Search results

  • Open Access
    File
    217 Downloads (Pure)
  • Understanding bifurcation of slow versus fast cyber-attackers

    van Wieren, M., Doerr, C., Jacobs, V. & Pieters, W., 2016, Data Privacy Management and Security Assurance: 11th International Workshop DPM 2016 and 5th International Workshop QASA 2016. Livraga, G., Torra, V., Aldini, A., Martinelli, F. & Suri, N. (eds.). Cham: Springer, p. 19-33 15 p. (Lecture notes in computer science; vol. 9963).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • United We Stand: Collaborative Detection and Mitigation of Amplification DDoS Attacks at Scale

    Wagner, D., Kopp, D., Wichtlhuber, M., DIetzel, C., Hohlfeld, O., Smaragdakis, G. & Feldmann, A., 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 970-987 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    7 Citations (Scopus)
    59 Downloads (Pure)
  • Unveiling the Threat: Investigating Distributed and Centralized Backdoor Attacks in Federated Graph Neural Networks

    Xu, J., Koffas, S. & Picek, S., 2024, (Accepted/In press) In: Digital Threats: Research and Practice. 30 p.

    Research output: Contribution to journalArticleScientificpeer-review

  • Upside Down: Exploring the Ecosystem of Dark Web Data Markets

    Covrig, B., Mikelarena, E. B., Rosca, C., Goanta, C., Spanakis, G. & Zarras, A., 2022, ICT Systems Security and Privacy Protection - 37th IFIP TC 11 International Conference, SEC 2022, Proceedings. Meng, W., Fischer-Hübner, S. & Jensen, C. D. (eds.). Springer, p. 489-506 18 p. (IFIP Advances in Information and Communication Technology; vol. 648 IFIP).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    18 Downloads (Pure)
  • User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack

    Li, M., Zhu, L., Zhang, Z., Lal, C., Conti, M. & Alazab, M., 2022, In: IEEE/ACM Transactions on Networking. 30, 5, p. 2060-2073 14 p., 9740483.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    9 Citations (Scopus)
    27 Downloads (Pure)
  • Using datasets from industrial control systems for cyber security research and education

    Lin, Q., Verwer, S., Kooij, R. & Mathur, A., 2020, Critical Information Infrastructures Security - 14th International Conference, CRITIS 2019, Revised Selected Papers. Nadjm-Tehrani, S. (ed.). Springer, Vol. 11777. p. 122-133 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11777 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    6 Citations (Scopus)
    37 Downloads (Pure)
  • Vacant Holes for Unsupervised Detection of the Outliers in Compact Latent Representation

    Glazunov, M. & Zarras, A., 2023, In: Proceedings of Machine Learning Research. 216, p. 701-711 11 p.

    Research output: Contribution to journalConference articleScientificpeer-review

    Open Access
    File
    22 Downloads (Pure)
  • VAL: Volume and Access Pattern Leakage-Abuse Attack with Leaked Documents

    Lambregts, S., Chen, H., Ning, J. & Liang, K., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Cham: Springer, p. 653-676 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13554 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    23 Downloads (Pure)
  • VAPOR: A Value-Centric Blockchain that is Scale-out, Decentralized, and Flexible by Design

    Ren, Z. & Erkin, Z., 2019, Financial Cryptography and Data Security : 23rd International Conference, FC 2019, Revised Selected Papers. Goldberg, I. & Moore, T. (eds.). Cham: Springer, Vol. 11598. p. 487-507 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11598)(Security and Cryptology; vol. 11598).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    75 Downloads (Pure)
  • Verifiable Credentials with Privacy-Preserving Tamper-Evident Revocation Mechanism

    Xu, L., Li, T. & Erkin, Z., 2023, Proceedings of the 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA). Danvers: IEEE, p. 266-273 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Victim-aware adaptive covert channels

    Bortolameotti, R., van Ede, T., Continella, A., Everts, M., Jonker, W., Hartel, P. & Peter, A., 2019, Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings. Chen, S., Choo, K-K. R., Fu, X., Lou, W. & Mohaisen, A. (eds.). Springer, Vol. 304. p. 450-471 22 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 304 LNICST).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Voltage Control in Distributed Generation under Measurement Falsification Attacks

    Ma, M., Herdeiro Teixeira, A., van den Berg, J. & Palensky, P., 2017, In: IFAC-PapersOnLine. 50, 1, p. 8379-8384 6 p.

