Cybersecurity Research
Publications
Device-centric
Publications | |
---|---|
Requirements and Challenges for Secure and Trustworthy UAV Collaboration, Marco Anisetti, Claudio A. Ardagna, Barbara Carminati, Elena Ferrari, Cora Perner:2020 IEEE CIC/CogMI/TPS Joint Conferences, 1-3 December 2020 | |
Blockchain on MSP430 with IEEE 802.15.4, Eryk Schiller, Elfat Esati, Sina Rafati Niya, Burkhard Stiller: The 45th IEEE Conference on Local Computer Networks (LCN),November 16-19, 2020 | |
KYoT: Self-Sovereign IoT Identification with A Physically Unclonable Function,Sina Rafati Niya, Benjamin Jeffrey, Burkhard Stiller: The 45th IEEE Conference on Local Computer Networks (LCN),November 16-19, 2020 | |
A novel approach for detecting vulnerable IoT devices connected behind a home NAT, Yair Meidan, Vinay Sachidananda, Hongyi Peng, Racheli Sagron, Yuval Elovici, Asaf Shabtai: Computers & Security, October 2020 | |
UZH Spotting political social bots in Twitter: A use case of the 2019 Spanish general election, Javier Pastor, Mattia Zago, Pantaleone Nespoli, Sergio López, Alberto Huertas, Manuel Gil, José A. Ruipérez, Gregorio Martínez, Félix Gómez :EEE Transactions on Network and Service Management, October 2020 | |
Be Your Neighbor’s Miner: Building Trust in Ledger Content via Reciprocally Useful Work,Lara Mauri, Ernesto Damiani, Stelvio Cimato: 2020 IEEE 13th International Conference on Cloud Computing (CLOUD), 18-24 October 2020 | |
IoT Device Identification Using Deep Learning, Jaidip Kotak, Yuval Elovici: 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020), 16-18 September 2020 | |
Mining and Monitoring Darknet Traffic, Dvir Cohen, Yisroel Mirsky, Manuel Kamp, Tobias Martin, Yuval Elovici, Rami Puzis, Asaf Shabtai: European Symposium on Research in Computer Security (ESORICS), 14-18 September 2020 | |
Enabling Digital Forensics Readiness for Internet of Vehicles, Alexakos C., Katsini, C., Votis K., Lalas A., Tzovaras D., Serpanos D:23rd EURO Working Group on Transportation Meeting, EWGT 2020, September 2020 | |
Real-time Thread Isolation and Trusted Execution on Embedded RISC-V,Samuel Lindemer, Gustav Midéus, Shahid Raza:First International Workshop on Secure RISC-V Architecture Design Exploration (SECRISC-V’20), 23 August 2020 | |
When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures, Gil Fidel, Ron Bitton, Asaf Shabtai: International Joint Conference on Neural Networks (IJCNN), 19-24 July 2020 | |
Stay Thrifty, Stay Secure: A VPN-Based Assurance Framework for Hybrid Systems, Marco Anisetti, Claudio A. Ardagna, Nicola Bena, Ernesto Damiani: 17th International Conference on Security and Cryptography (SECRYPT 2020), July 2020 | |
Towards Efficient and Secure Analysis of Large Datasets,Stelvio Cimato, Stefano Nicolò: 44th IEEE Annual Computers, Software, and Applications Conference (COMPSAC 2020), 13-17 July 2020 | |
Mammoth: Monitoring the ABAC Monitor of MQTT-based Internet of Things ecosystems, Pietro Colombo, Elena Ferrari, Samuele Salvia: The 25th ACM Symposium on Access Control Models and Technologies (SACMAT 2020), 10-12 June 2020 | |
A Resource Efficient Implementation of the RESTCONF Protocol for OpenWrt Systems, Malte Granderath, Jürgen Schönwälder: IEEE/IFIP Network Operations and Management Symposium (NOMS), June 2020 | |
Decentralized, Secure and Cognitive Architecture for Automotive CyberPhysical System of Systems, Apostolos Fournaris, Aris Lalos, Petros Kapsalas, Christos Koulamas:8th International Conference on Cyber-Physical Systems and Internet-of-Things (CPS&IoT’2020), June 2020 | |
Anomaly Detection Trusted Hardware Sensors for Critical Infrastructure Legacy Devices, Apostolos P. Fournaris, Charis Dimopoulos, Konstantinos Lampropoulos, Odysseas Koufopavlou : Sensors, May 2020 | |
ELSA: efficient long-term secure storage of large datasets, Philipp Muth, Matthias Geihs, Tolga Arul, Johannes Buchmann, Stefan Katzenbeisser: EURASIP Journal on Information Security, 1 May 2020 | |
A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem, Stelvio Cimato, Gabriele Gianini, Maryam Sepehri, Rasool Asal, Ernesto Damiani: Journal of Information Security and Applications, April 2020 | |
An enclave assisted snapshot-based kernel integrity monitor, Deyannis Dimitris, Dimitris Karnikis, Giorgos Vasiliadis, and Sotiris Ioannidis: In Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and Networking, pp. 19-24. April 2020 | |
BIIT: Standardization of Blockchain-based I2oT Systems in the I4 Era, Sina Rafati-Niya, Eryk Schiller, Ile Cepilov, Burkhard Stiller: IEEE/IFIP Network Operations and Management Symposium (NOMS 2020), 20-24 April 2020 | |
Trustav: Practical and privacy preserving malware analysis in the cloud, Deyannis Dimitris, Eva Papadogiannaki, Giorgos Kalivianakis, Giorgos Vasiliadis, and Sotiris Ioannidis: In Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy, pp. 39-48. March 2020 | |
Creating Trusted Security Sensors for Anomaly Detection Systems using Hardware components, Apostolos Fournaris, Charis Dimopoulos, and Odysseas Koufopavlou:TRUDEVICE 2020: Workshop on Trustworthy Manufacturing and Utilization of Secure Devices, Design, Automation and Test in Europe Conference (DATE 2020), March 2020 | |
Reining in the Web’s Inconsistencies with Site Policy,S. Calzavara, T. Urban, D. Tatang, M. Steffens, and B. Stock:Network and Distributed System Security Symposium (NDSS), 23-26 February 2020 | |
Privacy Preservation in Industrial IoT via Fast Adaptive Correlation Matrix Completion, Aris S. Lalos, Evangelos Vlachos, K. Berberidis, Apostolos Fournaris, Christos Koulamas:IEEE Transactions on Industrial Informatics, December 2019 | |
