Search dblp for Publications

export results for "ICISSP"

 download as .bib file

@inproceedings{DBLP:conf/icissp/0001UGWM24,
  author       = {Ali Ahmed and
                  Victor Ungureanu and
                  Tarek Gaber and
                  Craig A. Watterson and
                  Fatma Masmoudi},
  title        = {Smart Home Privacy: {A} Scoping Review},
  booktitle    = {{ICISSP}},
  pages        = {635--642},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/AksoyVMPK24,
  author       = {Ahmet Aksoy and
                  Sundeep Varma and
                  Ganesha Moorthy and
                  Enya Pan and
                  Gorkem Kar},
  title        = {Comparative Analysis of Feature Selection Algorithms for Automated
                  IoT Device Fingerprinting},
  booktitle    = {{ICISSP}},
  pages        = {430--437},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/Alcaraz24,
  author       = {Cristina Alcaraz},
  title        = {Safeguarding Industry 5.0 Ecosystems Through Digital Twins},
  booktitle    = {{ICISSP}},
  pages        = {5},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/AldabjanFCP24,
  author       = {Aseel Aldabjan and
                  Steven Furnell and
                  Xavier Carpent and
                  Maria Papadaki},
  title        = {Cybersecurity Incident Response Readiness in Organisations},
  booktitle    = {{ICISSP}},
  pages        = {262--269},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/AlipourjeddiM24,
  author       = {Narges Alipourjeddi and
                  Ali Miri},
  title        = {Preserving Privacy in High-Dimensional Data Publishing},
  booktitle    = {{ICISSP}},
  pages        = {845--852},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/AnderssonS24,
  author       = {Josefin Andersson and
                  Elias Seid},
  title        = {The Classification and Impact of Cyber Attacks Targeting Critical
                  Service Providers},
  booktitle    = {{ICISSP}},
  pages        = {137--145},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/AurnaHOTKK24,
  author       = {Nahid Ferdous Aurna and
                  Md Delwar Hossain and
                  Hideya Ochiai and
                  Yuzo Taenaka and
                  Latifur Khan and
                  Youki Kadobayashi},
  title        = {Banking Malware Detection: Leveraging Federated Learning with Conditional
                  Model Updates and Client Data Heterogeneity},
  booktitle    = {{ICISSP}},
  pages        = {309--319},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/BagheriJD24,
  author       = {Sally Bagheri and
                  Andreas Jacobsson and
                  Paul Davidsson},
  title        = {Smart Homes as Digital Ecosystems: Exploring Privacy in IoT Contexts},
  booktitle    = {{ICISSP}},
  pages        = {869--877},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/BarretoRC024,
  author       = {Jackson Barreto and
                  Paulina Rutecka and
                  Karina Cicha and
                  Pedro Pinto},
  title        = {The Status and Management of Web-Related Security at Higher Education
                  Institutions in Poland},
  booktitle    = {{ICISSP}},
  pages        = {789--798},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/BozorgiJA24,
  author       = {Arastoo Bozorgi and
                  Mahya Soleimani Jadidi and
                  Jonathan Anderson},
  title        = {{UPSS:} {A} Global, Least-Privileged Storage System with Stronger
                  Security and Better Performance},
  booktitle    = {{ICISSP}},
  pages        = {660--671},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/BrodschelmG24,
  author       = {Lukas Brodschelm and
                  Marcus Gelderie},
  title        = {Using {ILP} to Learn AppArmor Policies},
  booktitle    = {{ICISSP}},
  pages        = {766--773},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/BuchananGU24,
  author       = {William J. Buchanan and
                  Sam Grierson and
                  Daniel Uribe},
  title        = {Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear
                  Group Accumulators in Batch Mode},
  booktitle    = {{ICISSP}},
  pages        = {226--233},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/ButtnerG24,
  author       = {Andre B{\"{u}}ttner and
                  Nils Gruschka},
