


default search action
CSR 2021: Rhodes, Greece
- IEEE International Conference on Cyber Security and Resilience, CSR 2021, Rhodes, Greece, July 26-28, 2021. IEEE 2021, ISBN 978-1-6654-0285-9
- Abdul Hannan, Christian Gruhl, Bernhard Sick:
Anomaly based Resilient Network Intrusion Detection using Inferential Autoencoders. 1-7 - Panagiotis Panagiotidis, Christos Angelidis, Ioannis Karalis, George Spyropoulos, Angelos Liapis:
Act Proactively: An Intrusion Prediction Approach for Cyber Security. 8-13 - Risto Vaarandi
:
A Stream Clustering Algorithm for Classifying Network IDS Alerts. 14-19 - Faqeer ur Rehman
, Clemente Izurieta:
Statistical Metamorphic Testing of Neural Network Based Intrusion Detection Systems. 20-26 - Richard Zuech, John T. Hancock, Taghi M. Khoshgoftaar:
Detecting SQL Injection Web Attacks Using Ensemble Learners and Data Sampling. 27-34 - Thomas Cochrane, Peter Foster, Varun Chhabra, Maud Lemercier, Terry J. Lyons, Cristopher Salvi:
SK-Tree: a systematic malware detection algorithm on streaming trees via the signature kernel. 35-40 - Cainã Figueiredo
, João Gabriel Lopes, Rodrigo Azevedo Santos, Gerson Zaverucha, Daniel Sadoc Menasché, Leandro Pfleger de Aguiar:
Software Vulnerabilities, Products and Exploits: A Statistical Relational Learning Approach. 41-46 - Michael A. Taylor, Eric C. Larson, Mitchell A. Thornton:
Rapid Ransomware Detection through Side Channel Exploitation. 47-54 - Josep Soler Garrido, Dominik Dold
, Johannes Frank:
Machine learning on knowledge graphs for context-aware security monitoring. 55-60 - Phillip Williams, Haytham Idriss, Magdy A. Bayoumi:
Mc-PUF: Memory-based and Machine Learning Resilient Strong PUF for Device Authentication in Internet of Things. 61-65 - Christopher A. Rouff, Lanier A. Watkins, Roy Sterritt, Salim Hariri:
SoK: Autonomic Cybersecurity - Securing Future Disruptive Technologies. 66-72 - Jeppe Hagelskjær Østergaard, Edlira Dushku
, Nicola Dragoni
:
ERAMO: Effective Remote Attestation through Memory Offloading. 73-80 - Jingyi Liao, Sin G. Teo, Partha Pratim Kundu, Tram Truong-Huu:
ENAD: An Ensemble Framework for Unsupervised Network Anomaly Detection. 81-88 - Luca Deri, Francesco Fusco
:
Using Deep Packet Inspection in CyberTraffic Analysis. 89-94 - Ruichao Zhang, Shang Wang, Renée Burton, Minh Hoang, Juhua Hu, Anderson C. A. Nascimento:
Clustering Analysis of Email Malware Campaigns. 95-102 - Nelson L. Santos, Waleed Younis, Bogdan V. Ghita, Giovanni Luca Masala:
Enhancing Medical Data Security on Public Cloud. 103-108 - Gaurav Kodwani, Shashank Arora, Pradeep K. Atrey:
On Security of Key Derivation Functions in Password-based Cryptography. 109-114 - Christos Iliou
, Theodoros Kostoulas, Theodora Tsikrika
, Vasilis Katos, Stefanos Vrochidis
, Ioannis Kompatsiaris:
Web Bot Detection Evasion Using Generative Adversarial Networks. 115-120 - Konstantinos-Panagiotis Grammatikakis
, Ioannis Koufos
, Nicholas Kolokotronis
, Costas Vassilakis, Stavros Shiaeles
:
Understanding and Mitigating Banking Trojans: From Zeus to Emotet. 121-128 - Efthimios Pantelidis, Gueltoum Bendiab, Stavros Shiaeles
