . . . . . . . ?? Luís Prates and Rúben Pereira DevSecOps practices and tools . . . . . ?? Samson Oruma and Ricardo Colomo-Palacios and Vasileios Gkioulos Architectural views for social robots in public spaces: business, system, and security strategies . . . . . . . . . . ?? Ashutosh Kumar and L. Kavisankar and S. Venkatesan and Manish Kumar and Suneel Yadav and Sandeep Kumar Shukla and Rahamatullah Khondoker IoT device security audit tools: a comprehensive analysis and a layered architecture approach for addressing expanded security requirements . . . . . ?? Weinan Liu and Jiawen Shi and Hong Wang and Tingting Chen and Qingqing Li and Zhaoyang Han and Jiangjun Yuan A location-updating based self-healing group key management scheme for VANETs ?? Ilias Chanis and Avi Arampatzis Enhancing phishing email detection with stylometric features and classifier stacking . . . . . . . . . . . . . . . . ?? Zijing Zhang and Vimal Kumar and Bernhard Pfahringer and Albert Bifet Ai-enabled automated common vulnerability scoring from common vulnerabilities and exposures descriptions . . . . . . . . . . . . . . ?? Cristina Alcaraz and Iman Hasnaouia Meskini and Javier Lopez Digital twin communities: an approach for secure DT data sharing . . . . . . . ?? Lior Tabansky and Eynan Lichterman PROGRESS: the sectoral approach to cyber resilience . . . . . . . . . . . . . . . ?? Dheerendra Mishra and Komal Pursharthi and Mrityunjay Singh and Ankita Mishra Construction of post quantum secure authenticated key agreement protocol for dew-assisted IoT systems . . . . . . . . ?? A. Termanini and D. Al-Abri and H. Bourdoucen and A. Al Maashri Using machine learning to detect network intrusions in industrial control systems: a survey . . . . . . . . . . . ?? Sondes Ksibi and Faouzi Jaidi and Adel Bouhoula MLRA-Sec: an adaptive and intelligent cyber-security-assessment model for Internet of Medical Things (IoMT) . . . ?? Narges Kazempour and Mahtab Mirmohseni and Mohammad Reza Aref Information-theoretic privacy-preserving user authentication . . . . . . . . . . ?? Jinguo Li and Mengli Lu and Jin Zhang and Jing Wu Aldp-fl: an adaptive local differential privacy-based federated learning mechanism for IoT . . . . . . . . . . . ?? Milo\vs Stankovi\'c and Xiao Hu and Akif Ahsen Ozer and Umit Karabiyik How engaged are you? A forensic analysis of the Oura Ring Gen 3 application across iOS, Android, and Cloud platforms ?? John Prakash Arockiasamy and Irene Sabarimuthu and Lydia Elizabeth Benjamin and Srinivasan Palaniswami pbins : private bins for top- $k$ semantic search over encrypted data using transformers . . . . . . . . . . . ?? Sonia Laudanna and Andrea Di Sorbo and P. Vinod and Corrado Aaron Visaggio and Gerardo Canfora Transformer or Autoencoder? Who is the ultimate adversary for attack detectors? ?? Idoia Gamiz and Cristina Regueiro and Oscar Lage and Eduardo Jacob and Jasone Astorga Challenges and future research directions in secure multi-party computation for resource-constrained devices and large-scale computations . . ?? Hajime Ono and Kazuhiro Minami and Hideitsu Hino When should we use top coding in locally private estimation? . . . . . . . . . . ?? Anum Paracha and Junaid Arshad and Mohamed Ben Farah and Khalid Ismail Deep behavioral analysis of machine learning algorithms against data poisoning . . . . . . . . . . . . . . . ?? Joohee Lee and Sangrae Cho and Soohyung Kim and Saerom Park Verifiable computation over encrypted data via MPC-in-the-head zero-knowledge proofs . . . . . . . . . . . . . . . . . ?? Ricardo Reyes-Acosta and Carlos Dominguez-Baez and Ricardo Mendoza-Gonzalez and Miguel Vargas Martin Analysis of machine learning-based approaches for securing the Internet of Things in the smart industry: a multivocal state of knowledge review . . ?? Yehong Luo and Nafei Zhu and Ziwen Wang and Lei Sun and Jingsha He and Anca Delia Jurcut and Yuzi Yi and Xiangjun Ma Privacy information propagation in online social networks --- a case study based on Weibo data . . . . . . . . . . ?? Wanyi Gu and Guojun Wang and Peiqiang Li and Guangxin Zhai and Xubin Li Detecting unknown vulnerabilities in smart contracts with the CNN--BiLSTM model . . . . . . . . . . . . . . . . . ?? M. Magdalena Payeras-Capell\`a and Maci\`a Mut Puigserver and Rosa Peric\`as Gornals Transferable channels for fair micropurchases . . . . . . . . . . . . . ?? Yogesh and Lalit Mohan Goyal Retraction Note: Deep learning based network intrusion detection