  title        = {Evaluating the Influence of Multi-Factor Authentication and Recovery
                  Settings on the Security and Accessibility of User Accounts},
  booktitle    = {{ICISSP}},
  pages        = {691--700},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/ChakrabortyB24,
  author       = {Olive Chakraborty and
                  Aymen Boudguiga},
  title        = {A Decentralized Federated Learning Using Reputation},
  booktitle    = {{ICISSP}},
  pages        = {799--806},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/ChikulBM24,
  author       = {Pavel Chikul and
                  Hayretdin Bahsi and
                  Olaf Maennel},
  title        = {The Design and Implementation of a Semantic Web Framework for the
                  Event-Centric Digital Forensics Analysis},
  booktitle    = {{ICISSP}},
  pages        = {570--581},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/Conti24,
  author       = {Mauro Conti},
  title        = {Covert {\&} Side Stories: Threats Evolution in Traditional and
                  Modern Technologies},
  booktitle    = {{ICISSP}},
  pages        = {7},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/DebonoS24,
  author       = {David Debono and
                  Aleandro Sultana},
  title        = {Desktop Crypto Wallets: {A} Digital Forensic Investigation and Analysis
                  of Remnants and Traces on end-User Machines},
  booktitle    = {{ICISSP}},
  pages        = {350--357},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/DeloueeD0K24,
  author       = {Majid Lotfian Delouee and
                  Victoria Degeler and
                  Peter Amthor and
                  Boris Koldehofe},
  title        = {{APP-CEP:} Adaptive Pattern-Level Privacy Protection in Complex Event
                  Processing Systems},
  booktitle    = {{ICISSP}},
  pages        = {486--497},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/DelvecchioZBS24,
  author       = {Tony Delvecchio and
                  Sander Zeijlemaker and
                  Giancarlo De Bernardis and
                  Michael Siegel},
  title        = {Revolutionizing Board Cyber-Risk Management Using Collaborative Gaming},
  booktitle    = {{ICISSP}},
  pages        = {112--119},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/DoganB24,
  author       = {Ali Dogan and
                  Kemal Bicakci},
  title        = {{KAIME:} Central Bank Digital Currency with Realistic and Modular
                  Privacy},
  booktitle    = {{ICISSP}},
  pages        = {672--681},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/EleshinIRI24,
  author       = {Farida Eleshin and
                  Patrick Iradukunda and
                  David Ishimwe Ruberamitwe and
                  Eric Ishimwe},
  title        = {Your Robot Might Be Inadvertently or Deliberately Spying on You: {A}
                  Critical Analysis of Privacy Practices in the Robotics Industry},
  booktitle    = {{ICISSP}},
  pages        = {219--225},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/FarooqHFR24,
  author       = {Muhammad Ali Farooq and
                  Syed Muhammad Fasih Ul Hassan and
                  Muhammad Umer Farooq and
                  Abid Rafique},
  title        = {High Throughput Neural Network for Network Intrusion Detection on
                  FPGAs: An Algorithm-Architecture Interaction},
  booktitle    = {{ICISSP}},
  pages        = {423--429},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/GazoPH24,
  author       = {Dakouri Gazo and
                  Asma Patel and
                  Mohammad Hasan},
  title        = {Effectiveness of Malware Incident Management in Security Operations
                  Centres: Trends, Challenges and Research Directions},
  booktitle    = {{ICISSP}},
  pages        = {162--169},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/GelderieLB24,
  author       = {Marcus Gelderie and
                  Maximilian Luff and
                  Lukas Brodschelm},
  title        = {Differential Privacy for Distributed Traffic Monitoring in Smart Cities},
  booktitle    = {{ICISSP}},
  pages        = {758--765},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/GoncalvesM24,
  author       = {Brian Goncalves and
                  Atefeh Mashatan},
  title        = {Towards Generalized Diffie-Hellman-esque Key Agreement via Generic
                  Split {KEM} Construction},
