![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
EICC 2022: Barcelona, Spain
- David Megías, Roberto Di Pietro, Joaquín García-Alfaro
:
EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15 - 16, 2022. ACM 2022, ISBN 978-1-4503-9603-5 - Aykan Inan:
Method for Approximating RSA Prime Factors. 1-5 - Jan Wohlwender, Rolf Huesmann
, Andreas Heinemann, Alexander Wiesmaier:
cryptolib: Comparing and selecting cryptography libraries. 6-11 - Eileen Köhler, Daniel Spiekermann:
Smart Home as a Silent Witness - A Survey. 12-16 - Daniel Bub, Laura Hartmann, Zdravko Bozakov, Steffen Wendzel:
Towards Passive Identification of Aged Android Devices in the Home Network. 17-20 - Tin Tironsakkul, Manuel Maarek
, Andrea Eross
, Mike Just
:
The Unique Dressing of Transactions: Wasabi CoinJoin Transaction Detection. 21-28 - Jelizaveta Vakarjuk
, Nikita Snetkov
, Jan Willemson
:
Russian Federal Remote E-voting Scheme of 2021 - Protocol Description and Analysis. 29-35 - Inger Anne Tøndel, Gunnar Brataas:
SecureScale: Exploring Synergies between Security and Scalability in Software Development and Operation. 36-41 - Venkata Sai Charan Putrevu, Gowtham Ratnakaram, Sandeep K. Shukla:
DARK-KERNEL: Design and Implementation of a Kernel Level Active Darknet Sensor. 42-48 - Martin Atzmueller, Rushed Kanawati:
Explainability in Cyber Security using Complex Network Analysis: A Brief Methodological Overview. 49-52 - Marek Pawlicki, Rafal Kozik, Michal Choras:
Comparison of neural network paradigms for their usefulness in a real-world network intrusion detection deployment and a proposed optimised approach. 53-56 - Agathe Blaise, Elena Mihailescu, Bruno Vidalenc, Laurent Aufrechter, Darius Mihai, Mihai Carabas:
Learning Model Generalisation for Bot Detection. 57-63 - Slawomir Matelski:
Human-Computable OTP Generator as an Alternative of the Two-Factor Authentication. 64-71 - Pawel Szumelda, Natan Orzechowski, Mariusz Rawski, Artur Janicki:
VHS-22 - A Very Heterogeneous Set of Network Traffic Data for Threat Detection. 72-78 - Carina Heßeling
, Jörg Keller:
Pareto-Optimal Covert Channels in Sensor Data Transmission. 79-84 - Febrianti Wibawa, Ferhat Özgür Çatak, Murat Kuzlu, Salih Sarp, Umit Cali:
Homomorphic Encryption and Federated Learning based Privacy-Preserving CNN Training: COVID-19 Detection Use-Case. 85-90 - Marek Janiszewski, Marcin Rytel, Piotr Lewandowski
, Hubert Romanowski:
Creating vulnerabilities and exploits database of IoT devices. 91-92 - Andraz Hovnik, Luka Jelovcan, Anze Mihelic, Simon Vrhovec
:
Exploring the Associations between Website Trustworthiness, Cookie Consent and Taking an Online Survey. 93-94 - Ena Barcic, Petra Grd, Igor Tomicic, Bogdan Okresa Duric:
Age Estimation of Occluded Faces using EfficientNet-B3 CNN Model. 95-96 - Alberto Pedrouzo-Ulloa
, Fernando Pérez-González, David Vázquez-Padín:
Secure Collaborative Camera Attribution✱. 97-98 - Christian Oliva, Santiago Palmero Muñoz, Luis Fernando Lago-Fernández, David Arroyo:
Improving LSTMs' under-performance in Authorship Attribution for short texts. 99-101 - Aleksandar Velinov, Aleksandra Mileva:
POSTER: Launching a ZIP Bomb on the DICOM-enabled Devices. 102-103 - Gerhard Steinke, Ryan C. LaBrie, Satadipa Sarkar:
Recommendation for Continuous Ethical Analysis of AI Algorithms. 104-106 - Steffen Wendzel, Luca Caviglione, Bernhard Fechner:
Steganography Hiding Patterns: A Brief Review. 107-108 - Carina Heßeling
, Jörg Keller, Sebastian Litzinger:
Kleptography in Authentication Protocols: Why is it Still Possible? 109-110 - Josep Domingo-Ferrer:
Ethics by Design in Decentralized Computing. 111-113 - Fulvio Valenza:
Next Generation of Hybrid Threats. 114
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.