, Nicholas Kolokotronis
:
Insider Threat Detection using Deep Autoencoder and Variational Autoencoder Neural Networks. 129-134 - Valentina Casola, Alessandra De Benedictis, Carlo Mazzocca
, Rebecca Montanari:
Toward Automated Threat Modeling of Edge Computing Systems. 135-140 - Tyler Westland, Nan Niu, Rashmi Jha, David Kapp, Temesguen Kebede:
Semi-Automatic Bug Generation Using Test Case Negation. 141-146 - Lara Mauri
, Ernesto Damiani:
STRIDE-AI: An Approach to Identifying Vulnerabilities of Machine Learning Assets. 147-154 - Sergey Ostrikov:
Resilient Boot. 155-159 - Marcel Medwed, Ventzislav Nikov, Joost Renes, Tobias Schneider, Nikita Veshchikov:
Cyber Resilience for Self-Monitoring IoT Devices. 160-167 - Emanuele Bellini, Franco Bagnoli, Mauro Caporuscio, Ernesto Damiani, Francesco Flammini, Igor Linkov, Pietro Liò
, Stefano Marrone:
Resilience learning through self adaptation in digital twins of human-cyber-physical systems. 168-173 - Stylianos Karagiannis
, Marco Manso
, Emmanouil Magkos, Luís Landeiro Ribeiro
, Luís Campos:
Automated and On-Demand Cybersecurity Certification. 174-179 - Georgios Potamos, Adamantini Peratikou, Stavros Stavrou:
Towards a Maritime Cyber Range training environment. 180-185 - Jason Diakoumakos, Evangelos Chaskos, Nicholas Kolokotronis
, George Lepouras:
Cyber-Range Federation and Cyber-Security Games: A Gamification Scoring Model. 186-191 - Nikolaos Koutsouris, Costas Vassilakis, Nicholas Kolokotronis
:
Cyber-Security Training Evaluation Metrics. 192-197 - Matthew Swann
, Joseph R. Rose, Gueltoum Bendiab, Stavros Shiaeles
, Fudong Li:
Open Source and Commercial Capture The Flag Cyber Security Learning Platforms - A Case Study. 198-205 - Stefano Marrone, Antonio Tortora, Emanuele Bellini, Antonella Maione, Mariapia Raimondo:
Development of a Testbed for Fully Homomorphic Encryption Solutions. 206-211 - Massimiliano Leone Itria, Enrico Schiavone, Nicola Nostro:
Towards anomaly detection in smart grids by combining Complex Events Processing and SNMP objects. 212-217 - Najmeh Seifollahpour Arabi, Talal Halabi
, Mohammad Zulkernine:
Reinforcement Learning-driven Attack on Road Traffic Signal Controllers. 218-225 - Emrah Tomur, Utku Gülen
, Elif Ustundag Soykan, Mehmet Akif Ersoy
, Ferhat Karakoç, Leyli Karaçay, Pinar Çomak:
SoK: Investigation of Security and Functional Safety in Industrial IoT. 226-233 - Angelos Stamou, Panagiotis Pantazopoulos
, Sammy Haddad, Angelos Amditis:
Enabling Efficient Common Criteria Security Evaluation for Connected Vehicles. 234-240 - Mohd Ruzeiny Bin Kamaruzzaman, Bernard Ousmane Sané
, Doudou Fall, Yuzo Taenaka, Youki Kadobayashi:
Analyzing Cascading Effects of Spoofing Attacks on ADS-B Using a Discrete Model of Air Traffic Control Responses and AGMOD Dynamics. 241-248 - Daniele Granata, Massimiliano Rak
, Giovanni Salzillo:
Towards HybridgeCAN, a hybrid bridged CAN platform for automotive security testing. 249-254 - Abasi-Amefon O. Affia
, Raimundas Matulevicius:
Securing an MQTT-based Traffic Light Perception System for Autonomous Driving. 255-260 - Saurabh Shukla
