All Stories

  1. Design, Modeling and Implementation of Digital Twins
  2. Research Trends in Collaborative Drones
  3. Risky Zone Avoidance Strategies for Drones
  4. Pilot Contamination Attack Detection in 5G Massive MIMO Systems Using Generative Adversarial Networks
  5. GPS-Free, Error Tolerant Path Planning for Swarms of Micro Aerial Vehicles with Quality Amplification ‡
  6. Resilience Estimation of Cyber-Physical Systems via Quantitative Metrics
  7. DECA: A Dynamic Energy Cost and Carbon Emission-Efficient Application Placement Method for Edge Clouds
  8. Security and Privacy in Communication Networks
  9. Security and Privacy in Communication Networks
  10. Metrics to Enhance the Resilience of Cyber-Physical Systems
  11. Capacity Requirements in Networks of Quantum Repeaters and Terminals
  12. Stateful RORI-based countermeasure selection using hypergraphs
  13. Stateful RORI-based countermeasure selection using hypergraphs
  14. Taxonomy and challenges in machine learning-based approaches to detect attacks in the internet of things
  15. A Real-Time Query Log Protection Method for Web Search Engines
  16. Geocaching-Inspired Navigation for Micro Aerial Vehicles with Fallible Place Recognition
  17. LockDown: Balance Availability Attack Against Lightning Network Channels
  18. Reflective Attenuation of Cyber-Physical Attacks
  19. Switched-Based Resilient Control of Cyber-Physical Systems
  20. Computer Security
  21. Computer Security
  22. Quality Amplification of Error Prone Navigation for Swarms of Micro Aerial Vehicles
  23. Anonymous certification for E-assessment opinion polls
  24. Security and Privacy in the TeSLA Architecture
  25. Tuning the demodulation frequency based on a normalized trajectory model for mobile underwater acoustic communications
  26. On the Difficulty of Hiding the Balance of Lightning Network Channels
  27. Geocaching-inspired Resilient Path Planning for Drone Swarms
  28. A Study on Mitigation Techniques for SCADA-Driven Cyber-Physical Systems (Position Paper)
  29. The Influence of Conception Paradigms on Data Protection in E-Learning Platforms: A Case Study
  30. Towards an Adaptive Defuzzification: Using Numerical Choquet Integral
  31. Data Privacy Management, Cryptocurrencies and Blockchain Technology
  32. Security and Safety Interplay of Intelligent Software Systems
  33. Foundations and Practice of Security
  34. Introduction to the Special Section on Critical Systems Modelling and Security (Third Edition)
  35. A Pyramidal-based Model to Compute the Impact of Cyber Security Events
  36. Integration of an adaptive trust-based e-assessment system into virtual learning environments-The TeSLA project experience
  37. 2018 29th Biennial Symposium on Communications (BSC)
  38. Dynamic risk management response system to handle cyber threats
  39. Doppler Effect in the Acoustic Ultra Low Frequency Band for Wireless Underwater Networks
  40. Hypergraph-driven mitigation of cyberattacks
  41. Cyber-physical architecture assisted by programmable networking
  42. Towards a Security Event Data Taxonomy
  43. Using an Event Data Taxonomy to Represent the Impact of Cyber Events as Geometrical Instances
  44. Low Frequency Mobile Communications in Underwater Networks
  45. Attack Graph-Based Countermeasure Selection Using a Stateful Return on Investment Metric
  46. Doppler Effect in the Underwater Acoustic Ultra Low Frequency Band
  47. Lifelogging Protection Scheme for Internet-Based Personal Assistants
  48. The Sound of Communication in Underwater Acoustic Sensor Networks
  49. Data Privacy Management, Cryptocurrencies and Blockchain Technology
  50. Risks and Security of Internet and Systems
  51. Foundations and Practice of Security
  52. Learning to Communicate Underwater
  53. Secure Localization in the Presence of Colluders in WSNs
  54. Adaptive control-theoretic detection of integrity attacks against cyber-physical industrial systems
  55. Selection of Pareto-efficient response plans based on financial and operational assessments
  56. Security Challenges in e-Assessment and Technical Solutions
  57. On the use of watermark-based schemes to detect cyber-physical attacks
  58. Introduction to the Special Section on Critical Systems Modelling and Security
  59. A polytope-based approach to measure the impact of events against critical infrastructures
