


default search action
20th ARES 2025: Ghent, Belgium - Workshops Part II
- Bart Coppens

, Bruno Volckaert
, Vincent Naessens
, Bjorn De Sutter
:
Availability, Reliability and Security - ARES 2025 International Workshops, Ghent, Belgium, August 11-14, 2025, Proceedings, Part II. Lecture Notes in Computer Science 15995, Springer 2025, ISBN 978-3-032-00632-5
Proceedings of the Sixth Workshop on Recent Advances in Cyber Situational Awareness and Data-Centric Approaches (CSA 2025)
- Elisabeth Woisetschläger, Medina Andresel, Florian Skopik, Benjamin Akhras, Peter Leitmann, Max Landauer, Markus Wurzenberger, Alexander Schindler:

SC4OSINT: A Story Clustering Approach to Optimize OSINT Analysis. 5-24 - Max Landauer

, Florian Skopik
, Markus Wurzenberger
, Teodor Sommestad, Henrik Karlzén:
Benign User Activities that Trigger False Positives in Intrusion Detection Systems: An Expert Survey. 25-43 - Dzenan Hamzic, Florian Skopik

, Max Landauer
, Markus Wurzenberger
, Andreas Rauber
:
Enhancing Cyber Situational Awareness with AI: A Novel Pipeline Approach for Threat Intelligence Analysis and Enrichment. 44-62 - Carlota M. Muñoz de Luna Eusebio

, Xavier Larriva-Novo
, Carmen Sánchez-Zas
, Víctor A. Villagrá
, Matéo Burgos
:
Ontology-Based Model for Federated Systems Using JC3IEDM Taxonomies. 63-79 - Andraz Krasovec

, Gary Steri
, Georgios Karopoulos
, Mirko Trapani:
Large Language Models for Cyber Threat Intelligence: Extracting MITRE With LLMs. 80-89 - Georgi Nikolov

, Margaret Varga
, April Rose Panganiban, Kaur Kullman
, Valérie Lavigne:
Enhancing Cyber Situation Awareness: Visualizing Advanced Persistent Threats as Complex Systems. 90-107 - Joan Bas, Marta I. García-Cid, Francisco Sánchez, Konrad S. Wrona

, Joanna Sliwa, Federico Grasselli, Kadir Durak, Michal Krelina, Armando N. Pinto, Nuno A. Silva, Marco Piani:
Quantum Security Mechanisms for Defense Applications. 108-121 - David Lopes Antunes, Pavlos Cheimonidis

, Eleftherios Batzolis
, Kyriakos Ovaliadis
, Salvador Llopis Sánchez
, Konstantinos Rantos
:
Risk-Aware Adaptive Cyber Deception Guided by Large Language Models. 122-138 - Philipp Kuehn

, Markus Bayer
, Tobias Frey, Moritz Kerk, Christian Reuter
:
Reducing Information Overload: Because Even Security Experts Need to Blink. 139-155
Proceedings of the First International Workshop on Responsible Data Governance, Privacy, and Digital Transformation (RDGPT 2025)
- Monireh Hosseini, Shiva Parsarad, Fatemeh Amirjani:

Behavior-Based Detection of Instagram Addiction Using Machine Learning: Accuracy and Privacy Implications. 161-173 - Sascha Löbner

, Jetzabel M. Serna
, Frédéric Tronnier
, Welderufael Tesfay
, Kai Rannenberg:
Mitigating Bias in Recruitment: A Practical Approach to CV De-identification Considering Privacy Sensitive Information. 174-192 - Eduardo Brito

, Mahmoud Shoush
, Kristian Tamm
, Paula Etti
, Liina Kamm
:
SynthGuard: Redefining Synthetic Data Generation with a Scalable and Privacy-Preserving Workflow Framework. 193-211 - Rim Ben Salem

, Frédéric Cuppens
, Nora Boulahia-Cuppens
, Hager Khechine
:
Designing a Framework to Tackle the Multifaceted Intricacies of Insider Threats. 212-229
Proceedings of the Twenty-Second International Workshop on Trust, Privacy and Security in the Digital Society (TrustBus 2025)
- Maxime Sateur, Javier Martínez Llamas

, Davy Preuveneers
, Wouter Joosen:
Evaluating Turnstile as a Privacy-Conscious Alternative to reCAPTCHA. 235-252 - Anton Firc, Jan Klusácek, Kamil Malinka:

Hiding in Plain Sight: Query Obfuscation via Random Multilingual Searches. 253-268 - Jukka Ruohonen

, Mubashrah Saddiqa
:
A Time Series Analysis of Malware Uploads to Programming Language Ecosystems. 269-285 - Vahiny Gnanasekaran

, Raphael Neudert, Poul Einar Heegaard
, Günther Pernul
:
A Role Taxonomy in Security-Safety Incident Response. 286-304 - Mmaphefo Octavia Kumalo

, Reinhardt A. Botha
:
Promoting Privacy Compliant Data Management for South African Digital Marketplaces: A Privacy-Aware Data Classification and Taxonomy Reference Model. 305-323 - Taisho Sasada, Christophe Kiennert, Gregory Blanc, Yuzo Taenaka, Youki Kadobayashi:

Dynamic Transmission Scheduling Method for High-Concurrent Zero Trust Access Control. 324-341 - Federica Paci

, Matteo Cristani
, Armando de Berti
:
An Empirical Measurement of Cookie Banners Potential Legal Violations in EU vs US Websites. 342-359 - Milan Sorf

, Petr Svenda
, Lukasz Chmielewski
:
Large-Scale Security Analysis of Hardware Wallets. 360-377

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














