Login / Signup
EICC
2020
2024
2020
2024
Keyphrases
Publications
2024
Brooke Kidmose
,
Weizhi Meng
can-sleuth: Investigating and Evaluating Automotive Intrusion Detection Datasets.
EICC
(2024)
Meryem Berfin Ozkok
,
Baturay Birinci
,
Orçun Çetin
,
Budi Arief
,
Julio C. Hernandez-Castro
Honeypot's Best Friend? Investigating ChatGPT's Ability to Evaluate Honeypot Logs.
EICC
(2024)
Jeroen Klein Brinke
,
Martijn van der Linden
,
Paul J. M. Havinga
Using Federated Learning and Channel State Information-Based Sensing for Scalable and Realistic At-Home Healthcare.
EICC
(2024)
Pascal Memmesheimer
,
Stefan Machmeier
,
Vincent Heuveline
Increasing Detection Rate for Imbalanced Malicious Traffic using Generative Adversarial Networks.
EICC
(2024)
Kris Heid
,
Jens Heider
Haven't we met before? - Detecting Device Fingerprinting Activity on Android Apps.
EICC
(2024)
Tanya Koohpayeh Araghi
,
David Megías
,
Victor Garcia-Font
,
Minoru Kuribayashi
,
Wojciech Mazurczyk
Disinformation detection and source tracking using semi-fragile watermarking and blockchain.
EICC
(2024)
Ellie Prosser
,
Matthew Edwards
Helpful or Harmful? Exploring the Efficacy of Large Language Models for Online Grooming Prevention.
EICC
(2024)
Matthew Levy
,
Froylan Maldonado
Attack Surface Measurement: A Weird Machines Perspective.
EICC
(2024)
Jesús Esteban Díaz Verdejo
,
Rafael M. Estepa-Alonso
,
Antonio Estepa Alonso
,
Javier Muñoz-Calle
,
Germán Madinabeitia
Biblio-US17: A labeled real URL dataset for anomaly-based intrusion detection systems development.
EICC
(2024)
Alexander Lawall
,
Petra Beenken
A Threat-Led Approach to Mitigating Ransomware Attacks: Insights from a Comprehensive Analysis of the Ransomware Ecosystem.
EICC
(2024)
Steven Furnell
Cyber Security for SMEs - Clear, Consistent and Complete?
EICC
(2024)
Eleni Briola
,
Christos Chrysanthos Nikolaidis
,
Vasileios Perifanis
,
Nikolaos Pavlidis
,
Pavlos S. Efraimidis
A Federated Explainable AI Model for Breast Cancer Classification.
EICC
(2024)
European Interdisciplinary Cybersecurity Conference, EICC 2024, Xanthi, Greece, June 5-6, 2024
EICC
(2024)
Simon Vrhovec
,
Igor Bernik
,
Damjan Fujs
,
Damjan Vavpotic
Cybersecurity competence of older adult users of mobile devices.
EICC
(2024)
Nils von Nethen
,
Alexander Wiesmaier
,
Nouri Alnahawi
,
Johanna Henrich
PMMP-PQC Migration Management Process✱.
EICC
(2024)
Xinchuchu Gao
,
Xuechen Chen
Understanding the Evolution of Transatlantic Data Privacy Regimes: Ideas, Interests, and Institutions.
EICC
(2024)
Leon Twenning
,
Harald Baier
Towards arbitrating in a dispute - on responsible usage of client-side perceptual hashing against illegal content distribution.
EICC
(2024)
Christos Douligeris
Cybersecurity awareness and training: The CyberSecPro and NERO approaches.
EICC
(2024)
Karin Bernsmed
,
Martin Gilje Jaatun
Security-by-design challenges for medical device manufacturers.
EICC
(2024)
Tobias Pfaller
,
Florian Skopik
,
Paul Smith
,
Maria Leitner
Towards Customized Cyber Exercises using a Process-based Lifecycle Model.
EICC
(2024)
Juan Manuel Matalobos Veiga
,
Regino Criado
,
Miguel Romance Del Rio
,
Sergio Iglesias Perez
,
Alberto Partida Rodriguez
,
Karan Kabbur Hanumanthappa Manjunatha
A Hypergraph-based Model for Cyberincident-related Data Analysis.
EICC
(2024)
Dmitrii Usynin
,
Daniel Rueckert
,
Georgios Kaissis
Incentivising the federation: gradient-based metrics for data selection and valuation in private decentralised training.
EICC
(2024)
Roman Matzutt
Towards Access Control for Machine Learning Embeddings.
EICC
(2024)
Vasileios Perifanis
,
Efstathios Karypidis
,
Nikos Komodakis
,
Pavlos S. Efraimidis
SFTC: Machine Unlearning via Selective Fine-tuning and Targeted Confusion.
EICC
(2024)
Xiangyu Ma
,
Wei Shi
,
Junfeng Wen
An Enhanced Combinatorial Contextual Neural Bandit Approach for Client Selection in Federated Learning.
EICC
(2024)
Robert Andrew Chetwyn
,
Martin Eian
,
Audun Jøsang
Modelling Indicators of Behaviour for Cyber Threat Hunting via Sysmon.
