Publications

Here you can find the list of publications authored or co-authored by CyberSANE partners.

Currently, we have {tcount} scientific publications: {jcount} journals and {ccount} conferences.

 


 

Books

One of our partners also wrote and published a book about Cybersecurity based upon the work and knowledge acquired during the projects lifetime.

 

Title
Published

Crash Course on CyberSecurity – A manual for surviving in a networked world

University of Nova Gorica Press

Matej Kovačič

August 2022

The aim of this handbook is to provide a clear overview of the various aspects of cybersecurity that are relevant for business entities and to provide technologically neutral advice for the implementation of protection against cyber-attacks within companies.

This handbook is intended for managers who are primarily responsible for the implementation of information security solutions in their business environment and for users of information technology. The provision of information security requires both technology and appropriate organisational rules (security policies). An important part of the provision of information security in an organisation is also the education of users (employees). Employees who are not aware of the security risks for the organisation represent a major hazard and poor information security can ultimately jeopardise the very existence of the organisation.

Consolidated Proceedings of the first ECSCI Workshop on Critical Infrastructure Protection

Steinbeis-Edition

Habtamu Abie, Davide Ferrario, Ernesto Troiano, John Soldatos, Fabrizio Di Peppo, Aleksandar Jovanović, Ilias Gkotsis & Evangelos Markakis

2021
Modern critical infrastructures (“critical entities” in the terminology of the new EU-CER Directive) are becoming increasingly complex, turning into distributed, large-scale cyber-physical systems. Cyber-physical attacks are increasing in number, scope, and sophistication, making it difficult to predict their total impact. Thus, addressing cyber security and physical security separately is no longer effective, but more integrated approaches, that consider both physical security risks and cyber-security risks, along with their interrelationships, interactions and cascading effects, are needed to face the challenge of combined cyber-physical attacks. To face them successfully, aligned and integrated responses are needed, and this workshop has provided a great opportunity to do it: aligning and integrating not only the positions of single projects but also of many intended users of their results.

This workshop presented the different approaches on integrated (i.e., cyber and physical) security in seven different industrial sectors, such as finance, healthcare, energy, air transport, communications, industrial plants, gas, and water. The peculiarities of critical infrastructure protection in each one of these sectors have been discussed and addressed by the different projects of the ECSCI cluster that presented their outcomes, discussing the technical, ethical and societal aspects and the underlying technologies.

Specifically, novel techniques have been presented for integrated security modelling, IoT security, artificial intelligence for securing critical infrastructures, resilience of critical infrastructures, distributed ledger technologies for security information sharing and increased automation for detection, prevention and mitigation measures.

The workshop included two opening remarks, two keynote speeches, 11 project presentations, 2 roundtable and panel discussions and 10 thematic presentations. The audience included scientists and experts in the field of critical infrastructure protection, CISOs, CIOs, CERTs, CSIRTs, CSOs, cyber and physical security experts representing different sector and policy makers for Critical Infrastructure protection.


 

Journals

 

Title
Published

Visualizing the outcome of dynamic analysis of Android malware with VizMal

Journal of Information Security and Applications – Elsevier

Andrea De Lorenzo, Fabio Martinelli, Eric Medvet, Francesco Mercaldo & Antonella Santone

February 2020

Handling of advanced persistent threats and complex incidents in healthcare, transportation and energy ICT infrastructures

Evolving Systems – Springer International Publishing

Spyridon Papastergiou, Haralambos Mouratidis & Eleni-Maria Kalogeraki

April 2020

Android Collusion: Detecting Malicious Applications Inter-Communication through SharedPreferences

Information – MDPI

Rosangela Casolare, Fabio Martinelli, Francesco Mercaldo & Antonella Santone

June 2020

The Seven Deadly Sins of the HTML5 WebAPI: A Large-scale Study on the Risks of Mobile Sensor-based Attacks

ACM Transactions on Privacy and Security – Association for Computing Machinery (ACM)

Michalis Diamantaris, Francesco Marcantoni, Sotiris Ioannidis & Jason Polakis

July 2020

A Deep-Learning-Based Framework for Supporting Analysis and Detection of Attacks on CAN Buses

