Loading...

List of Accepted Papers

Flood control: TCP-SYN flood detection for software-defined networks using OpenFlow port statistics
T. Das, O. Abuhamdan, S. Sengupta, E. Arslan

LSTM-based anomalous behavior detection in multi-agent reinforcement learning
C. Lischke, T. Liu, J. Mccalmon, M. Rahman, T. Halabi, S. Alqahtani

ML-based anomaly detection for intra-vehicular CAN-bus networks
S. Purohit, M. Govindarasu

ETHERLED: Sending covert morse signals from air-gapped devices via network card (NIC) leds
M. Guri

How to build a SOC on a budget
R. Vaarandi, S. Mases

A stable generative adversarial network architecture for network intrusion detection
R. Soleymanzadeh, R. Kashef

SENTINEL: Approachable, tailor-made cybersecurity and data protection for small enterprises
T. Trantidou, G. Bravos, P. Valoggia, I. Skourtis, M. Falelakis, K. Poulios, I. Spais, S. Ioannidis, T. Oudin, R. Costa, C. Konialis, D. Holkham, Z. Kasapi, A. Karantjias

On the (in)security of memory protection units
M. Grisafi, M. Ammar, B. Crispo

H4rm0ny: a competitive zero-sum two-player Markov game for multi-agent learning on evasive malware generation and detection
C. Molloy, S. Ding, B. Fung, P. Charland

SoK: Demystifying cyber resilience quantification in cyber-physical systems
H. Lee, S. Kim, H. K. Kim

Auditing a software-defined cross domain solution architecture
N. Daughety, M. Pendleton, R. Perez, S. Xu, J. Franco

Moving target defense routing for SDN-enabled smart grid
M. Abdelkhalek, B. Hyder, M. Govindarasu, C. Rieger

BLEND: Efficient and blended iot data storage and communication with application layer security
J. Hoglund, S. Raza

A comparative overview of automotive radar spoofing countermeasures
M. Vu, W. Headley, K. Heaslip

Ensemble of random and isolation forests for graph-based intrusion detection in containers
A. Iacovazzi, S. Raza

ML-based anomaly detection system for DER DNP3 communication in smart grid
M. Abdelkhalek, M. Govindarasu

ICT in healthcare: The role of IoT and the SECANT solution
M. Caballero, D. Kavallieros, A. Spyros, A. Tavernarakis, A. Tziouvaras, S. Bonacina, K. Chandrarmouli, M. Coroiu, L. Chen, T. Dounia, I. Giannoulakis, N. Gligoric, E. Kafetzakis, T. Kasig, V. Koumaras, T. Krousarlis, K. Lapidaki, A. Markakis, S. Marin, M. Manulis, S. Menesidou, S. Nifakos, L. Meng, S. Mhiri, M. Nati, K. Ntafloukas, D. Oniga, D. Papamartzivanos, S. Papastergiou, K. Sanchez, C. Sakkas, K. Stelliou, L. Trujillo, T. Tsikrika, E. Venegas, S. Vrochidis, D. Xydias

OGMA: Visualisation for software container security analysis and automated remediation
A. Mills, J. White, P. Legg

Android device incident response: Viber analysis
A. Vasilaras, D. Dosis, M. Kotsis, P. Rizomiliotis

An approach to address risk management challenges focused on IT governance framework
H. Alessa, R. Boodai, A. Alanazi

On usability of hash fingerprinting for endpoint application identification
J. Heino, A. Gupta, A. Hakkala, S. Virtanen

Blockchain-enabled digital forensics for the IoT: Challenges, features, and current frameworks
S. Brotsis, N. Kolokotronis

Neural network based temporal point processes for attack detection in industrial control systems
G. Fortino, C. Greco, A. Guzzo, M. Ianni

SeeShells: An optimized solution for utilizing shellbags in a digital forensic investigation
E. Amoruso, R. Leinecker, C. Zou

CoReTM: An approach enabling cross-functional collaborative threat modeling
J. Von der Assen, M. Figueredo Franco, C. Killer

Evaluating perceptual hashing algorithms in detecting image manipulation over social media platforms
M. Alkhowaiter, K. Almubarak, C. Zou

Data volume reduction for deep packet inspection by multi-layer application determination
M. Vogel, F. Schuster, F. Kopp, H. Konig

Improving resilience in cyber-physical systems based on transfer learning
M. Saman Azari, F. Flammini, S. Santini

Modelling and assessing the risk of cascading effects with resilblockly
I. Bicchierai, E. Schiavone, F. Brancati

Enhancing the aggregation of the federated learning for the industrial cyber physical systems
S. Guendouzi, S. Ouchani, M. Malki

Host-based cyber attack pattern identification on honeypot logs using association rule learning
A. Papoutsis, C. Iliou, D. Kavallieros, T. Tsikrika, S. Vrochidis, I. Kompatsiaris

