CONCORDIA Service – Cybersecurity Research

Cybersecurity Research

Publications

 Publications
Enabling Digital Forensics Readiness for Internet of Vehicles, Alexakos C., Katsini, C., Votis K., Lalas A., Tzovaras D., Serpanos D:23rd EURO Working Group on Transportation Meeting, EWGT 2020, September 2020
Stay Thrifty, Stay Secure: A VPN-Based Assurance Framework for Hybrid Systems, Marco Anisetti, Claudio A. Ardagna, Nicola Bena, Ernesto Damiani: 17th International Conference on Security and Cryptography (SECRYPT 2020), July 2020
A Resource Efficient Implementation of the RESTCONF Protocol for OpenWrt Systems, Malte Granderath, Jürgen Schönwälder: IEEE/IFIP Network Operations and Management Symposium (NOMS), June 2020
Decentralized, Secure and Cognitive Architecture for Automotive CyberPhysical System of Systems, Apostolos Fournaris, Aris Lalos, Petros Kapsalas, Christos Koulamas:8th International Conference on Cyber-Physical Systems and Internet-of-Things (CPS&IoT’2020), June 2020
Anomaly Detection Trusted Hardware Sensors for Critical Infrastructure Legacy Devices, Apostolos P. Fournaris, Charis Dimopoulos, Konstantinos Lampropoulos, Odysseas Koufopavlou : Sensors, May 2020
Creating Trusted Security Sensors for Anomaly Detection Systems using Hardware components, Apostolos Fournaris, Charis Dimopoulos, and Odysseas Koufopavlou:TRUDEVICE 2020: Workshop on Trustworthy Manufacturing and Utilization of Secure Devices, Design, Automation and Test in Europe Conference (DATE 2020), March 2020
Privacy Preservation in Industrial IoT via Fast Adaptive Correlation Matrix Completion, Aris S. Lalos, Evangelos Vlachos, K. Berberidis, Apostolos Fournaris, Christos Koulamas:IEEE Transactions on Industrial Informatics, December 2019
Secure Semantic Interoperability for IoT Applications with Linked Data, G. Hatzivasilis, O. Soultatos, E. Lakka, S. Ioannidis, D. Anicic, A. Broring, L. Ciechomski, M. Falchetto, K. Fysarakis, G. Spanoudakis: IEEE Global Communications Conference (GLOBECOM 2019), IEEE, Waikoloa, HI, USA, 9- 13 December, 2019, pp. 1-7
A Proposal for Security Assessment of Trustzone-M based Software, Antonio Ken Iannillo, Radu State:Fast Abstract at the 30th International Symposium on Software Reliability Engineering (ISSRE 2019),28-31 October 2019, Berlin, Germany
Scalable Transport Mechanisms for Blockchain IoT Applications, Eryk Schiller, Sina Rafati Niya, Timo Surbeck, Burkhard Stiller: 2019 IEEE 44th Conference on Local Computer Networks (LCN) (LCN 2019),  14-17 October, 2019, Osnabrück, Germany
End-to-End Semantic Interoperability Mechanisms for IoT,E. Lakka, N. E. Petroulakis, G. Hatzivasilis, O. Soultatos, M. Michalodimitrakis, U. Rak, K. Waledzik, D. Anicic, V. Kulkarni:24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD 2019), IEEE, Limassol, Cyprus, 11-13 September, 2019, pp. 1-6.
