Formalizing real-world threat scenarios (Englisch)
Freier Zugriff
- Neue Suche nach: Tavolato, Paul
- Neue Suche nach: Luh, Robert
- Neue Suche nach: Eresheim, Sebastian
- Neue Suche nach: Tavolato, Paul
- Neue Suche nach: Luh, Robert
- Neue Suche nach: Eresheim, Sebastian
In:
Proceedings of the 8th International Conference on Information Systems Security and Privacy (ICISSP 2022)
; 281-289
;
2022
-
ISBN:
- Aufsatz (Konferenz) / Elektronische Ressource
-
Titel:Formalizing real-world threat scenarios
-
Beteiligte:
-
Erschienen in:
-
Verlag:
- Neue Suche nach: SciTePress - Science and Technology Publications, Lda.
-
Erscheinungsort:Setúbal
-
Erscheinungsdatum:2022
-
Anmerkungen:Langzeitarchivierung durch Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
-
ISBN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Elektronische Ressource
-
Sprache:Englisch
- Neue Suche nach: 54.38
- Weitere Informationen zu Basisklassifikation
-
Klassifikation:
BKL: 54.38 Computersicherheit -
Lizenzbestimmungen:
-
Datenquelle:
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 15
-
"Fake News Detector": an automatic system for the reliability evaluation of digital newsCilli, Claudio / Magnanini, Giulio / Manduca, Lorenzo / Venettoni, Fabrizio et al. | 2022
- 25
-
Network intrusion detection: a comprehensive analysis of CIC-IDS2017Rosay, Arnaud / Cheval, Eloïse / Carlier, Florent / Leroux, Pascal et al. | 2022
- 37
-
Privacy-preserving parallel computation of shortest path algorithms with low round complexityAnagreh, Mohammad / Laud, Peeter / Vainikko, Eero et al. | 2022
- 48
-
Systematic analysis of programming languages and their execution environments for spectre attacksNaseredini, Amir / Gast, Stefan / Schwarzl, Martin / Bernardo, Pedro / Smajic, Amel / Canella, Claudio / Berger, Martin / Gruss, Daniel et al. | 2022
- 60
-
Semantic attack on disassociated transactionsAlShuhail, Asma / Shao, Jianhue et al. | 2022
- 73
-
Implementing post-quantum cryptography for developersHekkala, Julius / Halunen, Kimmo / Vallivaara, Visa et al. | 2022
- 84
-
Security issue classification for vulnerability management with semi-supervised learningWåreus, Emil / Duppils, Anton / Tullberg, Magnus / Hell, Martin et al. | 2022
- 96
-
Estimating the time-to-compromise of exploiting industrial control system vulnerabilitiesLing, Engla Rencelj / Ekstedt, Mathias et al. | 2022
- 108
-
Containment strategy formalism in a probabilistic threat modelling frameworkFahlander, Per / Ekstedt, Mathias / Mukherjee, Preetam / Dwivedi, Ashish Kumar et al. | 2022
- 121
-
Culturally-sensitive cybersecurity awareness program design for Iranian high-school studentsKarimnia, Rooya / Maennel, Kaie / Shahin, Mahtab et al. | 2022
- 133
-
Analysis and enhancement of self-sovereign identity system properties compiling standards and regulationsPattiyanon, Charnon / Aoki, Toshiaki et al. | 2022
- 145
-
Public key compression and fast polynomial multiplication for NTRU using the corrected hybridized NTT-Karatsuba methodKundu, Rohon / De Piccoli, Alessandro / Visconti, Andrea et al. | 2022
- 154
-
Intent-aware permission architecture: a model for rethinking informed consent for Android appsRahman, Md Rashedur / Miller, Elizabeth / Hossain, Moinul / Ali-Gombe, Aisha et al. | 2022
- 165
-
A fast and cost-effective design for FPGA-based fuzzy rainbow tradeoffsVeronese, Leonardo / Palmarini, Francesco / Focardi, Riccardo / Luccio, Flaminia L. et al. | 2022
- 177
-
Detecting obfuscated malware using memory feature engineeringCarrier, Tristan / Victor, Princy / Tekeoglu, Ali / Habibi Lashkari, Arash et al. | 2022
- 189
-
Comparing the detection of XSS vulnerabilities in Node.js and a multi-tier JavaScript-based language via deep learningMaurel, Héloïse / Vidal, Santiago / Rezk, Tamara et al. | 2022
- 202
-
Differential-linear attacks on permutation ciphers revisited: experiments on Ascon and DryGASCONCivek, Aslí Başak / Tezcan, Cihangir et al. | 2022
- 210
-
On tracking ransomware on the file systemCatuogno, Luigi / Galdi, Clemente et al. | 2022
