Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Kaja Prislan, Igor Bernik, Gorazd Mesko, Rok Hacin, Blaz Markelj, Simon L. R. Vrhovec |
Cybercrime victimization and seeking help: A survey of students in Slovenia. |
CECC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Sebastiaan Alvarez Rodriguez, Erik van der Kouwe |
Meizodon: Security Benchmarking Framework for Static Android Malware Detectors. |
CECC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Martin Dietzfelbinger, Jörg Keller 0001 |
Determining Minimum Hash Width for Hash Chains. |
CECC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Antonios Dimitriadis, George Drosatos, Pavlos S. Efraimidis |
How much does a zero-permission Android app know about us? |
CECC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | |
Proceedings of the Third Central European Cybersecurity Conference, CECC 2019, Munich, Germany, November 14-15, 2019 |
CECC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Ziya Alper Genç, Gabriele Lenzini, Daniele Sgandurra |
Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique. |
CECC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Heckel, Daniel Spiekermann |
Network Forensic Investigation in OpenContrail Environments. |
CECC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Lamya Abdullah, Sebastian Hahn, Felix C. Freiling |
Achieving Consistency of Software Updates against Strong Attackers. |
CECC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Wojciech Mazurczyk, Krystian Powójski, Luca Caviglione |
IPv6 Covert Channels in the Wild. |
CECC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Andrew Sergeev, Eyal Ben-Sa'adon, Elad Tannenbaum, Asi Saar |
Combined side-channels malware detection for NFV infrastructure. |
CECC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Nico Vinzenz, Tobias Eggendorfer |
Forensic Investigations in Vehicle Data Stores. |
CECC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Andrej Cvetkovski, Flavio Esposito |
The Password Literacy in North Macedonia: A Case Study. |
CECC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Schorradt, Edita Bajramovic, Felix C. Freiling |
On the Feasibility of Secure Logging for Industrial Control Systems Using Blockchain. |
CECC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Maksim Goman |
A practical view on IT risk management process. |
CECC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Katarína Amrichová, Terézia Mézesová |
A Secure String Class Compliant with PCI DSS. |
CECC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Marksteiner, Zhendong Ma |
Approaching the Automation of Cyber Security Testing of Connected Vehicles. |
CECC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Pal-Stefan Murvay, Lucian Popa 0003, Bogdan Groza |
Accommodating Time-Triggered Authentication to FlexRay Demands. |
CECC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Anze Mihelic, Tomaz Hovelja, Simon L. R. Vrhovec |
Towards a delegation-type secure software development method. |
CECC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Aleksander Murko, Simon L. R. Vrhovec |
Bitcoin adoption: Scams and anonymity may not matter but trust into Bitcoin security does. |
CECC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Louis Tajan, Dirk Westhoff |
Retrospective Tracking of Suspects in GDPR Conform Mobile Access Networks Datasets. |
CECC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Tal Pavel |
From Fake News to Virtual Reality: Fake News and Digital Manipulations at the Age of Modern Technology. |
CECC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Uwe Ewald |
Digital Forensics vs. Due Process: Conflicting Standards or Complementary Approaches? |
CECC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Simon D. Duque Antón, Anna Pia Lohfink, Christoph Garth, Hans Dieter Schotten |
Security in Process: Detecting Attacks in Industrial Process Data. |
CECC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Simon D. Duque Antón, Anna Pia Lohfink, Hans Dieter Schotten |
Discussing the Feasibility of Acoustic Sensors for Side Channel-aided Industrial Intrusion Detection: An Essay. |
CECC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Schaffhauser |
SAT Solvers and their Limits with NFSR-based Stream Ciphers: an Example with Grain v1. |
CECC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Charles Varlei Neu, Ina Schiering, Avelino F. Zorzo |
Simulating and Detecting Attacks of Untrusted Clients in OPC UA Networks. |
CECC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Abdulaziz Altamimi, Nathan L. Clarke, Steven Furnell, Fudong Li 0001 |
Multi-Platform Authorship Verification. |
CECC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Pierre Graux, Jean-François Lalande, Valérie Viet Triem Tong |
Obfuscated Android Application Development. |
CECC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Marksteiner, Rudolf Ramler, Hannes Sochor |
Integrating Threat Modeling and Automated Test Case Generation into Industrialized Software Security Testing. |
CECC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Maksim Goman |
Towards unambiguous IT risk definition. |
CECC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Pal-Stefan Murvay, Bogdan Groza |
A brief look at the security of DeviceNet communication in industrial control systems. |
CECC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl |
Structural Limitations of B+-Tree forensics. |