  60. Security of Cyber-Physical Systems
  61. An n-Sided Polygonal Model to Calculate the Impact of Cyber Security Events
  62. Anonymous Certification for an e-Assessment Framework
  63. $$\mathcal {PCS}$$, A Privacy-Preserving Certification Scheme
  64. Data Privacy Management, Cryptocurrencies and Blockchain Technology
  65. Foundations and Practice of Security
  66. Reputation trust mechanism under the organizational-based access control model
  67. Revisiting a Watermark-Based Detection Scheme to Handle Cyber-Physical Attacks
  68. Considering Internal Vulnerabilities and the Attacker's Knowledge to Model the Impact of Cyber Events as Geometrical Prisms
  69. Selection of Mitigation Actions Based on Financial and Operational Impact Assessments
  70. CACEV: A Cost and Carbon Emission-Efficient Virtual Machine Placement Method for Green Distributed Clouds
  71. Channel selection using a multiple radio model
  72. Event-Triggered Watermarking Control to Handle Cyber-Physical Integrity Attacks
  73. Data Privacy Management, and Security Assurance
  74. Towards an Automated and Dynamic Risk Management Response System
  75. Research in Attacks, Intrusions, and Defenses
  76. Foundations and Practice of Security
  77. Introduction to the special section on critical systems modelling and security
  78. Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the RORI index
  79. NACER: A Network-Aware Cost-Efficient Resource Allocation Method for Processing-Intensive Tasks in Distributed Clouds
  80. On the Isofunctionality of Network Access Control Lists
  81. Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs)
  82. Location-free link state routing for underwater acoustic sensor networks
  83. Simulation of underwater communications with a colored noise approximation and mobility
  84. Remarks on Peinado et al.’s Analysis of J3Gen
  85. Automated Classification of C&C Connections Through Malware URL Clustering
  86. Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance
  87. Exploring DWT–SVD–DCT feature parameters for robust multiple watermarking against JPEG and JPEG2000 compression
  88. Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems
  89. Using a 3D Geometrical Model to Improve Accuracy in the Evaluation and Selection of Countermeasures Against Complex Cyber Attacks
  90. Advanced Research in Data Privacy
  91. Foundations and Practice of Security
  92. The Bidirectional Algorithm for Channel Selection Using a Two-Radio Model
  93. Classification of SSL Servers based on their SSL Handshake for Automated Security Assessment
  94. Security and Privacy Concerns About the RFID Layer of EPC Gen2 Networks
  95. A new analysis of the cognitive radio jump-stay algorithm under the asymmetric model
  96. Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm
  97. KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems
  98. Foundations and Practice of Security
  99. Revisiting the Performance of the Modular Clock Algorithm for Distributed Blind Rendezvous in Cognitive Radio Networks
  100. Data Privacy Management and Autonomous Spontaneous Security
  101. Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model
  102. Searching for a black hole in interconnected networks using mobile agents and tokens
  103. A new analytic model for the cognitive radio jump-stay algorithm
  104. QoS and security in Link State Routing protocols for MANETs
  105. Management of stateful firewall misconfiguration
  106. A privacy-aware access control model for distributed network monitoring
  107. Privacy-enhanced filtering and collection middleware in EPCglobal networks
  108. Onion routing circuit construction via latency graphs
  109. Attribute-Based Mining Process for the Organization-Based Access Control Model
  110. Editorial
  111. Real-time malicious fast-flux detection using DNS and bot related features
  112. Semantic analysis of role mining results and shadowed roles detection
  113. J3Gen: A PRNG for Low-Cost Passive RFID
  114. A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs
  115. An Adaptive Mitigation Framework for Handling Suspicious Network Flows via MPLS Policies
  116. Fine-grained privacy control for the RFID middleware of EPCglobal networks
  117. Model-Driven Extraction and Analysis of Network Security Policies
  118. Towards an Access-Control Metamodel for Web Content Management Systems