    Research output: Contribution to journalConference articleScientificpeer-review

    Open Access
    File
    8 Citations (Scopus)
    89 Downloads (Pure)
  • Vulnerability Detection on Mobile Applications Using State Machine Inference

    van der Lee, W. & Verwer, S., 2018, Proceedings - 3rd IEEE European Symposium on Security and Privacy Workshops, EUROS&PW 2018. Los Alamitos, CA: IEEE, p. 1-10 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    149 Downloads (Pure)
  • Watermarking Graph Neural Networks based on Backdoor Attacks

    Xu, J., Koffas, S., Ersoy, O. & Picek, S., 2023, Proceedings - 8th IEEE European Symposium on Security and Privacy, Euro S and P 2023. Institute of Electrical and Electronics Engineers (IEEE), p. 1179-1197 19 p. (Proceedings - 8th IEEE European Symposium on Security and Privacy, Euro S and P 2023).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    9 Downloads (Pure)
  • Welcome Message from the General Chairs

    Liang, K. & Smaragdakis, G., 2023, In: Proceedings - 8th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2023. p. XIV 1 p.

    Research output: Contribution to journalEditorialScientificpeer-review

    Open Access
    File
    15 Downloads (Pure)
  • Welcome Message from the WCTI Workshop Organizers

    Doerr, C., 2018, ARES 2018: Proceedings of the 13th International Conference on Availability, Reliability and Security . New York, NY: Association for Computing Machinery (ACM), p. 129mDUMMY (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeForeword/postscriptScientific

  • What Do You See? Transforming Fault Injection Target Characterizations

    Krček, M., 2022, Security, Privacy, and Applied Cryptography Engineering - 12th International Conference, SPACE 2022, Proceedings. Batina, L., Picek, S. & Mondal, M. (eds.). Springer, p. 165-184 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13783 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    18 Downloads (Pure)
  • What Is Your MOVE: Modeling Adversarial Network Environments

    Knezevic, K., Picek, S., Jakobovic, D. & Hernandez-Castro, J., 2020, Applications of Evolutionary Computation : 23rd European Conference, EvoApplications 2020, Held as Part of EvoStar 2020, Proceedings. Castillo, P. A., Jiménez Laredo, J. L. & Fernández de Vega, F. (eds.). Cham: Springer, p. 260-275 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12104 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    83 Downloads (Pure)
  • Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services

    Chen, Y., Li, M., Zheng, S., Lal, C. & Conti, M., 2021, Security and Trust Management - 17th International Workshop, STM 2021, Proceedings. Roman, R. & Zhou, J. (eds.). 17 ed. Darmstadt, Germany: Springer, Vol. 13075. p. 43-61 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13075 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    17 Downloads (Pure)
  • WordMarkov: A New Password Probability Model of Semantics

    Xie, J., Cheng, H., Zhu, R., Wang, P. & Liang, K., 2022, Proceedings of the ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Piscataway: IEEE, p. 3034-3038 5 p. 9746203

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    18 Downloads (Pure)
  • Your Smart Contracts Are Not Secure: Investigating Arbitrageurs and Oracle Manipulators in Ethereum

    Tjiam, K., Wang, R., Chen, H. & Liang, K., 2021, CYSARM 2021 - Proceedings of the 3rd Workshop on Cyber-Security Arms Race, co-located with CCS 2021. Association for Computing Machinery (ACM), p. 25-35 11 p. (CYSARM 2021 - Proceedings of the 3rd Workshop on Cyber-Security Arms Race, co-located with CCS 2021).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    583 Downloads (Pure)
  • 抵抗恶意服务器的口令增强加密方案

    Translated title of the contribution: Password Hardening Encryption Services Against Malicious ServerZhao, Y., Liu, H., Liang, K., Ming, Y., Zhao, X. M. & Yang, B., 2023, In: Ruan Jian Xue Bao/Journal of Software. 34, 5, p. 2482-2493 12 p.

    Research output: Contribution to journalArticleScientificpeer-review