ABI ACA ACM ACSAC AI AML API APIs ARIMA ATFuzzer AV AVs AZSecure Abu Adjerid Agadakos Agrafiotis Agrawal Ahmed Ahn Ailton Akka Aksoy Alastair Aleroud Alessandro Alexandros Alfajardo Allodi Alper Amanda Amiet Amit Amr Android Anonymization Antivirus Apps Arkaitz Arun Athough Atishay Audun Automation Axelrad Azimi B BVP Babakar Babun Balzarotti Barenghi Bashford Behavioural Bertino Blockchain Blockchains Blocklisting Bots Brin Bromander Bucur Buede Bulck Burkert CMG CODEN CPT CRV CSIRTs CTI CVE Cai Campobasso Carlos Chaithanya Charlton Chieh Chowdhury Christos Chung Cicala Colin Collaboratively Cono Cormack Creese Cyber Cybersecurity D D'Elia DAW DBI DDM DDoS DElia DLC DMHP DND DNS DTI DTR DTRAP Daniele Datta Davide Debloating Defences Demarinis Der Desiree Desmet Di Diallo Diaz Diksha Doup Durst Durvaux Dykstra E ECA ECT EDB EDS EEG EPS EPSS ESI Eduardo Ehsan Eian Elia Elisa Elise Emilie ExSol F FAX FFP FNC FNE FNS FPU Fabrizio Factchecking Federico Federrath Feitosa Feng Fi Filho Fingerpointing Fredrik G GCHQ GOS Gabriele Gajrani Ganduulga Gankhuyag Gaurav Geir Gen Genc Georgios Gerardo Gianluca Graybox Gu Guillaume Gutzwiller H HIDS Hannes Hao Happa Hawkes Helmhout Hengartner Hiet Horneman Horng Hsinchun Huan Huang Hussain IAS ICT IDN IFS IP IRT IRW ISC ISCM ISI ISSN Idris Igor Ikuse Iliou Imtiaz Inroduction Internet Invidia IoT Ioannis Isik Iskander Iwamura J Jain Janse Janssen Jassim Javad Jearson Jeroen Jin Joon Joosen Jul Juliane Jun Justin Jyoti K KUNDU Kanta Kapravelos Karabatis Karim Karimibiuki Karthik Katos Kawakoya Kemerlis Kohlrausch Kompatsiaris Konstantinovskiy Koot Kostoulas Kr Kraus Krishnarao Kumar Kuo Kwon L LBH LCB LSD Lakhotia Lanzi Laplacian Laurenza Laxmi Lazzeretti Lenzini Lev Li Lieven Lindorfer Liu Lorenzo Luca M MDO MDT MHB MLF MSL MST MTE Mainardi Makoto Malapati Malware Manish Mannan Manoj Marisa Martina Maryam Matsuura Matthijs Matyas Mazzotti Mccorry Medrano Meenakshi Mehdi Mehrnezhad Metcalf Mevan Michalis Michele Midler Miyoshi Mohammad Monrose N NIST NSA Nakatsuka Nils Nokhbeh Nwankpa O Oesch Olivier Omar Online Oort Opcode Osman Otsuki Oumar Outsourced P PAC PDoT POS PPD PSK PSS Palit Pallaprolu Palmaro Panman Panpan Partha Pattabiraman Paverd Pedrero Pelosi Perdisci Petr Phoha Piessens Pijnenburg Pitaya Plaquin Polychronakis Portokalidis Poudel Pratim Premadoma Pritam Proactive Purvine Querzoni RCE RIA RISC RM RV RVs Rafiul Raghav Rajesh Rao Ravichandra Razieh Redacted Ren Rensburg Reza Ricardo Riccardo Rodr Rohit Rola Romanosky Ronny Rosso Roytman Ruba Rubio Ruoti S SA SAA SAE SAIBERSOC SCA SGX SHS SHSs SIMD SM SMT SPP SSL SVB Sacher Sagar Sai Salma Samtani Santos Sasha Scofield Selcuk Sgandurra Shahandashti Shang Sheng Shimeall Shoman Shteinfeld Shuhan Shukla Siamak Sikder Sinan Singh Siri Skalka Skj Smartphone Smartphones Somani Sperotto Spertus Spielman Spoofing Spooren Srikrishna Srinivasan Stefanos Steinhauser Sticha Stringhini Sujit Sy Syed Systematisation T TAF TBU TIOT TLD TLS TOA TUI Tapiador Tapti Tejaswi Tel Teng Theodora Theodoros Tien Tirso Tomonori Toorn Toreini Toshinori Tousif Triage Tripathi Tsikrika Tsudik Tue Tuma U UDM ULT URL Ugarte Ukrop Uluagac Unsupervised Urs Usui V VPN VVV Valecha VanDerHam VanderToorn Vanessa Vashek Vasileios Vasilis Vermillion Vijay Vir Vissers Volety Vrochidis Vulvet WPA WSGait WWW WYT Waked Weifeng Whitmore Wi Wouter XSS Xabier Xiang Xintao Xinyi Yee Yegui Yoshimichi Youssef Yuan Yuhei Yuto Zaeem Zafarani Zemmari Zhanpeng Zhao Zheng Zhiyuan Zhou Zika Ziming Zimmer Ziya Zubiaga ack acknowledgement acm adversarial analyses app apps articleno automation baseband beebe behaviour bibdate bibmods bibnames bibsource bitcoin blockchain blocklisting blocklists bots c cyber cybersecurity cyberthreats de deWit dec defences der dl dtrap e edu enclaved esearch eu factcheckers factchecking fjournal fparith functionalities g guez healthcare http https humanlike j jul jun loi malware mer misconfiguration mitigations modus multi n nhfb ois online operandi org outsourced phishing pollbooks prioritization proactive quo runtime runtimes sep showtags smartcard smartphone smartphones tex toolkits tskift twocolumn unpatched unprivileged utah venues visualisation websites www x