, Subhasis Thakur, John G. Breslin
:
Secure Communication in Smart Meters using Elliptic Curve Cryptography and Digital Signature Algorithm. 261-266 - Abhi Patel, Tim Schenk, Steffi Knorn, Heiko Patzlaff, Dragan Obradovic, Andrés Botero Halblaub:
Real-time, Simulation-based Identification of Cyber-Security Attacks of Industrial Plants. 267-272 - Ievgen Kabin, Dan Klann, Zoya Dyka, Peter Langendoerfer:
Fast Dual-Field ECDSA Accelerator with Increased Resistance against Horizontal SCA Attacks. 273-280 - Constantinos Louca, Adamantini Peratikou, Stavros Stavrou:
On the detection of Channel Switch Announcement Attack in 802.11 networks. 281-285 - Annie Joss, Austin Grassbaugh, Majid Poshtan, Joseph Callenes:
A Dynamic Reconfiguration-based Approach to Resilient State Estimation. 286-291 - Baptiste Millot, Julien Francq, Franck Sicard
:
Systematic and Efficient Anomaly Detection Framework using Machine Learning on Public ICS Datasets. 292-297 - Paola Perrone, Francesco Flammini, Roberto Setola:
Machine Learning for Threat Recognition in Critical Cyber-Physical Systems. 298-303 - Andreas Gylling, Mathias Ekstedt, Zeeshan Afzal
, Per Eliasson:
Mapping Cyber Threat Intelligence to Probabilistic Attack Graphs. 304-311 - Georgios Aivatoglou, Mike Anastasiadis, Georgios Spanos
, Antonis Voulgaridis, Konstantinos Votis, Dimitrios Tzovaras
:
A tree-based machine learning methodology to automatically classify software vulnerabilities. 312-317 - Athanasios Dimitriadis
, Efstratios Lontzetidis
, Ioannis Mavridis:
Evaluation and Enhancement of the Actionability of Publicly Available Cyber Threat Information in Digital Forensics. 318-323 - Borce Stojkovski
, Gabriele Lenzini:
A workflow and toolchain proposal for analyzing users' perceptions in cyber threat intelligence sharing platforms. 324-330 - Dimitrios Chatziamanetoglou, Konstantinos Rantos:
CTI Blockchain-Based Sharing using Proof-of-Quality Consensus Algorithm. 331-336 - Kieran Hughes, Kieran McLaughlin, Sakir Sezer:
Towards Intrusion Response Intel. 337-342 - Cagatay Yucel, Ioannis Chalkias, Dimitrios Mallis, Deniz Cetinkaya
, Jane Henriksen-Bulmer
, Alice Cooper:
Data Sanitisation and Redaction for Cyber Threat Intelligence Sharing Platforms. 343-347 - Pavlos Evangelatos, Christos Iliou
, Thanassis Mavropoulos, Konstantinos Apostolou, Theodora Tsikrika
, Stefanos Vrochidis
, Ioannis Kompatsiaris:
Named Entity Recognition in Cyber Threat Intelligence Using Transformer-based Models. 348-353 - Panos Panagiotou, Christos Iliou
, Konstantinos Apostolou, Theodora Tsikrika
, Stefanos Vrochidis
, Periklis Chatzimisios, Ioannis Kompatsiaris:
Towards Selecting Informative Content for Cyber Threat Intelligence. 354-359 - Kadir Burak Mavzer, Ewa Konieczna, Henrique Alves, Cagatay Yucel, Ioannis Chalkias, Dimitrios Mallis, Deniz Cetinkaya
, Luis Angel Galindo Sánchez:
Trust and Quality Computation for Cyber Threat Intelligence Sharing Platforms. 360-365 - George E. Raptis, Christina P. Katsini
, Christos Alexakos:
Towards Automated Matching of Cyber Threat Intelligence Reports based on Cluster Analysis in an Internet-of-Vehicles Environment. 366-371 - Ioannis Bothos, Vasileios Vlachos
, Dimitris M. Kyriazanos
, Ioannis C. Stamatiou, Konstantinos Giorgios Thanos, Pantelis Tzamalis, Sotirios E. Nikoletseas, Stelios C. A. Thomopoulos
:
Modelling Cyber-Risk in an Economic Perspective. 372-377 - Jari Isohanni
, Lorna Goulden, Kai M. Hermsen, Mirko Ross, Jef Vanbockryck:
Disposable identities; enabling trust-by-design to build more sustainable data driven value. 378-383 - Aiden Hoyle, Thomas Powell, Beatrice Cadet, Judith van de Kuijt:
Influence Pathways: Mapping the Narratives and Psychological Effects of Russian COVID-19 Disinformation. 384-389 - Csaba Virág, Jakub Cegan, Tomás Lieskovan, Matteo Merialdo:
The Current State of The Art and Future of European Cyber Range Ecosystem. 390-395 - Mauno Pihelgas, Markus Kont:
Frankenstack: Real-time Cyberattack Detection and Feedback System for Technical Cyber Exercises. 396-402 - Nikos Oikonomou, Notis Mengidis
, Minas Spanopoulos-Karalexidis, Antonis Voulgaridis, Matteo Merialdo, Ivo Raisr, Kaarel Hanson, Paloma de La Vallée, Theodora Tsikrika
, Stefanos Vrochidis
, Konstantinos Votis:
ECHO Federated Cyber Range: Towards Next-Generation Scalable Cyber Ranges. 403-408 - Olivier Jacq, Pablo Giménez Salazar
, Kamban Parasuraman, Jarkko Kuusijärvi
, Andriana Gkaniatsou, Evangelia Latsa, Angelos Amditis:
The Cyber-MAR Project: First Results and Perspectives on the Use of Hybrid Cyber Ranges for Port Cyber Risk Assessment. 409-414 - Maria Tsiodra, Michail Chronopoulos, Matthias Ghering, Eirini Karapistoli, Neofytos Gerosavva, Nicolas Kylilis:
The SPIDER Cyber Security Investment Component (CIC). 415-421 - George Hatzivasilis, Sotiris Ioannidis, Michail Smyrlis
, George Spanoudakis, Fulvio Frati, Chiara Braghin
, Ernesto Damiani, Hristo Koshutanski, George Tsakirakis, Torsten Hildebrandt, Ludger Goeke, Sebastian Pape, Oleg Blinder, Michael Vinov, George Leftheriotis, Martin Kunc, Fotis Oikonomou, Giovanni Magilo, Vito Petrarolo, Antonio Chieti, Robert Bordianu:
The THREAT-ARREST Cyber Range Platform. 422-427 - Eleni-Constantina Davri
, Eleni Darra, Isidoros Monogioudis, Athanasios Grigoriadis, Christos Iliou
, Notis Mengidis
, Theodora Tsikrika
, Stefanos Vrochidis
, Adamantini Peratikou, Helen Gibson, Damir Haskovic, Dimitrios Kavallieros
, Evangelos Chaskos, Peng Zhao, Stavros Shiaeles
, Nick Savage, Babak Akhgar, Xavier J. A. Bellekens, Mohamed Amine Ben Farah
:
Cyber Security Certification Programmes. 428-435 - Sofia Alevizopoulou, Paris Koloveas
, Christos Tryfonopoulos
, Paraskevi Raftopoulou:
Social Media Monitoring for IoT Cyber-Threats. 436-441 - James King, Gueltoum Bendiab, Nick Savage, Stavros Shiaeles
:
Data Exfiltration: Methods and Detection Countermeasures. 442-447 - Beny Nugraha
, Naina Kulkarni, Akash Gopikrishnan:
Detecting Adversarial DDoS Attacks in Software- Defined Networking Using Deep Learning Techniques and Adversarial Training. 448-454 - Alfredo Nascita, Antonio Montieri