Secure Semantic Interoperability for IoT Applications with Linked Data, G. Hatzivasilis, O. Soultatos, E. Lakka, S. Ioannidis, D. Anicic, A. Broring, L. Ciechomski, M. Falchetto, K. Fysarakis, G. Spanoudakis: IEEE Global Communications Conference (GLOBECOM 2019), IEEE, Waikoloa, HI, USA, 9- 13 December, 2019, pp. 1-7 | |
Attacking SRAM PUFs using very-low-temperature data remanence, Nikolaos Athanasios Anagnostopoulos, Tolga Arul, Markus Rosenstihl, André Schaller, Sebastian Gabmeyer, Stefan Katzenbeisser: Microprocessors and Microsystems, volume 71, page 102,864, 1 November 2019 |
|
“https://doi.org/10.1109/ISSREW.2019.00110″>A Proposal for Security Assessment of Trustzone-M based Software, Antonio Ken Iannillo, Radu State:Fast Abstract at the 30th International Symposium on Software Reliability Engineering (ISSRE 2019),28-31 October 2019, Berlin, Germany | |
Scalable Transport Mechanisms for Blockchain IoT Applications, Eryk Schiller, Sina Rafati Niya, Timo Surbeck, Burkhard Stiller: 2019 IEEE 44th Conference on Local Computer Networks (LCN) (LCN 2019), 14-17 October, 2019, Osnabrück, Germany | |
End-to-End Semantic Interoperability Mechanisms for IoT,E. Lakka, N. E. Petroulakis, G. Hatzivasilis, O. Soultatos, M. Michalodimitrakis, U. Rak, K. Waledzik, D. Anicic, V. Kulkarni:24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD 2019), IEEE, Limassol, Cyprus, 11-13 September, 2019, pp. 1-6. | |
Reconfiguring the Functionality of IoT Edge/End nodes using FPGA based System on Chips, Apostolos P. Fournaris, Aris Lalos and Christos Koulamas:First international conference on Societal Automation conference, September 2019 | |
MobileTrust: Secure Knowledge Integration in VANETs, G. Hatzivasilis, O. Soultatos, S. Ioannidis, G. Spanoudakis, V. Katos, G. Demetriou: ACM Transactions on Cyber-Physical Systems Special Issue on User-Centric Security and Safety for Cyber-Physical Systems, ACM, vol., pp., September 2019 | |
Generative Adversarial Networks in AI-Enabled Safety-Critical Systems: Friend or Foe?, A. P. Fournaris, A. S. Lalos and D. Serpanos:IEEE Computer, August2019 | |
Robust and Efficient Privacy Preservation in Industrial IoT via correlation completion and tracking, Aris S. Lalos, Evangelos Vlachos, Konstantinos Berberidis, Apostolos Fournaris, Christos Koulamas:2019 IEEE 17th International Conference on Industrial Informatics (INDIN), 22-25 July 2019 | |
Trustworthy IoT: An Evidence Collection Approach based on Smart Contracts, Claudio A. Ardagna, Rasool Asal, Ernesto Damiani, Nabil El Ioini, Claus Pahl: EEE International Conference on Services Computing (SCC 2019), 8-13 July 2019, Milan, Italy | |
A trust assurance technique for Internet of things based on human behavior compliance, Marco Anisetti, Claudio Agostino Ardagna, Ernesto Damiani, Alessandro Sala:Concurrency and Computation: Practice and Experience, June 2019 | |
Adaptation of Proof-of-Stake-based Blockchains for IoT Data Streams (Demo),Sina Rafati Niya, Eryk Schiller, Ile Cepilov, Fabio Maddaloni, Timo Surbeck, Kürsat Aydinli, Thomas Bocek, Burkhard Stiller:1st IEEE International Conference on Blockchains and Cryptocurrencies (ICBC 2019), Seoul, South Korea, May 2019, pp 15-16 | |
Revisiting Rowhammer Attacks in Embedded Systems, Lidia Pocero Fraile, Apostolos P. Fournaris, Odysseas Koufopavlou: 14th IEEE International Conference on Design & Technology of Integrated Systems in Nanoscale Era, 16-18 April 2019, Mykonos, Greece | |
AR-PUFs: Advanced Security Primitives for the Internet of Things and Cyber-Physical Systems, Nikolaos Athanasios Anagnostopoulos, Tolga Arul, Yufan Fan, Manish Kumar, Stefan Katzenbeisser: IEEE International Conference on Consumer Electronics, 11-13 January 2019 |
Network-centric
Publications | |
---|---|
Encrypted HTTP/2 Traffic Monitoring: Standing the Test of Time and Space, Pierre-Olivier Brissaud, Jérôme François, Isabelle Chrisment, Thibault Cholez, Olivier Bettan:Proceedings of the 12th IEEE International Workshop on Information Forensics and Security (WIFS) 2020, 6-11 December 2020 | |
Provotum: A Blockchain-Based and End-To-End Verifiable Remote Electronic Voting System, Christian Killer, Bruno Rodrigues, Eder Scheid, Muriel Franco, Moritz Eck, Nik Zaugg, Alex Scheitlin, Burkhard Stiller: 45th Conference on Local Computer Networks (LCN), November 16-19, 2020 | |
OpenMTD: A Framework for Efficient Network-Level MTD Evaluation, Richard Poschinger, Nils Rodday, Raphael Labaca Castro, Gabi Dreo Rodosek: ACM 27th Conference on Computer and Communications Security (CCS) – MTD Workshop, 9-13 November 2020 | |
BGP Anycast Tuner: Intuitive Route Management for Anycast Services, L. Bertholdo, J. Ceron, L. Granvillez, G. Moura, C. Hesselman, and R. van Rijswijk-Deij:16th International Conference on Network and Service Management (CNSM), 2-6 November 2020 | |
SecBot: a Business-Driven Conversational Agent for Cybersecurity Planning and Management, Muriel Franco, Bruno Rodrigues, Eder Scheid, Arthur Jacobs, Christian Killer, Lisandro Granville, Burkhard Stiller: 16th International Conference on Network and Service Management (CNSM 2020), 2-6 November 2020 | |
Retrofitting Post-Quantum Cryptography in Internet Protocols: A Case Study of DNSSEC, M. Müller, J. de Jong, M. van Heesch, B. Overeinder & R. van Rijswijk-Deij: ACM SIGCOMM Computer Communication Review, October 2020 | |
