Stop the war!
Остановите войну!
for scientists:
default search action
CSR 2021: Rhodes, Greece
- IEEE International Conference on Cyber Security and Resilience, CSR 2021, Rhodes, Greece, July 26-28, 2021. IEEE 2021, ISBN 978-1-6654-0285-9
- Abdul Hannan, Christian Gruhl, Bernhard Sick:
Anomaly based Resilient Network Intrusion Detection using Inferential Autoencoders. 1-7 - Panagiotis Panagiotidis, Christos Angelidis, Ioannis Karalis, George Spyropoulos, Angelos Liapis:
Act Proactively: An Intrusion Prediction Approach for Cyber Security. 8-13 - Risto Vaarandi:
A Stream Clustering Algorithm for Classifying Network IDS Alerts. 14-19 - Faqeer ur Rehman, Clemente Izurieta:
Statistical Metamorphic Testing of Neural Network Based Intrusion Detection Systems. 20-26 - Richard Zuech, John T. Hancock, Taghi M. Khoshgoftaar:
Detecting SQL Injection Web Attacks Using Ensemble Learners and Data Sampling. 27-34 - Thomas Cochrane, Peter Foster, Varun Chhabra, Maud Lemercier, Terry J. Lyons, Cristopher Salvi:
SK-Tree: a systematic malware detection algorithm on streaming trees via the signature kernel. 35-40 - Cainã Figueiredo, João Gabriel Lopes, Rodrigo Azevedo Santos, Gerson Zaverucha, Daniel Sadoc Menasché, Leandro Pfleger de Aguiar:
Software Vulnerabilities, Products and Exploits: A Statistical Relational Learning Approach. 41-46 - Michael A. Taylor, Eric C. Larson, Mitchell A. Thornton:
Rapid Ransomware Detection through Side Channel Exploitation. 47-54 - Josep Soler Garrido, Dominik Dold, Johannes Frank:
Machine learning on knowledge graphs for context-aware security monitoring. 55-60 - Phillip Williams, Haytham Idriss, Magdy A. Bayoumi:
Mc-PUF: Memory-based and Machine Learning Resilient Strong PUF for Device Authentication in Internet of Things. 61-65 - Christopher A. Rouff, Lanier A. Watkins, Roy Sterritt, Salim Hariri:
SoK: Autonomic Cybersecurity - Securing Future Disruptive Technologies. 66-72 - Jeppe Hagelskjær Østergaard, Edlira Dushku, Nicola Dragoni:
ERAMO: Effective Remote Attestation through Memory Offloading. 73-80 - Jingyi Liao, Sin G. Teo, Partha Pratim Kundu, Tram Truong-Huu:
ENAD: An Ensemble Framework for Unsupervised Network Anomaly Detection. 81-88 - Luca Deri, Francesco Fusco:
Using Deep Packet Inspection in CyberTraffic Analysis. 89-94 - Ruichao Zhang, Shang Wang, Renée Burton, Minh Hoang, Juhua Hu, Anderson C. A. Nascimento:
Clustering Analysis of Email Malware Campaigns. 95-102 - Nelson L. Santos, Waleed Younis, Bogdan V. Ghita, Giovanni Luca Masala:
Enhancing Medical Data Security on Public Cloud. 103-108 - Gaurav Kodwani, Shashank Arora, Pradeep K. Atrey:
On Security of Key Derivation Functions in Password-based Cryptography. 109-114 - Christos Iliou, Theodoros Kostoulas, Theodora Tsikrika, Vasilis Katos, Stefanos Vrochidis, Ioannis Kompatsiaris:
Web Bot Detection Evasion Using Generative Adversarial Networks. 115-120 - Konstantinos-Panagiotis Grammatikakis, Ioannis Koufos, Nicholas Kolokotronis, Costas Vassilakis, Stavros Shiaeles:
Understanding and Mitigating Banking Trojans: From Zeus to Emotet. 121-128 - Efthimios Pantelidis, Gueltoum Bendiab, Stavros Shiaeles, Nicholas Kolokotronis:
Insider Threat Detection using Deep Autoencoder and Variational Autoencoder Neural Networks. 129-134 - Valentina Casola, Alessandra De Benedictis, Carlo Mazzocca, Rebecca Montanari:
Toward Automated Threat Modeling of Edge Computing Systems. 135-140 - Tyler Westland, Nan Niu, Rashmi Jha, David Kapp, Temesguen Kebede:
Semi-Automatic Bug Generation Using Test Case Negation. 141-146 - Lara Mauri, Ernesto Damiani:
STRIDE-AI: An Approach to Identifying Vulnerabilities of Machine Learning Assets. 147-154 - Sergey Ostrikov:
Resilient Boot. 155-159 - Marcel Medwed, Ventzislav Nikov, Joost Renes, Tobias Schneider, Nikita Veshchikov:
Cyber Resilience for Self-Monitoring IoT Devices. 160-167 - Emanuele Bellini, Franco Bagnoli, Mauro Caporuscio, Ernesto Damiani, Francesco Flammini, Igor Linkov, Pietro Liò, Stefano Marrone:
Resilience learning through self adaptation in digital twins of human-cyber-physical systems. 168-173 - Stylianos Karagiannis, Marco Manso, Emmanouil Magkos, Luís Landeiro Ribeiro, Luís Campos:
Automated and On-Demand Cybersecurity Certification. 174-179 - Georgios Potamos, Adamantini Peratikou, Stavros Stavrou:
Towards a Maritime Cyber Range training environment. 180-185 - Jason Diakoumakos, Evangelos Chaskos, Nicholas Kolokotronis, George Lepouras:
Cyber-Range Federation and Cyber-Security Games: A Gamification Scoring Model. 186-191 - Nikolaos Koutsouris, Costas Vassilakis, Nicholas Kolokotronis:
Cyber-Security Training Evaluation Metrics. 192-197 - Matthew Swann, Joseph R. Rose, Gueltoum Bendiab, Stavros Shiaeles, Fudong Li:
Open Source and Commercial Capture The Flag Cyber Security Learning Platforms - A Case Study. 198-205 - Stefano Marrone, Antonio Tortora, Emanuele Bellini, Antonella Maione, Mariapia Raimondo:
Development of a Testbed for Fully Homomorphic Encryption Solutions. 206-211 - Massimiliano Leone Itria, Enrico Schiavone, Nicola Nostro:
Towards anomaly detection in smart grids by combining Complex Events Processing and SNMP objects. 212-217 - Najmeh Seifollahpour Arabi, Talal Halabi, Mohammad Zulkernine:
Reinforcement Learning-driven Attack on Road Traffic Signal Controllers. 218-225 - Emrah Tomur, Utku Gülen, Elif Ustundag Soykan, Mehmet Akif Ersoy, Ferhat Karakoç, Leyli Karaçay, Pinar Çomak:
SoK: Investigation of Security and Functional Safety in Industrial IoT. 226-233 - Angelos Stamou, Panagiotis Pantazopoulos, Sammy Haddad, Angelos Amditis:
Enabling Efficient Common Criteria Security Evaluation for Connected Vehicles. 234-240 - Mohd Ruzeiny Bin Kamaruzzaman, Bernard Ousmane Sané, Doudou Fall, Yuzo Taenaka, Youki Kadobayashi:
Analyzing Cascading Effects of Spoofing Attacks on ADS-B Using a Discrete Model of Air Traffic Control Responses and AGMOD Dynamics. 241-248 - Daniele Granata, Massimiliano Rak, Giovanni Salzillo:
Towards HybridgeCAN, a hybrid bridged CAN platform for automotive security testing. 249-254 - Abasi-Amefon O. Affia, Raimundas Matulevicius:
Securing an MQTT-based Traffic Light Perception System for Autonomous Driving. 255-260 - Saurabh Shukla, Subhasis Thakur, John G. Breslin:
Secure Communication in Smart Meters using Elliptic Curve Cryptography and Digital Signature Algorithm. 261-266 - Abhi Patel, Tim Schenk, Steffi Knorn, Heiko Patzlaff, Dragan Obradovic, Andrés Botero Halblaub:
Real-time, Simulation-based Identification of Cyber-Security Attacks of Industrial Plants. 267-272 - Ievgen Kabin, Dan Klann, Zoya Dyka, Peter Langendoerfer:
Fast Dual-Field ECDSA Accelerator with Increased Resistance against Horizontal SCA Attacks. 273-280 - Constantinos Louca, Adamantini Peratikou, Stavros Stavrou:
On the detection of Channel Switch Announcement Attack in 802.11 networks. 281-285 - Annie Joss, Austin Grassbaugh, Majid Poshtan, Joseph Callenes:
A Dynamic Reconfiguration-based Approach to Resilient State Estimation. 286-291 - Baptiste Millot, Julien Francq, Franck Sicard:
Systematic and Efficient Anomaly Detection Framework using Machine Learning on Public ICS Datasets. 292-297 - Paola Perrone, Francesco Flammini, Roberto Setola:
Machine Learning for Threat Recognition in Critical Cyber-Physical Systems. 298-303 - Andreas Gylling, Mathias Ekstedt, Zeeshan Afzal, Per Eliasson:
Mapping Cyber Threat Intelligence to Probabilistic Attack Graphs. 304-311 - Georgios Aivatoglou, Mike Anastasiadis, Georgios Spanos, Antonis Voulgaridis, Konstantinos Votis, Dimitrios Tzovaras:
A tree-based machine learning methodology to automatically classify software vulnerabilities. 312-317 - Athanasios Dimitriadis, Efstratios Lontzetidis, Ioannis Mavridis:
Evaluation and Enhancement of the Actionability of Publicly Available Cyber Threat Information in Digital Forensics. 318-323 - Borce Stojkovski, Gabriele Lenzini:
A workflow and toolchain proposal for analyzing users' perceptions in cyber threat intelligence sharing platforms. 324-330 - Dimitrios Chatziamanetoglou, Konstantinos Rantos:
CTI Blockchain-Based Sharing using Proof-of-Quality Consensus Algorithm. 331-336 - Kieran Hughes, Kieran McLaughlin, Sakir Sezer:
Towards Intrusion Response Intel. 337-342 - Cagatay Yucel, Ioannis Chalkias, Dimitrios Mallis, Deniz Cetinkaya, Jane Henriksen-Bulmer, Alice Cooper:
Data Sanitisation and Redaction for Cyber Threat Intelligence Sharing Platforms. 343-347 - Pavlos Evangelatos, Christos Iliou, Thanassis Mavropoulos, Konstantinos Apostolou, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris:
Named Entity Recognition in Cyber Threat Intelligence Using Transformer-based Models. 348-353 - Panos Panagiotou, Christos Iliou, Konstantinos Apostolou, Theodora Tsikrika, Stefanos Vrochidis, Periklis Chatzimisios, Ioannis Kompatsiaris:
Towards Selecting Informative Content for Cyber Threat Intelligence. 354-359 - Kadir Burak Mavzer, Ewa Konieczna, Henrique Alves, Cagatay Yucel, Ioannis Chalkias, Dimitrios Mallis, Deniz Cetinkaya, Luis Angel Galindo Sánchez:
Trust and Quality Computation for Cyber Threat Intelligence Sharing Platforms. 360-365 - George E. Raptis, Christina P. Katsini, Christos Alexakos:
Towards Automated Matching of Cyber Threat Intelligence Reports based on Cluster Analysis in an Internet-of-Vehicles Environment. 366-371 - Ioannis Bothos, Vasileios Vlachos, Dimitris M. Kyriazanos, Ioannis C. Stamatiou, Konstantinos Giorgios Thanos, Pantelis Tzamalis, Sotirios E. Nikoletseas, Stelios C. A. Thomopoulos:
Modelling Cyber-Risk in an Economic Perspective. 372-377 - Jari Isohanni, Lorna Goulden, Kai M. Hermsen, Mirko Ross, Jef Vanbockryck:
Disposable identities; enabling trust-by-design to build more sustainable data driven value. 378-383 - Aiden Hoyle, Thomas Powell, Beatrice Cadet, Judith van de Kuijt:
Influence Pathways: Mapping the Narratives and Psychological Effects of Russian COVID-19 Disinformation. 384-389 - Csaba Virág, Jakub Cegan, Tomás Lieskovan, Matteo Merialdo:
The Current State of The Art and Future of European Cyber Range Ecosystem. 390-395 - Mauno Pihelgas, Markus Kont:
Frankenstack: Real-time Cyberattack Detection and Feedback System for Technical Cyber Exercises. 396-402 - Nikos Oikonomou, Notis Mengidis, Minas Spanopoulos-Karalexidis, Antonis Voulgaridis, Matteo Merialdo, Ivo Raisr, Kaarel Hanson, Paloma de La Vallée, Theodora Tsikrika, Stefanos Vrochidis, Konstantinos Votis:
ECHO Federated Cyber Range: Towards Next-Generation Scalable Cyber Ranges. 403-408 - Olivier Jacq, Pablo Giménez Salazar, Kamban Parasuraman, Jarkko Kuusijärvi, Andriana Gkaniatsou, Evangelia Latsa, Angelos Amditis:
The Cyber-MAR Project: First Results and Perspectives on the Use of Hybrid Cyber Ranges for Port Cyber Risk Assessment. 409-414 - Maria Tsiodra, Michail Chronopoulos, Matthias Ghering, Eirini Karapistoli, Neofytos Gerosavva, Nicolas Kylilis:
The SPIDER Cyber Security Investment Component (CIC). 415-421 - George Hatzivasilis, Sotiris Ioannidis, Michail Smyrlis, George Spanoudakis, Fulvio Frati, Chiara Braghin, Ernesto Damiani, Hristo Koshutanski, George Tsakirakis, Torsten Hildebrandt, Ludger Goeke, Sebastian Pape, Oleg Blinder, Michael Vinov, George Leftheriotis, Martin Kunc, Fotis Oikonomou, Giovanni Magilo, Vito Petrarolo, Antonio Chieti, Robert Bordianu:
The THREAT-ARREST Cyber Range Platform. 422-427 - Eleni-Constantina Davri, Eleni Darra, Isidoros Monogioudis, Athanasios Grigoriadis, Christos Iliou, Notis Mengidis, Theodora Tsikrika, Stefanos Vrochidis, Adamantini Peratikou, Helen Gibson, Damir Haskovic, Dimitrios Kavallieros, Evangelos Chaskos, Peng Zhao, Stavros Shiaeles, Nick Savage, Babak Akhgar, Xavier J. A. Bellekens, Mohamed Amine Ben Farah:
Cyber Security Certification Programmes. 428-435 - Sofia Alevizopoulou, Paris Koloveas, Christos Tryfonopoulos, Paraskevi Raftopoulou:
Social Media Monitoring for IoT Cyber-Threats. 436-441 - James King, Gueltoum Bendiab, Nick Savage, Stavros Shiaeles:
Data Exfiltration: Methods and Detection Countermeasures. 442-447 - Beny Nugraha, Naina Kulkarni, Akash Gopikrishnan:
Detecting Adversarial DDoS Attacks in Software- Defined Networking Using Deep Learning Techniques and Adversarial Training. 448-454 - Alfredo Nascita, Antonio Montieri, Giuseppe Aceto, Domenico Ciuonzo, Valerio Persico, Antonio Pescapè:
Unveiling MIMETIC: Interpreting Deep Learning Traffic Classifiers via XAI Techniques. 455-460 - Arshiya Khan, Chase Cotton:
Detecting Attacks on IoT Devices using Featureless 1D-CNN. 461-466 - Oluwagbemiga Ajayi, Aryya Gangopadhyay:
DAHID: Domain Adaptive Host-based Intrusion Detection. 467-472 - Iosif Sklavidis, Christos Angelidis, Rosanna Babagiannou, Angelos Liapis:
Enhancing SIEM Technology for protecting Electrical Power and Energy Sector. 473-478 - Achilleas Pasias, Alexandros Schoinas, Anastasios Drosou, Dimitrios Tzovaras:
A Scalable Multi-Agent System for Black Start Restoration in Low Voltage Microgrids. 479-484 - Panagiotis I. Radoglou-Grammatikis, Athanasios Liatifis, Elisavet Grigoriou, Theocharis Saoulidis, Antonios Sarigiannidis, Thomas Lagkas, Panagiotis G. Sarigiannidis:
TRUSTY: A Solution for Threat Hunting Using Data Analysis in Critical Infrastructures. 485-490 - Pol Paradell, Yannis Spyridis, Alba Colet, Anzhelika Ivanova, José Luis Domínguez-García, Achilleas Sesis, Georgios Efstathopoulos:
Increasing resilience of power systems using intentional islanding; a comparison of Binary genetic algorithm and deep learning based method. 491-496 - Achilleas Pasias, Thanasis Kotsiopoulos, Georgios Lazaridis, Anastasios Drosou, Dimitrios Tzovaras, Panagiotis G. Sarigiannidis:
Enabling Cyber-attack Mitigation Techniques in a Software Defined Network. 497-502 - Logan Drazovich, Liam Brew, Susanne Wetzel:
Advancing the State of Maritime Cybersecurity Guidelines to Improve the Resilience of the Maritime Transportation System. 503-509 - Liam Brew, Logan Drazovich, Susanne Wetzel:
The Impact of COVID-19 on the Security and Resilience of the Maritime Transportation System. 510-517 - Nicolas Pelissero, Pedro Merino Laso, John Puentes:
Impact assessment of anomaly propagation in a naval water distribution cyber-physical system. 518-523 - Malte Christian Struck, Jannis Stoppe:
A Backwards Compatible Approach to Authenticate Automatic Identification System Messages. 524-529 - Maria Papathanasaki, Panagiotis Fountas, Leandros Maglaras, Christos Douligeris, Mohamed Amine Ferrag:
Quantum Cryptography in Maritime Telecommunications. 530-535 - Oliver Eigner, Sebastian Eresheim, Peter Kieseberg, Lukas Daniel Klausner, Martin Pirker, Torsten Priebe, Simon Tjoa, Fiammetta Marulli, Francesco Mercaldo:
Towards Resilient Artificial Intelligence: Survey and Research Issues. 536-542 - Hassan Chaitou, Thomas Robert, Jean Leneutre, Laurent Pautet:
Assessing adversarial training effect on IDSs and GANs. 543-550 - Jing Wen, Siu-Ming Yiu, Lucas C. K. Hui:
Defending Against Model Inversion Attack by Adversarial Examples. 551-556 - Marco Pacini, Federico Nesti, Alessandro Biondi, Giorgio C. Buttazzo:
X-BaD: A Flexible Tool for Explanation-Based Bias Detection. 557-562 - Maria Stella de Biase, Fiammetta Marulli, Laura Verde, Stefano Marrone:
Improving Classification Trustworthiness in Random Forests. 563-568
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.