All Stories

  1. Assessing the Latency of Network Layer Security in 5G Networks
  2. Introducing a Comprehensive, Continuous, and Collaborative Survey of Intrusion Detection Datasets
  3. Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication
  4. METRICS: A Methodology for Evaluating and Testing the Resilience of Industrial Control Systems to Cyberattacks
  5. One IDS Is Not Enough! Exploring Ensemble Learning for Industrial Intrusion Detection
  6. Securing Wireless Communication in Critical Infrastructure: Challenges and Opportunities
  7. When and How to Aggregate Message Authentication Codes on Lossy Channels?
  8. Benchmark Evaluation of Anomaly-Based Intrusion Detection Systems in the Context of Smart Grids
  9. Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols
  10. Investigation of Multi-Stage Attack and Defense Simulation for Data Synthesis
  11. Illicit Blockchain Content: Its Different Shapes, Consequences, and Remedies
  12. A cyber-physical digital twin approach to replicating realistic multi-stage cyberattacks on smart grids
  13. Comprehensively Analyzing the Impact of Cyberattacks on Power Grids
  14. An Approach to Abstract Multi-stage Cyberattack Data Generation for ML-Based IDS in Smart Grids
  15. Designing Secure and Privacy-Preserving Information Systems for Industry Benchmarking
  16. On using contextual correlation to detect multi-stage cyber attacks in smart grids
  17. Poster
  18. IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems
  19. Network Attacks Against Marine Radar Systems: A Taxonomy, Simulation Environment, and Dataset
  20. On specification-based cyber-attack detection in smart grids
  21. PowerDuck: A GOOSE Data Set of Cyberattacks in Substations
  22. A False Sense of Security?
  23. Missed Opportunities
  24. Take a Bite of the Reality Sandwich
  25. BP-MAC: Fast Authentication for Short Messages
  26. Scalable and Privacy-Focused Company-Centric Supply Chain Management
  27. Can Industrial Intrusion Detection Be SIMPLE?
  28. Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments
  29. An Approach of Replicating Multi-Staged Cyber-Attacks and Countermeasures in a Smart Grid Co-Simulation Environment
  30. Investigating Man-in-the-Middle-based False Data Injection in a Smart Grid Laboratory Environment
  31. Cybersecurity in Power Grids: Challenges and Opportunities
  32. Towards an Approach to Contextual Detection of Multi-Stage Cyber Attacks in Smart Grids
  33. CoinPrune: Shrinking Bitcoin’s Blockchain Retrospectively
  34. Path Loss in Urban LoRa Networks: A Large-Scale Measurement Study
  35. Challenges and Opportunities in Securing the Industrial Internet of Things
  36. Transparent End-to-End Security for Publish/Subscribe Communication in Cyber-Physical Systems
  37. Facilitating Protocol-independent Industrial Intrusion Detection Systems
  38. Cybersecurity Research and Training for Power Distribution Grids -- A Blueprint
  39. Easing the Conscience with OPC UA
  40. Methods for Actors in the Electric Power System to Prevent, Detect and React to ICT Attacks and Failures
  41. Graph-based Model of Smart Grid Architectures
  42. Private Multi-Hop Accountability for Supply Chains
  43. The Quest for Secure and Privacy-preserving Cloud-based Industrial Cooperation
  44. Complying with Data Handling Requirements in Cloud Storage Systems
  45. Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing
  46. Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments
  47. The Case for Session Sharing: Relieving Clients from TLS Handshake Overheads
  48. Hi Doppelgänger : Towards Detecting Manipulation in News Comments
  49. Towards an Infrastructure Enabling the Internet of Production
  50. A Case for Integrated Data Processing in Large-Scale Cyber-Physical Systems
  51. Dataflow Challenges in an Internet of Production
  52. Secure Low Latency Communication for Constrained Industrial IoT Scenarios
  53. Towards In-Network Security for Smart Homes
  54. Thwarting Unwanted Blockchain Content Insertion
  55. Secure and anonymous decentralized Bitcoin mixing
  56. A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin
  57. A survey on the evolution of privacy enforcement on smartphones and the road ahead
  58. CloudAnalyzer
  59. Privacy-preserving Comparison of Cloud Exposure Induced by Mobile Apps
  60. Analysis of Fingerprinting Techniques for Tor Hidden Services
  61. Network Security and Privacy for Cyber-Physical Systems
  62. Distributed Configuration, Authorization and Management in the Cloud-Based Internet of Things
  63. BLOOM: BLoom filter based oblivious outsourced matchings
  64. Veiled in clouds? Assessing the prevalence of cloud computing in the email landscape
  65. Practical Data Compliance for Cloud Storage
  66. Privacy-Preserving HMM Forward Computation
  67. TraceMixer: Privacy-preserving crowd-sensing sans trusted third party
  68. Towards Transparent Information on Individual Cloud Service Usage
  69. POSTER
  70. POSTER
  71. CPPL
  72. Moving Privacy-Sensitive Services from Public Clouds to Decentralized Private Clouds
  73. A comprehensive approach to privacy in the cloud-based Internet of Things
  74. Comparison-Based Privacy: Nudging Privacy in Social Media (Position Paper)
  75. Website Fingerprinting at Internet Scale
  76. Choose Wisely: A Comparison of Secure Two-Party Computation Frameworks
  77. CoinParty
  78. Bandwidth-Optimized Secure Two-Party Computation of Minima
  79. User-Driven Privacy Enforcement for Cloud-Based Services in the Internet of Things
  80. Piccett: Protocol-independent classification of corrupted error-tolerant traffic
  81. A Trust Point-based Security Architecture for Sensor Data in the Cloud
  82. Graph-based redundancy removal approach for multiple cross-layer interactions
  83. SCSlib: Transparently Accessing Protected Sensor Data in the Cloud
  84. SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators
  85. Towards Data Handling Requirements-Aware Cloud Computing
  86. Maintaining User Control While Storing and Processing Sensor Data in the Cloud
  87. Slimfit — A HIP DEX compression layer for the IP-based Internet of Things
  88. The Cloud Needs Cross-Layer Data Handling Annotations
  89. 6LoWPAN fragmentation attacks and mitigation mechanisms
  90. A Cloud design for user-controlled storage and processing of sensor data