  booktitle    = {{ICISSP}},
  pages        = {594--608},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/GuerinC0M24,
  author       = {Sylvain Gu{\'{e}}rin and
                  Jo{\"{e}}l Champeau and
                  Salvador Mart{\'{\i}}nez and
                  Ra{\'{u}}l Mazo},
  title        = {Security Contracts a Property-Based Approach to Support Security Patterns},
  booktitle    = {{ICISSP}},
  pages        = {103--111},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/GuerraMDPF24,
  author       = {Michele Guerra and
                  Roberto Milanese and
                  Michele Deodato and
                  Vittorio Perozzi and
                  Fausto Fasano},
  title        = {Visual Attention and Privacy Indicators in Android: Insights from
                  Eye Tracking},
  booktitle    = {{ICISSP}},
  pages        = {320--329},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/HasegawaHSKFMK24,
  author       = {Kento Hasegawa and
                  Katsutoshi Hanahara and
                  Hiroshi Sugisaki and
                  Minoru Kozu and
                  Kazuhide Fukushima and
                  Yosuke Murakami and
                  Shinsaku Kiyomoto},
  title        = {Vulnerability Information Sharing Platform for Securing Hardware Supply
                  Chains},
  booktitle    = {{ICISSP}},
  pages        = {403--410},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/HeinrichWOM24,
  author       = {Tiago Heinrich and
                  Newton Carlos Will and
                  Rafael R. Obelheiro and
                  Carlos Alberto Maziero},
  title        = {Anywhere on Earth: {A} Look at Regional Characteristics of DRDoS Attacks},
  booktitle    = {{ICISSP}},
  pages        = {21--29},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/HeinrichWOM24a,
  author       = {Tiago Heinrich and
                  Newton Carlos Will and
                  Rafael R. Obelheiro and
                  Carlos Alberto Maziero},
  title        = {A Categorical Data Approach for Anomaly Detection in WebAssembly Applications},
  booktitle    = {{ICISSP}},
  pages        = {275--284},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/HintzRS24,
  author       = {Jan Hintz and
                  Jacob R{\"{u}}he and
                  Ingo Siegert},
  title        = {AnonEmoFace: Emotion Preserving Facial Anonymization},
  booktitle    = {{ICISSP}},
  pages        = {785--788},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/HosseinzadehCB24,
  author       = {Arghavan Hosseinzadeh and
                  Jessica Chwalek and
                  Robin Brandst{\"{a}}dter},
  title        = {Policy-Driven XACML-Based Architecture for Dynamic Enforcement of
                  Multiparty Computation},
  booktitle    = {{ICISSP}},
  pages        = {81--89},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/HousselL24,
  author       = {Paul R. B. Houssel and
                  Luis A. Leiva},
  title        = {User Re-Authentication via Mouse Movements and Recurrent Neural Networks},
  booktitle    = {{ICISSP}},
  pages        = {652--659},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/HuT24,
  author       = {Wanyu Hu and
                  Vrizlynn L. L. Thing},
  title        = {CPE-Identifier: Automated {CPE} Identification and {CVE} Summaries
                  Annotation with Deep Learning and {NLP}},
  booktitle    = {{ICISSP}},
  pages        = {67--78},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/IadarolaMMPS24,
  author       = {Giacomo Iadarola and
                  Fabio Martinelli and
                  Francesco Mercaldo and
                  Luca Petrillo and
                  Antonella Santone},
  title        = {Cybersecurity-Related Tweet Classification by Explainable Deep Learning},
  booktitle    = {{ICISSP}},
  pages        = {438--445},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/JakubeitPS24,
  author       = {Philipp Jakubeit and
                  Andreas Peter and
                  Maarten van Steen},
  title        = {RoomKey: Extracting a Volatile Key with Information from the Local
                  WiFi Environment Reconstructable Within a Designated Area},
  booktitle    = {{ICISSP}},
  pages        = {558--569},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/JawedPKHS24,
  author       = {Mohammed Jawed and
                  Sriram Parameshwaran and
