All Stories

  1. Seldom: An Anonymity Network with Selective Deanonymization
  2. Assessing the Latency of Network Layer Security in 5G Networks
  3. Introducing a Comprehensive, Continuous, and Collaborative Survey of Intrusion Detection Datasets
  4. Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication
  5. METRICS: A Methodology for Evaluating and Testing the Resilience of Industrial Control Systems to Cyberattacks
  6. One IDS Is Not Enough! Exploring Ensemble Learning for Industrial Intrusion Detection
  7. Securing Wireless Communication in Critical Infrastructure: Challenges and Opportunities
  8. When and How to Aggregate Message Authentication Codes on Lossy Channels?
  9. Benchmark Evaluation of Anomaly-Based Intrusion Detection Systems in the Context of Smart Grids
  10. Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols
  11. Investigation of Multi-Stage Attack and Defense Simulation for Data Synthesis
  12. Illicit Blockchain Content: Its Different Shapes, Consequences, and Remedies
  13. A cyber-physical digital twin approach to replicating realistic multi-stage cyberattacks on smart grids
  14. Comprehensively Analyzing the Impact of Cyberattacks on Power Grids
  15. An Approach to Abstract Multi-stage Cyberattack Data Generation for ML-Based IDS in Smart Grids
  16. Designing Secure and Privacy-Preserving Information Systems for Industry Benchmarking
  17. On using contextual correlation to detect multi-stage cyber attacks in smart grids
  18. Poster
  19. IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems
  20. Network Attacks Against Marine Radar Systems: A Taxonomy, Simulation Environment, and Dataset
  21. On specification-based cyber-attack detection in smart grids
  22. PowerDuck: A GOOSE Data Set of Cyberattacks in Substations
  23. A False Sense of Security?
  24. Missed Opportunities
  25. Take a Bite of the Reality Sandwich
  26. BP-MAC: Fast Authentication for Short Messages
  27. Scalable and Privacy-Focused Company-Centric Supply Chain Management
  28. Can Industrial Intrusion Detection Be SIMPLE?
  29. Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments
  30. An Approach of Replicating Multi-Staged Cyber-Attacks and Countermeasures in a Smart Grid Co-Simulation Environment
  31. Investigating Man-in-the-Middle-based False Data Injection in a Smart Grid Laboratory Environment
  32. Cybersecurity in Power Grids: Challenges and Opportunities
  33. Towards an Approach to Contextual Detection of Multi-Stage Cyber Attacks in Smart Grids
  34. CoinPrune: Shrinking Bitcoin’s Blockchain Retrospectively
  35. Path Loss in Urban LoRa Networks: A Large-Scale Measurement Study
  36. Challenges and Opportunities in Securing the Industrial Internet of Things
  37. Transparent End-to-End Security for Publish/Subscribe Communication in Cyber-Physical Systems
  38. Facilitating Protocol-independent Industrial Intrusion Detection Systems
  39. Cybersecurity Research and Training for Power Distribution Grids -- A Blueprint
  40. Easing the Conscience with OPC UA
  41. Methods for Actors in the Electric Power System to Prevent, Detect and React to ICT Attacks and Failures
  42. Graph-based Model of Smart Grid Architectures
  43. Private Multi-Hop Accountability for Supply Chains
  44. The Quest for Secure and Privacy-preserving Cloud-based Industrial Cooperation
  45. Complying with Data Handling Requirements in Cloud Storage Systems
  46. Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing
  47. Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments
  48. The Case for Session Sharing: Relieving Clients from TLS Handshake Overheads
  49. Hi Doppelgänger : Towards Detecting Manipulation in News Comments
  50. Towards an Infrastructure Enabling the Internet of Production
  51. A Case for Integrated Data Processing in Large-Scale Cyber-Physical Systems
  52. Dataflow Challenges in an Internet of Production
  53. Secure Low Latency Communication for Constrained Industrial IoT Scenarios
  54. Towards In-Network Security for Smart Homes
  55. Thwarting Unwanted Blockchain Content Insertion
  56. Secure and anonymous decentralized Bitcoin mixing
  57. A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin
  58. A survey on the evolution of privacy enforcement on smartphones and the road ahead
  59. CloudAnalyzer
  60. Privacy-preserving Comparison of Cloud Exposure Induced by Mobile Apps
  61. Analysis of Fingerprinting Techniques for Tor Hidden Services
  62. Network Security and Privacy for Cyber-Physical Systems
  63. Distributed Configuration, Authorization and Management in the Cloud-Based Internet of Things
  64. BLOOM: BLoom filter based oblivious outsourced matchings
  65. Veiled in clouds? Assessing the prevalence of cloud computing in the email landscape
  66. Practical Data Compliance for Cloud Storage
  67. Privacy-Preserving HMM Forward Computation
  68. TraceMixer: Privacy-preserving crowd-sensing sans trusted third party
  69. Towards Transparent Information on Individual Cloud Service Usage
  70. POSTER
  71. POSTER
  72. CPPL
  73. Moving Privacy-Sensitive Services from Public Clouds to Decentralized Private Clouds
  74. A comprehensive approach to privacy in the cloud-based Internet of Things
  75. Comparison-Based Privacy: Nudging Privacy in Social Media (Position Paper)
  76. Website Fingerprinting at Internet Scale
  77. Choose Wisely: A Comparison of Secure Two-Party Computation Frameworks
  78. CoinParty
  79. Bandwidth-Optimized Secure Two-Party Computation of Minima
  80. User-Driven Privacy Enforcement for Cloud-Based Services in the Internet of Things
  81. Piccett: Protocol-independent classification of corrupted error-tolerant traffic
  82. A Trust Point-based Security Architecture for Sensor Data in the Cloud
  83. Graph-based redundancy removal approach for multiple cross-layer interactions
  84. SCSlib: Transparently Accessing Protected Sensor Data in the Cloud
  85. SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators
  86. Towards Data Handling Requirements-Aware Cloud Computing
  87. Maintaining User Control While Storing and Processing Sensor Data in the Cloud
  88. Slimfit — A HIP DEX compression layer for the IP-based Internet of Things
  89. The Cloud Needs Cross-Layer Data Handling Annotations
  90. 6LoWPAN fragmentation attacks and mitigation mechanisms
  91. A Cloud design for user-controlled storage and processing of sensor data