Reconfiguring the Functionality of IoT Edge/End nodes using FPGA based System on Chips, Apostolos P. Fournaris, Aris Lalos and Christos Koulamas:First international conference on Societal Automation conference, September 2019
MobileTrust: Secure Knowledge Integration in VANETs, G. Hatzivasilis, O. Soultatos, S. Ioannidis, G. Spanoudakis, V. Katos, G. Demetriou: ACM Transactions on Cyber-Physical Systems Special Issue on User-Centric Security and Safety for Cyber-Physical Systems, ACM, vol., pp., September 2019
Generative Adversarial Networks in AI-Enabled Safety-Critical Systems: Friend or Foe?, A. P. Fournaris, A. S. Lalos and D. Serpanos:IEEE Computer, August2019
Robust and Efficient Privacy Preservation in Industrial IoT via correlation completion and tracking, Aris S. Lalos, Evangelos Vlachos, Konstantinos Berberidis, Apostolos Fournaris, Christos Koulamas:2019 IEEE 17th International Conference on Industrial Informatics (INDIN), 22-25 July 2019
Trustworthy IoT: An Evidence Collection Approach based on Smart Contracts, Claudio A. Ardagna, Rasool Asal, Ernesto Damiani, Nabil El Ioini, Claus Pahl: EEE International Conference on Services Computing (SCC 2019), 8-13 July 2019, Milan, Italy
A trust assurance technique for Internet of things based on human behavior compliance, Marco Anisetti, Claudio Agostino Ardagna, Ernesto Damiani, Alessandro Sala:Concurrency and Computation: Practice and Experience, June 2019
Adaptation of Proof-of-Stake-based Blockchains for IoT Data Streams (Demo),Sina Rafati Niya, Eryk Schiller, Ile Cepilov, Fabio Maddaloni, Timo Surbeck, Kürsat Aydinli, Thomas Bocek, Burkhard Stiller:1st IEEE International Conference on Blockchains and Cryptocurrencies (ICBC 2019), Seoul, South Korea, May 2019, pp 15-16
Revisiting Rowhammer Attacks in Embedded Systems, Lidia Pocero Fraile, Apostolos P. Fournaris, Odysseas Koufopavlou: 14th IEEE International Conference on Design & Technology of Integrated Systems in Nanoscale Era, 16-18 April 2019, Mykonos, Greece

 Publications
A Practical Analysis on the Mirai Botnet, Getoar Gallopeni, Bruno Rodrigues, Muriel Franco, Burkhard Stiller: IFIP Networking 2020, June 22 – 25, 2020
SC-FLARE: Cooperative DDoS Signaling based on Smart Contracts,Bruno Rodrigues, Spasen Trendafilov, Eder Scheid, Burkhard Stiller: IEEE International Conference on Blockchain and Cryptocurrency 2-6 May 2020, Virtual Conference
Reliable measurements with BGP and RPKI, Mattijs Jonker, Nils Rodday: IEEE/IFIP Network Operations and Management Symposium (NOMS), 20-24 April 2020
Blockchains in the Age of Softwarization – Hands-on Experiences with Programming Smart Contracts and Their Security Pitfalls, Bruno Rodrigues, Eder Scheid, Burkhard Stiller:IEEE/IFIP Network Operations and Management Symposium (NOMS),20-24 April 2020, Virtual Conference
WeTrace: Privacy-preserving Mobile COVID-19 Tracing Approach and Application,Alessandro De Carli, Muriel Franco, Andreas Gassmann, Christian Killer, Bruno Rodrigues, Eder John Scheid, David Schoenbaechler, Burkhard Stille: Whitepaper , April 2020
Design and implementation of cast-as-intended verifiability for a blockchain-based voting system, Christian Killer, Bruno Rodrigues, Raphael Matile, Eder Scheid, Burkhard Stiller:SAC ’20: Proceedings of the 35th Annual ACM Symposium on Applied Computing,March 30-April 3, 2020, Virtual Conference
State Channel as a Service based on a Distributed and Decentralized Web,Blaž Podgorelec, Marjan Heričko, Muhamed Turkanović:IEEE Access,30 March 2020
A Novel Intrusion Detection System Against Spoofing Attacks in Connected Electric Vehicle, Dimitrios Kosmanos, Apostolos Pappas, Leandros Maglaras, Sotiris Moschoyiannis, Francisco J. Navarro, Antonios Argyriou and Helge Janicke: Array, Volume 5, March 2020
ARIMA Supplemented Security Metrics for Quality Assurance and Situational Awareness,Jan Kohlrausch and Eugene A. Brin:ACM DTRAP Journal Vol 1 No 1,March 2020