The Reality of Algorithm Agility: Studying the DNSSEC Algorithm Life-Cycle,Moritz Muller, Willem Toorop, Taejoong Chung, Jelte Jansen, and Roland van Rijswijk-Deij: In Proceedings of ACM Internet Measurement Conference(IMC 2020), 27-29 October 2020 | |
UZH Spotting political social bots in Twitter: A use case of the 2019 Spanish general election, Javier Pastor, Mattia Zago, Pantaleone Nespoli, Sergio López, Alberto Huertas, Manuel Gil, José A. Ruipérez, Gregorio Martínez, Félix Gómez :EEE Transactions on Network and Service Management, October 2020 | |
ProtectDDoS: A Platform for Trustworthy Offering and Recommendation of Protections, Muriel Franco, Erion, Sula, Bruno Rodrigues, Eder Scheid, Burkhard Stiller: International Conference on Economics of Grids, Clouds, Software and Services (GECON 2020), 15-17 September 2020 | |
Head(er)Hunter: Fast Intrusion Detection using Packet Metadata Signatures, Eva Papadogiannaki, Dimitris Deyannis, Sotiris Ioannidis: IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD2020), 14-16 September 2020 | |
Blockchain Signaling System (BloSS): Cooperative Signaling of Distributed Denial-of-Service Attacks, Bruno Rodrigues, Eder Scheid, Christian Killer, Muriel Franco, Burkhard Stiller: Journal of Network and Systems Management (JNSM) 2020, 24 August 2020 | |
Proverum: A Hybrid Public Verifiability and Decentralized Identity Management, Christian Killer, Lucas Thorbecke, Bruno Rodrigues, Eder Scheid, Muriel Franco, Burkhard Stiller: Cryptography and Security (cs.CR), 22 August 2020 | |
Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queries, Sean Rivera, Vijay Gurbani, Sofiane Lagraa, Antonio Ken Iannillo and Radu State: ARES 2020/CUING 2020, August 2020 | |
The DNS in IoT: Opportunities, Risks, and Challenges, C. Hesselman, M. Kaeo, L. Chapin, kc claffy, M. Seiden, D. McPherson, D. Piscitello, A. McConachie, T. April, J. Latour, and R. Rasmussen:IEEE Internet Computing, Vol. 24 , No. 4 , July-Aug 2020 | |
A Practical Analysis on Mirai Botnet Traffic, Getoar Gallopeni, Bruno Rodrigues, Muriel Franco, Burkhard Stiller: IFIP Networking 2020, June 22 – 25, 2020 | |
Multi-Sector Assessment Framework – A New Approach to Analyze Cybersecurity Challenges and Opportunities,Salvatore Marco Pappalardo, Marcin Niemiec, Maya Bozhilova, Nikolai Stoianov, Andrzej Dziech, Burkhard Stiller:10th International Conference on Multimedia Communications, Services, and Security (MCSS 2020),18-19 June 2020 | |
SC-FLARE: Cooperative DDoS Signaling based on Smart Contracts,Bruno Rodrigues, Spasen Trendafilov, Eder Scheid, Burkhard Stiller: IEEE International Conference on Blockchain and Cryptocurrency 2-6 May 2020, Virtual Conference | |
Using TLS Fingerprints for OS Identification in Encrypted Traffic, Martin Lastovicka, Stanislav Spacek, Petr Velan, Pavel Celeda: NOMS 2020 – 2020 IEEE/IFIP Network Operations and Management Symposium, 20-24 April 2020 | |
Towards Adversarial Resilience in Proactive Detection of Botnet Domain Names by using MTD, C. Dietz, G. Dreo Rodosek, A. Sperotto, A. Pras: IEEE/IFIP Network Operations and Management Symposium (NOMS 2020), 20-24 April 2020 | |
Distributed DDoS Defense: A Collaborative Approach at Internet Scale, Jessica Steinberger, Anna Sperotto, Aiko Pras, Harald Baier: 2020 IEEE/IFIP Network Operations and Management Symposium, 20-24 April 2020 | |
DDoS Mitigation: A Measurement-Based Approach, Mattijs Jonker, Anna Sperotto, Aiko Pras: 2020 IEEE/IFIP Network Operations and Management Symposium, 20-24 April 2020 | |
Reliable measurements with BGP and RPKI, Mattijs Jonker, Nils Rodday: IEEE/IFIP Network Operations and Management Symposium (NOMS), 20-24 April 2020 | |
Blockchains in the Age of Softwarization – Hands-on Experiences with Programming Smart Contracts and Their Security Pitfalls, Bruno Rodrigues, Eder Scheid, Burkhard Stiller:IEEE/IFIP Network Operations and Management Symposium (NOMS),20-24 April 2020, Virtual Conference | |
WeTrace: Privacy-preserving Mobile COVID-19 Tracing Approach and Application,Alessandro De Carli, Muriel Franco, Andreas Gassmann, Christian Killer, Bruno Rodrigues, Eder John Scheid, David Schoenbaechler, Burkhard Stille: Whitepaper , April 2020 | |
Design and implementation of cast-as-intended verifiability for a blockchain-based voting system, Christian Killer, Bruno Rodrigues, Raphael Matile, Eder Scheid, Burkhard Stiller:SAC ’20: Proceedings of the 35th Annual ACM Symposium on Applied Computing,March 30-April 3, 2020, Virtual Conference | |
State Channel as a Service based on a Distributed and Decentralized Web,Blaž Podgorelec, Marjan Heričko, Muhamed Turkanović:IEEE Access,30 March 2020 | |
Looking Beyond the Horizon: Thoughts on Proactive Detection of Threats, Olivier van der Toorn, Anna Sperotto: Digital Threats: Research and Practice, March 2020 | |
A Novel Intrusion Detection System Against Spoofing Attacks in Connected Electric Vehicles, Dimitrios Kosmanos, Apostolos Pappas, Leandros Maglaras, Sotiris Moschoyiannis, Francisco J. Navarro, Antonios Argyriou and Helge Janicke: Array, Volume 5, March 2020 | |
ARIMA Supplemented Security Metrics for Quality Assurance and Situational Awareness,Jan Kohlrausch and Eugene A. Brin:ACM DTRAP Journal Vol 1 No 1,March 2020 | |
Evaluating TCP Connection Healthiness, Nils Rodday, Raphael Labaca Castro, Klement Streit and Gabi Dreo Rodosek: International Telecommunication Networks and Applications Conference ITNAC 2019, 27-29 November 2019, Auckland, New Zealand | |
Machine Learning for Security at the IoT Edge – A Feasibility Study, Han Wang, Luis Barriga, Arash Vahidi, Shahid Raza: International Workshop on Machine Learning Security and Privacy: Experiences and Applications, 4 – 7 November 2019, Monterey, CA, USA | |