Procedia Computer Science – Elsevier

Alfredo Cuzzocrea, Francesco Mercaldo & Fabio Martinelli

October 2020

Call Graph and Model Checking for Fine-Grained Android Malicious Behaviour Detection

Applied Sciences – MDPI

Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo & Antonella Santone

November 2020

Detecting Colluding Inter-App Communication in Mobile Environment

Applied Sciences – MDPI

Rosangela Casolare, Fabio Martinelli, Francesco Mercaldo & Antonella Santone

November 2020

Model checking and machine learning techniques for HummingBad mobile malware detection and mitigation

Simulation Modelling Practice and Theory – Elsevier

Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone & Gigliola Vaglini

December 2020

Towards an Interpretable Deep Learning Model for Mobile Malware Detection and Family Identification

Computers & Security – Elsevier

Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo & Antonella Santone

January 2021

Neural Networks for Driver Behavior Analysis

Electronics – MDPI

Fabio Martinelli, Fiammetta Marulli, Francesco Mercaldo & Antonella Santone

February 2021

Driver Identification Through Formal Methods

IEEE Transactions on Intelligent Transportation Systems – IEEE

Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone & Antonella Santone

February 2021

Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware

Sensors – MDPI

Eva Papadogiannaki & Sotiris Ioannidis

February 2021

A Survey on Encrypted Network Traffic Analysis Applications, Techniques and Countermeasures

ACM Computing Surveys – Association for Computing Machinery (ACM)

Eva Papadogiannaki & Sotiris Ioannidis

July 2021

Attack Categorisation for IoT Applications in Critical Infrastructures, a Survey

Applied Sciences – MDPI

Edward Staddon, Valeria Loscri & Nathalie Mitton

August 2021

Identification of Twitter Bots based on an Explainable ML Framework: the US 2020 Elections Case Study

arXiv preprint

Alexander Shevtsov, Christos Tzagkarakis, Despoina Antonakaki & Sotiris Ioannidis

December 2021

An Attack Simulation and Evidence Chains Generation Model for Critical Information Infrastructures

Electronics – MDPI

Eleni-Maria Kalogeraki, Spyridon Papastergiou & Themis Panayiotopoulos

January 2022

An integrated cyber security risk management framework and risk predication for the critical infrastructure protection

Neural Computing and Applications – Springer

Halima Ibrahim Kure, Shareeful Islam & Haralambos Mouratidis

February 2022

Analysis and Evaluation of Capture the Flag Challenges in Secure Mobile Application Development

International Journal on Integrating Technology in Education – IJITE Vol.11, No.2

Stylianos Karagiannis, Emmanouil Magkos, George Chalavazis & Maria Nefeli Nikiforos

June 2022

Managing cybersecurity risks of cyber-physical systems: The MARISMA-CPS pattern

Computers in Industry – Elsevier Vol.142

David G.Rosado, Antonio Santos-Olmo, Luis Enrique Sánchez, Manuel A. Serrano, Carlos Blanco, Haralambos Mouratidis & Eduardo Fernández-Medina

November 2022


 

Conferences

 

Title
Published

Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE)

Engineering Applications of Neural Networks – Springer International Publishing

Spyridon Papastergiou, Haralambos Mouratidis & Eleni-Maria Kalogeraki

May 2019

Android Run-time Permission Exploitation User Awareness by Means of Formal Methods

Proceedings of the 6th International Conference on Information Systems Security and Privacy – ForSE – SciTePress

Fausto Fasano, Fabio Martinelli, Francesco Mercaldo & Antonella Santone

February 2020

Accidental Sensitive Data Leaks Prevention via Formal Verification

Proceedings of the 6th International Conference on Information Systems Security and Privacy – ForSE – SciTePress

Madalina Ciobanu, Fausto Fasano, Fabio Martinelli, Francesco Mercaldo & Antonella Santone

February 2020

Bank Credit Risk Management based on Data Mining Techniques

Proceedings of the 6th International Conference on Information Systems Security and Privacy – ForSE – SciTePress

Fabio Martinelli, Francesco Mercaldo, Domenico Raucci & Antonella Santone

February 2020

Code Reordering Obfuscation Technique Detection by Means of Weak Bisimulation

Advanced Information Networking and Applications – Springer International Publishing

Giuseppe Crincoli, Tiziano Marinaro, Fabio Martinelli, Francesco Mercaldo & Antonella Santone