Evaluating TCP Connection Healthiness, Nils Rodday, Raphael Labaca Castro, Klement Streit and Gabi Dreo Rodosek: International Telecommunication Networks and Applications Conference ITNAC 2019, 27-29 November 2019, Auckland, New Zealand
Machine Learning for Security at the IoT Edge – A Feasibility Study, Han Wang, Luis Barriga, Arash Vahidi, Shahid Raza: International Workshop on Machine Learning Security and Privacy: Experiences and Applications, 4 – 7 November 2019, Monterey, CA, USA
MENTOR: The Design and Evaluation of a Protection Services Recommender System, Muriel Franco, Bruno Rodrigues, Burkhard Stiller: 15th International Conference on Network and Service Management (CNSM 2019), 21-25 October, 2019, Halifax, Canada
DDoS Hide & Seek: On the Effectiveness of a Booter Services Takedown, Daniel Kopp, Matthias Wichtlhuber, Ingmar Poese, Jair Santanna, Oliver Hohlfeld, and Christoph Dietzel:Internet Measurement Conference (IMC ’19), 21-23 October 2019, Amsterdam, Netherlands
RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins, Taejoong Chung, Emile Aben, Tim Bruijnzeels, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Roland van Rijswijk-Deij, John Rula, and Nick Sullivan:Internet Measurement Conference (IMC ’19), 21-23 October 2019, Amsterdam, Netherlands
Roll, Roll, Roll your Root: A Comprehensive Analysis of the First Ever DNSSEC Root KSK Rollover, Moritz Müller, Matthew Thomas, Duane Wessels, Wes Hardaker, Taejoong Chung, Willem Toorop, and Roland van Rijswijk-Deij:Internet Measurement Conference (IMC ’19) Distinguished paper award, 21-23 October 2019, Amsterdam, Netherlands
Wireless SDN for Highly Utilized MANETs, Klement Streit, Nils Rodday, Florian Steuber, Corinna Schmitt, Gabi Dreo Rodosek:6th Workshop: ICT Systems for Public Protection and Risk Reduction at the International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2019), 21-23 October, Barcelona, Spain
Analysis of Fault Tolerance in Permissioned Blockchain Networks, Blaž Podgorelec, Vid Keršič and Muhamed Turkanović: ICAT-BCTA 2019, 20-23 October 2019, Sarajevo, Bosnia and Herzegovina
Cooperative Signaling of DDoS Attacks in a Blockchain-based Network, Bruno Rodrigues, Burkhard Stiller: ACM SIGCOMM 2019 Conference (SIGCOMM Posters and Demos ’19), 19-24 August, 2019, Beijing, China
Transparent and Service-Agnostic Monitoring of Encrypted Web Traffic, Pierre-Olivier Brissaud, Jérôme François, Isabelle Chrisment, Thibault Cholez and Olivier Bettan:IEEE Transactions on Network and Service Management, 05 August 2019
At Home and Abroad: The Use of Denial-of-service Attacks during Elections in Nondemocratic Regimes, P. Lutscher, Nils Weidmann, Molly E. Roberts, M. Jonker, A. King, A. Dainotti:Journal of Conflict Resolutions, July 2019

 Publications
Enabling Digital Forensics Readiness for Internet of Vehicles, Alexakos C., Katsini, C., Votis K., Lalas A., Tzovaras D., Serpanos D:23rd EURO Working Group on Transportation Meeting, EWGT 2020, September 2020
TraceSanitizer – Eliminating the Effects of Non-determinism on Error Propagation Analysis, Habib Saissi, Stefan Winter, Oliver Schwahn, Karthik Pattabiraman Neeraj:Proc. of Dependable Systems and Networks, 29th June – 2th July, 2020
Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure,Ahmed Taha, Ahmed Zakaria, Dongseong Kim, Neeraj Suri:Proc. of Intl. Conference on Cloud Engineering, April 2020
When parents and children disagree: Diving into DNS delegation inconsistency,Raffaele Sommese, Giovane C. M. Moura, Mattijs Jonker, Roland van Rijswijk-Deij , Alberto Dainotti, K Claffy, Anna Sperotto:2020 Passive and Active Measurement Conference (PAM2020),March 2020
Counterfighting Counterfeit: detecting and taking down fraudulent webshops at a ccTLD,Thymen Wabeke, Giovane C. M. Moura, Nanneke Franken, Cristian Hesselman:2020 Passive and Active Measurement Conference (PAM2020),March 2020
Cybersecurity Evaluation of Enterprise Architectures: The e-SENS Case, Tanja Pavleska, Helder Aranha, Massimiliano Masi, Eric Grandry and Giovanni Paolo Sellitto: Practice of Enterprise Modelling (PoEM) 2019, 27-29 November 2019, Luxembourg