MENTOR: The Design and Evaluation of a Protection Services Recommender System, Muriel Franco, Bruno Rodrigues, Burkhard Stiller: 15th International Conference on Network and Service Management (CNSM 2019), 21-25 October, 2019, Halifax, Canada | |
DDoS Hide & Seek: On the Effectiveness of a Booter Services Takedown, Daniel Kopp, Matthias Wichtlhuber, Ingmar Poese, Jair Santanna, Oliver Hohlfeld, and Christoph Dietzel:Internet Measurement Conference (IMC ’19), 21-23 October 2019, Amsterdam, Netherlands | |
RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins, Taejoong Chung, Emile Aben, Tim Bruijnzeels, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Roland van Rijswijk-Deij, John Rula, and Nick Sullivan:Internet Measurement Conference (IMC ’19), 21-23 October 2019, Amsterdam, Netherlands | |
Roll, Roll, Roll your Root: A Comprehensive Analysis of the First Ever DNSSEC Root KSK Rollover, Moritz Müller, Matthew Thomas, Duane Wessels, Wes Hardaker, Taejoong Chung, Willem Toorop, and Roland van Rijswijk-Deij:Internet Measurement Conference (IMC ’19) Distinguished paper award, 21-23 October 2019, Amsterdam, Netherlands | |
Wireless SDN for Highly Utilized MANETs, Klement Streit, Nils Rodday, Florian Steuber, Corinna Schmitt, Gabi Dreo Rodosek:6th Workshop: ICT Systems for Public Protection and Risk Reduction at the International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2019), 21-23 October, Barcelona, Spain | |
Analysis of Fault Tolerance in Permissioned Blockchain Networks, Blaž Podgorelec, Vid Keršič and Muhamed Turkanović: ICAT-BCTA 2019, 20-23 October 2019, Sarajevo, Bosnia and Herzegovina | |
Cooperative Signaling of DDoS Attacks in a Blockchain-based Network, Bruno Rodrigues, Burkhard Stiller: ACM SIGCOMM 2019 Conference (SIGCOMM Posters and Demos ’19), 19-24 August, 2019, Beijing, China | |
Transparent and Service-Agnostic Monitoring of Encrypted Web Traffic, Pierre-Olivier Brissaud, Jérôme François, Isabelle Chrisment, Thibault Cholez and Olivier Bettan:IEEE Transactions on Network and Service Management, 05 August 2019 | |
At Home and Abroad: The Use of Denial-of-service Attacks during Elections in Nondemocratic Regimes, P. Lutscher, Nils Weidmann, Molly E. Roberts, M. Jonker, A. King, A. Dainotti:Journal of Conflict Resolutions, July 2019 |
Software/System-centric
Publications | |
---|---|
Retrofitting Post-Quantum Cryptography in Internet Protocols: A Case Study of DNSSEC, M. Müller, J. de Jong, M. van Heesch, B. Overeinder & R. van Rijswijk-Deij: ACM SIGCOMM Computer Communication Review, October 2020 | |
Clouding up the Internet: how centralized is DNS traffic becoming?Giovane C. M. Moura, Sebastian Castro, Wes Hardaker, Maarten Wullink, Cristian HesselmanProceedings of the ACM Internet Measurement Conference, Virtual Conference, 27-29 October 2020 | |
O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs,O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPsVasileios Giotsas, George Nomikos Vasileios Kotronis; Pavlos Sermpezis; Petros Gigis; Lefteris Manassakis; Christoph Dietzel; Stavros Konstantaras; Xenofontas Dimitropoulos: IEEE/ACM Transactions on Networking, 23 October 2020 | |
UZH Spotting political social bots in Twitter: A use case of the 2019 Spanish general election, Javier Pastor, Mattia Zago, Pantaleone Nespoli, Sergio López, Alberto Huertas, Manuel Gil, José A. Ruipérez, Gregorio Martínez, Félix Gómez :EEE Transactions on Network and Service Management, October 2020 | |
A Responsible Internet to Increase Trust in the Digital World,C. Hesselman, P. Grosso, R. Holz, F. Kuipers, J. Hui Xue, M. Jonker, J. de Ruiter, A. Sperotto, R. van Rijswijk-Deij, G. C. M. Moura, A. Pras, and C. de Laat: Invited paper for the Journal of Network and Systems Management (JNSM), special issue on “Future of Network and Service Operations and Management: Trends, Developments, and Directions”, September 2020 | |
Enabling Digital Forensics Readiness for Internet of Vehicles, Alexakos C., Katsini, C., Votis K., Lalas A., Tzovaras D., Serpanos D:23rd EURO Working Group on Transportation Meeting, EWGT 2020, September 2020 | |
Real-time Thread Isolation and Trusted Execution on Embedded RISC-V,Samuel Lindemer, Gustav Midéus, Shahid Raza:First International Workshop on Secure RISC-V Architecture Design Exploration (SECRISC-V’20), 23 August 2020 | |
ICS Testbed Tetris: Practical Building Blocks Towards a Cyber Security Resource,Benjamin Green, Richard Derbyshire, William Knowles, James Boorman, Pierre Ciholas, Daniel Prince and David Hutchison:Proc. of USENIX Security – CSET Workshop, 10 August 2020 | |
The DNS in IoT: Opportunities, Risks, and Challenges, C. Hesselman, M. Kaeo, L. Chapin, kc claffy, M. Seiden, D. McPherson, D. Piscitello, A. McConachie, T. April, J. Latour, and R. Rasmussen:IEEE Internet Computing, Vol. 24 , No. 4 , July-Aug 2020 | |
(How Much) Does a Private WAN Improve Cloud Performance?Todd Arnold, Ege Gürmeriçliler, Georgia Essig, Arpit Gupta, Matt Calder, Vasileios Giotsas, Ethan Katz-Bassett:IEEE INFOCOM 2020,6-9 July 2020 | |
TraceSanitizer – Eliminating the Effects of Non-determinism on Error Propagation Analysis, Habib Saissi, Stefan Winter, Oliver Schwahn, Karthik Pattabiraman Neeraj:Proc. of Dependable Systems and Networks, 29th June – 2th July, 2020 | |
