Sign in
EICC
2020
2021
2022
2023
2020
2023
Keyphrases
Publications
2023
Chia-Mei Chen
,
Fang-Hsuan Hsu
,
Jenq-Neng Hwang
Useful Cyber Threat Intelligence Relation Retrieval Using Transfer Learning.
EICC
(2023)
Frédéric Tronnier
,
Patrick Biker
,
Erik Baur
,
Sascha Löbner
An Evaluation of Information Flows in Digital Euro Transactions Using Contextual Integrity Theory.
EICC
(2023)
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, EICC 2023, Stavanger, Norway, June 14-15, 2023
EICC
(2023)
Ümit Cali
,
F. Özgur Catak
,
Zsolt György Balogh
,
Rita Ugarelli
,
Martin Gilje Jaatun
Cyber-physical Hardening of the Digital Water Infrastructure.
EICC
(2023)
Farzana Quayyum
Collaboration between parents and children to raise cybersecurity awareness.
EICC
(2023)
Elvira Castillo-Fernández
,
Jesús Esteban Díaz Verdejo
,
Rafael Estepa Alonso
,
Antonio Estepa Alonso
,
Javier Muñoz-Calle
,
Germán Mabinabeitia
Multistep Cyberattacks Detection using a Flexible Multilevel System for Alerts and Events Correlation.
EICC
(2023)
Allison Wylde
In Alice and Bob, I trust?
EICC
(2023)
Yashovardhan Sharma
,
Simon Birnbach
,
Ivan Martinovic
RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection.
EICC
(2023)
Sascha Löbner
,
Christian Gartner
,
Frédéric Tronnier
Privacy Preserving Data Analysis with the Encode, Shuffle, Analyse Architecture in Vehicular Data Sharing.
EICC
(2023)
Mordechai Guri
CLOUDOSCOPE: Detecting Anti-Forensic Malware using Public Cloud Environments.
EICC
(2023)
Fariborz Lohrabi Pour
,
Dong Sam Ha
Effect of Power Conversion Efficiency of the RF Energy Harvester on the Security and Data Rate of the Self-Sustainable IoT Devices.
EICC
(2023)
Peter Hamm
,
Sebastian Pape
,
David Harborth
Acceptance Factors and Obstacles for Cryptocurrency Adoption.
EICC
(2023)
Vahiny Gnanasekaran
,
Katrien De Moor
Usability, Security, and Privacy Recommendations for Mobile Parental Control.
EICC
(2023)
Johanna Henrich
,
Andreas Heinemann
,
Martin Stiemerling
,
Fabian Seidl
Crypto-agile Design and Testbed for QKD-Networks.
EICC
(2023)
Jörg Keller
,
Carina Heßeling
Improving Covert Channel Bandwidth by Variable-Length Exponent Re-Coding in Floating-Point Representations.
EICC
(2023)
Ciaran Reilly
,
Stephen O. Shaughnessy
,
Christina Thorpe
Robustness of Image-Based Malware Classification Models trained with Generative Adversarial Networks.
EICC
(2023)
Umit Cali
,
Marthe Fogstad Dynge
,
Ahmed Idries
,
Sambeet Mishra
,
Ivanko Dmytro
,
Naser Hashemipour
,
Murat Kuzlu
Digital Energy Platforms Considering Digital Privacy and Security by Design Principles.
EICC
(2023)
Patrick Himler
,
Max Landauer
,
Florian Skopik
,
Markus Wurzenberger
Towards Detecting Anomalies in Log-Event Sequences with Deep Learning: Open Research Challenges.
EICC
(2023)
Venkata Satya Sai Ajay Daliparthi
,
Nurul Momen
,
Kurt Tutschku
,
Miguel De Prado
ViSDM: A Liquid Democracy based Visual Data Marketplace for Sovereign Crowdsourcing Data Collection.
EICC
(2023)
Sidra Aslam
,
Ala Altaweel
,
Ibrahim Kamel
Exposed-mode of Wormhole Attack in Opportunistic Mobile Networks: Impact Study and Analysis.
EICC
(2023)
Robin Duraz
,
David Espes
,
Julien Francq
,
Sandrine Vaton
Cyber Informedness: A New Metric using CVSS to Increase Trust in Intrusion Detection Systems.
EICC
(2023)
Chibuzo Ukegbu
,
Ramesh Neupane
,
Hoda Mehrpouyan
Ontology-based Framework for Boundary Verification of Safety and Security Properties in Industrial Control Systems.
EICC
(2023)
Alvhild Skjelvik
,
Arnstein Vestad
Digital safety alarms - Exploring the understandings of the cybersecurity practice in Norwegian municipalities.
EICC
(2023)
Martin Atzmueller
,
Sophia Sylvester
,
Rushed Kanawati
Exploratory and Explanation-Aware Network Intrusion Profiling using Subgroup Discovery and Complex Network Analysis.
EICC
(2023)
Anze Mihelic
,
Igor Bernik
,
Simon Vrhovec
Older adults and tablet computers: Adoption and the role of perceived threat of cyber attacks.
EICC
(2023)
Matteo Curcio
Cybercrime and Video Games: Exploring children's safety in the gaming environment.
EICC
(2023)
Lasse Nitz
,
Avikarsha Mandal
DGA Detection Using Similarity-Preserving Bloom Encodings.
