Loading...

List of Accepted Papers

A dynamic reconfiguration-based approach to resilient state estimation
A. Joss, A. Grassbaugh, M. Poshtan, and J. Callenes

A stream clustering algorithm for classifying network IDS alerts
R. Vaarandi

Act proactively: An intrusion prediction approach for cyber security
P. Panagiotidis, C. Angelidis, I. Karalis, G. Spyropoulos, and A. Liapis

Analyzing cascading effects of spoofing attacks on ADS-B using a discrete model of air traffic control responses and AGMOD dynamics
M. R. Kamaruzzaman, B. O. Sane, D. Fall, Y. Taenaka, and Y. Kadobayashi

Anomaly based resilient network intrusion detection using inferential autoencoders
A. Hannan, C. Gruhl, and B. Sick

Automated and on-demand cybersecurity certification
S. Karagiannis, M. Manso, E. Magkos, L. L. Ribeiro, and L. Campos

Clustering analysis of email malware campaigns
R. Zhang, S. Wang, R. Burton, M. Hoang, J. Hu, and A. Nascimento

Cyber resilience for self-monitoring IoT devices
M. Medwed, V. Nikov, J. Renes, T. Schneider, and N. Veshchikov

Cyber-range federation and cyber-security games: A gamification scoring model
J. Diakoumakos, E. Chaskos, N. Kolokotronis, and G. Lepouras

Cyber-security training evaluation metrics
N. Koutsouris, C. Vassilakis, and N. Kolokotronis

Detecting SQL injection web attacks using ensemble learners and data sampling
R. Zuech, J. Hancock, and T. Khoshgoftaar

Development of a testbed for fully homomorphic encryption solutions
S. Marrone, A. Tortora, E. Bellini, A. Maione, and M. Raimondo

Enabling efficient common criteria security evaluation for connected vehicles
A. Stamou, P. Pantazopoulos, S. Haddad, and A. Amditis

ENAD: An ensemble framework for unsupervised network anomaly detection
J. Liao, S. G. Teo, P. P. Kundu, and T. Truong-Huu

Enhancing medical data security on public cloud
N. Santos, W. Younis, B. Ghita, and G. Masala

ERAMO: Effective remote attestation through memory offloading
J. H. Ostergaard, E. Dushku, and N. Dragoni

Fast dual-field ECDSA accelerator with increased resistance against horizontal SCA attacks
I. Kabin, D. Klann, Z. Dyka, and P. Langendoerfer

Insider threat detection using deep autoencoder and variational autoencoder neural networks
E. Pantelidis, G. Bendiab, S. Shiaeles, and N. Kolokotronis

Machine learning for threat recognition in critical cyber-physical systems
P. Perrone, F. Flammini, and R. Setola

Machine learning on knowledge graphs for context-aware security monitoring
J. Soler Garrido, D. Dold, and J. Frank

Mc-PUF: memory-based and machine learning resilient strong PUF for device authentication in internet of things
P. Williams, H. Idriss, and M. Bayoumi

On security of key derivation functions in password-based cryptography
G. Kodwani, S. Arora, and P. Atrey

On the detection of channel switch announcement attack in 802.11 networks
C. Louca, A. Peratikou, and S. Stavrou

Open source and commercial capture the flag cyber security learning platforms: A case study
M. Swann, J. Rose, G. Bendiab, S. Shiaeles, and F. Li

Rapid ransomware detection through side channel exploitation
M. Taylor, E. Larson, and M. Thornton

Real-time, simulation-based identification of cyber-security attacks of industrial plants
A. Patel, T. Schenk, S. Knorn, H. Patzlaff, D. Obradovic, and A. Botero Halblaub

Reinforcement learning-driven attack on road traffic signal controllers
N. Seifollahpour Arabi, T. Halabi, and M. Zulkernine

Resilience learning through self adaptation in digital twins of human-cyber-physical systems
E. Bellini, F. Bagnoli, M. Caporuscio, E. Damiani, F. Flammini, I. Linkov, P. Lio, and S. Marrone

Resilient boot
S. Ostrikov

Secure communication in smart meters using elliptic curve cryptography and digital signature algorithm
S. Shukla, S. Thakur, and J. G. Breslin

Securing an MQTT-based traffic light perception system for autonomous driving
A.-A. Affia and R. Matulevicius

Semi-automatic bug generation using test case negation
T. Westland, N. Niu, R. Jha, D. Kapp, and T. Kebede

SK-Tree: A systematic malware detection algorithmon streaming trees via the signature kernel
C. Salvi, T. Lyons, M. Lemercier, T. Cochrane, V. Chhabra, and P. Foster

Software vulnerabilities, products and exploits: A statistical relational learning approach
C. Figueiredo, J. G. Lopes, R. Azevedo, G. Zaverucha, D. S. Menasche, and L. Aguiar

SoK: Autonomic cybersecurity – Securing future disruptive technologies
C. Rouff, L. Watkins, R. Sterritt, and S. Hariri

