European Interdisciplinary Cybersecurity Conference最新文献

筛选
英文 中文
Understanding the Evolution of Transatlantic Data Privacy Regimes: Ideas, Interests, and Institutions 了解跨大西洋数据隐私制度的演变:理念、利益和制度
European Interdisciplinary Cybersecurity Conference Pub Date : 2024-06-05 DOI: 10.1145/3655693.3655720
Xinchuchu Gao, Xuechen Chen
{"title":"Understanding the Evolution of Transatlantic Data Privacy Regimes: Ideas, Interests, and Institutions","authors":"Xinchuchu Gao, Xuechen Chen","doi":"10.1145/3655693.3655720","DOIUrl":"https://doi.org/10.1145/3655693.3655720","url":null,"abstract":"","PeriodicalId":405486,"journal":{"name":"European Interdisciplinary Cybersecurity Conference","volume":"8 9","pages":"50-56"},"PeriodicalIF":0.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141265303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Insights into anomaly-based intrusion detection systems usability. A case study using real http requests 深入了解基于异常的入侵检测系统的可用性。使用真实 http 请求的案例研究
European Interdisciplinary Cybersecurity Conference Pub Date : 2024-06-05 DOI: 10.1145/3655693.3655745
J. D. Verdejo, Rafael Estepa, Antonio Estepa Alonso, Javier Muñoz-Calle
{"title":"Insights into anomaly-based intrusion detection systems usability. A case study using real http requests","authors":"J. D. Verdejo, Rafael Estepa, Antonio Estepa Alonso, Javier Muñoz-Calle","doi":"10.1145/3655693.3655745","DOIUrl":"https://doi.org/10.1145/3655693.3655745","url":null,"abstract":"","PeriodicalId":405486,"journal":{"name":"European Interdisciplinary Cybersecurity Conference","volume":"1 2","pages":"82-89"},"PeriodicalIF":0.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141265350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling Indicators of Behaviour for Cyber Threat Hunting via Sysmon 通过 Sysmon 建立网络威胁猎杀行为指标模型
European Interdisciplinary Cybersecurity Conference Pub Date : 2024-06-05 DOI: 10.1145/3655693.3655722
R. A. Chetwyn, Martin Eian, A. Jøsang
{"title":"Modelling Indicators of Behaviour for Cyber Threat Hunting via Sysmon","authors":"R. A. Chetwyn, Martin Eian, A. Jøsang","doi":"10.1145/3655693.3655722","DOIUrl":"https://doi.org/10.1145/3655693.3655722","url":null,"abstract":"","PeriodicalId":405486,"journal":{"name":"European Interdisciplinary Cybersecurity Conference","volume":"12 20","pages":"95-104"},"PeriodicalIF":0.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141265371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Threat-Led Approach to Mitigating Ransomware Attacks: Insights from a Comprehensive Analysis of the Ransomware Ecosystem 减少勒索软件攻击的威胁导向法:全面分析勒索软件生态系统的启示
European Interdisciplinary Cybersecurity Conference Pub Date : 2024-06-05 DOI: 10.1145/3655693.3661321
Alexander Lawall, Petra Beenken
{"title":"A Threat-Led Approach to Mitigating Ransomware Attacks: Insights from a Comprehensive Analysis of the Ransomware Ecosystem","authors":"Alexander Lawall, Petra Beenken","doi":"10.1145/3655693.3661321","DOIUrl":"https://doi.org/10.1145/3655693.3661321","url":null,"abstract":"","PeriodicalId":405486,"journal":{"name":"European Interdisciplinary Cybersecurity Conference","volume":"12 1","pages":"210-216"},"PeriodicalIF":0.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141265484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Customized Cyber Exercises using a Process-based Lifecycle Model 利用基于流程的生命周期模型开展定制化网络演习
European Interdisciplinary Cybersecurity Conference Pub Date : 2024-06-05 DOI: 10.1145/3655693.3655713
Tobias Pfaller, Florian Skopik, Paul Smith, Maria Leitner
{"title":"Towards Customized Cyber Exercises using a Process-based Lifecycle Model","authors":"Tobias Pfaller, Florian Skopik, Paul Smith, Maria Leitner","doi":"10.1145/3655693.3655713","DOIUrl":"https://doi.org/10.1145/3655693.3655713","url":null,"abstract":"Cyber exercises enable the effective training of cyber security skills in a simulated, yet realistic, environment for a wide variety of professional roles. However, planning, conducting, and evaluating customized (i.e., non-standard) cyber exercise scenarios involves numerous time-and resource-intensive activities, which are still mostly carried out manually today. Unfortunately, the high costs related to these activities limit the practical applicability of cyber exercises to serve widely as a regular tool for skill development. Today, the flow of cyber exercise scenarios usually consists of predefined and meticulously planned injects (e.g. events) that are sequentially rolled out and thus drive the exercise. The composition of such injects resembles a linear process in its simplest form. Therefore, we argue that the utilization of existing, standardized, and well-researched methods from the business process domain provides opportunities to improve the quality of cyber exercises and at the same time reduce the