Multi-Sector Assessment Framework – A New Approach to Analyze Cybersecurity Challenges and Opportunities,Salvatore Marco Pappalardo, Marcin Niemiec, Maya Bozhilova, Nikolai Stoianov, Andrzej Dziech, Burkhard Stiller:10th International Conference on Multimedia Communications, Services, and Security (MCSS 2020),18-19 June 2020 | |
Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure,Ahmed Taha, Ahmed Zakaria, Dongseong Kim, Neeraj Suri:Proc. of Intl. Conference on Cloud Engineering, April 2020 | |
Counterfighting Counterfeit: detecting and taking down fraudulent webshops at a ccTLD, Thymen Wabeke, Giovane C. M. Moura, Nanneke Franken and Cristian Hesselman: Proceedings of the Passive and Active Measurement Workshop (Eugene, OR, USA, 30-31 March 2020 | |
A First Look at the Misuse and Abuse of the IPv4 Transfer Market,Vasileios Giotsas, Ioana Livadariu, Petros Gigis: International Conference on Passive and Active Network Measurement, 30-31 March 2020 | |
When parents and children disagree: Diving into DNS delegation inconsistency,Raffaele Sommese, Giovane C. M. Moura, Mattijs Jonker, Roland van Rijswijk-Deij , Alberto Dainotti, K Claffy, Anna Sperotto:2020 Passive and Active Measurement Conference (PAM2020),March 2020 | |
Counterfighting Counterfeit: detecting and taking down fraudulent webshops at a ccTLD,Thymen Wabeke, Giovane C. M. Moura, Nanneke Franken, Cristian Hesselman:2020 Passive and Active Measurement Conference (PAM2020),March 2020 | |
How to kill symbolic deobfuscation for free (or: unleashing the potential of path-oriented protections), Mathilde Ollivier, Sébastien Bardin, Richard Bonichon, Jean-Yves Marion: Proceedings of the 35th Annual Computer Security Applications Conference, ACSAC 2019, December 2019 | |
Cybersecurity Evaluation of Enterprise Architectures: The e-SENS Case, Tanja Pavleska, Helder Aranha, Massimiliano Masi, Eric Grandry and Giovanni Paolo Sellitto: Practice of Enterprise Modelling (PoEM) 2019, 27-29 November 2019, Luxembourg | |
Auto-encoding Robot State against Sensor Spoofing Attacks, Sean Rivera, Sofiane Lagraa, Antonio Ken Iannillo, Radu State:The 4th IEEE International Workshop on Reliability and Security Data Analysis (RSDA 2019), co-located with the 30th International Symposium on Software Reliability Engineering (ISSRE 2019), 28-31 October 2019, Berlin, Germany | |
Analyzing and Improving Customer-side Cloud Security Certifiability, Shujie Zhao, Yiqun Chen, Stefan Winter and Neeraj Suri:IEEE International Workshop on Software Certification (WoSoCeR), 28-31 October 2019, Berlin, Germany | |
Mobile App to SGX Enclave Secure Channel, Fernando Kaway Carvalho Ota, Jorge Augusto Meira, Cyril Renaud Cassagnes and Radu State: 4th IEEE International Workshop on Reliability and Security Data Analysis (RSDA), co-located with ISSRE, 28-31 October 2019, Berlin, Germany | |
Inferring Performance Bug Patterns from Developer Commits, Yiqun Chen, Stefan Winter and Neeraj Suri : International Symposium on Software Reliability Engineering (ISSRE), 28-31 October 2019, Berlin, Germany | |
Securing Mobile e-Health Environments by Design: A Holistic Architectural Approach, Helder Aranha, Massimiliano Masi, Tanja Pavleska, Giovanni Paolo Sellitto:Seventh International Workshop on e-Health Pervasive Wireless Applications and Services 2019, 21 October 2019, Barcelona, Spain | |
Gyro: A Modular Scale-Out Layer for Single-Server DBMSs, Habib Saissi, Marco Serafini and Neeraj Suri: Symposium on Reliable Distributed Systems (SRDS) 2019, 1-4 October, 2019, Lyon, France | |
Distributed Systems Security Knowledge Area,Neeraj Suri: EPSRC Cybersecurity Body of Knowledge, CyBOK, 1 October 2019 | |
Enabling Security-by-design in Smart Grids: An architecture-based approach, Helder Aranha, Massimiliano Masi, Giovanni Paolo Sellitto and Tanja Pavleska:2019 15th European Dependable Computing Conference (EDCC), 20-27 September 2019, Naples, Italy | |
Improving Detection of Malicious Office Documents using One-Side Classifiers, Silviu Constantin Vitel, Gheorghe Balan, Dumitru Bogdan Prelipcean:21st International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC2019), Timisoara, Romania, September 4-7 2019 | |
Preventing File-less Attacks with Machine Learning Techniques, Alexandru Gabriel Bucevschi, Gheorghe Balan, Dumitru Bogdan Prelipcean: 21st International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC2019), Timisoara, Romania, September 4-7 2019 | |
Generative Adversarial Networks in AI-Enabled Safety-Critical Systems: Friend or Foe?, A. P. Fournaris, A. S. Lalos and D. Serpanos:IEEE Computer, August2019 | |
Extracting Safe Thread Schedules from Incomplete Model Checking Results, Patrick Metzler, Neeraj Suri and Georg Weissenbacher: International Symposium on Model Checking of Software (SPIN) 2019, 15 – 19 July 2019, Beijing, China | |
Assessing the State and Improving the Art of Parallel Testing for C, Oliver Schwahn, Nicolas Coppik, Stefan Winter, Neeraj Suri: The ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA) 2019, 15 – 19 July 2019, Beijing, China | |
An Analysis of Cryptographic Algorithms in IoT, Samed Bajrić: Smart devices, applications, and protocols for the IoT, March 2019 |
Data/Application-centric
Publications | |
---|---|
A Methodology for Non-Functional Property Evaluation of Machine Learning Models, Marco Anisetti, Claudio A. Ardagna, Ernesto Damiani, Paolo G. Panero: 12th International Conference on Management of Digital EcoSystems, 2-4 November 2020 | |
UZH Spotting political social bots in Twitter: A use case of the 2019 Spanish general election, Javier Pastor, Mattia Zago, Pantaleone Nespoli, Sergio López, Alberto Huertas, Manuel Gil, José A. Ruipérez, Gregorio Martínez, Félix Gómez :EEE Transactions on Network and Service Management, October 2020 | |
