- 2018
- Jeman Park, DaeHun Nyang, Aziz Mohaisen:
Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks. PST 2018: 1-10 - Gaurav Sharma, Veronika Kuchta, Rajeev Anand Sahu, Soultana Ellinidou, Olivier Markowitch, Jean-Michel Dricot:
A Twofold Group Key Agreement Protocol for NoC based MPSoCs. PST 2018: 1-2 - William Aiken, Hyoungshick Kim, Jungwoo Ryoo, Mary Beth Rosson:
An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks. PST 2018: 1-6 - Robin Ankele, Andrew Simpson:
Analysis and Evaluation of Syntactic Privacy Notions and Games. PST 2018: 1-2 - Voke Augoye, Allan Tomlinson:
Mutual Authentication in Electronic Voting Schemes. PST 2018: 1-2 - Kai Bavendiek, Robin Adams, Sibylle Schupp:
Privacy-Preserving Architectures with Probabilistic Guaranties. PST 2018: 1-10 - Domhnall Carlin, Philip O'Kane, Sakir Sezer, Jonah Burgess:
Detecting Cryptomining Using Dynamic Analysis. PST 2018: 1-6 - Ana C. Carvalho, Rolando Martins, Luis Antunes:
How-to Express Explicit and Auditable Consent. PST 2018: 1-5 - Ge Chu, Alexei Lisitsa:
Poster: Agent-based (BDI) modeling for automation of penetration testing. PST 2018: 1-2 - James Clay, Alexander Hargrave, Ramalingam Sridhar:
A Power Analysis of Cryptocurrency Mining: A Mobile Device Perspective. PST 2018: 1-5 - Brittany Davis, Christopher Whitfield, Mohd Anwar:
Extended Abstract: Ethical and Privacy Considerations in Cybersecurity. PST 2018: 1-2 - Sourya Joyee De, Abdessamad Imine:
Enabling Users to Balance Social Benefit and Privacy in Online Social Networks. PST 2018: 1-10 - Guruprasad Eswaraiah, Roopa Vishwanathan, Douglas Nedza:
Automated Proofs of Signatures using Bilinear Pairings. PST 2018: 1-10 - Nicolás E. Díaz Ferreyra, Rene Meis, Maritta Heisel:
At Your Own Risk: Shaping Privacy Heuristics for Online Self-disclosure. PST 2018: 1-10 - Clémentine Gritti, Melek Önen, Refik Molva:
CHARIOT: Cloud-Assisted Access Control for the Internet of Things. PST 2018: 1-6 - Mordechai Guri, Boris Zadov, Andrey Daidakulov, Yuval Elovici:
xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDs. PST 2018: 1-12 - Ghada El Haddad, Amin Shahab, Esma Aïmeur:
Exploring User Behavior and Cybersecurity Knowledge - An experimental study in Online Shopping. PST 2018: 1-10 - Matthew Hagan, BooJoong Kang, Kieran McLaughlin, Sakir Sezer:
Peer Based Tracking using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection. PST 2018: 1-5 - Shin-Ying Huang, Tzu-Hsien Chuang, Shi-Meng Huang, Tao Ban:
Comprehensible Categorization and Visualization of Orchestrated Malicious Domain Names using Linkage Analysis. PST 2018: 1-2 - Ratinder Kaur, Ye Ning, Hugo Gonzalez, Natalia Stakhanova:
Unmasking Android Obfuscation Tools Using Spatial Analysis. PST 2018: 1-10 - Mahsa Keshavarz, Mohd Anwar:
Towards Improving Privacy Control for Smart Homes: A Privacy Decision Framework. PST 2018: 1-3 - Rafiullah Khan, Kieran McLaughlin, John Hastings, David M. Laverty, Sakir Sezer:
Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart Grid. PST 2018: 1-10 - Hye Min Kim, Hyun Min Song, Jae Woo Seo, Huy Kang Kim:
Andro-Simnet: Android Malware Family Classification using Social Network Analysis. PST 2018: 1-8 - Ibrahim Lazrig, Toan C. Ong, Indrajit Ray, Indrakshi Ray, Xiaoqian Jiang, Jaideep Vaidya:
Privacy Preserving Probabilistic Record Linkage Without Trusted Third Party. PST 2018: 1-10 - Wanpeng Li, Chris J. Mitchell, Thomas M. Chen:
Mitigating CSRF attacks on OAuth 2.0 Systems. PST 2018: 1-5 - Hesham Mahrous, Baljeet Malhotra:
Managing Publicly Known Security Vulnerabilities in Software Systems. PST 2018: 1-10 - Tomoaki Mimoto, Shinsaku Kiyomoto, Seira Hidano, Anirban Basu, Atsuko Miyaji:
The Possibility of Matrix Decomposition as Anonymization and Evaluation for Time-sequence Data. PST 2018: 1-7 - Kai Mindermann, Stefan Wagner:
Usability and Security Effects of Code Examples on Crypto APIs. PST 2018: 1-2 - Nazila Gol Mohammadi, Nelufar Ulfat-Bunyadi, Maritta Heisel:
Problem-based Derivation of Trustworthiness Requirements from Users' Trust Concerns. PST 2018: 1-10 - Toufique Morshed, Dima Alhadidi, Noman Mohammed:
Parallel Linear Regression on Encrypted Data. PST 2018: 1-5