                  Nitesh Kumar and
                  Anand Handa and
                  Sandeep K. Shukla},
  title        = {ArkThor: Threat Categorization Based on Malware's {C2} Communication},
  booktitle    = {{ICISSP}},
  pages        = {203--210},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/KaksonenHLR24,
  author       = {Rauli Kaksonen and
                  Kimmo Halunen and
                  Marko Laakso and
                  Juha R{\"{o}}ning},
  title        = {Automating IoT Security Standard Testing by Common Security Tools},
  booktitle    = {{ICISSP}},
  pages        = {42--53},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/KalhorD24,
  author       = {Borna Kalhor and
                  Sanchari Das},
  title        = {Evaluating the Security and Privacy Risk Postures of Virtual Assistants},
  booktitle    = {{ICISSP}},
  pages        = {154--161},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/KimL24,
  author       = {Seo{-}Yi Kim and
                  Il{-}Gu Lee},
  title        = {{LSTM} Autoencoder-Based Insider Abnormal Behavior Detection Using
                  De-Identified Data},
  booktitle    = {{ICISSP}},
  pages        = {609--620},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/KobayashiY24,
  author       = {Ryosuke Kobayashi and
                  Rie Shigetomi Yamaguchi},
  title        = {Forgery Resistance of User Authentication Methods Using Location,
                  Wi-Fi and Their Correlation},
  booktitle    = {{ICISSP}},
  pages        = {709--716},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/KohlerM24,
  author       = {Daniel K{\"{o}}hler and
                  Christoph Meinel},
  title        = {The Right Tool for the Job: Contextualization of Cybersecurity Education
                  and Assessment Methods},
  booktitle    = {{ICISSP}},
  pages        = {234--241},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/Kokolakis24,
  author       = {Spyros Kokolakis},
  title        = {Security, Privacy and the "Human Factor": Making Sense of the Paradoxes
                  of Security and Privacy Behaviour},
  booktitle    = {{ICISSP}},
  pages        = {9--11},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/KoltaiGA24,
  author       = {Beatrix Koltai and
                  Andr{\'{a}}s Gazdag and
                  Gergely {\'{A}}cs},
  title        = {Supporting {CAN} Bus Anomaly Detection with Correlation Data},
  booktitle    = {{ICISSP}},
  pages        = {285--296},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/KumarMB24,
  author       = {Vimal Kumar and
                  Juliette Mayo and
                  Khadija Bahiss},
  title        = {ADMIn: Attacks on Dataset, Model and Input: {A} Threat Model for {AI}
                  Based Software},
  booktitle    = {{ICISSP}},
  pages        = {170--178},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/LanzaLO24,
  author       = {Claudia Lanza and
                  Abdelkader Lahmadi and
                  Fabian Osmond},
  title        = {An Empirical Study of Ransomware Vulnerabilities Descriptions},
  booktitle    = {{ICISSP}},
  pages        = {146--153},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/LevshunV24,
  author       = {Dmitry Levshun and
                  Dmitry Vesnin},
  title        = {Exploring {BERT} for Predicting Vulnerability Categories in Device
                  Configurations},
  booktitle    = {{ICISSP}},
  pages        = {452--461},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/LienBK24,
  author       = {Eirik Lien and
                  Karl Magnus Gr{\o}nning Bergh and
                  Sokratis K. Katsikas},
  title        = {Perceptions of Cyber Security Risk of the Norwegian Advanced Metering
                  Infrastructure},
  booktitle    = {{ICISSP}},
  pages        = {187--194},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/LiuDDS24,
  author       = {Changwei Liu and
                  Louis DiValentin and
                  Aolin Ding and
                  Malek Ben Salem},
  title        = {Build a Computationally Efficient Strong Defense Against Adversarial
                  Example Attacks},
  booktitle    = {{ICISSP}},
  pages        = {358--365},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/LiuG24,
  author       = {Kunlong Liu and
                  Trinabh Gupta},
  title        = {Federated Learning with Differential Privacy and an Untrusted Aggregator},
