Here you can find the list of publications authored or co-authored by CyberSANE partners.
Currently, we have {tcount} scientific publications: {jcount} journals and {ccount} conferences.
Books
One of our partners also wrote and published a book about Cybersecurity based upon the work and knowledge acquired during the projects lifetime.
Crash Course on CyberSecurity – A manual for surviving in a networked world
University of Nova Gorica Press
The aim of this handbook is to provide a clear overview of the various aspects of cybersecurity that are relevant for business entities and to provide technologically neutral advice for the implementation of protection against cyber-attacks within companies.
This handbook is intended for managers who are primarily responsible for the implementation of information security solutions in their business environment and for users of information technology. The provision of information security requires both technology and appropriate organisational rules (security policies). An important part of the provision of information security in an organisation is also the education of users (employees). Employees who are not aware of the security risks for the organisation represent a major hazard and poor information security can ultimately jeopardise the very existence of the organisation.
Consolidated Proceedings of the first ECSCI Workshop on Critical Infrastructure Protection
Steinbeis-Edition
This workshop presented the different approaches on integrated (i.e., cyber and physical) security in seven different industrial sectors, such as finance, healthcare, energy, air transport, communications, industrial plants, gas, and water. The peculiarities of critical infrastructure protection in each one of these sectors have been discussed and addressed by the different projects of the ECSCI cluster that presented their outcomes, discussing the technical, ethical and societal aspects and the underlying technologies.
Specifically, novel techniques have been presented for integrated security modelling, IoT security, artificial intelligence for securing critical infrastructures, resilience of critical infrastructures, distributed ledger technologies for security information sharing and increased automation for detection, prevention and mitigation measures.
The workshop included two opening remarks, two keynote speeches, 11 project presentations, 2 roundtable and panel discussions and 10 thematic presentations. The audience included scientists and experts in the field of critical infrastructure protection, CISOs, CIOs, CERTs, CSIRTs, CSOs, cyber and physical security experts representing different sector and policy makers for Critical Infrastructure protection.
Journals
Visualizing the outcome of dynamic analysis of Android malware with VizMal
Journal of Information Security and Applications – Elsevier
Handling of advanced persistent threats and complex incidents in healthcare, transportation and energy ICT infrastructures
Evolving Systems – Springer International Publishing
Android Collusion: Detecting Malicious Applications Inter-Communication through SharedPreferences
Information – MDPI
The Seven Deadly Sins of the HTML5 WebAPI: A Large-scale Study on the Risks of Mobile Sensor-based Attacks
ACM Transactions on Privacy and Security – Association for Computing Machinery (ACM)
A Deep-Learning-Based Framework for Supporting Analysis and Detection of Attacks on CAN Buses
Procedia Computer Science – Elsevier
Call Graph and Model Checking for Fine-Grained Android Malicious Behaviour Detection
Applied Sciences – MDPI
Detecting Colluding Inter-App Communication in Mobile Environment
Applied Sciences – MDPI
Model checking and machine learning techniques for HummingBad mobile malware detection and mitigation
Simulation Modelling Practice and Theory – Elsevier
Towards an Interpretable Deep Learning Model for Mobile Malware Detection and Family Identification
Computers & Security – Elsevier
Driver Identification Through Formal Methods
IEEE Transactions on Intelligent Transportation Systems – IEEE
Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware
Sensors – MDPI
A Survey on Encrypted Network Traffic Analysis Applications, Techniques and Countermeasures
ACM Computing Surveys – Association for Computing Machinery (ACM)
Attack Categorisation for IoT Applications in Critical Infrastructures, a Survey
Applied Sciences – MDPI
Identification of Twitter Bots based on an Explainable ML Framework: the US 2020 Elections Case Study
arXiv preprint
An Attack Simulation and Evidence Chains Generation Model for Critical Information Infrastructures
Electronics – MDPI
An integrated cyber security risk management framework and risk predication for the critical infrastructure protection
Neural Computing and Applications – Springer
Analysis and Evaluation of Capture the Flag Challenges in Secure Mobile Application Development
International Journal on Integrating Technology in Education – IJITE Vol.11, No.2
Managing cybersecurity risks of cyber-physical systems: The MARISMA-CPS pattern
Computers in Industry – Elsevier Vol.142
Conferences
Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE)
Engineering Applications of Neural Networks – Springer International Publishing
Android Run-time Permission Exploitation User Awareness by Means of Formal Methods
Proceedings of the 6th International Conference on Information Systems Security and Privacy – ForSE – SciTePress
Accidental Sensitive Data Leaks Prevention via Formal Verification
Proceedings of the 6th International Conference on Information Systems Security and Privacy – ForSE – SciTePress
Bank Credit Risk Management based on Data Mining Techniques
Proceedings of the 6th International Conference on Information Systems Security and Privacy – ForSE – SciTePress
Code Reordering Obfuscation Technique Detection by Means of Weak Bisimulation
Advanced Information Networking and Applications – Springer International Publishing
Colluding Android Apps Detection via Model Checking
Web, Artificial Intelligence and Network Applications – Springer International Publishing
Towards the Use of Generative Adversarial Neural Networks to Attack Online Resources
Web, Artificial Intelligence and Network Applications – Springer International Publishing
Predicting Probability of Default Under IFRS 9 Through Data Mining Techniques
Web, Artificial Intelligence and Network Applications – Springer International Publishing
Image-based Malware Family Detection: An Assessment between Feature Extraction and Classification Techniques
Proceedings of the 5th International Conference on Internet of Things, Big Data and Security – AI4EIoTs – SciTePress
Machine Learning for Driver Detection through CAN bus
2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring) – IEEE
Malicious Collusion Detection in Mobile Environment by means of Model Checking
2020 International Joint Conference on Neural Networks (IJCNN) – IEEE
Enhanced Privacy and Data Protection using Natural Language Processing and Artificial Intelligence
2020 International Joint Conference on Neural Networks (IJCNN) – IEEE
VisualDroid: automatic triage and detection of Android repackaged applications
Proceedings of the 15th International Conference on Availability, Reliability and Security – Association for Computing Machinery (ACM)
Head(er)Hunter: Fast Intrusion Detection using Packet Metadata Signatures
2020 IEEE 25th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) – IEEE
Evaluating Deep Learning Classification Reliability in Android Malware Family Detection
2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) – IEEE
On Strengthening SMEs and MEs Threat Intelligence and Awareness by Identifying Data Breaches, Stolen Credentials and Illegal Activities on the Dark Web
16th International Conference on Availability, Reliability and Security – ARES 2021
This Sneaky Piggy Went to the Android Ad Market: Misusing Mobile Sensors for Stealthy Data Exfiltration
ACM Conference on Computer and Communications Security (CCS) – ACM
AODV-Miner : Routage par Consensus Basé sur la Réputation
7ème Rencontres Francophones sur la Conception de Protocoles, l’Évaluation de Performance et l’Expérimentation des Réseaux de Communication – CORES 2022
Network Intrusion Detection in Encrypted Traffic
4th International Workshop on Secure Smart Societies in Next Generation Networks (SECSOC)
Requirements for an Information Privacy Pedagogy based on the Constructivism Learning Theory
17th International Conference on Availability, Reliability and Security – ARES 2022
AODV-Miner: Consensus-Based Routing Using Node Reputation
18th International Conference on Wireless and Mobile Computing, Networking and Communications – WiMob 2022