Login / Signup
CECC
2017
2019
2017
2019
Keyphrases
Publications
2019
Andreas Schaffhauser
SAT Solvers and their Limits with NFSR-based Stream Ciphers: an Example with Grain v1.
CECC
(2019)
Louis Tajan
,
Dirk Westhoff
Retrospective Tracking of Suspects in GDPR Conform Mobile Access Networks Datasets.
CECC
(2019)
Proceedings of the Third Central European Cybersecurity Conference, CECC 2019, Munich, Germany, November 14-15, 2019
CECC
(2019)
Wojciech Mazurczyk
,
Krystian Powójski
,
Luca Caviglione
IPv6 Covert Channels in the Wild.
CECC
(2019)
Uwe Ewald
Digital Forensics vs. Due Process: Conflicting Standards or Complementary Approaches?
CECC
(2019)
Abdulaziz Altamimi
,
Nathan L. Clarke
,
Steven Furnell
,
Fudong Li
Multi-Platform Authorship Verification.
CECC
(2019)
Anze Mihelic
,
Tomaz Hovelja
,
Simon L. R. Vrhovec
Towards a delegation-type secure software development method.
CECC
(2019)
Charles Varlei Neu
,
Ina Schiering
,
Avelino F. Zorzo
Simulating and Detecting Attacks of Untrusted Clients in OPC UA Networks.
CECC
(2019)
Ziya Alper Genç
,
Gabriele Lenzini
,
Daniele Sgandurra
Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique.
CECC
(2019)
Tal Pavel
From Fake News to Virtual Reality: Fake News and Digital Manipulations at the Age of Modern Technology.
CECC
(2019)
Katarína Amrichová
,
Terézia Mézesová
A Secure String Class Compliant with PCI DSS.
CECC
(2019)
Simon D. Duque Antón
,
Anna Pia Lohfink
,
Christoph Garth
,
Hans Dieter Schotten
Security in Process: Detecting Attacks in Industrial Process Data.
CECC
(2019)
Stefan Marksteiner
,
Zhendong Ma
Approaching the Automation of Cyber Security Testing of Connected Vehicles.
CECC
(2019)
Andrew Sergeev
,
Eyal Ben-Sa'adon
,
Elad Tannenbaum
,
Asi Saar
Combined side-channels malware detection for NFV infrastructure.
CECC
(2019)
Maksim Goman
A practical view on IT risk management process.
CECC
(2019)
Pal-Stefan Murvay
,
Lucian Popa
,
Bogdan Groza
Accommodating Time-Triggered Authentication to FlexRay Demands.
CECC
(2019)
Pierre Graux
,
Jean-François Lalande
,
Valérie Viet Triem Tong
Obfuscated Android Application Development.
CECC
(2019)
Martin Dietzfelbinger
,
Jörg Keller
Determining Minimum Hash Width for Hash Chains.
CECC
(2019)
Simon D. Duque Antón
,
Anna Pia Lohfink
,
Hans Dieter Schotten
Discussing the Feasibility of Acoustic Sensors for Side Channel-aided Industrial Intrusion Detection: An Essay.
CECC
(2019)
Nico Vinzenz
,
Tobias Eggendorfer
Forensic Investigations in Vehicle Data Stores.
CECC
(2019)
Sebastiaan Alvarez Rodriguez
,
Erik van der Kouwe
Meizodon: Security Benchmarking Framework for Static Android Malware Detectors.
CECC
(2019)
Alexander Heckel
,
Daniel Spiekermann
Network Forensic Investigation in OpenContrail Environments.
CECC
(2019)
Aleksander Murko
,
Simon L. R. Vrhovec
Bitcoin adoption: Scams and anonymity may not matter but trust into Bitcoin security does.
CECC
(2019)
Lamya Abdullah
,
Sebastian Hahn
,
Felix C. Freiling
Achieving Consistency of Software Updates against Strong Attackers.
CECC
(2019)
Stefan Marksteiner
,
Rudolf Ramler
,
Hannes Sochor
Integrating Threat Modeling and Automated Test Case Generation into Industrialized Software Security Testing.