  119. Foundations and Practice of Security
  120. On the similarity of commercial EPC Gen2 pseudorandom number generators
  121. HADEGA: A novel MPLS-based mitigation solution to handle network attacks
  122. A model-driven approach for the extraction of network access-control policies
  123. Transaction-based authentication and key agreement protocol for inter-domain VoIP
  124. Towards Automated Assistance for Mined Roles Analysis in Role Mining Applications
  125. Security Issues in Link State Routing Protocols for MANETs
  126. Preventing the Cluster Formation Attack against the Hierarchical OLSR Protocol
  127. A Contextual Privacy-Aware Access Control Model for Network Monitoring Workflows: Work in Progress
  128. Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress
  129. Handling Stateful Firewall Anomalies
  130. Data Privacy Management and Autonomous Spontaneus Security
  131. Foundations and Practice of Security
  132. Data and Applications Security and Privacy XXVI
  133. System architecture for collaborative security and privacy monitoring in multi-domain networks
  134. Multiple-polynomial LFSR based pseudorandom number generator for EPC Gen2 RFID tags
  135. Dynamic deployment of context-aware access control policies for constrained security devices
  136. Mitigation of Flooding Disruption Attacks in Hierarchical OLSR Networks
  137. Improved flooding of broadcast messages using extended multipoint relaying
  138. Data Privacy Management and Autonomous Spontaneous Security
  139. MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies
  140. A Practical Implementation Attack on Weak Pseudorandom Number Generator Designs for EPC Gen2 Tags
  141. Secure geolocalization of wireless sensor nodes in the presence of misbehaving anchor nodes
  142. Mitigation of topology control traffic attacks in OLSR networks
  143. Handling Security Threats to the RFID System of EPC Networks
  144. RFID EPC-Gen2 for postal applications: A security and privacy survey
  145. Security Threat Mitigation Trends in Low-Cost RFID Systems
  146. Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags
  147. Model-Driven Security Policy Deployment: Property Oriented Approach
  148. Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks
  149. Data Privacy Management and Autonomous Spontaneous Security
  150. Spyware-Based Menaces Against Web Applications
  151. A secured delegation of remote services on IPv6 home networks
  152. Secure Localization of Nodes in Wireless Sensor Networks with Limited Number of Truth Tellers
  153. A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor
  154. Evaluation of Two Privacy-Preserving Protocols for the DNS
  155. Semantic context aware security policy deployment
  156. Analysis of Threats to the Security of EPC Networks
  157. Distributed Exchange of Alerts for the Detection of Coordinated Attacks
  158. Security Threats on EPC Based RFID Systems
  159. A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications
  160. Anonymous Resolution of DNS Queries
  161. Complete analysis of configuration rules to guarantee reliable network security policies
  162. Aggregating and Deploying Network Access Control Policies
  163. Management of Exceptions on Access Control Policies
  164. RELIABLE PROCESS FOR SECURITY POLICY DEPLOYMENT
  165. Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework
  166. Analysis of Policy Anomalies on Distributed Network Security Setups
  167. Protection of Components Based on a Smart-Card Enhanced Security Module
  168. SMARTCOP – A Smart Card Based Access Control for the Protection of Network Security Components
  169. Towards Filtering and Alerting Rule Rewriting on Single-Component Policies
  170. An alert communication infrastructure for a decentralized attack prevention framework
  171. Digital chips for an on-line casino
  172. Mechanisms for attack protection on a prevention framework
  173. Protecting on-line casinos against fraudulent player drop-out
  174. Secure agent-based management for pervasive environments
  175. Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation
  176. Prevention of Cross-Site Scripting Attacks on Current Web Applications
  177. Amapola: A Simple Infrastructure for Ubiquitous Computing
  178. Decoupling Components of an Attack Prevention System Using Publish/Subscribe