Auto-encoding Robot State against Sensor Spoofing Attacks, Sean Rivera, Sofiane Lagraa, Antonio Ken Iannillo, Radu State:The 4th IEEE International Workshop on Reliability and Security Data Analysis (RSDA 2019), co-located with the 30th International Symposium on Software Reliability Engineering (ISSRE 2019), 28-31 October 2019, Berlin, Germany
Analyzing and Improving Customer-side Cloud Security Certifiability, Shujie Zhao, Yiqun Chen, Stefan Winter and Neeraj Suri:IEEE International Workshop on Software Certification (WoSoCeR), 28-31 October 2019, Berlin, Germany
Mobile App to SGX Enclave Secure Channe, Fernando Kaway Carvalho Ota, Jorge Augusto Meira, Cyril Renaud Cassagnes and Radu State: 4th IEEE International Workshop on Reliability and Security Data Analysis (RSDA), co-located with ISSRE, 28-31 October 2019, Berlin, Germany
Inferring Performance Bug Patterns from Developer Commits, Yiqun Chen, Stefan Winter and Neeraj Suri : International Symposium on Software Reliability Engineering (ISSRE), 28-31 October 2019, Berlin, Germany
Securing Mobile e-Health Environments by Design: A Holistic Architectural Approach, Helder Aranha, Massimiliano Masi, Tanja Pavleska, Giovanni Paolo Sellitto:Seventh International Workshop on e-Health Pervasive Wireless Applications and Services 2019, 21 October 2019, Barcelona, Spain
Gyro: A Modular Scale-Out Layer for Single-Server DBMSs, Habib Saissi, Marco Serafini and Neeraj Suri: Symposium on Reliable Distributed Systems (SRDS) 2019, 1-4 October, 2019, Lyon, France
Enabling Security-by-design in Smart Grids: An architecture-based approach, Helder Aranha, Massimiliano Masi, Giovanni Paolo Sellitto and Tanja Pavleska:2019 15th European Dependable Computing Conference (EDCC), 20-27 September 2019, Naples, Italy
Improving Detection of Malicious Office Documents using One-Side Classifiers, Silviu Constantin Vitel, Gheorghe Balan, Dumitru Bogdan Prelipcean:21st International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC2019), Timisoara, Romania, September 4-7 2019
Preventing File-less Attacks with Machine Learning Techniques, Alexandru Gabriel Bucevschi, Gheorghe Balan, Dumitru Bogdan Prelipcean: 21st International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC2019), Timisoara, Romania, September 4-7 2019
Generative Adversarial Networks in AI-Enabled Safety-Critical Systems: Friend or Foe?, A. P. Fournaris, A. S. Lalos and D. Serpanos:IEEE Computer, August2019
Extracting Safe Thread Schedules from Incomplete Model Checking Results, Patrick Metzler, Neeraj Suri and Georg Weissenbacher: International Symposium on Model Checking of Software (SPIN) 2019,  15 – 19 July 2019, Beijing, China
Assessing the State and Improving the Art of Parallel Testing for C, Oliver Schwahn, Nicolas Coppik, Stefan Winter, Neeraj Suri: The ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA) 2019, 15 – 19 July 2019, Beijing, China
An Analysis of Cryptographic Algorithms in IoT,Samed Bajrić: Smart devices, applications, and protocols for the IoT, March 2019

 

 Publications
Stay Thrifty, Stay Secure: A VPN-Based Assurance Framework for Hybrid Systems, Marco Anisetti, Claudio A. Ardagna, Nicola Bena, Ernesto Damiani: 17th International Conference on Security and Cryptography (SECRYPT 2020), July 2020
Improving Cellular IoT Security with Identity Federation and Anomaly Detection, Bernardo Santos, Bruno Dzogovic, Boning Feng, Niels Jacot, Van Thuan Do, Thanh Van Do: 2020 5th International Conference on Computer and Communication Systems (ICCCS 2020), May 15-18 2020
Secure Healthcare: 5G-enabled network slicing for elderly care, Bruno Dzogovic, Van Thuan Do, Bernardo Santos, Niels Jacot, Boning Feng, Thanh Van Do: 2020 5th International Conference on Computer and Communication Systems (ICCCS 2020), May 15 – 18 2020
Blockchain-based controlled information sharing in inter-organizational workflows, Christian Rondanini, Federico Daidone, Barbara Carminati, Elena Ferrari:International Conference on Services Computing (SCC 2020), March 2020