SoK: Investigation of security and functional safety in industrial IoT
E. Tomur, U. Gulen, E. Ustundağ Soykan, M. A. Ersoy, F. Karakoc, L. Karacay, and P. Comak

Statistical metamorphic testing of neural network based intrusion detection systems
F. Rehman and C. Izurieta

STRIDE-AI: An approach to identifying vulnerabilities of machine learning assets
L. Mauri and E. Damiani

Systematic and efficient anomaly detection framework using machine learning on public ICS datasets
B. Millot, J. Francq, and F. Sicard

Toward automated threat modeling of edge computing systems
C. Mazzocca, A. De Benedictis, R. Montanari, and V. Casola

Towards a maritime cyber range training environment
G. Potamos, A. Peratikou, and S. Stavrou

Towards anomaly detection in smart grids by combining complex events processing and SNMP objects
M. L. Itria, E. Schiavone, and N. Nostro

Towards HybridgeCAN, a hybrid bridged CAN platform for automotive (security) testing
D. Granata, M. Rak, and G. Salzillo

Understanding and mitigating banking trojans: From Zeus to Emotet
K. P. Grammatikakis, I. Koufos, N. Kolokotronis, C. Vassilakis, and S. Shiaeles

Using deep packet inspection in cyber traffic analysis
L. Deri and F. Fusco

Web bot detection evasion using generative adversarial networks
C. Iliou, T. Kostoulas, T. Tsikrika, V. Katos, S. Vrochidis, and I. Kompatsiaris

CSR workshop on ACTI

Read more about IEEE CSR ACTI workshop’s scope, topics of interest, and committees.


A tree-based machine learning methodology to automatically classify software vulnerabilities
G. Aivatoglou, M. Anastasiadis, G. Spanos, A. Voulgaridis, K. Votis, and D. Tzovaras

A workflow and toolchain proposal for analyzing users’ perceptions in cyber threat intelligence sharing platforms
B. Stojkovski and G. Lenzini

CTI blockchain-based sharing using proof-of-quality consensus algorithm
D. Chatziamanetoglou and K. Rantos

Data sanitisation and redaction for cyber threat intelligence sharing platforms
C. Yucel, I. Chalkias, D. Mallis, D. Cetinkaya, J. Henriksen-Bulmer, and A. Cooper

Evaluation and enhancement of the actionability of publicly available cyber threat information in digital forensics
A. Dimitriadis, E. Lontzetidis, and I. Mavridis

Mapping cyber threat intelligence to probabilistic attack graphs
A. Gylling, M. Ekstedt, Z. Afzal, and P. Eliasson

Named entity recognition in cyber threat intelligence using transformer-based models
P. Evangelatos, C. Iliou, T. Mavropoulos, K. Apostolou, T. Tsikrika, S. Vrochidis, and I. Kompatsiaris

Towards automated matching of cyber threat intelligence reports based on cluster analysis in an Internet-of-vehicles environment
G. E. Raptis, C. Katsini, and C. Alexakos

Towards intrusion response intel
K. Hughes, K. McLaughlin, and S. Sezer

Towards selecting informative content for cyber threat intelligence
P. Panagiotou, C. Iliou, K. Apostolou, T. Tsikrika, S. Vrochidis, P. Chatzimisios, and I. Kompatsiaris

Trust and quality computation for cyber threat intelligence sharing platforms
K. B. Mavzer, E. Konieczna, H. Alves, C. Yucel, I. Chalkias, D. Mallis, D. Cetinkaya, and L. Galindo Sanchez

CSR workshop on CRE

Read more about IEEE CSR CRE workshop’s scope, topics of interest, and committees.


Modelling cyber-risk in an economic perspective
I. Bothos, V. Vlachos, D. Kyriazanos, I. Stamatiou, K. G. Thanos, P. Tzamalis, S. Nikoletseas, and S. Thomopoulos

Disposable identities; Enabling trust-by-design to build more sustainable data driven value
J. Isohanni, K. M. Hermsen, L. Goulden, M. Ross, and J. Vanbockryck

Influence pathways: Mapping the narratives and psychological effects of russian COVID-19 disinformation
A. Hoyle, T. Powell, B. Cadet, and J. van de Kuijt

CSR workshop on CRST

Read more about IEEE CSR CRST workshop’s scope, topics of interest, and committees.