  booktitle    = {{ICISSP}},
  pages        = {379--389},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/LuL24,
  author       = {Chun{-}Shien Lu and
                  Chao{-}Hsuan Lin},
  title        = {Robust Image Deepfake Detection with Perceptual Hashing},
  booktitle    = {{ICISSP}},
  pages        = {374--378},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/MaciUC24,
  author       = {Antonio Maci and
                  Giuseppe Urbano and
                  Antonio Coscia},
  title        = {Deep Q-Networks for Imbalanced Multi-Class Malware Classification},
  booktitle    = {{ICISSP}},
  pages        = {342--349},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/MackovaBS24,
  author       = {Katerina Mackov{\'{a}} and
                  Dominik Benk and
                  Martin Srot{\'{y}}r},
  title        = {Enhancing Cybersecurity Through Comparative Analysis of Deep Learning
                  Models for Anomaly Detection},
  booktitle    = {{ICISSP}},
  pages        = {682--690},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/MaderL24,
  author       = {Julia Mader and
                  Thomas Lor{\"{u}}nser},
  title        = {Feasibility of Privacy Preserving Minutiae-Based Fingerprint Matching},
  booktitle    = {{ICISSP}},
  pages        = {899--906},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/MarruccoABM24,
  author       = {Fabrizia Marrucco and
                  Mosabbah Mushir Ahmed and
                  Bechir Bouali and
                  Alieeldin Mady},
  title        = {EMplifier: Hybrid Electromagnetic Probe for Side Channel and Fault
                  Injection Analysis},
  booktitle    = {{ICISSP}},
  pages        = {815--822},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/Maugeri24,
  author       = {Marcello Maugeri},
  title        = {Fuzzing Matter(s): {A} White Paper for Fuzzing the Matter Protocol},
  booktitle    = {{ICISSP}},
  pages        = {446--451},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/McConnellLSW24,
  author       = {John McConnell and
                  Yair Levy and
                  Marti Snyder and
                  Ling Wang},
  title        = {The Role of Heuristics and Biases in Linux Server Administrators'
                  Information Security Policy Compliance at Healthcare Organizations},
  booktitle    = {{ICISSP}},
  pages        = {30--41},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/McWeeneyMV24,
  author       = {Bernard McWeeney and
                  Ilya Mudritskiy and
                  Renaat Verbruggen},
  title        = {Analysis of Payload Confidentiality for the IoT/ {LPWAN} Technology
                  'Lora'},
  booktitle    = {{ICISSP}},
  pages        = {90--102},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/MeguroKNHFSH24,
  author       = {Ryo Meguro and
                  Hiroya Kato and
                  Shintaro Narisada and
                  Seira Hidano and
                  Kazuhide Fukushima and
                  Takuo Suganuma and
                  Masahiro Hiji},
  title        = {Gradient-Based Clean Label Backdoor Attack to Graph Neural Networks},
  booktitle    = {{ICISSP}},
  pages        = {510--521},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/MiglioreCT24,
  author       = {Andrea Migliore and
                  Stelvio Cimato and
                  Gabriella Trucco},
  title        = {Efficient Secure Computation of Edit Distance on Genomic Data},
  booktitle    = {{ICISSP}},
  pages        = {878--883},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/MoralesRBJS24,
  author       = {Gabriel A. Morales and
                  Farhan Tajwar Romit and
                  Adam Bienek{-}Parrish and
                  Patrick Jenkins and
                  Rocky Slavin},
  title        = {IoT Device Classification Using Link-Level Features for Traditional
                  Machine Learning and Large Language Models},
  booktitle    = {{ICISSP}},
  pages        = {297--308},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/MoustafaNGE24,
  author       = {Mariam Moustafa and
                  Arto Niemi and
                  Philip Ginzboorg and
                  Jan{-}Erik Ekberg},
  title        = {Attestation with Constrained Relying Party},
  booktitle    = {{ICISSP}},
  pages        = {701--708},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/NguyenCHFB24,