Certified Machine-Learning Models,Ernesto Damiani, Claudio Agostino Ardagna: 46th International Conference on Current Trends in Theory and Practice of Informatics (SOFSEM 2020), 20-24 January 2020,Limassol,Cyprus
Cost-Effective Deployment of Certified Cloud Composite Services, Marco Anisetti, Claudio Agostino Ardagna, Ernesto Damiani, Filippo Gaudenzi, Gwanggil Jeon: Journal of Parallel and Distributed Computing, January 2020
A Continuous Certification Methodology for DevOps, M. Anisetti, C. Ardagna, E. Damiani, F. Gaudenzi: ACM MEDES, 12-14 November 2019, Limassol, Cyprus
Attacking Malware Classifiers by Crafting Gradient-Attacks that Preserve Functionality, Raphael Labaca Castro, Battista Biggio, Gabi Dreo Rodosek:ACM SIGSAC Conference on Computer and Communications Security (CCS’ 19) – Posters & Demos, 11-15 November 2019, London, UK
Efficient Monitoring of Library Call Invocation, Marinos Tsantekidis and Vassilis Prevelakis:The 2nd IEEE International Symposium on Future Cyber Security Technologies (FCST),22-25 October 2019, Granada, Spain
Thunderbolt-3 Backbone for Augmented 5G Network Slicing in Cloud-Radio Access Networks, Bruno Dzogovic, Thanh van Do, Bernardo Santos, Van Thuan Do, Boning Feng, Niels Jacot:IEEE 5GWF’19, 30 September – 2. October, Dresden, Germany
Secure Data Exchange for Computationally Constrained Devices, Vassilis Prevelakis, Mohammad Hamad, Jihane Najar, and Ilias Spais:International workshop on Information & Operational Technology (IT & OT) security systems (IOSec 2019), 26-27 September 2019, Luxemburg
Using blockchains to enable Big Data analysis of private information, Konstantinos Lampropoulos, Giorgos Georgakakos, Sotiris Ioannidis: IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD 2019), 11-13 September 2019, Limassol, Cyprus
Enhancing Security of Cellular IoT with Identity Federation, Bernardo Santos, Bruno Dzogovic, Boning Feng, Van Thuan Do, Niels Jacot, Thanh van Do:The 11th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2019); 5 – 7 September 2019, Oita, Japan
Correlation Between Students’ Background and the Knowledge on Conceptual Database Modelling, Lili Nemec Zlatolas, Aida Kamišalić, Muhamed Turkanović:in book New Trends in Databases and Information Systems, Chapter · September 2019
AIMED: Evolving Malware with Genetic Programming to Evade Detection, Raphael Labaca Castro, Corinna Schmitt, Gabi Dreo Rodosek: IEEE 18th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 5-8 August, Rotorua, New Zealand
Bringing 5G Into User’s Smart Home, Bruno Dzogovic, Niels Jacot, Bernardo Santos, Van Thuan Do, Boning Feng, Thanh van Do:17th IEEE International Conference on Pervasive Intelligence and Computing, 5 – 8 August 2019, Fukuoka, Japan
Confidential Discovery of IoT devices through Blockchain, Christian Rondanini, Barbara Carminati and Elena Ferrari: EEE International Conference on Internet of Things (ICIOT 2019), 8-13 July 2019, Milan, Italy
Adapting Users’ Privacy Preferences in Smart Environments,Zulfikar Alom, Barbara Carminati and Elena Ferrari: EEE International Conference on Internet of Things (ICIOT 2019), 8-13 July 2019, Milan, Italy
Helping Users Managing Context-based Privacy Preferences, Zulfikar Alom, Barbara Carminati and Elena Ferrari: EEE International Conference on Services Computing (SCC 2019), 8-13 July 2019, Milan, Italy
Towards Achieving a Secure Authentication Mechanism for IoT Devices in 5G Networks, Bernardo Santos, Bruno Dzogovic, Boning Feng, Van Thuan Do, Niels Jacot, Thanh van Do:2019 6th IEEE International Conference on Cyber Security and Cloud Computing / 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud. IEEE conference proceedings 2019 ISBN 978-1-7281-1660-0. s. 130-135, 21-23 June 2019, Paris, France