The Million Dollar Handshake: Secure and Attested Communications in the Cloud, Nikolaos Chalkiadakis, Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis, Sotiris Ioannidis: IEEE International Conference on Cloud Computing (IEEE Cloud 2020), 18-24 October 2020 | |
A Brief Review of Database Solutions Used within Blockchain Platforms, Blaž Podgorelec, Muhamed Turkanović, Martina Šestak: 2nd International Congress on Blockchain and Applications, 7-9 October 2020 | |
Software System Exploration using Library Call Analysis, Marinos Tsantekidis, Vassilis Prevelakis: 2nd Workshop on Model-driven Simulation and Training Environments for Cybersecurity (MSTEC), 17 September 2020 | |
Evaluating the effects of access control policies within NoSQL systems, Pietro Colombo, Elena Ferrari: Future Generation Computer Systems, August 2020 | |
Stay Thrifty, Stay Secure: A VPN-Based Assurance Framework for Hybrid Systems, Marco Anisetti, Claudio A. Ardagna, Nicola Bena, Ernesto Damiani: 17th International Conference on Security and Cryptography (SECRYPT 2020), July 2020 | |
A Brief Review of Database Solution used within Blockchain Platforms,Blaž Podgorelec, Muhamed Turkanović, Martina Šestak:Advances in Intelligent Systems and Computing (AISC, volume 1238). Springer, Cham./ BLOCKCHAIN 2020: Blockchain and Applications, 15 July 2020 | |
SAVTA: A Hybrid Vehicular Threat Model: Overview and Case Study, Mohammad Hamad, Vassilis Prevelakis:Information, 19 May 2020 | |
Improving Cellular IoT Security with Identity Federation and Anomaly Detection, Bernardo Santos, Bruno Dzogovic, Boning Feng, Niels Jacot, Van Thuan Do, Thanh Van Do: 2020 5th International Conference on Computer and Communication Systems (ICCCS 2020), May 15-18 2020 | |
Secure Healthcare: 5G-enabled network slicing for elderly care, Bruno Dzogovic, Van Thuan Do, Bernardo Santos, Niels Jacot, Boning Feng, Thanh Van Do: 2020 5th International Conference on Computer and Communication Systems (ICCCS 2020), May 15 – 18 2020 | |
Blockchain-based controlled information sharing in inter-organizational workflows, Christian Rondanini, Federico Daidone, Barbara Carminati, Elena Ferrari:International Conference on Services Computing (SCC 2020), March 2020 | |
Certified Machine-Learning Models,Ernesto Damiani, Claudio Agostino Ardagna: 46th International Conference on Current Trends in Theory and Practice of Informatics (SOFSEM 2020), 20-24 January 2020,Limassol,Cyprus | |
Cost-Effective Deployment of Certified Cloud Composite Services, Marco Anisetti, Claudio Agostino Ardagna, Ernesto Damiani, Filippo Gaudenzi, Gwanggil Jeon: Journal of Parallel and Distributed Computing, January 2020 | |
A Continuous Certification Methodology for DevOps, M. Anisetti, C. Ardagna, E. Damiani, F. Gaudenzi: ACM MEDES, 12-14 November 2019, Limassol, Cyprus | |
Attacking Malware Classifiers by Crafting Gradient-Attacks that Preserve Functionality, Raphael Labaca Castro, Battista Biggio, Gabi Dreo Rodosek:ACM SIGSAC Conference on Computer and Communications Security (CCS’ 19) – Posters & Demos, 11-15 November 2019, London, UK | |
Efficient Monitoring of Library Call Invocation, Marinos Tsantekidis and Vassilis Prevelakis:The 2nd IEEE International Symposium on Future Cyber Security Technologies (FCST),22-25 October 2019, Granada, Spain | |
Thunderbolt-3 Backbone for Augmented 5G Network Slicing in Cloud-Radio Access Networks, Bruno Dzogovic, Thanh van Do, Bernardo Santos, Van Thuan Do, Boning Feng, Niels Jacot:IEEE 5GWF’19, 30 September – 2. October, Dresden, Germany | |
Secure Data Exchange for Computationally Constrained Devices, Vassilis Prevelakis, Mohammad Hamad, Jihane Najar, and Ilias Spais:International workshop on Information & Operational Technology (IT & OT) security systems (IOSec 2019), 26-27 September 2019, Luxemburg | |
Using blockchains to enable Big Data analysis of private information, Konstantinos Lampropoulos, Giorgos Georgakakos, Sotiris Ioannidis: IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD 2019), 11-13 September 2019, Limassol, Cyprus | |
Enhancing Security of Cellular IoT with Identity Federation, Bernardo Santos, Bruno Dzogovic, Boning Feng, Van Thuan Do, Niels Jacot, Thanh van Do:The 11th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2019); 5 – 7 September 2019, Oita, Japan | |
Correlation Between Students’ Background and the Knowledge on Conceptual Database Modelling, Lili Nemec Zlatolas, Aida Kamišalić, Muhamed Turkanović:in book New Trends in Databases and Information Systems, Chapter · September 2019 | |
AIMED: Evolving Malware with Genetic Programming to Evade Detection, Raphael Labaca Castro, Corinna Schmitt, Gabi Dreo Rodosek: IEEE 18th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 5-8 August, Rotorua, New Zealand | |
Bringing 5G Into User’s Smart Home, Bruno Dzogovic, Niels Jacot, Bernardo Santos, Van Thuan Do, Boning Feng, Thanh van Do:17th IEEE International Conference on Pervasive Intelligence and Computing, 5 – 8 August 2019, Fukuoka, Japan | |
Confidential Discovery of IoT devices through Blockchain, Christian Rondanini, Barbara Carminati and Elena Ferrari: EEE International Conference on Internet of Things (ICIOT 2019), 8-13 July 2019, Milan, Italy | |
Adapting Users’ Privacy Preferences in Smart Environments,Zulfikar Alom, Barbara Carminati and Elena Ferrari: EEE International Conference on Internet of Things (ICIOT 2019), 8-13 July 2019, Milan, Italy | |