CECC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Zoltán Szántó, Hunor Sándor, Béla Genge |
A Testbed for Performing Security Experiments with Software-Defined Industrial Control Systems. |
CECC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Damjan Fujs, Simon Vrhovec, Anze Mihelic |
What drives the motivation to self-protect on social networks?: The role of privacy concerns and perceived threats. |
CECC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Hajian Berenjestanaki, Mohammad Ali Akhaee |
Application Detection in Anonymous Communication Networks. |
CECC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Fraunholz, Daniel Schneider 0007, Janis Zemitis, Hans Dieter Schotten |
Hack My Company: An Empirical Assessment of Post-exploitation Behavior and Lateral Movement in Cloud Environments. |
CECC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Roman Pilipchuk, Stephan Seifermann, Robert Heinrich |
Aligning Business Process Access Control Policies with Enterprise Architecture. |
CECC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Gregor R. Krmelj, Matjaz Pancur, Miha Grohar, Mojca Ciglaric |
OpenSPA - An Open and Extensible Protocol for Single Packet Authorization. |
CECC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Tomás Bajtos, Pavol Sokol, Terézia Mézesová |
Virtual honeypots and detection of telnet botnets. |
CECC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Sabine K. Witting |
Do ut des: Disseminating online child sexual abuse material for investigative purposes? |
CECC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Oliver Popov, Jesper Bergman, Christian Valassi |
A Framework for a Forensically Sound Harvesting the Dark Web. |
CECC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Petra Grd, Igor Tomicic, Miroslav Baca |
Privacy improvement model for biometric person recognition in ambient intelligence using perceptual hashing. |
CECC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Steffen Wendzel, Daniela Eller, Wojciech Mazurczyk |
One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels. |
CECC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | |
Proceedings of the Central European Cybersecurity Conference 2018, CECC 2018, Ljubljana, Slovenia, November 15-16, 2018 |
CECC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Roman Pilipchuk |
Coping with Access Control Requirements in the Context of Mutual Dependencies between Business and IT. |
CECC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Melisa Geko, Simon Tjoa |
An Ontology Capturing the Interdependence of the General Data Protection Regulation (GDPR) and Information Security. |
CECC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Danaja Fabcic Povse |
It's all fun and games, and some legalese: data protection implications for increasing cyber-skills of employees through games. |
CECC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan |
Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware. |
CECC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Spiekermann, Jörg Keller 0001, Tobias Eggendorfer |
Improving Lawful Interception in Virtual Datacenters. |
CECC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Petra Grd, Igor Tomicic, Miroslav Baca |
Children Privacy Protection in Video Surveillance Based on Automatic Age Estimation. |
CECC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jörg Keller 0001 |
Cycle Structure and Reachability Analysis for Cipher Spritz with Small N. |
CECC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Blaz Markelj, Sabina Zgaga |
Mobile Security: Two Generations of Potential Victims. |
CECC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Igor Bernik, Blaz Markelj, Simon Vrhovec (eds.) |
Advances in Cybersecurity - Proceedings of the 2017 Central European Cybersecurity Conference, CECC 2017, Ljubljana, Slovenia, November 16-17, 2017 |
CECC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Simon Vrhovec, Blaz Markelj |
Use of Mobile Devices in Hospitals and Perceived Data Breach Consequences: An Explorative Study. |
CECC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Irfan Bulut, Ali Gökhan Yavuz, R. Can Aygun |
Combat Mobile Evasive Malware via Deep Learning. |
CECC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Nerea Sainz de la Maza Doñabeitia, Miguel Hernández Boza, Javier Jiménez del Peso, José Ignacio Escribano Pablos |
Why Did I End Up Living in a Cave? Risks of IoT at home. |
CECC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Kaja Prislan, Branko Lobnikar, Igor Bernik |
Information Security Management Practices: Expectations and Reality. |
CECC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Anze Mihelic, Simon Vrhovec |
Explaining the Employment of Information Security Measures by Individuals in Organizations: The Self-protection Model. |
CECC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Samo Tomazic, Igor Bernik |
Preparation of Response Model to Cyber-attacks at Nuclear Facilities. |
CECC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Martin Böhm 0004, Ina Schiering, Diederich Wermser |
Security of IoT Cloud Services - A User-Oriented Test Approach. |
CECC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Michal Choras, Michal Wozniak 0001 |
Concept Drift Analysis for Improving Anomaly Detection Systems in Cybersecurity. |
CECC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan |
Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware. |
CECC |
2017 |
DBLP DOI BibTeX RDF |
|