All Stories

  1. Introducing a Comprehensive, Continuous, and Collaborative Survey of Intrusion Detection Datasets
  2. Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication
  3. Poster
  4. IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems
  5. PowerDuck: A GOOSE Data Set of Cyberattacks in Substations
  6. A False Sense of Security?
  7. Take a Bite of the Reality Sandwich
  8. BP-MAC: Fast Authentication for Short Messages
  9. Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments
  10. Cybersecurity in Power Grids: Challenges and Opportunities
  11. CoinPrune: Shrinking Bitcoin’s Blockchain Retrospectively
  12. Challenges and Opportunities in Securing the Industrial Internet of Things
  13. Transparent End-to-End Security for Publish/Subscribe Communication in Cyber-Physical Systems
  14. Facilitating Protocol-independent Industrial Intrusion Detection Systems
  15. Cybersecurity Research and Training for Power Distribution Grids -- A Blueprint
  16. Easing the Conscience with OPC UA
  17. Methods for Actors in the Electric Power System to Prevent, Detect and React to ICT Attacks and Failures
  18. Graph-based Model of Smart Grid Architectures
  19. Private Multi-Hop Accountability for Supply Chains
  20. The Quest for Secure and Privacy-preserving Cloud-based Industrial Cooperation
  21. Complying with Data Handling Requirements in Cloud Storage Systems
  22. Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing
  23. Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments
  24. The Case for Session Sharing: Relieving Clients from TLS Handshake Overheads
  25. Hi Doppelgänger : Towards Detecting Manipulation in News Comments
  26. Towards an Infrastructure Enabling the Internet of Production
  27. A Case for Integrated Data Processing in Large-Scale Cyber-Physical Systems
  28. Dataflow Challenges in an Internet of Production
  29. Secure Low Latency Communication for Constrained Industrial IoT Scenarios
  30. Towards In-Network Security for Smart Homes
  31. Thwarting Unwanted Blockchain Content Insertion
  32. Secure and anonymous decentralized Bitcoin mixing
  33. A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin
  34. A survey on the evolution of privacy enforcement on smartphones and the road ahead
  35. CloudAnalyzer
  36. Privacy-preserving Comparison of Cloud Exposure Induced by Mobile Apps
  37. Analysis of Fingerprinting Techniques for Tor Hidden Services
  38. Network Security and Privacy for Cyber-Physical Systems
  39. Distributed Configuration, Authorization and Management in the Cloud-Based Internet of Things
  40. BLOOM: BLoom filter based oblivious outsourced matchings
  41. Veiled in clouds? Assessing the prevalence of cloud computing in the email landscape
  42. Practical Data Compliance for Cloud Storage
  43. Privacy-Preserving HMM Forward Computation
  44. TraceMixer: Privacy-preserving crowd-sensing sans trusted third party
  45. Towards Transparent Information on Individual Cloud Service Usage
  46. POSTER
  47. POSTER
  48. CPPL
  49. Moving Privacy-Sensitive Services from Public Clouds to Decentralized Private Clouds
  50. A comprehensive approach to privacy in the cloud-based Internet of Things
  51. Comparison-Based Privacy: Nudging Privacy in Social Media (Position Paper)
  52. Website Fingerprinting at Internet Scale
  53. Choose Wisely: A Comparison of Secure Two-Party Computation Frameworks
  54. CoinParty
  55. Bandwidth-Optimized Secure Two-Party Computation of Minima
  56. User-Driven Privacy Enforcement for Cloud-Based Services in the Internet of Things
  57. Piccett: Protocol-independent classification of corrupted error-tolerant traffic
  58. A Trust Point-based Security Architecture for Sensor Data in the Cloud
  59. Graph-based redundancy removal approach for multiple cross-layer interactions
  60. SCSlib: Transparently Accessing Protected Sensor Data in the Cloud
  61. SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators
  62. Towards Data Handling Requirements-Aware Cloud Computing
  63. Maintaining User Control While Storing and Processing Sensor Data in the Cloud
  64. Slimfit — A HIP DEX compression layer for the IP-based Internet of Things
  65. The Cloud Needs Cross-Layer Data Handling Annotations
  66. 6LoWPAN fragmentation attacks and mitigation mechanisms
  67. A Cloud design for user-controlled storage and processing of sensor data