workload necessary for planning and conducting them. This paper reviews the challenges related to conducting customized cyber exercises and introduces a process-based cyber exercise lifecycle model that leverages the power of process modeling languages, process engines, and process mining tools to transform cyber exercises into transparent, dynamic, and highly automated endeavors. We further describe the application of this lifecycle model in course of a proof-of-concept implementation and discuss lessons learned from its utilization at a large-scale national cyber exercise together with CERTs and authorities. While the state of the art mostly focuses on optimizing individual tasks or phases within the cyber exercise lifecycle, our contribution aims to offer a comprehensive integrated framework that spans across the phases, providing interfaces between them, and enhancing the overall effectiveness and maintainability of","PeriodicalId":405486,"journal":{"name":"European Interdisciplinary Cybersecurity Conference","volume":"13 7","pages":"37-45"},"PeriodicalIF":0.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141265535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
XAI-driven Adversarial Attacks on Network Intrusion Detectors XAI 驱动的对网络入侵探测器的对抗性攻击
European Interdisciplinary Cybersecurity Conference Pub Date : 2024-06-05 DOI: 10.1145/3655693.3655714
Satoshi Okada, Houda Jmila, Kunio Akashi, Takuho Mitsunaga, Yuji Sekiya, Hideki Takase, Gregory Blanc, Hiroshi Nakamura
{"title":"XAI-driven Adversarial Attacks on Network Intrusion Detectors","authors":"Satoshi Okada, Houda Jmila, Kunio Akashi, Takuho Mitsunaga, Yuji Sekiya, Hideki Takase, Gregory Blanc, Hiroshi Nakamura","doi":"10.1145/3655693.3655714","DOIUrl":"https://doi.org/10.1145/3655693.3655714","url":null,"abstract":"","PeriodicalId":405486,"journal":{"name":"European Interdisciplinary Cybersecurity Conference","volume":"3 4","pages":"65-73"},"PeriodicalIF":0.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141265331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Security for SMEs - Clear, Consistent and Complete? 中小企业网络安全--清晰、一致、完整?
European Interdisciplinary Cybersecurity Conference Pub Date : 2024-06-05 DOI: 10.1145/3655693.3661829
Steven Furnell
{"title":"Cyber Security for SMEs - Clear, Consistent and Complete?","authors":"Steven Furnell","doi":"10.1145/3655693.3661829","DOIUrl":"https://doi.org/10.1145/3655693.3661829","url":null,"abstract":"","PeriodicalId":405486,"journal":{"name":"European Interdisciplinary Cybersecurity Conference","volume":"11 41","pages":"224"},"PeriodicalIF":0.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141265495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PMMP-PQC Migration Management Process✱ PMMP-PQC 迁移管理流程✱
European Interdisciplinary Cybersecurity Conference Pub Date : 2024-06-05 DOI: 10.1145/3655693.3655719
Nils von Nethen, Alexander Wiesmaier, Nouri Alnahawi, Johanna Henrich
{"title":"PMMP-PQC Migration Management Process✱","authors":"Nils von Nethen, Alexander Wiesmaier, Nouri Alnahawi, Johanna Henrich","doi":"10.1145/3655693.3655719","DOIUrl":"https://doi.org/10.1145/3655693.3655719","url":null,"abstract":"","PeriodicalId":405486,"journal":{"name":"European Interdisciplinary Cybersecurity Conference","volume":"11 6","pages":"144-154"},"PeriodicalIF":0.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141265574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attack Surface Measurement: A Weird Machines Perspective 攻击面测量:怪异机器的视角
European Interdisciplinary Cybersecurity Conference Pub Date : 2024-06-05 DOI: 10.1145/3655693.3655705
Matthew Levy, Froylan Maldonado
{"title":"Attack Surface Measurement: A Weird Machines Perspective","authors":"Matthew Levy, Froylan Maldonado","doi":"10.1145/3655693.3655705","DOIUrl":"https://doi.org/10.1145/3655693.3655705","url":null,"abstract":"","PeriodicalId":405486,"journal":{"name":"European Interdisciplinary Cybersecurity Conference","volume":"1 9","pages":"90-94"},"PeriodicalIF":0.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141265716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Improving Accountability in Sensitive-Disclosure Scenarios 努力提高敏感信息披露情景下的问责性
European Interdisciplinary Cybersecurity Conference Pub Date : 2024-06-05 DOI: 10.1145/3655693.3655715
Roman Matzutt, Eric Wagner
{"title":"Towards Improving Accountability in Sensitive-Disclosure Scenarios","authors":"Roman Matzutt, Eric Wagner","doi":"10.1145/3655693.3655715","DOIUrl":"https://doi.org/10.1145/3655693.3655715","url":null,"abstract":"","PeriodicalId":405486,"journal":{"name":"European Interdisciplinary Cybersecurity Conference","volume":"3 8","pages":"115-119"},"PeriodicalIF":0.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141265736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信