Connecting Remote eNodeB with Containerized 5G C-RANs in OpenStack Cloud, Bruno Dzogovic, Bernardo Santos, Van Thuan Do, Boning Feng, Niels Jacot, Thanh van Do:2019 6th IEEE International Conference on Cyber Security and Cloud Computing / 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud. IEEE conference proceedings 2019 ISBN 978-1-7281-1660-0. s. 14-19, 21-23 June 2019, Paris, France
Security Management and Visualization in a Blockchain-based Collaborative Defense, Christian Killer, Bruno Rodrigues, Burkhard Stiller: IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (ICBC 2019), 14-17 May 2019,  Seoul, South Korea
Red-Zone: Towards an Intrusion Response Framework for Intra-Vehicle System, Mohammad Hamad, Marinos Tsantekidis and Vassilis Prevelakis: 5th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS 2019), 3-5 May 2019, Heraklion, Crete, Greece

 

 Publications
A Deep Learning Model for Twitter Spam Detection, Zulfikar Alom, Barbara Carminati and Elena Ferrari:Online Social Networks and Media,2020
Cluster-Based Anonymization of Knowledge Graphs, Anh-Tu Hoang, Barbara Carminati and Elena Ferrari: 18th International Conference on Applied Cryptography and Network Security, June 2020
Angry Birds Flock Together: Aggression Propagation on Social Media, Chrysoula Terizi, Despoina Chatzakou, Evaggelia Pitoura, Panayiotis Tsaparas, Nicolas Kourtellis: February 2020
Understanding the Incel Community on YouTube, Kostantinos Papadamou, Savvas Zannettou, Jeremy Blackburny, Emiliano De Cristofaroz, Gianluca Stringhini, Michael Sirivianos:January 2020
A Machine Learning-Based Method for Automated Blockchain Transaction Signing Including Personalized Anomaly Detection,Blaž Podgorelec, Muhamed Turkanović, Sašo Karakatič: Journal article Sensors, 25 December 2019
Beyond content analysis: Detecting targeted ads via distributed counting, Costas Iordanou (MPI, Nicolas Kourtellis (TID), Juan Miguel Carrascosa (LSTech), Claudio Soriente (NEC Europe), Ruben Cuevas (UC3M), Nikolaos Laoutaris (IMDEA Networks): 15th International Conference on emerging Networking EXperiments and Technologies (ACM CoNEXT’19), 9-12 December 2019,Orlando, Florida, U.S.
TradeMap: A FINMA-compliant Anonymous Management of an End-2-end Trading Market Place, Sina Rafati Niya, Sebastian Allemann, Arik Gabay, Burkhard Stiller:15th International Conference on Network and Service Management , 21-25 October 2019 Halifax, Canada
No More Chasing Waterfalls: A Measurement Study of the Header Bidding Ad-Ecosystem,Michalis Pachilakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis:  The 19th ACM on Internet Measurement Conference, 21-23 October, 2019, Amsterdam, Netherlands
On the Influence of Twitter Trolls during the 2016 US Presidential Election, Nikos Salamanos, Michael J. Jensen, Xinlei He, Yang Chen, Michael Sirivianos: October 2019
Towards the Insurance of Healthcare Systems, G. Hatzivasilis, P. Chatziadam, A. Miaoudakis, E. Lakka, S. Ioannidis, A. Alessio, M. Smyrlis, G. Spanoudakis, A. Yautsiukhin, M. Antoniou, N. Stathiakis:
1st Model-driven Simulation and Training Environments for Cybersecurity (MSTEC), ESORICS, Springer, 27 September, 2019, Luxembourg, pp. 1-14.
You Shall Not Register! Detecting Privacy Leaks across Registration Forms, Manolis Chatzimpyrros, Konstantinos Solomos and Sotiris Ioannidis: ESORICS 2019 European Symposium on Research in Computer Security 23-27 September 2019, Luxembourg
TALOS: An automated framework for Cross-Device Tracking Detection,  Kostas Solomos, Panagiotis Ilias, Sotiris Ioannidis, Nicolas Kourtellis: 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019), 23-25 September, 2019, Beijing, China
Complexity Analysis of Decentralized Application Development, Patrik Rek, Blaž Podgorelec and Muhamed Turkanović:SQAMIA 2019, 22-25 September 2019, Ohrid, North Macedonia
Cyber Insurance of Information Systems, G. Hatzivasilis, P. Chatziadam, N. E. Petroulakis, M. Mangini, C. Kloukinas, A. Yautsiukhin, M. Antoniou, D. G. Katehakis, M. Panayiotou:24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD 2019), IEEE, Limassol, Cyprus, 11-13 September, 2019, pp. 1-7.