Helping Users Managing Context-based Privacy Preferences, Zulfikar Alom, Barbara Carminati and Elena Ferrari: EEE International Conference on Services Computing (SCC 2019), 8-13 July 2019, Milan, Italy | |
Towards Achieving a Secure Authentication Mechanism for IoT Devices in 5G Networks, Bernardo Santos, Bruno Dzogovic, Boning Feng, Van Thuan Do, Niels Jacot, Thanh van Do:2019 6th IEEE International Conference on Cyber Security and Cloud Computing / 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud. IEEE conference proceedings 2019 ISBN 978-1-7281-1660-0. s. 130-135, 21-23 June 2019, Paris, France | |
Connecting Remote eNodeB with Containerized 5G C-RANs in OpenStack Cloud, Bruno Dzogovic, Bernardo Santos, Van Thuan Do, Boning Feng, Niels Jacot, Thanh van Do:2019 6th IEEE International Conference on Cyber Security and Cloud Computing / 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud. IEEE conference proceedings 2019 ISBN 978-1-7281-1660-0. s. 14-19, 21-23 June 2019, Paris, France | |
Security Management and Visualization in a Blockchain-based Collaborative Defense, Christian Killer, Bruno Rodrigues, Burkhard Stiller: IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (ICBC 2019), 14-17 May 2019, Seoul, South Korea | |
Red-Zone: Towards an Intrusion Response Framework for Intra-Vehicle System, Mohammad Hamad, Marinos Tsantekidis and Vassilis Prevelakis: 5th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS 2019), 3-5 May 2019, Heraklion, Crete, Greece |
User-centric
Publications | |
---|---|
Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning, Benjamin Zi Hao Zhao, Mohamed Ali Kaafar, Nicolas Kourtellis: CCSW 2020: The ACM Cloud Computing Security Workshop, 9 November 2020 | |
DLIT: A Scalable Distributed Ledger for IoT Data, Sina Rafati Niya, Raphael Beckmann, Burkhard Stiller:Second International Conference on Blockchain Computing and Applications (BCCA), 3 November 2020 | |
“It is just a flu”: Assessing the Effect of Watch History on YouTube’s Pseudoscientific Video Recommendations, Kostantinos Papadamou, Savvas Zannettou, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Michael Sirivianos:October 2020 |
|
UZH Spotting political social bots in Twitter: A use case of the 2019 Spanish general election, Javier Pastor, Mattia Zago, Pantaleone Nespoli, Sergio López, Alberto Huertas, Manuel Gil, José A. Ruipérez, Gregorio Martínez, Félix Gómez :EEE Transactions on Network and Service Management, October 2020 | |
Signing Blockchain Transactions using Qualified Certificates, Muhamed Turkanović, Blaž Podgorelec:IEEE Internet Computing, 25 September 2020 | |
A Deep Learning Model for Twitter Spam Detection, Zulfikar Alom, Barbara Carminati and Elena Ferrari:Online Social Networks and Media,2020 | |
Evaluating the effects of access control policies within NoSQL systems, Pietro Colombo, Elena Ferrari: Future Generation Computer Systems, August 2020 | |
The Seven Deadly Sins of the HTML5 WebAPI: A Large-scale Study on the Risks of Mobile Sensor-based Attacks, Michalis Diamantaris, Francesco Marcantoni, Sotiris Ioannidis, Jason Polakis: ACM Transactions on Privacy and Security (TOPS) July 2020 | |
Multi-Sector Assessment Framework – A New Approach to Analyze Cybersecurity Challenges and Opportunities,Salvatore Marco Pappalardo, Marcin Niemiec, Maya Bozhilova, Nikolai Stoianov, Andrzej Dziech, Burkhard Stiller:10th International Conference on Multimedia Communications, Services, and Security (MCSS 2020),18-19 June 2020 | |
Did State-sponsored Trolls Shape the US Presidential Election Discourse? Quantifying Influence on Twitter, Nikos Salamanos, Michael J. Jensen, Xinlei He, Yang Chen, Costas Iordanou, Michael Sirivianos: 17 June 2020 | |
On the Aggression Diffusion Modeling and Minimization in Online Social Networks, Marinos Poiitis, Athena Vakali, Nicolas Kourtellis: 21 May 2020 | |
Stop tracking me Bro! Differential Tracking of User Demographics on Hyper-Partisan Websites, Pushkal Agarwal, Sagar Joglekar, Panagiotis Papadopoulos, Nishanth Sastry, Nicolas Kourtellis: The Web Conference (2020), 1 April 2020 | |
Angry Birds Flock Together: Aggression Propagation on Social Media, Chrysoula Terizi, Despoina Chatzakou, Evaggelia Pitoura, Panayiotis Tsaparas, Nicolas Kourtellis: February 2020 | |
Understanding the Incel Community on YouTube, Kostantinos Papadamou, Savvas Zannettou, Jeremy Blackburny, Emiliano De Cristofaroz, Gianluca Stringhini, Michael Sirivianos:22 January 2020 | |
A Machine Learning-Based Method for Automated Blockchain Transaction Signing Including Personalized Anomaly Detection,Blaž Podgorelec, Muhamed Turkanović, Sašo Karakatič: Journal article Sensors, 25 December 2019 | |
Cluster-Based Anonymization of Directed Graphs,Anh-Tu Hoang, Barbara Carminati and Elena Ferrari: IEEE 5th International Conference on Collaboration and Internet Computing (CIC 2019), 12-14 December 2019 | |
Beyond content analysis: Detecting targeted ads via distributed counting, Costas Iordanou (MPI, Nicolas Kourtellis (TID), Juan Miguel Carrascosa (LSTech), Claudio Soriente (NEC Europe), Ruben Cuevas (UC3M), Nikolaos Laoutaris (IMDEA Networks): 15th International Conference on emerging Networking EXperiments and Technologies (ACM CoNEXT’19), 9-12 December 2019,Orlando, Florida, U.S. | |
TradeMap: A FINMA-compliant Anonymous Management of an End-2-end Trading Market Place, Sina Rafati Niya, Sebastian Allemann, Arik Gabay, Burkhard Stiller:15th International Conference on Network and Service Management , 21-25 October 2019 Halifax, Canada | |