- 220
-
SecTL: secure and verifiable transfer learning-based inferenceMadi, Abbass / Stan, Oana / Sirdey, Renaud / Gouy-Pailler, Cédric et al. | 2022
- 230
-
TEEm: a tangle-based elastic emulator for storing connected vehicle data in a distributed ledger technologyWerden, David / Muccioli, Matthew / Liu, Anyi et al. | 2022
- 242
-
Game theoretic analysis of ransomware: a preliminary studyBaksi, Rudra Prasad / Upadhyaya, Shambhu et al. | 2022
- 255
-
On the LPSE password meter’s discrepancies among different datasetsRucka, Agnieszka / Wodo, Wojciech et al. | 2022
- 264
-
Classifying COVID-19 disinformation on Twitter using a convolutional neural networkNabeel, Mohamad / Große, Christine et al. | 2022
- 273
-
Utility of anonymised data in decision tree derivationDavies, Jack R. / Shao, Jianhua et al. | 2022
- 281
-
Formalizing real-world threat scenariosTavolato, Paul / Luh, Robert / Eresheim, Sebastian et al. | 2022
- 290
-
Side channel identification using Granger time series clustering with applications to control systemsLee, Matthew / Sylvester, Joshua / Aggarwal, Sunjoli / Sinha, Aviraj / Taylor, Michael / Srirama, Nathan / Larson, Eric C. / Thornton, Mitchell A. et al. | 2022
- 299
-
An analysis of cloud certifications' performance on privacy protectionsWang, Tian / Bashir, Masooda et al. | 2022
- 307
-
Efficient and secure encryption adjustment for JSON dataAlmarwani, Maryam / Konev, Boris / Lisitsa, Alexei et al. | 2022
- 314
-
Towards a better understanding of machine learning based network intrusion detection systems in industrial networksBorcherding, Anne / Feldmann, Lukas / Karch, Markus / Meshram, Ankush / Beyerer, Jürgen et al. | 2022
- 326
-
Digital supply chain vulnerabilities in critical infrastructure: a systematic literature review on cybersecurity in the energy sectorAarland, Mari / Gjøsæter, Terje et al. | 2022
- 334
-
Cluster crash: learning from recent vulnerabilities in communication stacksBorcherding, Anne / Takacs, Philipp / Beyerer, Jürgen et al. | 2022
- 345
-
PREUNN: Protocol Reverse Engineering using Neural NetworksKiechle, Valentin / Börsig, Matthias / Nitzsche, Sven / Baumgart, Ingmar / Becker, Jürgen et al. | 2022
- 357
-
An exploratory study of why UMLsec is not adoptedEbad, Shouki A. et al. | 2022
- 365
-
A tailored model for cyber security education utilizing a cyber rangeLangner, Gregor / Skopik, Florian / Furnell, Steven / Quirchmayr, Gerald et al. | 2022
- 378
-
Android data storage locations and what app developers do with it from a security and privacy perspectiveHeid, Kris / Tefke, Tobias / Heider, Jens / Staudemeyer, Ralf et al. | 2022
- 388
-
SpamFender: a semi-supervised incremental spam classification system across social networksWen, Shengyuan / Sun, Weiqing et al. | 2022
- 396
-
A novel key exchange protocol using logic algebra for the factorization problemXiao, Junhui / Neupane, Ashish / Fayoumi, Hiba F. / Sun, Weiqing et al. | 2022
- 404
-
Cyber exercises in computer science educationGafic, Melisa / Tjoa, Simon / Kieseberg, Peter / Hellwig, Otto / Quirchmayr, Gerald et al. | 2022
- 412
-
Construction of a support tool for user reading of privacy policies and assessment of its user impactKanamori, Sachiko / Sato, Hirotsune / Tabata, Naoya / Nojima, Ryo et al. | 2022
- 420
-
Impact of cross-standard cell libraries on machine learning based hardware Trojan detectionChen, Shang-Wen / Liao, Jian-Wei / Tien, Chia-Wei / Hsiao, Jung-Hsin et al. | 2022
- 426
-
Benchmarking consumer data and privacy knowledge in connected and autonomous vehiclesBarber, Flora / Furnell, Steven et al. | 2022
- 435
-
Evaluating deep learning-based NIDS in adversarial settingsMohammadian, Hesamodin / Habibi Lashkari, Arash / Ghorbani, Ali A. et al. | 2022
- 445
-
Effective & efficient access control in smart farms: opportunities, challenges & potential approachesYassin, Ghadeer I. / Ramaswamy, Lakshmish et al. | 2022
- 453
-
Feature importance and deep learning for Android malware detectionTalbi, A. / Viens, A. / Leroux, L.-C. / François, M. / Caillol, M. / Nguyen, N. et al. | 2022