Configuration vulnerability in SNORT for Windows operating systems
S. Guarino, M. Grassi, R. Setola, L. Faramondi, C. Alcaraz

An approach to improve the robustness of machine learning based intrusion detection system models against the Carlini-Wagner attack
M. Pujari, B. Cherukuri, A. Javaid, W. Sun

Control logic obfuscation attack in industrial control systems
N. Zubair, A. Ayub, H. Yoo, I. Ahmed

Semantic-aware vulnerability detection
Z. Huang, M. White

Powertrace-based fuzzing of CAN connected hardware
M. Dunne, S. Fischmeister

Using cyberscore for network traffic monitoring
L. Deri, A. Cardigliano

A blockchain-based trustworthy cloud services digital ecosystem
E. Bellini, S. Cimato, A. Esposito, I. Aversa

IPASS: A novel open-source intelligence password scoring system
J. Hubbard, G. Bendiab, S. Shiaeles

CIDS: Collaborative intrusion detection system using blockchain technology
G. Gurung, G. Bendiab, M. Shiaele, S. Shiaeles

CSR workshop on ACTI

Read more about IEEE CSR ACTI workshop’s scope, topics of interest, and committees.


Towards continuous enrichment of cyber threat intelligence: A study on a honeypot dataset
A. Spyros, A. Papoutsis, I. Koritsas, N. Mengidis, C. Iliou, D. Kavallieros, T. Tsikrika, S. Vrochidis, and I. Kompatsiaris

Combining text analysis techniques with unsupervised machine learning methodologies for improved software vulnerability management
M. Anastasiadis, G. Aivatoglou, G. Spanos, A. Voulgaridis, and K. Votis

CSR workshop on CRE

Read more about IEEE CSR CRE workshop’s scope, topics of interest, and committees.


Process mining for asymmetric cybersecurity audit
R. Turner

Using potential effects on threat events (PETE) to assess mitigation effectiveness and return on investment (ROI)
D. Bodeau, R. Graubart, and R. Mcquaid

Policy-based profiles for intrusion response systems
K. Hughes

CSR workshop on CRST

Read more about IEEE CSR CRST workshop’s scope, topics of interest, and committees.


Design and proof of concept of a prediction engine for decision support during cyber range attack simulations in the maritime domain
M. Antonopoulos, G. Drainakis, E. Ouzounoglou, G. Papavassiliou, and A. Amditis

Leveraging cyber ranges for prototyping, certification and training: The ECHO case
N. Mengidis, M. Bozhilova, C. Ceresola, C. Colabuono, M. Cooke, G. Depaix, A. Genchev, G. Koykov, W. Mees, M. Merialdo, A. Voulgaridis, T. Tsikrika, K. Votis, and S. Vrochidis

CSR workshop on DS4CS

Read more about IEEE CSR DS4CS workshop’s scope, topics of interest, and committees.


Machine learning-based ransomware detection using low-level memory access patterns obtained from live-forensic hypervisor
M. Hirano and R. Kobayashi

A Bayesian model combination based approach to active malware analysis
A. Hota and J. Schonwalder

A comprehensive API call analysis for detecting Windows-based ransomware
P. Mohan Anand, P. V. Sai Charan, and S. K. Shukla

Employing social network analysis to dark web communities
S. Nikoletos and P. Raftopoulou

Phishing detection using machine learning algorithm
J. Tanimu and S. Shiaeles

CSR workshop on EPES-SPR

Read more about IEEE CSR EPES-SPR workshop’s scope, topics of interest, and committees.


Current drainage induced by bias injection attack against Kalman filter of BLDC motor
Y. Boiko, I. Kiringa, and T. Yeap

Privacy preserving human activity recognition using microaggregated generative deep learning
A. Aleroud, M. Shariah, and R. Malkawi

Protecting IEC 60870-5-104 ICS/SCADA systems with honeypots
E. Grigoriou, A. Liatifis, P. Radoglou-Grammatikis, T. Lagkas, I. Moscholios, E. Markakis, and P. Sarigiannidis

Risk analysis of DNP3 attacks
V. Kelli, P. Radoglou-Grammatikis, T. Lagkas, E. Markakis, and P. Sarigiannidis

CSR workshop on ΜCS

Read more about IEEE CSR MCS workshop’s scope, topics of interest, and committees.


A multi-level trust framework for the Internet of underwater things
A. Almutairi, Y. He, and S. Furnell

FFDA: A novel four-factor distributed authentication mechanism
J. Edwards, F. Aparicio-Navarro, L. Maglaras, and C. Douligeris

A supply chain service cybersecurity certification scheme based on the cybersecurity act
A. Michota and N. Polemi

Training the maritime security operations centre teams
M. Raimondi, G. Longo, A. Merlo, A. Armando, and E. Russo

Cybersecurity at merchant shipping
E. D. Charitos, N. A. Kounalakis, and I. Kantzavelou