EICC
(2023)
Petra Grd
,
Ena Barcic
,
Igor Tomicic
,
Bogdan Okresa Duric
Analysing the Impact of Gender Classification on Age Estimation.
EICC
(2023)
Agustín Walabonso Lara Romero
,
Juan Antonio Ternero Muñiz
,
Rafael Estepa Alonso
,
Antonio Estepa Alonso
,
Fernando Ruiz Robles
,
Jesús Esteban Díaz Verdejo
HTTP Cyberattacks Detection through Automatic Signature Generation in multi-site IoT Deployments.
EICC
(2023)
Omer Said Ozturk
,
Emre Ekmekcioglu
,
Orçun Çetin
,
Budi Arief
,
Julio Hernandez-Castro
New Tricks to Old Codes: Can AI Chatbots Replace Static Code Analysis Tools?
EICC
(2023)
Yichao Wang
,
Budi Arief
,
Virginia Nunes Leal Franqueira
,
Anna Grace Coates
,
Caoilte Ó Ciardha
Investigating the Availability of Child Sexual Abuse Materials in Dark Web Markets: Evidence Gathered and Lessons Learned.
EICC
(2023)
Kris Heid
,
Vincent Andrae
,
Jens Heider
Towards detecting device fingerprinting on iOS with API function hooking.
EICC
(2023)
Georgios Agrafiotis
,
Eftychia Makri
,
Antonios Lalas
,
Konstantinos Votis
,
Dimitrios Tzovaras
,
Nikolaos Tsampieris
A Deep Learning-based Malware Traffic Classifier for 5G Networks Employing Protocol-Agnostic and PCAP-to-Embeddings Techniques.
EICC
(2023)
Umit Cali
,
Murat Kuzlu
,
Onur Elma
,
Osman Gazi Gucluturk
,
Ahmet Kilic
,
Ferhat Özgür Çatak
Cybersecurity and Digital Privacy Aspects of V2X in the EV Charging Structure.
EICC
(2023)
Venkata Sai Charan Putrevu
,
Hrushikesh Chunduri
,
Mohan Anand Putrevu
,
Sandeep K. Shukla
A Framework for Advanced Persistent Threat Attribution using Zachman Ontology.
EICC
(2023)
2022
Venkata Sai Charan Putrevu
,
Gowtham Ratnakaram
,
Sandeep K. Shukla
DARK-KERNEL: Design and Implementation of a Kernel Level Active Darknet Sensor.
EICC
(2022)
Eileen Köhler
,
Daniel Spiekermann
Smart Home as a Silent Witness - A Survey.
EICC
(2022)
Jan Wohlwender
,
Rolf Huesmann
,
Andreas Heinemann
,
Alexander Wiesmaier
cryptolib: Comparing and selecting cryptography libraries.
EICC
(2022)
Steffen Wendzel
,
Luca Caviglione
,
Bernhard Fechner
Steganography Hiding Patterns: A Brief Review.
EICC
(2022)
Andraz Hovnik
,
Luka Jelovcan
,
Anze Mihelic
,
Simon Vrhovec
Exploring the Associations between Website Trustworthiness, Cookie Consent and Taking an Online Survey.
EICC
(2022)
Ena Barcic
,
Petra Grd
,
Igor Tomicic
,
Bogdan Okresa Duric
Age Estimation of Occluded Faces using EfficientNet-B3 CNN Model.
EICC
(2022)
Marek Janiszewski
,
Marcin Rytel
,
Piotr Lewandowski
,
Hubert Romanowski
Creating vulnerabilities and exploits database of IoT devices.
EICC
(2022)
Febrianti Wibawa
,
Ferhat Özgür Çatak
,
Murat Kuzlu
,
Salih Sarp
,
Umit Cali
Homomorphic Encryption and Federated Learning based Privacy-Preserving CNN Training: COVID-19 Detection Use-Case.
EICC
(2022)
Carina Heßeling
,
Jörg Keller
Pareto-Optimal Covert Channels in Sensor Data Transmission.
EICC
(2022)
Gerhard Steinke
,
Ryan C. LaBrie
,
Satadipa Sarkar
Recommendation for Continuous Ethical Analysis of AI Algorithms.
EICC
(2022)
Aleksandar Velinov
,
Aleksandra Mileva
POSTER: Launching a ZIP Bomb on the DICOM-enabled Devices.
EICC
(2022)
Marek Pawlicki
,
Rafal Kozik
,
Michal Choras
Comparison of neural network paradigms for their usefulness in a real-world network intrusion detection deployment and a proposed optimised approach.
EICC
(2022)
Jelizaveta Vakarjuk
,
Nikita Snetkov
,
Jan Willemson
Russian Federal Remote E-voting Scheme of 2021 - Protocol Description and Analysis.
EICC
(2022)
Pawel Szumelda
,
Natan Orzechowski
,
Mariusz Rawski
,
Artur Janicki
VHS-22 - A Very Heterogeneous Set of Network Traffic Data for Threat Detection.
EICC
(2022)
Christian Oliva
,
Santiago Palmero Muñoz
,
Luis Fernando Lago-Fernández
,
David Arroyo
Improving LSTMs' under-performance in Authorship Attribution for short texts.
EICC
(2022)