


default search action
Digital Threats: Research and Practice, Volume 3
Volume 3, Number 1, March 2022
- Introduction to the Special Issue on Insider Threats. 1:1-1:3

- Ephraim Zimmer

, Christian Burkert
, Hannes Federrath:
Insiders Dissected: New Foundations and a Systematisation of the Research on Insiders. 2:1-2:35 - Adam D. Williams, Shannon N. Abbott, Nathan Shoman, William S. Charlton

:
Results From Invoking Artificial Neural Networks to Measure Insider Threat Detection & Mitigation. 3:1-3:20 - Paul J. Sticha, Tirso E. Diaz, Elise T. Axelrad, Sean D. Vermillion, Dennis M. Buede:

Simulating Organizational Data from Redacted Input for Inference Enterprise Modeling. 4:1-4:30 - Panpan Zheng, Shuhan Yuan

, Xintao Wu
:
Using Dirichlet Marked Hawkes Processes for Insider Threat Detection. 5:1-5:19
- Siri Bromander, Morton Swimmer, Lilly Pijnenburg Muller, Audun Jøsang, Martin Eian, Geir Skjøtskift, Fredrik Borg:

Investigating Sharing of Cyber Threat Intelligence and Proposing A New Data Model for Enabling Automation in Knowledge Representation and Exchange. 6:1-6:22 - Nicholas Mainardi

, Alessandro Barenghi
, Gerardo Pelosi
:
Privacy-aware Character Pattern Matching over Outsourced Encrypted Data. 7:1-7:38
Volume 3, Number 2, June 2022
- Ricardo J. Rodríguez, Xabier Ugarte-Pedrero, Juan Tapiador:

Introduction to the Special Issue on Challenges and Trends in Malware Analysis. 8:1-8:2 - J. S. Panman de Wit, Doina Bucur, J. van der Ham:

Dynamic Detection of Mobile Malware Using Smartphone Data and Machine Learning. 9:1-9:24 - Daniele Cono D'Elia, Lorenzo Invidia, Federico Palmaro, Leonardo Querzoni:

Evaluating Dynamic Binary Instrumentation Systems for Conspicuous Features and Artifacts. 10:1-10:13 - Ailton Santos Filho, Ricardo J. Rodríguez

, Eduardo L. Feitosa:
Evasion and Countermeasures Techniques to Detect Dynamic Binary Instrumentation Frameworks. 11:1-11:28
- Roberto Perdisci, Martina Lindorfer, Gianluca Stringhini:

Introduction to the ACSAC'20 Special Issue. 12:1-12:2 - Fritz Alder

, Jo Van Bulck
, Jesse Spielman, David F. Oswald
, Frank Piessens:
Faulty Point Unit: ABI Poisoning Attacks on Trusted Execution Environments. 13:1-13:26 - Martin Rosso, Michele Campobasso

, Ganduulga Gankhuyag, Luca Allodi:
SAIBERSOC: A Methodology and Tool for Experimenting with Security Operation Centers. 14:1-14:29 - Sean Oesch, Ruba Abu-Salma, Oumar Diallo, Juliane Krämer, James Simmons, Justin Wu, Scott Ruoti

:
User Perceptions of Security and Privacy for Group Chat. 15:1-15:29
- Sheng Sun:

A Chosen Random Value Attack on WPA3 SAE Authentication Protocol. 16:1-16:8
Volume 3, Number 3, September 2022
- Martin Husák

, Martin Lastovicka
, Tomás Plesník
:
Handling Internet Activism During the Russian Invasion of Ukraine: A Campus Network Perspective. 17:1-17:5
- Lucimara Desiderá, Jeroen van der Ham

:
Introduction to the Special Issue on the 2020 FIRST Conference. 18:1 - Alexandre Dulaunoy

, Jean-Louis Huynen, Aurelien Thirion
:
Active and Passive Collection of SSH Key Material for Cyber Threat Intelligence. 19:1-19:5 - Chung-Kuan Chen, Si-Chen Lin, Szu-Chun Huang, Yung-Tien Chu, Chin-Laung Lei, Chun-Ying Huang

:
Building Machine Learning-based Threat Hunting System from Scratch. 20:1-20:21 - Chase Cotton

:
"Off-Label" Use of DNS. 21:1-21:13 - Desiree Sacher-Boldewin, Éireann Leverett

:
The Intelligent Process Lifecycle of Active Cyber Defenders. 22:1-22:17 - Mila Bajic

, Andrej Petrovski, Bojan Perkov:
Field Note on Doing Digital Rights: Central and Southeast Europe Monitoring Project. 23:1-23:7
- Gabriel Kaptchuk, Fabio Massacci, Sara Nieves Matheu-García