No More Chasing Waterfalls: A Measurement Study of the Header Bidding Ad-Ecosystem,Michalis Pachilakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis: The 19th ACM on Internet Measurement Conference, 21-23 October, 2019, Amsterdam, Netherlands | |
On the Influence of Twitter Trolls during the 2016 US Presidential Election, Nikos Salamanos, Michael J. Jensen, Xinlei He, Yang Chen, Michael Sirivianos: October 2019 | |
Towards the Insurance of Healthcare Systems, G. Hatzivasilis, P. Chatziadam, A. Miaoudakis, E. Lakka, S. Ioannidis, A. Alessio, M. Smyrlis, G. Spanoudakis, A. Yautsiukhin, M. Antoniou, N. Stathiakis: 1st Model-driven Simulation and Training Environments for Cybersecurity (MSTEC), ESORICS, Springer, 27 September, 2019, Luxembourg, pp. 1-14. |
|
You Shall Not Register! Detecting Privacy Leaks across Registration Forms, Manolis Chatzimpyrros, Konstantinos Solomos and Sotiris Ioannidis: ESORICS 2019 European Symposium on Research in Computer Security 23-27 September 2019, Luxembourg | |
TALON: An automated framework for Cross-Device Tracking Detection, Kostas Solomos, Panagiotis Ilias, Sotiris Ioannidis, Nicolas Kourtellis: 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019), 23-25 September, 2019, Beijing, China | |
Complexity Analysis of Decentralized Application Development, Patrik Rek, Blaž Podgorelec and Muhamed Turkanović:SQAMIA 2019, 22-25 September 2019, Ohrid, North Macedonia | |
Cyber Insurance of Information Systems, G. Hatzivasilis, P. Chatziadam, N. E. Petroulakis, M. Mangini, C. Kloukinas, A. Yautsiukhin, M. Antoniou, D. G. Katehakis, M. Panayiotou:24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD 2019), IEEE, Limassol, Cyprus, 11-13 September, 2019, pp. 1-7. | |
An Example of a Cybersecurity Education Model, Muhamed Turkanović, Tatjana Welzer, Marko Hölbl:29th Annual Conference of the European Association For Education in Electrical and Information Engineering (EAEEIE), 4-6 September 2019, University of Ruse, Bulgaria | |
A Model of Perception of Privacy, Trust, and Self-Disclosure on Online Social Networks, Lili Nemec Zlatolas, Tatjana Welzer, Marko Hölbl, Marjan Heričko and Aida Kamišalić:MDPI Entropy, August 2019 | |
Clash of the Trackers: Measuring the Evolution of the Online Tracking Ecosystem,Konstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis, Nicolas Kourtellis: TMA Conference, 30 July 2019 | |
Confidential Discovery of IoT devices through Blockchain, Christian Rondanini, Barbara Carminati and Elena Ferrari: EEE International Conference on Internet of Things (ICIOT 2019), 8-13 July 2019, Milan, Italy | |
Adapting Users’ Privacy Preferences in Smart Environments,Zulfikar Alom, Barbara Carminati and Elena Ferrari: EEE International Conference on Internet of Things (ICIOT 2019), 8-13 July 2019, Milan, Italy | |
Helping Users Managing Context-based Privacy Preferences, Zulfikar Alom, Barbara Carminati and Elena Ferrari: EEE International Conference on Services Computing (SCC 2019), 8-13 July 2019, Milan, Italy | |
Trustworthy IoT: An Evidence Collection Approach based on Smart Contracts, Claudio A. Ardagna, Rasool Asal, Ernesto Damiani, Nabil El Ioini, Claus Pahl: EEE International Conference on Services Computing (SCC 2019), 8-13 July 2019, Milan, Italy | |
Who Let The Trolls Out? Towards Understanding State-Sponsored Trolls, Savvas Zannettou, Tristan Caulfield, William Setzer, Michael Sirivianos, Gianluca Stringhini, Jeremy Blackburn: ACM International Web Science Conference (WebSci), June 30 – July 3, 2019 Boston, MA, USA | |
Nothing is free in the web: Transparency on RTB with YourAdvalue tool, Michalis Pachilakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis: Cybersecurity and Privacy (CySeP) Summer School, 10-14 June , 2019, Stockholm, Sweden | |
Performance analysis of fact-checking organizations and initiatives in Europe: A critical overview of online platforms fighting fake news, Tanja Pavleska, Andrej Školkay, Bissera Zankova, Nelson Ribeiro, Anja Bechmann:“Disinformation and Digital Media as a Challenge for Democracy” European Integration and Democracy Series Vol. 6, June 2019 | |
Blockchain-based Anonymous P2P Trading System, Sina Rafati Niya, Sebastian Allemann, Arik Gabay, Burkhard Stiller: UZH, IFI-TecReport No. 2019.04, Zürich, Switzerland, June 2019 | |
A trust assurance technique for Internet of things based on human behavior compliance, Marco Anisetti, Claudio Agostino Ardagna, Ernesto Damiani, Alessandro Sala:Concurrency and Computation: Practice and Experience, June 2019 | |
Cookie Synchronization: Everything You Always Wanted to Know but were afraid to ask, Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos P. Markatos: The 30th International Web Conference (WWW), May 13-17, 2019, San Francisco | |
Demo: Blockchain for the Simplification and Automation of KYC Result Sharing, Robert Norvill, Mathis Steichen, Wazen M. Shbair, Radu State: IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (ICBC 2019), 14-17 May 2019, Seoul, South Korea | |
BlockZoom: Large-Scale Blockchain Testbed, Wazen M. Shbair, Mathis Steichen , Jerome Francois, Radu State: IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (ICBC 2019), 14-17 May 2019, Seoul, South Korea | |
Disinformation Warfare: Understanding State-Sponsored Trolls On Twitter And Their Influence On The Web, Savvas Zannettou, Tristan Caulfield, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini And Jeremy Blackburn: Workshop On Computational Methods In CyberSafety, Online Harassment And Misinformation, 13-14 May 2019, San Francisco, California, USA |