  author       = {Huynh Phuong Thanh Nguyen and
                  Zhi Chen and
                  Kento Hasegawa and
                  Kazuhide Fukushima and
                  Razvan Beuran},
  title        = {PenGym: Pentesting Training Framework for Reinforcement Learning Agents},
  booktitle    = {{ICISSP}},
  pages        = {498--509},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/OhLJCL24,
  author       = {Ye{-}Sol Oh and
                  Yeon{-}Ji Lee and
                  Jiwon Jang and
                  Hyunwoo Choi and
                  Il{-}Gu Lee},
  title        = {Implementation and Analysis of Covert Channel Using iBeacon},
  booktitle    = {{ICISSP}},
  pages        = {861--868},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/OzgunTS24,
  author       = {Kagan {\"{O}}zg{\"{u}}n and
                  Ayse Tosun and
                  Mehmet Tahir Sandikkaya},
  title        = {A Recommender System to Detect Distributed Denial of Service Attacks
                  with Network and Transport Layer Features},
  booktitle    = {{ICISSP}},
  pages        = {390--397},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/PailletCC24,
  author       = {Justine Paillet and
                  Olive Chakraborty and
                  Marina Checri},
  title        = {Pure Multi Key {BGV} Implementation},
  booktitle    = {{ICISSP}},
  pages        = {807--814},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/PareK24,
  author       = {Anjali Pare and
                  Prasad A. Kulkarni},
  title        = {Exploring Errors in Binary-Level {CFG} Recovery},
  booktitle    = {{ICISSP}},
  pages        = {546--557},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/PatzeltNDHHS24,
  author       = {Luca Patzelt and
                  Georg Neugebauer and
                  Meik D{\"{o}}ll and
                  Sacha Hack and
                  Tim Hoener and
                  Marko Schuba},
  title        = {A Framework for {E2E} Audit Trails in System Architectures of Different
                  Enterprise Classes},
  booktitle    = {{ICISSP}},
  pages        = {750--757},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/PauwMD24,
  author       = {C{\'{e}}drick De Pauw and
                  Jan Tobias M{\"{u}}hlberg and
                  Jean{-}Michel Dricot},
  title        = {An Improved PUF-Based Privacy-Preserving IoT Protocol for Cloud Storage},
  booktitle    = {{ICISSP}},
  pages        = {725--732},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/PirkerH24,
  author       = {Martin Pirker and
                  Robert Haas},
  title        = {A Brief Reflection on Trusted Platform Module Support},
  booktitle    = {{ICISSP}},
  pages        = {890--898},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/PohlerSHHN24,
  author       = {Luca P{\"{o}}hler and
                  Marko Schuba and
                  Tim Hoener and
                  Sacha Hack and
                  Georg Neugebauer},
  title        = {An Open-Source Approach to {OT} Asset Management in Industrial Environments},
  booktitle    = {{ICISSP}},
  pages        = {128--136},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/PrillardBT24,
  author       = {Ophelia Prillard and
                  Costas Boletsis and
                  Shukun Tokas},
  title        = {Ethical Design for Data Privacy and User Privacy Awareness in the
                  Metaverse},
  booktitle    = {{ICISSP}},
  pages        = {333--341},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/Raciti24,
  author       = {Mario Raciti},
  title        = {Conceptualising an Anti-Digital Forensics Kill Chain for Smart Homes},
  booktitle    = {{ICISSP}},
  pages        = {831--837},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/RahmanHOKSR24,
  author       = {Md. Mahbubur Rahman and
                  Md Delwar Hossain and
                  Hideya Ochiai and
                  Youki Kadobayashi and
                  Tanjim Sakib and
                  Syed Taha Yeasin Ramadan},
  title        = {Vision Based Malware Classification Using Deep Neural Network with
                  Hybrid Data Augmentation},
  booktitle    = {{ICISSP}},
  pages        = {823--830},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/RajputA24,
  author       = {Amitesh Singh Rajput and
                  Arnav Agrawal},
  title        = {Blockchain for Privacy-Preserving Data Distribution in Healthcare},