Cyber security certification programmes
E.-C. Davri, E. Darra, I. Monogioudis, A. Grigoriadis, C. Iliou, N. Mengidis, T. Tsikrika, S. Vrochidis, A. Peratikou, H. Gibson, D. Haskovic, D. Kavallieros, E. Chaskos, P. Zhao, S. Shiaeles, N. Savage, B. Akhgar, X. Bellekens, and M. Amine Ben Farah

ECHO federated cyber range: Towards next-generation scalable cyber ranges
N. Oikonomou, N. Mengidis, M. Spanopoulos – Karalexidis, A. Voulgaridis, M. Merialdo, I. Raisr, K. Hanson, P. de La Vallee, T. Tsikrika, S. Vrochidis, and K. Votis

Frankenstack: Real-time cyberattack detection and feedback system for technical cyber exercises
M. Pihelgas and M. Kont

The current SOTA and future of European cyber range ecosystem
C. Virag, T. Lieskovan, J. Čegan, and M. Merialdo

The Cyber-MAR project: First results and perspectives on the use of hybrid cyber ranges for port cyber risk assessment
O. Jacq, P. Giménez Salar, K. Parasuraman, J. Kuusijärvi, A. Gkaniatsou, E. Latsa, and A. Amditis

The SPIDER cyber security investment component (CIC)
M. Tsiodra, M. Chronopoulos, M. Ghering, E. Karapistoli, N. Gerosavva, and N. Kylilis

The THREAT-ARREST cyber ranges platform
G. Hatzivasilis, S. Ioannidis, M. Smyrlis, G. Spanoudakis, F. Frati, C. Braghin, E. Damiani, H. Koshutanski, G. Tsakirakis, T. Hildebrandt, L. Goeke, S. Pape, O. Blinder, M. Vinov, G. Leftheriotis, M. Kunc, F. Oikonomou, G. Magilo, V. Petrarolo, A. Chieti, and R. Bordianu

CSR workshop on DS4CS

Read more about IEEE CSR DS4CS workshop’s scope, topics of interest, and committees.


DAHID: Domain adaptive host-based intrusion detection
O. Ajayi and A. Gangopadhyay

Data exfiltration: Methods and detection countermeasures
J. King, G. Bendiab, N. Savage, and S. Shiaeles

Detecting adversarial DDoS attacks in software-defined networking using deep learning techniques and adversarial training
B. Nugraha, N. Kulkarni, and A. Gopikrishnan

Detecting attacks on IoT devices using featureless 1D-CNN
A. Khan and C. Cotton

Social media monitoring for IoT cyber-threats
S. Alevizopoulou, P. Koloveas, C. Tryfonopoulos, and P. Raftopoulou

Unveiling MIMETIC: Interpreting deep learning traffic classifiers via XAI techniques
A. Nascita, A. Montieri, G. Aceto, D. Ciuonzo, V. Persico, and A. Pescape

CSR workshop on EPES-SPR

Read more about IEEE CSR EPES-SPR workshop’s scope, topics of interest, and committees.


A scalable multi-agent system for black start restoration in low voltage microgrids
A. Pasias, A. Schoinas, A. Drosou, and D. Tzovaras

Enabling cyber-attack mitigation techniques in a software defined network
A. Pasias, T. Kotsiopoulos, G. Lazaridis, A. Drosou, D. Tzovaras, and P. Sarigiannidis

Enhancing SIEM technology for protecting electrical power and energy sector
I. Sklavidis, C. Angelidis, R. Babagiannou, and A. Liapis

Increasing resilience of power systems using intentional islanding; a comparison of binary genetic algorithm and deep learning based method
P. Paradell, Y. Spyridis, A. Colet Subirachs, A. Ivanova, J. L. Dominguez – Garcia, A. Sesis, and G. Efstathopoulos

TRUSTY: A solution for threat hunting using data analysis in critical infrastructures
P. Radoglou-Grammatikis, A. Liatifis, E. Grigoriou, T. Saoulidis, A. Sarigiannidis, and T. Lagkas

CSR workshop on ΜCS

Read more about IEEE CSR MCS workshop’s scope, topics of interest, and committees.


A backwards compatible approach to authenticate automatic identification system messages
M. Struck and J. Stoppe

Advancing the state of maritime cybersecurity guidelines to improve the resilience of the maritime transportation system
L. Drazovich, L. Brew, and S. Wetzel

Impact assessment of anomaly propagation in a naval water distribution cyber-physical system
N. Pelissero, P. Merino Laso, and J. Puentes

Quantum cryptography in maritime telecommunications
M. Papathanasaki, P. Fountas, L. Maglaras, C. Douligeris, and M. A. Ferrag

The impact of COVID-19 on the security and resilience of the maritime transportation system
L. Brew, L. Drazovich, and S. Wetzel

CSR workshop on RΑΙ

Read more about IEEE CSR RAI workshop’s scope, topics of interest, and committees.


Assessing adversarial training effect on IDSs and GANs
H. Chaitou, T. Robert, J. Leneutre, and L. Pautet

Defending against model inversion attack by adversarial examples
J. Wen, S.-M. Yiu, and L. C. K. Hui

Improving classification trustworthiness in random forests
S. Marrone, M. S. de Biase, F. Marulli, and L. Verde

Towards resilient artificial intelligence: survey and research issues
O. Eigner, S. Eresheim, P. Kieseberg, L. D. Klausner, F. Marulli, F. Mercaldo, M. Pirker, T. Priebe, and S. Tjoa

X-BaD: A flexible tool for explanation-based bias detection
M. Pacini, F. Nesti, A. Biondi, and G. Buttazzo