


default search action
EICC 2020: Rennes, France
- Luca Caviglione, Aleksandra Mileva, Steffen Wendzel:

EICC 2020: European Interdisciplinary Cybersecurity Conference, Rennes, France, November 18, 2020. ACM 2020, ISBN 978-1-4503-7599-3 - Kris Heid, Jens Heider, Kasra Qasempour:

Raising Security Awareness on Mobile Systems through Gamification. 1:1-1:6 - Maria Leitner

, Maximilian Frank, Wolfgang Hotwagner
, Gregor Langner
, Oliver Maurhart, Timea Pahi
, Lenhard Reuter
, Florian Skopik
, Paul Smith
, Manuel Warum:
AIT Cyber Range: Flexible Cyber Security Environment for Exercises, Training and Research. 2:1-2:6 - Sayar Karmakar

, Sanchari Das:
Evaluating the Impact of COVID-19 on Cyberbullying through Bayesian Trend Analysis. 3:1-3:6 - Saffija Kasem-Madani, Timo Malderle, Felix Boes, Michael Meier

:
Privacy-Preserving Warning Management for an Identity Leakage Warning Network. 4:1-4:6 - Johannes Bouché, Lukas Atkinson, Martin Kappes:

Shadow-Heap: Preventing Heap-based Memory Corruptions by Metadata Validation. 5:1-5:6 - Corinna Heinz, Wojciech Mazurczyk

, Luca Caviglione:
Covert Channels in Transport Layer Security. 6:1-6:6 - Daniel Spiekermann:

FAP: Design of an Architecture of a Forensic Access Point to Perform Online Access in a Forensically Sound Manner. 7:1-7:6 - Jongho Shin:

Cross-domain meta-learning for bug finding in the source codes with a small dataset. 8:1-8:6 - Hilde G. Corneliussen

:
What Brings Women to Cybersecurity?: A Qualitative Study of Women's Pathways to Cybersecurity in Norway. 9:1-9:2 - Luka Jelovcan, Damjan Fujs, Simon Vrhovec

, Anze Mihelic:
The role of information sensitivity in adoption of E2EE communication software. 10:1-10:2 - Mario Kahlhofer

, Michael Hölzl, Andreas Berger:
Towards Reconstructing Multi-Step Cyber Attacks in Modern Cloud Environments with Tripwires. 11:1-11:2 - Damjan Fujs, Simon Vrhovec

, Damjan Vavpotic
:
A Novel Approach for Acquiring Training and Software Security Requirements. 12:1-12:2 - Jörg Keller, Steffen Wendzel

:
Covert Channels in One-Time Passwords Based on Hash Chains. 13:1-13:2 - Laura Hartmann, Steffen Wendzel

:
Anomaly Detection in ICS based on Data-history Analysis. 14:1-14:2 - David Megías

:
Data hiding: New opportunities for security and privacy? 15:1-15:6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