, Elissa M. Redmiles:
Introduction to the Special Issue on Security and Privacy for COVID-19. 24:1-24:2 - Lucy Simko, Jack Lucas Chang, Maggie Jiang, Ryan Calo, Franziska Roesner, Tadayoshi Kohno:

COVID-19 Contact Tracing and Privacy: A Longitudinal Study of Public Opinion. 25:1-25:36 - Borce Stojkovski

, Ruba Abu-Salma, Karen Triquet
, Gabriele Lenzini:
"Unless One Does the Research, It May Seem as Just a Useless Battery-consuming App" - Field Notes on COVID-19 Contact Tracing Applications. 26:1-26:17 - Gabriel Kaptchuk, Daniel G. Goldstein

, Eszter Hargittai, Jake M. Hofman, Elissa M. Redmiles:
How Good is Good Enough? Quantifying the Impact of Benefits, Accuracy, and Privacy on Willingness to Adopt COVID-19 Decision Aids. 27:1-27:18 - Antoine Boutet, Claude Castelluccia, Mathieu Cunche, Cédric Lauradoux, Vincent Roca, Adrien Baud, Pierre-Guillaume Raverdy:

Desire: Leveraging the Best of Centralized and Decentralized Contact Tracing Systems. 28:1-28:20 - Serge Vaudenay, Martin Vuagnoux:

SwissCovid in the Perspective of Its Goals. 29:1-29:17
- Shehzeen Hussain

, Paarth Neekhara
, Brian Dolhansky, Joanna Bitton, Cristian Canton Ferrer, Julian J. McAuley
, Farinaz Koushanfar:
Exposing Vulnerabilities of Deepfake Detection Systems with Robust Attacks. 30:1-30:23 - Giovanni Apruzzese

, Mauro Andreolini, Luca Ferretti, Mirco Marchetti
, Michele Colajanni
:
Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems. 31:1-31:19 - Christopher Jelesnianski, Jinwoo Yom, Changwoo Min, Yeongjin Jang:

Securely Sharing Randomized Code That Flies. 32:1-32:25
Volume 3, Number 4, December 2022
- Paul Shomo

, Sebastián Echeverría, Jesse Sowell
:
Introduction to the Special Issue on the Lifecycle of IoT (In)security. 33:1-33:2 - Louise Axon, Katherine Fletcher

, Arianna Schuler Scott, Marcel Stolz, Robert Hannigan, Ali El Kaafarani, Michael Goldsmith, Sadie Creese:
Emerging Cybersecurity Capability Gaps in the Industrial Internet of Things: Overview and Research Agenda. 34:1-34:27 - Pooria Madani

, Natalija Vlajic, Ivo Maljevic
:
Randomized Moving Target Approach for MAC-Layer Spoofing Detection and Prevention in IoT Systems. 35:1-35:24 - Karl Mozurkewich:

Field Note on IoT Security: Novel JIT Security for Large-Scale Heterogeneous IoT Deployments. 36:1-36:5
- Fabio Massacci, Nick Nikiforakis, Ivan Pashchenko, Antonino Sabetta, Victoria Wang:

Introduction to the Special Issue on Vulnerabilities. 37:1 - Johannes Düsing

, Ben Hermann
:
Analyzing the Direct and Transitive Impact of Vulnerabilities onto Different Artifact Repositories. 38:1-38:25 - Allen D. Householder, Jonathan M. Spring:

Are We Skillful or Just Lucky? Interpreting the Possible Histories of Vulnerability Disclosures. 39:1-39:28 - Paul-David Jarvis, Amalia Damianou, Cosmin Ciobanu, Vasilis Katos:

Vulnerability Exposure Driven Intelligence in Smart, Circular Cities. 40:1-40:18 - Ming Li, Peter J. Hawrylak, John Hale

:
Strategies for Practical Hybrid Attack Graph Generation and Analysis. 41:1-41:24 - Éireann Leverett, Matilda Rhode, Adam Wedgbury:

Vulnerability Forecasting: Theory and Practice. 42:1-42:27
- Jinxin Liu

, Murat Simsek, Burak Kantarci, Melike Erol-Kantarci, Andrew J. Malton, Andrew Walenstein:
Risk-aware Fine-grained Access Control in Cyber-physical Contexts. 43:1-43:29 - Adam Zibak, Clemens Sauerwein, Andrew C. Simpson

:
Threat Intelligence Quality Dimensions for Research and Practice. 44:1-44:22

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