, Giuseppe Aceto, Domenico Ciuonzo, Valerio Persico, Antonio Pescapè:
Unveiling MIMETIC: Interpreting Deep Learning Traffic Classifiers via XAI Techniques. 455-460 - Arshiya Khan, Chase Cotton:
Detecting Attacks on IoT Devices using Featureless 1D-CNN. 461-466 - Oluwagbemiga Ajayi
, Aryya Gangopadhyay:
DAHID: Domain Adaptive Host-based Intrusion Detection. 467-472 - Iosif Sklavidis, Christos Angelidis, Rosanna Babagiannou, Angelos Liapis:
Enhancing SIEM Technology for protecting Electrical Power and Energy Sector. 473-478 - Achilleas Pasias, Alexandros Schoinas, Anastasios Drosou, Dimitrios Tzovaras
:
A Scalable Multi-Agent System for Black Start Restoration in Low Voltage Microgrids. 479-484 - Panagiotis I. Radoglou-Grammatikis
, Athanasios Liatifis
, Elisavet Grigoriou, Theocharis Saoulidis, Antonios Sarigiannidis, Thomas Lagkas, Panagiotis G. Sarigiannidis:
TRUSTY: A Solution for Threat Hunting Using Data Analysis in Critical Infrastructures. 485-490 - Pol Paradell
, Yannis Spyridis
, Alba Colet
, Anzhelika Ivanova, José Luis Domínguez-García, Achilleas Sesis, Georgios Efstathopoulos:
Increasing resilience of power systems using intentional islanding; a comparison of Binary genetic algorithm and deep learning based method. 491-496 - Achilleas Pasias, Thanasis Kotsiopoulos, Georgios Lazaridis
, Anastasios Drosou, Dimitrios Tzovaras
, Panagiotis G. Sarigiannidis:
Enabling Cyber-attack Mitigation Techniques in a Software Defined Network. 497-502 - Logan Drazovich, Liam Brew, Susanne Wetzel:
Advancing the State of Maritime Cybersecurity Guidelines to Improve the Resilience of the Maritime Transportation System. 503-509 - Liam Brew, Logan Drazovich, Susanne Wetzel:
The Impact of COVID-19 on the Security and Resilience of the Maritime Transportation System. 510-517 - Nicolas Pelissero, Pedro Merino Laso, John Puentes:
Impact assessment of anomaly propagation in a naval water distribution cyber-physical system. 518-523 - Malte Christian Struck, Jannis Stoppe
:
A Backwards Compatible Approach to Authenticate Automatic Identification System Messages. 524-529 - Maria Papathanasaki
, Panagiotis Fountas
, Leandros Maglaras
, Christos Douligeris, Mohamed Amine Ferrag
:
Quantum Cryptography in Maritime Telecommunications. 530-535 - Oliver Eigner
, Sebastian Eresheim, Peter Kieseberg
, Lukas Daniel Klausner, Martin Pirker
, Torsten Priebe, Simon Tjoa
, Fiammetta Marulli, Francesco Mercaldo:
Towards Resilient Artificial Intelligence: Survey and Research Issues. 536-542 - Hassan Chaitou, Thomas Robert, Jean Leneutre, Laurent Pautet
:
Assessing adversarial training effect on IDSs and GANs. 543-550 - Jing Wen, Siu-Ming Yiu, Lucas C. K. Hui:
Defending Against Model Inversion Attack by Adversarial Examples. 551-556 - Marco Pacini, Federico Nesti, Alessandro Biondi
, Giorgio C. Buttazzo:
X-BaD: A Flexible Tool for Explanation-Based Bias Detection. 557-562 - Maria Stella de Biase, Fiammetta Marulli, Laura Verde, Stefano Marrone:
Improving Classification Trustworthiness in Random Forests. 563-568

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.