system: a systematic literature review and future scopes . . . . . . . . . . . . . . . . . ?? Qisheng Chen and Kazumasa Omote An intrinsic evaluator for embedding methods in malicious URL detection . . . ?? Antonio Borrero-Foncubierta and Mercedes Rodriguez-Garcia and Andrés Muñoz and Juan Manuel Dodero Protecting privacy in the age of big data: exploring data linking methods for quasi-identifier selection . . . . . . . ?? Angeliki Kitsiou and Maria Sideri and Michail Pantelelis and Stavros Simou and Aikaterini--Georgia Mavroeidi and Katerina Vgena and Eleni Tzortzaki and Christos Kalloniatis Developers' mindset on self-adaptive privacy and its requirements for cloud computing environments . . . . . . . . . ?? Wei Yu and Zhixiang Chen and Hui Wang and Zeyu Miao and Dake Zhong Industrial network intrusion detection in open-set scenarios . . . . . . . . . ?? Eduard-Matei Constantinescu and Mohammed El-Hajj and Luca Mariot Exploring smooth number-based MAC algorithms for secure communication in IoT devices: a systematic literature review . . . . . . . . . . . . . . . . . ?? Ángel Jesús Varela-Vaca and María Teresa Gómez-López and Yolanda Morales Zamora and Rafael M. Gasca Business process models and simulation to enable GDPR compliance . . . . . . . ?? Jonas Ingemarsson and Marcus Birath and Joakim Kävrestad Factors influencing Swedish citizens' willingness to provide their mobile phones to forensic examination . . . . . ?? Shao-Fang Wen and Ankur Shukla and Basel Katt Artificial intelligence for system security assurance: A systematic literature review . . . . . . . . . . . ?? Israa Abuelezz and Mahmoud Barhamgi and Sameha Alshakhsi and Ala Yankouskaya and Armstrong Nhlabatsi and Khaled M. Khan and Raian Ali How do gender and age similarities with a potential social engineer influence one's trust and willingness to take security risks? . . . . . . . . . . . . ?? Juan Ignacio Iturbe-Araya and Helena Rif\`a-Pous Enhancing unsupervised anomaly-based cyberattacks detection in smart homes through hyperparameter optimization . . ?? Farid Binbeshr and Khaw Chee Siong and Lip Yee Por and Muhammad Imam and Alawi A. Al-Saggaf and Anas A. Abudaqa A systematic review of graphical password methods resistant to shoulder-surfing attacks . . . . . . . . ?? Konstantinos E. Kampourakis and Efstratios Chatzoglou and Georgios Kambourakis and Dimitrios Serpanos Balancing the act? Resampling versus imbalanced data for Wi--Fi IDS . . . . . ?? Phan The Duy and Nghi Hoang Khoa and Nguyen Huu Quyen and Le Cong Trinh and Vu Trung Kien and Trinh Minh Hoang and Van-Hau Pham Vulnsense: efficient vulnerability detection in Ethereum smart contracts by multimodal learning with graph neural network and language model . . . . . . . ?? Chun Yang and Yining Ma and Binyu Xie and Yanni Li and Shuo Cong Multi-user covert communication in power internet of things networks . . . . . . ?? Mohammad Ryiad Al-Eiadeh and Mustafa Abdallah PR-DRA : PageRank-based defense resource allocation methods for securing interdependent systems modeled by attack graphs . . . . . . . . . . . . . . . . . ?? Mohamed Rahouti and Hamza Drid and Khaled Hamouid and Karima Massmi and Sif Eddine Mehenna Brave-sdn: blockchain-reliant authentication for versatile east-west bound in distributed SDNs . . . . . . . ?? Mohammad Hadi Rezayati and Abdolah Amirany and Mohammad Hossein Moaiyeri and Kian Jafari A new method for securing binary deep neural networks against model replication attacks using magnetic tunnel junctions . . . . . . . . . . . . ?? Sani M. Abdullahi and Sanja Lazarova-Molnar On the adoption and deployment of secure and privacy-preserving IIoT in smart manufacturing: a comprehensive guide with recent advances . . . . . . . . . . ?? Kosuke Higuchi and Ryotaro Kobayashi Real-time open-file backup system with machine-learning detection model for ransomware . . . . . . . . . . . . . . . ?? Mariam Arutunian and Sevak Sargsyan and Hripsime Hovhannisyan and Garnik Khroyan and Albert Mkrtchyan and Hovhannes Movsisyan and Arutyun Avetisyan and Hayk Aslanyan Accurate code fragment clone detection and its application in identifying known CVE clones . . . . . . . . . . . . . . . ?? Marouane Kihal and Lamia Hamza Efficient Arabic and English social spam detection using a transformer and 2D convolutional neural network-based deep learning filter . . . . . . . . . . . . ?? Jason Diakoumakos and Evangelos Chaskos and Nicholas Kolokotronis and George Lepouras Cyber-security