


default search action
CECC 2019: Munich, Germany
- Proceedings of the Third Central European Cybersecurity Conference, CECC 2019, Munich, Germany, November 14-15, 2019. ACM 2019, ISBN 978-1-4503-7296-1

Research papers
- Nico Vinzenz, Tobias Eggendorfer

:
Forensic Investigations in Vehicle Data Stores. 1:1-1:6 - Pal-Stefan Murvay

, Lucian Popa, Bogdan Groza
:
Accommodating Time-Triggered Authentication to FlexRay Demands. 2:1-2:6 - Simon D. Duque Antón

, Anna Pia Lohfink, Hans Dieter Schotten:
Discussing the Feasibility of Acoustic Sensors for Side Channel-aided Industrial Intrusion Detection: An Essay. 3:1-3:4 - Stefan Schorradt, Edita Bajramovic, Felix C. Freiling:

On the Feasibility of Secure Logging for Industrial Control Systems Using Blockchain. 4:1-4:6 - Simon D. Duque Antón

, Anna Pia Lohfink, Christoph Garth
, Hans Dieter Schotten:
Security in Process: Detecting Attacks in Industrial Process Data. 5:1-5:6 - Lamya Abdullah, Sebastian Hahn, Felix C. Freiling:

Achieving Consistency of Software Updates against Strong Attackers. 6:1-6:6 - Antonios Dimitriadis, George Drosatos

, Pavlos S. Efraimidis:
How much does a zero-permission Android app know about us? 7:1-7:5 - Sebastiaan Alvarez Rodriguez, Erik van der Kouwe:

Meizodon: Security Benchmarking Framework for Static Android Malware Detectors. 8:1-8:7 - Ziya Alper Genç, Gabriele Lenzini

, Daniele Sgandurra:
Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique. 9:1-9:4 - Wojciech Mazurczyk

, Krystian Powójski, Luca Caviglione:
IPv6 Covert Channels in the Wild. 10:1-10:6 - Charles Varlei Neu, Ina Schiering

, Avelino F. Zorzo
:
Simulating and Detecting Attacks of Untrusted Clients in OPC UA Networks. 11:1-11:6 - Alexander Heckel, Daniel Spiekermann

:
Network Forensic Investigation in OpenContrail Environments. 12:1-12:6 - Abdulaziz Altamimi

, Nathan L. Clarke
, Steven Furnell, Fudong Li
:
Multi-Platform Authorship Verification. 13:1-13:7 - Andrej Cvetkovski, Flavio Esposito:

The Password Literacy in North Macedonia: A Case Study. 14:1-14:6 - Aleksander Murko, Simon L. R. Vrhovec

:
Bitcoin adoption: Scams and anonymity may not matter but trust into Bitcoin security does. 15:1-15:6 - Louis Tajan, Dirk Westhoff:

Retrospective Tracking of Suspects in GDPR Conform Mobile Access Networks Datasets. 16:1-16:6 - Katarína Amrichová, Terézia Mézesová:

A Secure String Class Compliant with PCI DSS. 17:1-17:5 - Martin Dietzfelbinger, Jörg Keller:

Determining Minimum Hash Width for Hash Chains. 18:1-18:5 - Andreas Schaffhauser:

SAT Solvers and their Limits with NFSR-based Stream Ciphers: an Example with Grain v1. 19:1-19:5
Posters
- Andrew Sergeev, Eyal Ben-Sa'adon, Elad Tannenbaum, Asi Saar:

Combined side-channels malware detection for NFV infrastructure. 20:1-20:2 - Anze Mihelic, Tomaz Hovelja, Simon L. R. Vrhovec

:
Towards a delegation-type secure software development method. 21:1-21:2 - Stefan Marksteiner

, Zhendong Ma:
Approaching the Automation of Cyber Security Testing of Connected Vehicles. 22:1-22:3 - Maksim Goman:

A practical view on IT risk management process. 23:1-23:2 - Kaja Prislan, Igor Bernik, Gorazd Mesko

, Rok Hacin, Blaz Markelj, Simon L. R. Vrhovec
:
Cybercrime victimization and seeking help: A survey of students in Slovenia. 24:1-24:2 - Stefan Marksteiner

, Rudolf Ramler, Hannes Sochor:
Integrating Threat Modeling and Automated Test Case Generation into Industrialized Software Security Testing. 25:1-25:3
Invited talks
- Tal Pavel

:
From Fake News to Virtual Reality: Fake News and Digital Manipulations at the Age of Modern Technology. 26:1 - Pierre Graux

, Jean-François Lalande, Valérie Viet Triem Tong:
Obfuscated Android Application Development. 27:1-27:6 - Uwe Ewald:

Digital Forensics vs. Due Process: Conflicting Standards or Complementary Approaches? 28:1-28:2

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














