Table of Contents, vol 18, no 1&2, year 2025

pages: 1 - 16
Automated Social Engineering Tools Revisited - An Extended Overview and Comparison with Respect to Capabilities and Detectability
Dominik Dana, St. Pölten UAS, Austria
Timea Pahi, St. Pölten UAS, Austria
Sebastian Schrittwieser, CD-Labor AsTra, University of Vienna, Austria
Simon Tjoa, St. Pölten UAS, Austria
Petter Kieseberg, St. Pölten UAS, Austria

pages: 17 - 24
Graceful Degradation of Control Device Operation Under Attack
Rainer Falk, Siemens AG, Germany
Christian Feist, Siemens AG, Germany
Steffen Fries, Siemens AG, Germany

pages: 25 - 35
Post-Quantum Cryptography - An Overview of Standards, Protocols, and Practical Applications
Jörn-Marc Schmidt, IU International University of Applied Sciences, Germany
Alexander Lawall, IU International University of Applied Sciences, Germany

pages: 36 - 47
Invisible Identifiers - How Browser Fingerprinting Challenges Internet Privacy and User Anonymity
Alexander Lawall, IU International University of Applied Science, Germany

pages: 48 - 60
Towards a Trust Management Approach Encompassing Stakeholders for the Automotive Ecosystem
Marco Michl, Technische Hochschule Ingolstadt, Germany
Hans-Joachim Hof, Technische Hochschule Ingolstadt, Germany

pages: 61 - 76
Understanding Human Aspects in Phishing Detection: The Role of Demographics, Eye Movements and User Experience in Security Software
Fabian Engl, OTH Regensburg, Germany
Meret Kristen, OTH Regensburg, Germany
Juergen Mottok, OTH Regensburg, Germany

pages: 77 - 91
From Theory to Practice: Evaluating and Enhancing Kolmogorov-Arnold Networks (KAN) Robustness Under Adversarial Conditions
Evgenii Ostanin, Toronto Metropolitan University, Canada
Nebojsa Djosic, Toronto Metropolitan University, Canada
Fatima Hussain, Toronto Metropolitan University, Canada
Salah Sharieh, Toronto Metropolitan University, Canada
Alexander Ferworn, Toronto Metropolitan University, Canada

pages: 92 - 103
CorpIA: An Operational Framework for AI Agents Augmenting Knowledge Work
Salvatore Vella, Toronto Metropolitan University, Canada
Moussa Noun, Royal Bank of Canada, Canada
Salah Sharieh, Toronto Metropolitan University, Canada
Fatima Hussain, Toronto Metropolitan University, Canada
Alex Ferworn, Toronto Metropolitan University, Canada

pages: 104 - 111
Leveraging Transparency of Initial Trust Establishment for Device Security Management
Steffen Fries, Siemens AG, Germany
Rainer Falk, Siemens AG, Germany

pages: 112 - 122
Extended Analysis, Detection and Attribution of Steganographic Embedding Methods in Network Data of Industrial Controls Systems
Tom Neubert, Brandenburg University of Applied Sciences, Germany
Eric Schueler, Brandenburg University of Applied Sciences, Germany
Henning Ullrich, Brandenburg University of Applied Sciences, Germany
Laura Buxhoidt, Brandenburg University of Applied Sciences, Germany
Claus Vielhauer, Brandenburg University of Applied Sciences, Germany

download vol 18, no 1&2, year 2025

 
Copyright (c) 2008-2010. IARIA, All rights reserved.