default search action
CECC 2019: Munich, Germany
- Proceedings of the Third Central European Cybersecurity Conference, CECC 2019, Munich, Germany, November 14-15, 2019. ACM 2019, ISBN 978-1-4503-7296-1
Research papers
- Nico Vinzenz, Tobias Eggendorfer:
Forensic Investigations in Vehicle Data Stores. 1:1-1:6 - Pal-Stefan Murvay, Lucian Popa, Bogdan Groza:
Accommodating Time-Triggered Authentication to FlexRay Demands. 2:1-2:6 - Simon D. Duque Antón, Anna Pia Lohfink, Hans Dieter Schotten:
Discussing the Feasibility of Acoustic Sensors for Side Channel-aided Industrial Intrusion Detection: An Essay. 3:1-3:4 - Stefan Schorradt, Edita Bajramovic, Felix C. Freiling:
On the Feasibility of Secure Logging for Industrial Control Systems Using Blockchain. 4:1-4:6 - Simon D. Duque Antón, Anna Pia Lohfink, Christoph Garth, Hans Dieter Schotten:
Security in Process: Detecting Attacks in Industrial Process Data. 5:1-5:6 - Lamya Abdullah, Sebastian Hahn, Felix C. Freiling:
Achieving Consistency of Software Updates against Strong Attackers. 6:1-6:6 - Antonios Dimitriadis, George Drosatos, Pavlos S. Efraimidis:
How much does a zero-permission Android app know about us? 7:1-7:5 - Sebastiaan Alvarez Rodriguez, Erik van der Kouwe:
Meizodon: Security Benchmarking Framework for Static Android Malware Detectors. 8:1-8:7 - Ziya Alper Genç, Gabriele Lenzini, Daniele Sgandurra:
Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique. 9:1-9:4 - Wojciech Mazurczyk, Krystian Powójski, Luca Caviglione:
IPv6 Covert Channels in the Wild. 10:1-10:6 - Charles Varlei Neu, Ina Schiering, Avelino F. Zorzo:
Simulating and Detecting Attacks of Untrusted Clients in OPC UA Networks. 11:1-11:6 - Alexander Heckel, Daniel Spiekermann:
Network Forensic Investigation in OpenContrail Environments. 12:1-12:6 - Abdulaziz Altamimi, Nathan L. Clarke, Steven Furnell, Fudong Li:
Multi-Platform Authorship Verification. 13:1-13:7 - Andrej Cvetkovski, Flavio Esposito:
The Password Literacy in North Macedonia: A Case Study. 14:1-14:6 - Aleksander Murko, Simon L. R. Vrhovec:
Bitcoin adoption: Scams and anonymity may not matter but trust into Bitcoin security does. 15:1-15:6 - Louis Tajan, Dirk Westhoff:
Retrospective Tracking of Suspects in GDPR Conform Mobile Access Networks Datasets. 16:1-16:6 - Katarína Amrichová, Terézia Mézesová:
A Secure String Class Compliant with PCI DSS. 17:1-17:5 - Martin Dietzfelbinger, Jörg Keller:
Determining Minimum Hash Width for Hash Chains. 18:1-18:5 - Andreas Schaffhauser:
SAT Solvers and their Limits with NFSR-based Stream Ciphers: an Example with Grain v1. 19:1-19:5
Posters
- Andrew Sergeev, Eyal Ben-Sa'adon, Elad Tannenbaum, Asi Saar:
Combined side-channels malware detection for NFV infrastructure. 20:1-20:2 - Anze Mihelic, Tomaz Hovelja, Simon L. R. Vrhovec:
Towards a delegation-type secure software development method. 21:1-21:2 - Stefan Marksteiner, Zhendong Ma:
Approaching the Automation of Cyber Security Testing of Connected Vehicles. 22:1-22:3 - Maksim Goman:
A practical view on IT risk management process. 23:1-23:2 - Kaja Prislan, Igor Bernik, Gorazd Mesko, Rok Hacin, Blaz Markelj, Simon L. R. Vrhovec:
Cybercrime victimization and seeking help: A survey of students in Slovenia. 24:1-24:2 - Stefan Marksteiner, Rudolf Ramler, Hannes Sochor:
Integrating Threat Modeling and Automated Test Case Generation into Industrialized Software Security Testing. 25:1-25:3
Invited talks
- Tal Pavel:
From Fake News to Virtual Reality: Fake News and Digital Manipulations at the Age of Modern Technology. 26:1 - Pierre Graux, Jean-François Lalande, Valérie Viet Triem Tong:
Obfuscated Android Application Development. 27:1-27:6 - Uwe Ewald:
Digital Forensics vs. Due Process: Conflicting Standards or Complementary Approaches? 28:1-28:2
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.