CECC
(2019)
Stefan Schorradt
,
Edita Bajramovic
,
Felix C. Freiling
On the Feasibility of Secure Logging for Industrial Control Systems Using Blockchain.
CECC
(2019)
Andrej Cvetkovski
,
Flavio Esposito
The Password Literacy in North Macedonia: A Case Study.
CECC
(2019)
Kaja Prislan
,
Igor Bernik
,
Gorazd Mesko
,
Rok Hacin
,
Blaz Markelj
,
Simon L. R. Vrhovec
Cybercrime victimization and seeking help: A survey of students in Slovenia.
CECC
(2019)
Antonios Dimitriadis
,
George Drosatos
,
Pavlos S. Efraimidis
How much does a zero-permission Android app know about us?
CECC
(2019)
2018
Daniel Fraunholz
,
Daniel Schneider
,
Janis Zemitis
,
Hans Dieter Schotten
Hack My Company: An Empirical Assessment of Post-exploitation Behavior and Lateral Movement in Cloud Environments.
CECC
(2018)
Zoltán Szántó
,
Hunor Sándor
,
Béla Genge
A Testbed for Performing Security Experiments with Software-Defined Industrial Control Systems.
CECC
(2018)
Petra Grd
,
Igor Tomicic
,
Miroslav Baca
Privacy improvement model for biometric person recognition in ambient intelligence using perceptual hashing.
CECC
(2018)
Steffen Wendzel
,
Daniela Eller
,
Wojciech Mazurczyk
One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels.
CECC
(2018)
Pal-Stefan Murvay
,
Bogdan Groza
A brief look at the security of DeviceNet communication in industrial control systems.
CECC
(2018)
Damjan Fujs
,
Simon Vrhovec
,
Anze Mihelic
What drives the motivation to self-protect on social networks?: The role of privacy concerns and perceived threats.
CECC
(2018)
Roman Pilipchuk
,
Stephan Seifermann
,
Robert Heinrich
Aligning Business Process Access Control Policies with Enterprise Architecture.
CECC
(2018)
Proceedings of the Central European Cybersecurity Conference 2018, CECC 2018, Ljubljana, Slovenia, November 15-16, 2018
CECC
(2018)
Daniel Spiekermann
,
Jörg Keller
,
Tobias Eggendorfer
Improving Lawful Interception in Virtual Datacenters.
CECC
(2018)
Ziya Alper Genç
,
Gabriele Lenzini
,
Peter Y. A. Ryan
Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware.
CECC
(2018)
Gregor R. Krmelj
,
Matjaz Pancur
,
Miha Grohar
,
Mojca Ciglaric
OpenSPA - An Open and Extensible Protocol for Single Packet Authorization.
CECC
(2018)
Roman Pilipchuk
Coping with Access Control Requirements in the Context of Mutual Dependencies between Business and IT.
CECC
(2018)
Melisa Geko
,
Simon Tjoa
An Ontology Capturing the Interdependence of the General Data Protection Regulation (GDPR) and Information Security.
CECC
(2018)
Danaja Fabcic Povse
It's all fun and games, and some legalese: data protection implications for increasing cyber-skills of employees through games.
CECC
(2018)
Tomás Bajtos
,
Pavol Sokol
,
Terézia Mézesová
Virtual honeypots and detection of telnet botnets.
CECC
(2018)
Peter Kieseberg
,
Sebastian Schrittwieser
,
Edgar R. Weippl
Structural Limitations of B+-Tree forensics.
CECC
(2018)
Sabine K. Witting
Do ut des: Disseminating online child sexual abuse material for investigative purposes?
CECC
(2018)
Maksim Goman
Towards unambiguous IT risk definition.
CECC
(2018)
Oliver Popov
,
Jesper Bergman
,
Christian Valassi
A Framework for a Forensically Sound Harvesting the Dark Web.
CECC
(2018)
Mohammad Hajian Berenjestanaki
,
Mohammad Ali Akhaee
Application Detection in Anonymous Communication Networks.
CECC
(2018)
2017
Nerea Sainz de la Maza Doñabeitia
,
Miguel Hernández Boza
,
Javier Jiménez del Peso
,
José Ignacio Escribano Pablos
Why Did I End Up Living in a Cave? Risks of IoT at home.
CECC
(2017)