default search action
CSR 2023: Venice, Italy
- IEEE International Conference on Cyber Security and Resilience, CSR 2023, Venice, Italy, July 31 - Aug. 2, 2023. IEEE 2023, ISBN 979-8-3503-1170-9
- Orkhan Gasimov, Risto Vaarandi, Mauno Pihelgas:
Comparative Analysis of Pattern Mining Algorithms for Event Logs. 1-7 - Yashovardhan Sharma, Eleonora Giunchiglia, Simon Birnbach, Ivan Martinovic:
To TTP or not to TTP?: Exploiting TTPs to Improve ML-based Malware Detection. 8-15 - Key-whan Chung, Phuong Cao, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
stealthML: Data-driven Malware for Stealthy Data Exfiltration. 16-21 - Claudia Greco, Michele Ianni, Antonella Guzzo, Giancarlo Fortino:
Explaining Binary Obfuscation. 22-27 - Ann Marie Reinhold, Travis Weber, Colleen Lemak, Derek Reimanis, Clemente Izurieta:
New Version, New Answer: Investigating Cybersecurity Static-Analysis Tool Findings. 28-35 - David Soler, Carlos Dafonte, Francisco Javier Nóvoa, Manuel Fernández-Veiga, Ana Fernández Vilas, Rebeca P. Díaz Redondo:
Qerberos: A Protocol for Secure Distribution of QRNG Keys. 36-41 - Lorenzo Principi, Marco Baldi, Alessandro Cucchiarelli, Luca Spalazzi:
Efficiency of Malware Detection Based on DNS Packet Analysis Over Real Network Traffic. 42-47 - Alexander Khalil Daou, Fudong Li, Stavros Shiaeles:
A Cost-Efficient Threat Intelligence Platform Powered by Crowdsourced OSINT. 48-53 - Fabio Martinelli, Francesco Mercaldo, Antonella Santone:
A Driver Detection Method by Means of Explainable Deep Learning. 54-59 - Ortal Dayan, Lior Wolf, Fang Wang, Yaniv Harel:
Optimizing AI for Mobile Malware Detection by Self-Built-Dataset GAN Oversampling and LGBM. 60-65 - Felipe Moreno Vera, Mateus Schulz Nogueira, Cainã Figueiredo, Daniel S. Menasché, Miguel Angelo Bicudo, Ashton Woiwood, Enrico Lovat, Anton Kocheturov, Leandro Pfleger de Aguiar:
Cream Skimming the Underground: Identifying Relevant Information Points from Online Forums. 66-71 - Jorge Casajús-Setién, Concha Bielza, Pedro Larrañaga:
Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models. 72-77 - Rikard Höglund, Marco Tiloca, Simon Bouget, Shahid Raza:
Key Update for the IoT Security Standard OSCORE. 78-85 - Chrysoula Oikonomou, Ilias Iliopoulos, Dimosthenis Ioannidis, Dimitrios Tzovaras:
A Multi-Class Intrusion Detection System Based on Continual Learning. 86-91 - Emanuele Bellini, Ernesto Damiani, Stefano Marrone:
Blockchain-Based Trustworthy O2O Interaction in the Next 6G Ecosystem. 92-98 - Francesco Palmarini, Leonardo Veronese, Matteo Busi, Riccardo Focardi, Flaminia L. Luccio:
A Recipe for Cost-Effective Secure IoT: the Safe Place Project Case Study. 99-104 - Marwan Omar, Stavros Shiaeles:
VulDetect: A novel technique for detecting software vulnerabilities using Language Models. 105-110 - Marcus L. Green, Priya Dozier:
Understanding Human Factors of Cybersecurity: Drivers of Insider Threats. 111-116 - Khatereh Ahmadi, Reza Javidan:
DDoS Attack Detection in a Real Urban IoT Environment Using Federated Deep Learning. 117-122 - Jan von der Assen, Alberto Huertas Celdrán, Nicolas Huber, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller:
Moving Target Defense Strategy Selection against Malware in Resource-Constrained Devices. 123-129 - Jipeng Hou, Lei Xu, Liehuang Zhu, Peng Jiang, Shaorui Song:
HSchain: Anonymous Permissioned Blockchain with Enhanced Auditability. 130-135 - Simon Paul Mönch, Hendrik Roth:
Real-Time APT Detection Technologies: A Literature Review. 136-141 - Sevasti Grigoriadou, Panagiotis I. Radoglou-Grammatikis, Panagiotis G. Sarigiannidis, Ioannis Makris, Thomas Lagkas, Vasileios Argyriou, Anastasios Lytos, Eleftherios Fountoukidis:
Hunting IoT Cyberattacks With AI - Powered Intrusion Detection. 142-147 - Massinissa Chelghoum, Gueltoum Bendiab, Mohamed Benmohammed, Stavros Shiaeles, Emanuele Bellini:
BTV2P: Blockchain-based Trust Model for Secure Vehicles and Pedestrians Networks. 148-153 - Tanwir Ahmad, Dragos Truscan:
Efficient Early Anomaly Detection of Network Security Attacks Using Deep Learning. 154-159 - Abubakr Ibrahim, Mohamed Mejri, Fehmi Jaafar:
An Explainable Artificial Intelligence Approach for a Trustworthy Spam Detection. 160-167 - Luís Oliveira, Andrzej Chmielewski, Paulina Rutecka, Karina Cicha, Mariia Rizun, Nuno Torres, Pedro Pinto:
Assessing Cybersecurity Hygiene and Cyber Threats Awareness in the Campus - A Case Study of Higher Education Institutions in Portugal and Poland. 168-173 - Alessandro Bellini, Emanuele Bellini, Massimo Bertini, Doaa Almhaithawi, Stefano Cuomo:
Multi-party Computation for Privacy and Security in Machine Learning: a Practical Review. 174-179 - Nahid Ferdous Aurna, Md Delwar Hossain, Yuzo Taenaka, Youki Kadobayashi:
Federated Learning-Based Credit Card Fraud Detection: Performance Analysis with Sampling Methods and Deep Learning Algorithms. 180-186 - Prathibha Keshavamurthy, Sarvesh Kulkarni:
Early Detection of Reconnaissance Attacks on IoT Devices by Analyzing Performance and Traffic Characteristics. 187-193 - Mohamed Amine Ben Farah, M. Omar Al-Kadri, Yussuf Ahmed, Raouf Abouzariba, Xavier J. A. Bellekens:
Cyber Incident Scenarios in the Maritime Industry: Risk Assessment and Mitigation Strategies. 194-199 - Didem Genç, Mustafa Özuysal, Emrah Tomur:
A Taxonomic Survey of Model Extraction Attacks. 200-205 - Hadi El Karhani, Riad Al Jamal, Yorgo Bou Samra, Imad H. Elhajj, Ayman I. Kayssi:
Phishing and Smishing Detection Using Machine Learning. 206-211 - Katsuyuki Umezawa, Sven Wohlgemuth, Keisuke Hasegawa, Kazuo Takaragi:
Evaluation of Applying LDA to Redacted Documents in Security and Safety Analysis. 212-218 - Omer Subasi, Joseph B. Manzano, Kevin Barker:
Denial of Service Attack Detection via Differential Analysis of Generalized Entropy Progressions. 219-226 - Aman Srivastava, Nitesh Kumar, Anand Handa, Sandeep K. Shukla:
Ransomware Detection based on Network Behavior using Machine Learning and Hidden Markov Model with Gaussian Emission. 227-233 - Gonçalo Lima, Vitor Hugo Gonçalves, Pedro Pinto:
A Taxonomy for Tsunami Security Scanner Plugins. 234-239 - Waldemar Cruz, Laurent D. Michel, Benjamin Drozdenko, Steven Roodbeen:
ML and Network Traces to M.A.R.S. 240-245 - Vrizlynn L. L. Thing:
Deepfake Detection with Deep Learning: Convolutional Neural Networks versus Transformers. 246-253 - Daniel Machooka, Xiaohong Yuan, Albert C. Esterline:
A Survey of Attacks and Defenses for Deep Neural Networks. 254-261 - Myria Bouhaddi, Kamel Adi:
Mitigating Membership Inference Attacks in Machine Learning as a Service. 262-268 - Daniele Granata, Massimiliano Rak, Francesco Grimaldi:
Attacking a packet Analyzer: Caronte case study. 269-274 - Zaynab Lamoyero, Oluwatobi Fajana:
Exposed: Critical Vulnerabilities in USSD Banking Authentication Protocols. 275-280 - Pandu Ranga Reddy Konala, Vimal Kumar, David Bainbridge:
SoK: Static Configuration Analysis in Infrastructure as Code Scripts. 281-288 - Luke Vandenberghe, Hari Manassery Koduvely, Maria Pospelova:
Detecting Internal Reconnaissance Behavior Through Classification of Command Collections. 289-294 - Nishanth Laxman, Daniel Krohmer, Markus Damm, Reinhard Schwarz, Pablo Oliveira Antonino:
Understanding Resilience: Looking at Frameworks & Standards - A Systematic Study from Cyber Perspective. 295-300 - Lelio Campanile, Maria Stella de Biase, Roberta De Fazio, Michele Di Giovanni, Fiammetta Marulli, Laura Verde:
Merging Model-Based and Data-Driven Approaches for Resilient Systems Digital Twins Design. 301-306 - Silvia Bonomi, Marco Cuoci, Simone Lenti:
A Semi-automatic Approach for Enhancing the Quality of Automatically Generated Inventories. 307-314 - Saeid Sheikhi, Panos Kostakos:
Cyber threat hunting using unsupervised federated learning and adversary emulation. 315-320 - Vida Ahmadi Mehri, Patrik Arlos, Emiliano Casalicchio:
Automated Patch Management: An Empirical Evaluation Study. 321-328 - Ekzhin Ear, Jose L. C. Remy, Shouhuai Xu:
Towards Automated Cyber Range Design: Characterizing and Matching Demands to Supplies. 329-334 - Midori Inaba, Takeaki Terada:
Nudge to Promote Employees' Information Security Compliance Behavior: A Field Study. 335-340 - Simone Bussa, Riccardo Sisto, Fulvio Valenza:
Formal Verification of a V2X Privacy Preserving Scheme Using Proverif. 341-346 - Valeria Bonagura, Stefano Panzieri, Federica Pascucci, Leonardo Badia:
A Game of Age of Incorrect Information Against an Adversary Injecting False Data. 347-352 - Kamal Taha:
Proactive Measures for Cyber-Physical Systems Cybersecurity. 353-358 - Randolph Loh, Vrizlynn L. L. Thing:
Enhancing Cyber-Resilience in Self-Healing Cyber-Physical Systems with Implicit Guarantees. 359-366 - Khaled Alotaibi, Rafat Rob, Dana Nour, Doaa Zamzami:
Detecting Subspace Malicious Vectors Attack Against Smart Grid Using Sequence-Alignment Method. 367-372 - Kyle Murbach, Tommy Morris, Fred Wiersig, Jeffery Golden:
Small Satellite System Modeling for Vulnerability Analysis. 373-380 - Roberto Caviglia, Giovanni Battista Gaggero, Nicola Vincis, Omar Morando, Alessio Aceti, Mario Marchese:
SPAT: A Testbed for Automotive Cybersecurity Training. 381-386 - Valeria Bonagura, Chiara Foglietta, Stefano Panzieri, Federica Pascucci:
Enhancing Industrial Cyber-Physical Systems Security with Smart Probing Approach. 387-393 - Sandip Roy, Benjamin Drozdenko:
Control-Implications-Based Side-Channel Monitoring for Embedded Systems. 394-399 - Konstantinos Ntafloukas, Liliana Pasquale, Beatriz Martinez-Pastor, Daniel P. McCrum:
Identification of Vulnerable IoT Enabled Transportation Infrastructure into a Cyber-Physical Transportation Network. 400-405 - Stefano Perone, Luca Faramondi, Roberto Setola:
Default Credentials Vulnerability: The Case Study of Exposed IP Cams. 406-411 - Luca Faramondi, Francesco Flammini, Simone Guarino, Roberto Setola:
Evaluating Machine Learning Approaches for Cyber and Physical Anomalies in SCADA Systems. 412-417 - Verena Menzel, Kai Oliver Großhanten, Anne Remke:
Evaluating a Process-Aware IDS for Smart Grids on Distributed Hardware. 418-425 - Kabid Hassan Shibly, Md Delwar Hossain, Hiroyuki Inoue, Yuzo Taenaka, Youki Kadobayashi:
A Feature-Aware Semi-Supervised Learning Approach for Automotive Ethernet. 426-431 - Mohammed Mynuddin, Sultan Uddin Khan, Mahmoud Nabil Mahmoud:
Trojan Triggers for Poisoning Unmanned Aerial Vehicles Navigation: A Deep Learning Approach. 432-439 - Maryam Zahid, Alessio Bucaioni, Francesco Flammini:
Trustworthiness-Related Risks in Autonomous Cyber-Physical Production Systems - A Survey. 440-445 - Evangelos Dragonas, Costas Lambrinoudakis:
IoT Forensics: Analysis of Ajax Systems' mobile app for the end user. 446-451 - Evangelos Dragonas, Costas Lambrinoudakis, Michael Kotsis:
IoT Forensics: Investigating the Mobile App of Dahua Technology. 452-457 - Rob Van Kranenburg, Rohit Bohara, Raphael Yahalom, Mirko Ross:
Cyber Resilience, Societal Situational Awareness for SME. 458-463 - George Hatzivasilis, Sotiris Ioannidis, Grigoris Kalogiannis, Manolis Chatzimpyrros, George Spanoudakis, Guillermo Jiménez Prieto, Araceli Rojas Morgan, Miguel Juaniz Lopez, Cataldo Basile, José Francisco Ruiz:
Continuous Security Assurance of Modern Supply-Chain Ecosystems with Application in Autonomous Driving: The FISHY approach for the secure autonomous driving domain. 464-469 - Arnd Weber, Sylvain Guilley, René Rathfelder, Marc Stöttinger, Christoph Lüth, Maja Malenko, Torsten Grawunder, Steffen Reith, Armand Puccetti, Jean-Pierre Seifert, Norbert Herfurth, Hagen Sankowski, Gernot Heiser:
Verified Value Chains, Innovation and Competition. 470-476 - Beny Nugraha, Krishna Yadav, Parag Patil, Thomas Bauschert:
Improving the Detection of Unknown DDoS Attacks through Continual Learning. 477-483 - Sotirios Nikoletos, Stefanos Vlachos, Efstathios Zaragkas, Costas Vassilakis, Christos Tryfonopoulos, Paraskevi Raftopoulou:
RoG§: A Pipeline for Automated Sensitive Data Identification and Anonymisation. 484-489 - Mateusz D. Zych, Vasileios Mavroeidis, Konstantinos Fysarakis, Manos Athanatos:
Reviewing BPMN as a Modeling Notation for CACAO Security Playbooks. 490-495 - Panagiotis Sotiropoulos, Christos-Minas Mathas, Costas Vassilakis, Nicholas Kolokotronis:
Minimizing Software-Rooted Risk through Library Implementation Selection. 496-502 - Breno Tostes, Leonardo Ventura, Enrico Lovat, Matheus Martins, Daniel S. Menasché:
Learning When to Say Goodbye: What Should be the Shelf Life of an Indicator of Compromise? 503-510 - Jiali Zhu, Zhenxin Wu:
An Open Sharing Method for Digital Heritage Assets Based on Self-Sovereign Identity Technology. 511-515 - Alba Amato, Dario Branco, Salvatore Venticinque, Giuseppina Renda, Sabrina Mataluna:
Metadata and Semantic Annotation of Digital Heritage Assets: a case study. 516-522 - Mohamed Faisal Elrawy, Lenos Hadjidemetriou, Christos Laoudias, Maria K. Michael:
Modelling and Analysing Security Threats Targeting Protective Relay Operations in Digital Substations. 523-529 - Maria Nintsiou, Elisavet Grigoriou, Paris-Alexandros Karypidis, Theocharis Saoulidis, Eleftherios Fountoukidis, Panagiotis G. Sarigiannidis:
Threat intelligence using Digital Twin honeypots in Cybersecurity. 530-537 - Konstantinos Fysarakis, Alexios Lekidis, Vasileios Mavroeidis, Konstantinos Lampropoulos, George L. Lyberopoulos, Ignasi Garcia-Milà Vidal, José Carles Terés i Casals, Eva Rodriguez Luna, Alejandro Antonio Moreno Sancho, Antonios Mavrelos, Marinos Tsantekidis, Sebastian Pape, Argyro Chatzopoulou, Christina Nanou, George Drivas, Vangelis Photiou, George Spanoudakis, Odysseas G. Koufopavlou:
PHOENI2X - A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation & Response Capabilities for Business Continuity and Recovery, Incident Response, and Information Exchange. 538-545 - Panagiotis Savvidis, Nikolaos Vakakis, Antonis Voulgaridis, Emanuele Bellini, Dimosthenis Ioannidis, Konstantinos Votis, Dimitrios Tzovaras:
Towards a Hybrid Multi-Layer Blockchain-Based Energy Trading Market for Microgrids. 546-551 - Kyriaki Tsantikidou, Dimitrios Boufeas, Nicolas Sklavos:
Area-Delay Efficient Security Scheme for Smart Hospital Systems. 552-557 - Callum Aitchison, Basel Halak, Alexander Serb, Themis Prodromakis:
A PUF Based on the Non-Linearity of Memristors. 558-563 - Sara Tehranipoor, Nima Karimian, Jack Edmonds:
Breaking AES-128: Machine Learning-Based SCA Under Different Scenarios and Devices. 564-571 - Marco Macchetti, Hervé Pelletier, Cédric Groux:
A New Fast and Side-Channel Resistant AES Hardware Architecture. 572-579 - Ievgen Kabin, Zoya Dyka, Peter Langendoerfer:
Randomized Addressing Countermeasures are Inefficient Against Address-Bit SCA. 580-585 - Shailesh Rajput, Jaya Dofe:
Counteracting Modeling Attacks Using Hardware-Based Dynamic Physical Unclonable Function. 586-591 - Andrey Plotnikov, Alla Levina:
Algorithm for simplifying the SHA-256 operations tree. 592-597 - Nikos Avgerinos, Salvatore D'Antonio, Irene Kamara, Christos Kotselidis, Ioannis Lazarou, Teresa Mannarino, Georgios Meditskos, Konstantina Papachristopoulou, Angelos Papoutsis, Paolo Roccetti, Martin Zuber:
A Practical and Scalable Privacy-preserving Framework. 598-603 - Alberto Pedrouzo-Ulloa, Jan Ramon, Fernando Pérez-González, Siyanna Lilova, Patrick Duflot, Zakaria Chihani, Nicola Gentili, Paola Ulivi, Mohammad Ashadul Hoque, Twaha Mukammel, Zeev Pritzker, Augustin Lemesle, Jaime Loureiro-Acuña, Xavier Martínez Luaña, Gonzalo Jiménez-Balsa:
Introducing the TRUMPET project: TRUstworthy Multi-site Privacy Enhancing Technologies. 604-611 - Alberto Pedrouzo-Ulloa, Aymen Boudguiga, Olive Chakraborty, Renaud Sirdey, Oana Stan, Martin Zuber:
Practical Multi-Key Homomorphic Encryption for More Flexible and Efficient Secure Federated Average Aggregation. 612-617 - Judith Sáinz-Pardo Díaz, Álvaro López García:
Comparison of machine learning models applied on anonymized data with different techniques. 618-623 - Mohammadreza Mohammadi, Roberto Allocca, David Eklund, Rakesh Shrestha, Sima Sinaei:
Privacy-preserving Federated Learning System for Fatigue Detection. 624-629 - Souhila Badra Guendouzi, Samir Ouchani, Hiba El Assaad, Madeleine El-Zaher:
FedGA-Meta: Federated Learning Framework using Genetic Algorithms and Meta-Learning for Aggregation in Industrial Cyber- Physical Systems. 630-635 - Aleksandra Pawlicka, Damian Puchalski, Marek Pawlicki, Rafal Kozik, Michal Choras:
How to secure the IoT-based surveillance systems in an ELEGANT way. 636-640 - Salvatore D'Antonio, Giannis Lazarou, Giovanni Mazzeo, Oana Stan, Martin Zuber, Ioannis Tsavdaridis:
The Alliance of HE and TEE to Enhance their Performance and Security. 641-647 - Luigi Coppolino, Salvatore D'Antonio, Federica Uccello, Anastasios Lyratzis, Constantinos Bakalis, Souzana Touloumtzi, Ioannis Papoutsis:
Detection of Radio Frequency Interference in Satellite Ground Segments. 648-653 - Ioannis Siachos, Konstantinos Kaltakis, Konstantina Papachristopoulou, Ioannis Giannoulakis, Emmanouil Kafetzakis:
Comparison of Machine Learning Algorithms Trained Under Differential Privacy for Intrusion Detection Systems. 654-658
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.