March 2020

Colluding Android Apps Detection via Model Checking

Web, Artificial Intelligence and Network Applications – Springer International Publishing

Rosangela Casolare, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone & Antonella Santone

March 2020

Towards the Use of Generative Adversarial Neural Networks to Attack Online Resources

Web, Artificial Intelligence and Network Applications – Springer International Publishing

Lelio Campanile, Mauro Iacono, Fabio Martinelli, Fiammetta Marulli, Michele Mastroianni, Francesco Mercaldo & Antonella Santone

March 2020

Predicting Probability of Default Under IFRS 9 Through Data Mining Techniques

Web, Artificial Intelligence and Network Applications – Springer International Publishing

Fabio Martinelli, Francesco Mercaldo, Domenico Raucci & Antonella Santone

March 2020

Image-based Malware Family Detection: An Assessment between Feature Extraction and Classification Techniques

Proceedings of the 5th International Conference on Internet of Things, Big Data and Security – AI4EIoTs – SciTePress

Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo & Antonella Santone

May 2020

Machine Learning for Driver Detection through CAN bus

2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring) – IEEE

Fabio Martinelli, Francesco Marcantoni & Antonella Santone

May 2020

Malicious Collusion Detection in Mobile Environment by means of Model Checking

2020 International Joint Conference on Neural Networks (IJCNN) – IEEE

Rosangela Casolare, Fabio Martinelli, Francesco Mercaldo & Antonella Santone

July 2020

Enhanced Privacy and Data Protection using Natural Language Processing and Artificial Intelligence

2020 International Joint Conference on Neural Networks (IJCNN) – IEEE

Fabio Martinelli, Fiammetta Marulli, Francesco Mercaldo, Stefano Marrone & Antonella Santone

July 2020

VisualDroid: automatic triage and detection of Android repackaged applications

Proceedings of the 15th International Conference on Availability, Reliability and Security – Association for Computing Machinery (ACM)

Rosangela Casolare, Carlo De Dominicis, Fabio Martinelli, Francesco Mercaldo & Antonella Santone

August 2020

Head(er)Hunter: Fast Intrusion Detection using Packet Metadata Signatures

2020 IEEE 25th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) – IEEE

Eva Papadogiannaki, Dimitris Deyannis & Sotiris Ioannidis

September 2020

Evaluating Deep Learning Classification Reliability in Android Malware Family Detection

2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) – IEEE

Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo & Antonella Santone

October 2020

On Strengthening SMEs and MEs Threat Intelligence and Awareness by Identifying Data Breaches, Stolen Credentials and Illegal Activities on the Dark Web

16th International Conference on Availability, Reliability and Security – ARES 2021

George Pantelis, Petros Petrou, Sophia Karagiorgou & Dimitrios Alexandrou

August 2021

This Sneaky Piggy Went to the Android Ad Market: Misusing Mobile Sensors for Stealthy Data Exfiltration

ACM Conference on Computer and Communications Security (CCS) – ACM

Michalis Diamantaris, Serafeim Moustakas, Lichao Sun, Sotiris Ioannidis & Jason Polakis

November 2021

AODV-Miner : Routage par Consensus Basé sur la Réputation

7ème Rencontres Francophones sur la Conception de Protocoles, l’Évaluation de Performance et l’Expérimentation des Réseaux de Communication – CORES 2022

Edward Staddon, Valeria Loscri & Nathalie Mitton

May 2022

Network Intrusion Detection in Encrypted Traffic

4th International Workshop on Secure Smart Societies in Next Generation Networks (SECSOC)

Eva Papadogiannaki, Giorgos Tsirantonakis & Sotiris Ioannidis

June 2022

Requirements for an Information Privacy Pedagogy based on the Constructivism Learning Theory

17th International Conference on Availability, Reliability and Security – ARES 2022

Thanos Papaioannou, Aggeliki Tsohou, Maria Karyda & Stylianos Karagiannis

August 2022

AODV-Miner: Consensus-Based Routing Using Node Reputation

18th International Conference on Wireless and Mobile Computing, Networking and Communications – WiMob 2022

Edward Staddon, Valeria Loscri & Nathalie Mitton

October 2022

Comments are closed.