Linked e-resources
Details
Table of Contents
Intrusion Detection
Hunting Brand Domain Forgery: A Scalable Classification for Homograph Attack / Tran Phuong Thao, Yukiko Sawaya, Hoang-Quoc Nguyen-Son, Akira Yamada, Kazumasa Omote, Ayumu Kubota
GanDef: A GAN Based Adversarial Training Defense for Neural Network Classifier / Guanxiong Liu, Issa Khalil, Abdallah Khreishah
Control Logic Injection Attacks on Industrial Control Systems / Hyunguk Yoo, Irfan Ahmed
An Efficient and Scalable Intrusion Detection System on Logs of Distributed Applications / David Lanoë, Michel Hurfin, Eric Totel, Carlos Maziero
Access Control
Performance of Password Guessing Enumerators Under Cracking Conditions / Mathieu Valois, Patrick Lacharme, Jean-Marie Le Bars
An Offline Dictionary Attack Against zkPAKE Protocol / José Becerra, Peter Y. A. Ryan, Petra Šala, Marjan Škrobot
Fine-Grained Access Control in Industrial Internet of Things / Dominik Ziegler, Josef Sabongui, Gerald Palfinger
Towards an Automated Extraction of ABAC Constraints from Natural Language Policies / Manar Alohaly, Hassan Takabi, Eduardo Blanco
Removing Problems in Rule-Based Policies / Zheng Cheng, Jean-Claude Royer, Massimo Tisi
Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild / Stephan Wiefling, Luigi Lo Iacono, Markus Dürmuth
Organizational and Behavioral Security
Differentially Private Generative Adversarial Networks for Time Series, Continuous, and Discrete Open Data / Lorenzo Frigerio, Anderson Santana de Oliveira, Laurent Gomez, Patrick Duverger
ESARA: A Framework for Enterprise Smartphone Apps Risk Assessment / Majid Hatamian, Sebastian Pape, Kai Rannenberg
SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking Applications / Weizhi Meng, Wenjuan Li, Lijun Jiang, Jianying Zhou
The Influence of Organizational, Social and Personal Factors on Cybersecurity Awareness and Behavior of Home Computer Users / Joëlle Simonet, Stephanie Teufel
To Be, or Not to Be Notified / Patrick Murmann, Delphine Reinhardt, Simone Fischer-Hübner
A Structured Comparison of the Corporate Information Security Maturity Level / Michael Schmid, Sebastian Pape
Predicting Students' Security Behavior Using Information-Motivation-Behavioral Skills Model / Ali Farooq, Debora Jeske, Jouni Isoaho
Why Do People Pay for Privacy-Enhancing Technologies? The Case of Tor and JonDonym / David Harborth, Xinyuan Cai, Sebastian Pape
Crypto and Encryption
Arcana: Enabling Private Posts on Public Microblog Platforms / Anirudh Narasimman, Qiaozhi Wang, Fengjun Li, Dongwon Lee, Bo Luo
Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards / Jan Camenisch, Manu Drijvers, Petr Dzurenda, Jan Hajny
BlockTag: Design and Applications of a Tagging System for Blockchain Analysis / Yazan Boshmaf, Husam Al Jawaheri, Mashael Al Sabah
Forward Secure Identity-Based Signature Scheme with RSA / Hankyung Ko, Gweonho Jeong, Jongho Kim, Jihye Kim, Hyunok Oh
Integrity
On the Effectiveness of Control-Flow Integrity Against Modern Attack Techniques / Sarwar Sayeed, Hector Marco-Gisbert
Automatically Proving Purpose Limitation in Software Architectures / Kai Bavendiek, Tobias Mueller, Florian Wittner, Thea Schwaneberg, Christian-Alexander Behrendt, Wolfgang Schulz et al.
Commit Signatures for Centralized Version Control Systems / Sangat Vaidya, Santiago Torres-Arias, Reza Curtmola, Justin Cappos
Towards Contractual Agreements for Revocation of Online Data / Theodor Schnitzler, Markus Dürmuth, Christina Pöpper.