gamification in federation of cyber ranges: design, implementation, and evaluation . . . . . ?? Hajime Ono Theoretical lower bounds for one-dimensional locally private estimations with missing data . . . . . ?? Qisheng Chen and Kazumasa Omote Correction to: An intrinsic evaluator for embedding methods in malicious URL detection . . . . . . . . . . . . . . . ?? Trong-Nghia To and Danh Le Kim and Do Thi Thu Hien and Nghi Hoang Khoa and Hien Do Hoang and Phan The Duy and Van-Hau Pham On the effectiveness of adversarial samples against ensemble learning-based windows PE malware detectors . . . . . . ?? Nasibeh Mohammadi and Afshin Rezakhani and Hamid Haj Seyyed Javadi and Parvaneh Asghari Enhancing time-series access control using deep recurrent neural networks and generative adversarial networks . . . . ?? Tala Talaei Khoei and Khair Al Shamaileh and Vijaya Kumar Devabhaktuni and Naima Kaabouch Performance analysis of capsule networks for detecting GPS spoofing attacks on unmanned aerial vehicles . . . . . . . . ?? Faheem Ullah and Jingsha He and Nafei Zhu and Ahsan Wajahat and Ahsan Nazir and Sirajuddin Qureshi and Hasan Shahzad Ehr management evolution through purpose-based access control and blockchain smart contracts . . . . . . . ?? Nasim Tavakkoli and Orçun Çetin and Emre Ekmekcioglu and Erkay Sava\cs From frontlines to online: examining target preferences in the Russia--Ukraine conflict . . . . . . . . ?? Lingrui Ren and Xingcan Zhang and Jian Wang Low complexity decompression method for FPGA bitstreams . . . . . . . . . . . . ?? Jeonggak Lyu and Ahyun Song and Euiseong Seo and Gibum Kim An exploratory analysis of the DPRK cyber threat landscape using publicly available reports . . . . . . . . . . . ?? Eszter Kail and Annamária Riethné Nagy and Rita Fleiner and Anna Bánáti and Ern\Ho Rigó Low-impact, near real-time risk assessment for legacy IT infrastructures ?? Vicenç Torra Differentially private Choquet integral: extending mean, median, and order statistics . . . . . . . . . . . . . . . ?? Cho Do Xuan and Dat Bui Quang and Vinh Dang Quang Large language models based vulnerability detection: How does it enhance performance? . . . . . . . . . . ?? Ashish Bajaj and Dinesh Kumar Vishwakarma Inflect-text: a novel mechanism to evade neural text classifiers by leveraging word inflectional perturbations . . . . ?? Sourena Khanzadeh and Euclides Carlos Pinto Neto and Shahrear Iqbal and Manar Alalfi and Scott Buffett An exploratory study on domain knowledge infusion in deep learning for automated threat defense . . . . . . . . . . . . . ?? Eduardo B. Fernandez and Antonio Muñoz A cluster of patterns for trusted computing . . . . . . . . . . . . . . . ?? Anonymous Journal navigation . . . . . . . . . . . ??
I Putu Arya Dharmaadi and Elias Athanasopoulos and Fatih Turkmen Fuzzing frameworks for server-side web applications: a survey . . . . . . . . . ?? George Chatzisofroniou and Panayiotis Kotzanikolaou Security analysis of the Wi--Fi Easy Connect . . . . . . . . . . . . . . . . ?? Lorena González-Manzano and Joaquin Garcia-Alfaro Software vulnerability detection under poisoning attacks using CNN-based image processing . . . . . . . . . . . . . . . ?? Francesco Brancati and Diamantea Mongelli and Francesco Mariotti and Paolo Lollini A cybersecurity risk assessment methodology for industrial automation control systems . . . . . . . . . . . . ?? Koffi Anderson Koffi and Vyron Kampourakis and Constantinos Kolias and Jia Song and Robert C. Ivans Speeding-up fuzzing through directional seeds . . . . . . . . . . . . . . . . . ?? Seyed Mohammad Taghavi Far and Farid Feyzi Large language models for software vulnerability detection: a guide for researchers on models, methods, techniques, datasets, and metrics . . . ?? Anil Kumar Chillara and Paresh Saxena and Rajib Ranjan Maiti USB-GATE: USB-based GAN-augmented transformer reinforced defense framework for adversarial keystroke injection attacks . . . . . . . . . . . . . . . . ?? Marcos Rogério Silveira and Adriano Mauro Cansian and Hugo Koji Kobayashi Semi-supervised approach for detecting malicious domains in TLDs in their first query . . . . . . . . . . . . . . . . . ?? Alessandro Cantelli-Forti and Giacomo Longo and Francesco Lupia and Enrico Russo WEFT: a consistent and tamper-proof methodology for acquisition of automatically verifiable forensic web evidence . . . . . . . . . . . . . . . . ?? Anonymous Journal navigation . . . . . . . . . . . ??