


default search action
EICC 2023: Stavanger, Norway
- Aleksandra Mileva, Steffen Wendzel, Virginia N. L. Franqueira:
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, EICC 2023, Stavanger, Norway, June 14-15, 2023. ACM 2023, ISBN 978-1-4503-9829-9
Main track
- Elvira Castillo-Fernández
, Jesús Esteban Díaz Verdejo
, Rafael M. Estepa-Alonso
, Antonio Jose Estepa Alonso
, Javier Muñoz-Calle
, Germán Madinabeitia
:
Multistep Cyberattacks Detection using a Flexible Multilevel System for Alerts and Events Correlation. 1-6 - Frédéric Tronnier
, Patrick Biker
, Erik Baur
, Sascha Löbner
:
An Evaluation of Information Flows in Digital Euro Transactions Using Contextual Integrity Theory. 7-12 - Omer Said Ozturk
, Emre Ekmekcioglu
, Orçun Çetin
, Budi Arief
, Julio C. Hernandez-Castro
:
New Tricks to Old Codes: Can AI Chatbots Replace Static Code Analysis Tools? 13-18 - Sidra Aslam
, Ala Altaweel
, Ibrahim Kamel
:
Exposed-mode of Wormhole Attack in Opportunistic Mobile Networks: Impact Study and Analysis. 19-25 - Peter Hamm
, Sebastian Pape
, David Harborth
:
Acceptance Factors and Obstacles for Cryptocurrency Adoption. 26-33 - Venkata Sai Charan Putrevu
, Hrushikesh Chunduri
, Mohan Anand Putrevu
, Sandeep K. Shukla
:
A Framework for Advanced Persistent Threat Attribution using Zachman Ontology. 34-41 - Chia-Mei Chen
, Fang-Hsuan Hsu
, Jenq-Neng Hwang
:
Useful Cyber Threat Intelligence Relation Retrieval Using Transfer Learning. 42-46 - Chibuzo Ukegbu
, Ramesh Neupane
, Hoda Mehrpouyan
:
Ontology-based Framework for Boundary Verification of Safety and Security Properties in Industrial Control Systems. 47-52 - Robin Duraz
, David Espes
, Julien Francq
, Sandrine Vaton
:
Cyber Informedness: A New Metric using CVSS to Increase Trust in Intrusion Detection Systems. 53-58 - Yichao Wang
, Budi Arief
, Virginia Nunes Leal Franqueira
, Anna Grace Coates
, Caoilte Ó Ciardha
:
Investigating the Availability of Child Sexual Abuse Materials in Dark Web Markets: Evidence Gathered and Lessons Learned. 59-64 - Agustín Walabonso Lara Romero
, Juan Antonio Ternero Muñiz
, Rafael M. Estepa-Alonso
, Antonio Jose Estepa Alonso
, Fernando Ruiz Robles
, Jesús Esteban Díaz Verdejo
:
HTTP Cyberattacks Detection through Automatic Signature Generation in multi-site IoT Deployments. 65-70 - Patrick Himler
, Max Landauer
, Florian Skopik
, Markus Wurzenberger
:
Towards Detecting Anomalies in Log-Event Sequences with Deep Learning: Open Research Challenges. 71-77 - Kris Heid
, Vincent Andrae
, Jens Heider
:
Towards detecting device fingerprinting on iOS with API function hooking. 78-84 - Sascha Löbner
, Christian Gartner
, Frédéric Tronnier
:
Privacy Preserving Data Analysis with the Encode, Shuffle, Analyse Architecture in Vehicular Data Sharing. 85-91 - Ciaran Reilly
, Stephen O'Shaughnessy
, Christina Thorpe
:
Robustness of Image-Based Malware Classification Models trained with Generative Adversarial Networks. 92-99 - Mordechai Guri
:
CLOUDOSCOPE: Detecting Anti-Forensic Malware using Public Cloud Environments. 100-107 - Venkata Satya Sai Ajay Daliparthi
, Nurul Momen
, Kurt Tutschku
, Miguel de Prado
:
ViSDM: A Liquid Democracy based Visual Data Marketplace for Sovereign Crowdsourcing Data Collection. 108-115 - Lasse Nitz
, Avikarsha Mandal
:
DGA Detection Using Similarity-Preserving Bloom Encodings. 116-120 - Fariborz Lohrabi Pour
, Dong Sam Ha
:
Effect of Power Conversion Efficiency of the RF Energy Harvester on the Security and Data Rate of the Self-Sustainable IoT Devices. 121-124 - Jörg Keller
, Carina Heßeling
:
Improving Covert Channel Bandwidth by Variable-Length Exponent Re-Coding in Floating-Point Representations. 125-128 - Alvhild Skjelvik
, Arnstein Vestad
:
Digital safety alarms - Exploring the understandings of the cybersecurity practice in Norwegian municipalities. 129-133 - Petra Grd
, Ena Barcic
, Igor Tomicic
, Bogdan Okresa Duric
:
Analysing the Impact of Gender Classification on Age Estimation. 134-137
COSH Special Session
- Vahiny Gnanasekaran
, Katrien De Moor
:
Usability, Security, and Privacy Recommendations for Mobile Parental Control. 138-143 - Matteo Curcio
:
Cybercrime and Video Games: Exploring children's safety in the gaming environment. 144-148 - Farzana Quayyum
:
Collaboration between parents and children to raise cybersecurity awareness. 149-152
CNACYS Special Session
- Martin Atzmueller
, Sophia Sylvester
, Rushed Kanawati
:
Exploratory and Explanation-Aware Network Intrusion Profiling using Subgroup Discovery and Complex Network Analysis. 153-158 - Yashovardhan Sharma
, Simon Birnbach
, Ivan Martinovic
:
RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection. 159-166
DP4I Special Session
- Umit Cali
, Marthe Fogstad Dynge
, Ahmed Idries
, Sambeet Mishra
, Dmytro Ivanko
, Naser Hashemipour
, Murat Kuzlu
:
Digital Energy Platforms Considering Digital Privacy and Security by Design Principles. 167-173 - Umit Cali
, Murat Kuzlu
, Onur Elma
, Osman Gazi Gucluturk
, Ahmet Kilic
, Ferhat Özgür Çatak
:
Cybersecurity and Digital Privacy Aspects of V2X in the EV Charging Structure. 174-180 - Umit Cali
, Ferhat Özgür Çatak
, Zsolt György Balogh
, Rita Maria Ugarelli
, Martin Gilje Jaatun
:
Cyber-physical Hardening of the Digital Water Infrastructure. 181-188
Poster Session
- Anze Mihelic
, Igor Bernik
, Simon Vrhovec
:
Older adults and tablet computers: Adoption and the role of perceived threat of cyber attacks. 189-190 - Johanna Henrich
, Andreas Heinemann
, Martin Stiemerling
, Fabian Seidl
:
Crypto-agile Design and Testbed for QKD-Networks. 191-192 - Georgios Agrafiotis
, Eftychia Makri
, Antonios Lalas
, Konstantinos Votis
, Dimitrios Tzovaras
, Nikolaos Tsampieris
:
A Deep Learning-based Malware Traffic Classifier for 5G Networks Employing Protocol-Agnostic and PCAP-to-Embeddings Techniques. 193-194 - Allison Wylde
:
In Alice and Bob, I trust? 195-196

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.