EICC
(2024)
Satoshi Okada
,
Houda Jmila
,
Kunio Akashi
,
Takuho Mitsunaga
,
Yuji Sekiya
,
Hideki Takase
,
Gregory Blanc
,
Hiroshi Nakamura
XAI-driven Adversarial Attacks on Network Intrusion Detectors.
EICC
(2024)
Recep Yildirim
,
Kerem Aydin
,
Orçun Çetin
Evaluating the Impact of Conventional Code Analysis Against Large Language Models in API Vulnerability Detection.
EICC
(2024)
Rei Yamagishi
,
Shota Fujii
Survey and Analysis of User Perceptions of Security Icons.
EICC
(2024)
Jesús Esteban Díaz Verdejo
,
Rafael Estepa
,
Antonio Estepa Alonso
,
Javier Muñoz-Calle
Insights into anomaly-based intrusion detection systems usability. A case study using real http requests.
EICC
(2024)
Roman Matzutt
,
Eric Wagner
Towards Improving Accountability in Sensitive-Disclosure Scenarios.
EICC
(2024)
Tomas Bueno Momcilovic
,
Dian Balta
Emergent Needs in Assuring Security-Relevant Compliance of Information Systems.
EICC
(2024)
Yichao Wang
,
Budi Arief
,
Julio C. Hernandez-Castro
Analysis of Security Mechanisms of Dark Web Markets.
EICC
(2024)
Umit Cali
,
Sri Nikhil Gupta Gourisetti
,
David Jonathan Sebastian Cardenas
,
Ferhat Özgür Çatak
,
Annabelle Lee
,
Linda M. Zeger
,
Taha Selim Ustun
,
Marthe Fogstad Dynge
,
Sreedhar Rao
,
Javier E. Ramirez
Emerging Technologies for Privacy Preservation in Energy Systems.
EICC
(2024)
2023
Matteo Curcio
Cybercrime and Video Games: Exploring children's safety in the gaming environment.
EICC
(2023)
Fariborz Lohrabi Pour
,
Dong Sam Ha
Effect of Power Conversion Efficiency of the RF Energy Harvester on the Security and Data Rate of the Self-Sustainable IoT Devices.
EICC
(2023)
Agustín Walabonso Lara Romero
,
Juan Antonio Ternero Muñiz
,
Rafael Estepa Alonso
,
Antonio Estepa Alonso
,
Fernando Ruiz Robles
,
Jesús Esteban Díaz Verdejo
HTTP Cyberattacks Detection through Automatic Signature Generation in multi-site IoT Deployments.
EICC
(2023)
Vahiny Gnanasekaran
,
Katrien De Moor
Usability, Security, and Privacy Recommendations for Mobile Parental Control.
EICC
(2023)
Ümit Cali
,
F. Özgur Catak
,
Zsolt György Balogh
,
Rita Ugarelli
,
Martin Gilje Jaatun
Cyber-physical Hardening of the Digital Water Infrastructure.
EICC
(2023)
Johanna Henrich
,
Andreas Heinemann
,
Martin Stiemerling
,
Fabian Seidl
Crypto-agile Design and Testbed for QKD-Networks.
EICC
(2023)
Jörg Keller
,
Carina Heßeling
Improving Covert Channel Bandwidth by Variable-Length Exponent Re-Coding in Floating-Point Representations.
EICC
(2023)
Chia-Mei Chen
,
Fang-Hsuan Hsu
,
Jenq-Neng Hwang
Useful Cyber Threat Intelligence Relation Retrieval Using Transfer Learning.
EICC
(2023)
Ciaran Reilly
,
Stephen O. Shaughnessy
,
Christina Thorpe
Robustness of Image-Based Malware Classification Models trained with Generative Adversarial Networks.
EICC
(2023)
Venkata Satya Sai Ajay Daliparthi
,
Nurul Momen
,
Kurt Tutschku
,
Miguel De Prado
ViSDM: A Liquid Democracy based Visual Data Marketplace for Sovereign Crowdsourcing Data Collection.
EICC
(2023)
Allison Wylde
In Alice and Bob, I trust?
EICC
(2023)
Elvira Castillo-Fernández
,
Jesús Esteban Díaz Verdejo
,
Rafael Estepa Alonso
,
Antonio Estepa Alonso
,
Javier Muñoz-Calle
,
Germán Mabinabeitia
Multistep Cyberattacks Detection using a Flexible Multilevel System for Alerts and Events Correlation.
EICC
(2023)
Yashovardhan Sharma
,
Simon Birnbach
,
Ivan Martinovic
RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection.
EICC
(2023)
Patrick Himler
,
Max Landauer
,
Florian Skopik
,
Markus Wurzenberger
Towards Detecting Anomalies in Log-Event Sequences with Deep Learning: Open Research Challenges.
EICC
(2023)
Yichao Wang
,
Budi Arief
,
Virginia Nunes Leal Franqueira
,
Anna Grace Coates
,
Caoilte Ó Ciardha
Investigating the Availability of Child Sexual Abuse Materials in Dark Web Markets: Evidence Gathered and Lessons Learned.
EICC
(2023)
Omer Said Ozturk
,
Emre Ekmekcioglu
,
Orçun Çetin
,
Budi Arief
,
Julio Hernandez-Castro
New Tricks to Old Codes: Can AI Chatbots Replace Static Code Analysis Tools?
EICC
(2023)