- 463
-
SMPG: Secure Multi Party Computation on Graph DatabasesAljuaid, Nouf / Lisitsa, Alexei / Schewe, Sven et al. | 2022
- 472
-
Age bias in finger vein biometric researchHall, Joanne L. / John, Jomin / Liebig, Jessica / Skariah, Anju et al. | 2022
- 478
-
Industrial and automation control system cyber range prototype for offensive capability developmentUljāns, Austris / Blumbergs, Bernhards et al. | 2022
- 491
-
Planning for cryptographic readiness in an era of quantum computing advancementOtt, David / Moreau, Dennis / Gaur, Manish et al. | 2022
- 499
-
Incentivisation of outsourced network testing: view from platform perspectiveAlasmari, Sultan / Wang, Weichao / Wang, Yu et al. | 2022
- 507
-
Protecting shared virtualized environments against cache side-channel attacksAlbalawi, Abdullah / Vassilakis, Vassilios G. / Calinescu, Radu C. et al. | 2022
- 515
-
Revisiting ontology based access control: the case for Ontology Based Data AccessCan, Ozgu / Unalir, Murat Osman et al. | 2022
- 519
-
Linguistic steganography for messaging applicationsSerret, Elsa / Lesueur, Antoine / Gabillon, Alban et al. | 2022
- 528
-
DeDup.js: discovering malicious and vulnerable extensions by detecting duplicationPicazo-Sanchez, Pablo / Algehed, Maximilian / Sabelfeld, Andrei et al. | 2022
- 536
-
Survey and guidelines about learning cyber security risk assessmentPonsard, Christophe / Massonet, Philippe et al. | 2022
- 544
-
Comparing perception of disclosure of different types of information related to automated toolsBracamonte, Vanessa / Isohara, Takamasa et al. | 2022
- 551
-
Post quantum cryptography analysis of TLS tunneling on a constrained deviceBarton, Jon / Buchanan, William J. / Pitropakis, Nikolaos / Sayeed, Sarwar / Abramson, Will et al. | 2022
- 562
-
PDF malware detection based on stacking learningIssakhani, Maryam / Victor, Princy / Tekeoglu, Ali / Habibi Lashkari, Arash et al. | 2022
- 571
-
The GDPR compliance and access control systems: challenges and research opportunitiesDaoudagh, Said / Marchetti, Eda et al. | 2022
- 579
-
Who watches the watchers: a multi-task benchmark for anomaly detectionDemetriou, Phil / Becker, Ingolf / Hailes, Stephen et al. | 2022
- 587
-
Cyber attack stage tracing system based on attack scenario comparisonKumazaki, Masahito / Hasegawa, Hirokazu / Yamaguchi, Yukiko / Shimada, Hajime / Takakura, Hiroki et al. | 2022
- 595
-
Malware in motionChoudhury, Robert / Luo, Zhiyuan / Nguyen, Khuong An et al. | 2022
- 603
-
Cryptanalysis of some electronic checkbook schemesSertkaya, Isa / Kalkar, Oznur et al. | 2022
- 613
-
The role of information deserts in information security awareness and behaviourSnyman, D. P. / Kruger, H. A. et al. | 2022
- 621
-
iProfile: collecting and analyzing keystroke dynamics from Android usersElmiligi, Haytham / Saad, Sherif et al. | 2022
- 629
-
WhatsApp web client live forensics techniqueMuniz Soares, Alberto Magno et al. | 2022
- 637
-
A privacy-preserving auction platform with public verifiability for smart manufacturingLorünser, Thomas / Wohner, Florian / Krenn, Stephan et al. | 2022
- 648
-
Can we formally catch cheating in E-exams?Vazquez Sandoval, Itzel / Lenzini, Gabriele et al. | 2022
- 656
-
Ransomware detection with deep neural networksDavidian, Matan / Vanetik, Natalia / Kiperberg, Michael et al. | 2022
- 669
-
On the influence of image settings in deep learning-based malware detectionMercaldo, Francesco / Martinelli, Fabio / Santone, Antonella / P., Vinod et al. | 2022
- 677
-
Tamer: a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behaviorYonamine, Shun / Taenaka, Yuzo / Kadobayashi, Youki et al. | 2022
- 688
-
Profile Hidden Markov Model malware detection and API call obfuscationAli, Muhammad / Hamid, Monem / Jasser, Jacob / Lerman, Joachim / Shetty, Samod / Di Troia, Fabio et al. | 2022
- 696
-
NLP-based user authentication through mouse dynamicsLee, Hoseong Asher / Prathapani, Nikhil / Paturi, Rajesh / Parmaksiz, Sarp / Di Troia, Fabio et al. | 2022