An Example of a Cybersecurity Education Model, Muhamed Turkanović, Tatjana Welzer, Marko Hölbl:29th Annual Conference of the European Association
For Education in Electrical and Information Engineering (EAEEIE), 4-6 September 2019, University of Ruse, Bulgaria
A Model of Perception of Privacy, Trust, and Self-Disclosure on Online Social Networks, Lili Nemec Zlatolas, Tatjana Welzer, Marko Hölbl, Marjan Heričko and Aida Kamišalić:MDPI Entropy, August 2019
Confidential Discovery of IoT devices through Blockchain, Christian Rondanini, Barbara Carminati and Elena Ferrari: EEE International Conference on Internet of Things (ICIOT 2019), 8-13 July 2019, Milan, Italy
Adapting Users’ Privacy Preferences in Smart Environments,Zulfikar Alom, Barbara Carminati and Elena Ferrari: EEE International Conference on Internet of Things (ICIOT 2019), 8-13 July 2019, Milan, Italy
Helping Users Managing Context-based Privacy Preferences, Zulfikar Alom, Barbara Carminati and Elena Ferrari: EEE International Conference on Services Computing (SCC 2019), 8-13 July 2019, Milan, Italy
Trustworthy IoT: An Evidence Collection Approach based on Smart Contracts, Claudio A. Ardagna, Rasool Asal, Ernesto Damiani, Nabil El Ioini, Claus Pahl: EEE International Conference on Services Computing (SCC 2019), 8-13 July 2019, Milan, Italy
Who Let The Trolls Out? Towards Understanding State-Sponsored Trolls, Savvas Zannettou, Tristan Caulfield, William Setzer, Michael Sirivianos, Gianluca Stringhini, Jeremy Blackburn: ACM International Web Science Conference (WebSci), June 30 – July 3, 2019 Boston, MA, USA
Nothing is free in the web: Transparency on RTB with YourAdvalue tool, Michalis Pachilakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis: Cybersecurity and Privacy (CySeP) Summer School, 10-14 June , 2019, Stockholm, Sweden
Performance analysis of fact-checking organizations and initiatives in Europe: A critical overview of online platforms fighting fake news, Tanja Pavleska, Andrej Školkay, Bissera Zankova, Nelson Ribeiro, Anja Bechmann:“Disinformation and Digital Media as a Challenge for Democracy” European Integration and Democracy Series Vol. 6, June 2019
Blockchain-based Anonymous P2P Trading System, Sina Rafati Niya, Sebastian Allemann, Arik Gabay, Burkhard Stiller: UZH, IFI-TecReport No. 2019.04, Zürich, Switzerland, June 2019
A trust assurance technique for Internet of things based on human behavior compliance, Marco Anisetti, Claudio Agostino Ardagna, Ernesto Damiani, Alessandro Sala:Concurrency and Computation: Practice and Experience, June 2019
Cookie Synchronization: Everything You Always Wanted to Know but were afraid to ask, Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos P. Markatos: The 30th International Web Conference (WWW), May 13-17, 2019, San Francisco
Demo: Blockchain for the Simplification and Automation of KYC Result Sharing, Robert Norvill, Mathis Steichen, Wazen M. Shbair, Radu State: IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (ICBC 2019), 14-17 May 2019,  Seoul, South Korea
BlockZoom: Large-Scale Blockchain Testbed, Wazen M. Shbair, Mathis Steichen , Jerome Francois, Radu State: IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (ICBC 2019), 14-17 May 2019,  Seoul, South Korea
Disinformation Warfare: Understanding State-Sponsored Trolls On Twitter And Their Influence On The Web, Savvas Zannettou, Tristan Caulfield, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini And Jeremy Blackburn: Workshop On Computational Methods In CyberSafety, Online Harassment And Misinformation, 13-14 May 2019, San Francisco, California, USA