Hunting Brand Domain Forgery: A Scalable Classification for Homograph Attack / Tran Phuong Thao, Yukiko Sawaya, Hoang-Quoc Nguyen-Son, Akira Yamada, Kazumasa Omote, Ayumu Kubota
GanDef: A GAN Based Adversarial Training Defense for Neural Network Classifier / Guanxiong Liu, Issa Khalil, Abdallah Khreishah
Control Logic Injection Attacks on Industrial Control Systems / Hyunguk Yoo, Irfan Ahmed
An Efficient and Scalable Intrusion Detection System on Logs of Distributed Applications / David Lanoë, Michel Hurfin, Eric Totel, Carlos Maziero
Access Control
Performance of Password Guessing Enumerators Under Cracking Conditions / Mathieu Valois, Patrick Lacharme, Jean-Marie Le Bars
An Offline Dictionary Attack Against zkPAKE Protocol / José Becerra, Peter Y. A. Ryan, Petra Šala, Marjan Škrobot
Fine-Grained Access Control in Industrial Internet of Things / Dominik Ziegler, Josef Sabongui, Gerald Palfinger
Towards an Automated Extraction of ABAC Constraints from Natural Language Policies / Manar Alohaly, Hassan Takabi, Eduardo Blanco
Removing Problems in Rule-Based Policies / Zheng Cheng, Jean-Claude Royer, Massimo Tisi
Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild / Stephan Wiefling, Luigi Lo Iacono, Markus Dürmuth
Organizational and Behavioral Security
Differentially Private Generative Adversarial Networks for Time Series, Continuous, and Discrete Open Data / Lorenzo Frigerio, Anderson Santana de Oliveira, Laurent Gomez, Patrick Duverger
ESARA: A Framework for Enterprise Smartphone Apps Risk Assessment / Majid Hatamian, Sebastian Pape, Kai Rannenberg
SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking Applications / Weizhi Meng, Wenjuan Li, Lijun Jiang, Jianying Zhou
The Influence of Organizational, Social and Personal Factors on Cybersecurity Awareness and Behavior of Home Computer Users / Joëlle Simonet, Stephanie Teufel
To Be, or Not to Be Notified / Patrick Murmann, Delphine Reinhardt, Simone Fischer-Hübner
A Structured Comparison of the Corporate Information Security Maturity Level / Michael Schmid, Sebastian Pape
Predicting Students' Security Behavior Using Information-Motivation-Behavioral Skills Model / Ali Farooq, Debora Jeske, Jouni Isoaho
Why Do People Pay for Privacy-Enhancing Technologies? The Case of Tor and JonDonym / David Harborth, Xinyuan Cai, Sebastian Pape
Crypto and Encryption
Arcana: Enabling Private Posts on Public Microblog Platforms / Anirudh Narasimman, Qiaozhi Wang, Fengjun Li, Dongwon Lee, Bo Luo
Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards / Jan Camenisch, Manu Drijvers, Petr Dzurenda, Jan Hajny
BlockTag: Design and Applications of a Tagging System for Blockchain Analysis / Yazan Boshmaf, Husam Al Jawaheri, Mashael Al Sabah
Forward Secure Identity-Based Signature Scheme with RSA / Hankyung Ko, Gweonho Jeong, Jongho Kim, Jihye Kim, Hyunok Oh
Integrity
On the Effectiveness of Control-Flow Integrity Against Modern Attack Techniques / Sarwar Sayeed, Hector Marco-Gisbert
Automatically Proving Purpose Limitation in Software Architectures / Kai Bavendiek, Tobias Mueller, Florian Wittner, Thea Schwaneberg, Christian-Alexander Behrendt, Wolfgang Schulz et al.
Commit Signatures for Centralized Version Control Systems / Sangat Vaidya, Santiago Torres-Arias, Reza Curtmola, Justin Cappos
Towards Contractual Agreements for Revocation of Online Data / Theodor Schnitzler, Markus Dürmuth, Christina Pöpper.