


default search action
CECC 2018: Ljubljana, Slovenia
- Proceedings of the Central European Cybersecurity Conference 2018, CECC 2018, Ljubljana, Slovenia, November 15-16, 2018. ACM 2018, ISBN 978-1-4503-6515-4
- Steffen Wendzel
, Daniela Eller, Wojciech Mazurczyk
:
One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels. 1:1-1:6 - Tomás Bajtos, Pavol Sokol
, Terézia Mézesová:
Virtual honeypots and detection of telnet botnets. 2:1-2:6 - Daniel Fraunholz, Daniel Schneider
, Janis Zemitis, Hans Dieter Schotten:
Hack My Company: An Empirical Assessment of Post-exploitation Behavior and Lateral Movement in Cloud Environments. 3:1-3:6 - Gregor R. Krmelj, Matjaz Pancur, Miha Grohar, Mojca Ciglaric:
OpenSPA - An Open and Extensible Protocol for Single Packet Authorization. 4:1-4:6 - Pal-Stefan Murvay
, Bogdan Groza:
A brief look at the security of DeviceNet communication in industrial control systems. 5:1-5:6 - Zoltán Szántó, Hunor Sándor, Béla Genge:
A Testbed for Performing Security Experiments with Software-Defined Industrial Control Systems. 6:1-6:6 - Ziya Alper Genç, Gabriele Lenzini
, Peter Y. A. Ryan
:
Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware. 7:1-7:6 - Daniel Spiekermann
, Jörg Keller, Tobias Eggendorfer
:
Improving Lawful Interception in Virtual Datacenters. 8:1-8:6 - Peter Kieseberg
, Sebastian Schrittwieser
, Edgar R. Weippl:
Structural Limitations of B+-Tree forensics. 9:1-9:4 - Danaja Fabcic Povse
:
It's all fun and games, and some legalese: data protection implications for increasing cyber-skills of employees through games. 10:1-10:5 - Damjan Fujs
, Simon Vrhovec
, Anze Mihelic:
What drives the motivation to self-protect on social networks?: The role of privacy concerns and perceived threats. 11:1-11:6 - Mohammad Hajian Berenjestanaki
, Mohammad Ali Akhaee:
Application Detection in Anonymous Communication Networks. 12:1-12:5 - Oliver Popov, Jesper Bergman, Christian Valassi:
A Framework for a Forensically Sound Harvesting the Dark Web. 13:1-13:7 - Sabine K. Witting:
Do ut des: Disseminating online child sexual abuse material for investigative purposes? 14:1-14:6 - Maksim Goman:
Towards unambiguous IT risk definition. 15:1-15:6 - Roman Pilipchuk:
Coping with Access Control Requirements in the Context of Mutual Dependencies between Business and IT. 16:1-16:4 - Roman Pilipchuk, Stephan Seifermann, Robert Heinrich:
Aligning Business Process Access Control Policies with Enterprise Architecture. 17:1-17:4 - Petra Grd
, Igor Tomicic, Miroslav Baca:
Privacy improvement model for biometric person recognition in ambient intelligence using perceptual hashing. 18:1-18:6 - Melisa Geko, Simon Tjoa
:
An Ontology Capturing the Interdependence of the General Data Protection Regulation (GDPR) and Information Security. 19:1-19:6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.