  booktitle    = {{ICISSP}},
  pages        = {621--631},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/RashidMM24,
  author       = {Fatema Rashid and
                  Ali Miri and
                  Atefeh Mashatan},
  title        = {PETRIoT - {A} Privacy Enhancing Technology Recommendation Framework
                  for IoT Computing},
  booktitle    = {{ICISSP}},
  pages        = {838--844},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/RibesMGP24,
  author       = {Stefano Ribes and
                  Fabio Malatesta and
                  Grazia Garzo and
                  Alessandro Palumbo},
  title        = {Machine Learning-Based Classification of Hardware Trojans in FPGAs
                  Implementing {RISC-V} Cores},
  booktitle    = {{ICISSP}},
  pages        = {717--724},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/RuedlingerKLHTV24,
  author       = {Andreas R{\"{u}}edlinger and
                  Rebecca Klauser and
                  Pavlos Lamprakis and
                  Markus Happe and
                  Bernhard Tellenbach and
                  Onur Veyisoglu and
                  Ariane Trammell},
  title        = {FeedMeter: Evaluating the Quality of Community-Driven Threat Intelligence},
  booktitle    = {{ICISSP}},
  pages        = {54--66},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/ScottL0K24,
  author       = {Jackie Scott and
                  Yair Levy and
                  Wei Li and
                  Ajoy Kumar},
  title        = {Comparing Phishing Training and Campaign Methods for Mitigating Malicious
                  Emails in Organizations},
  booktitle    = {{ICISSP}},
  pages        = {643--651},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/SeidPB24,
  author       = {Elias Seid and
                  Oliver Popov and
                  Fredrik Blix},
  title        = {An Automated Adaptive Security Framework for Cyber-Physical Systems},
  booktitle    = {{ICISSP}},
  pages        = {242--253},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/SinghTG024,
  author       = {Arunab Singh and
                  Maryam Tanha and
                  Yashsvi Girdhar and
                  Aaron Hunter},
  title        = {Interpretable Android Malware Detection Based on Dynamic Analysis},
  booktitle    = {{ICISSP}},
  pages        = {195--202},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/SpitzL24,
  author       = {Stephan Spitz and
                  Alexander Lawall},
  title        = {Silicon-Integrated Security Solutions Driving IoT Security},
  booktitle    = {{ICISSP}},
  pages        = {398--402},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/StavrouPV24,
  author       = {Eliana Stavrou and
                  Andriani Piki and
                  Panayiotis Varnava},
  title        = {Merging Policy and Practice: Crafting Effective Social Engineering
                  Awareness-Raising Policies},
  booktitle    = {{ICISSP}},
  pages        = {179--186},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/StevanLLDP24,
  author       = {Antoine Stevan and
                  Thomas Lavaur and
                  J{\'{e}}r{\^{o}}me Lacan and
                  Jonathan Detchart and
                  Tanguy P{\'{e}}rennou},
  title        = {Performance Evaluation of Polynomial Commitments for Erasure Code
                  Based Information Dispersal},
  booktitle    = {{ICISSP}},
  pages        = {522--533},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/Stremlau24,
  author       = {Thorsten P. Stremlau},
  title        = {Integrating Post-Quantum Cryptography into Trusted Computing Group
                  Standards},
  booktitle    = {{ICISSP}},
  pages        = {15},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/TavolatoLEGS24,
  author       = {Paul Tavolato and
                  Robert Luh and
                  Sebastian Eresheim and
                  Simon Gmeiner and
                  Sebastian Schrittwieser},
  title        = {Comparing the Effectivity of Planned Cyber Defense Controls in Order
                  to Support the Selection Process},
  booktitle    = {{ICISSP}},
  pages        = {211--218},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/TejapijayaSSK24,
  author       = {Thanawat Tejapijaya and
                  Prarinya Siritanawan and
                  Karin Sumongkayothin and
                  Kazunori Kotani},
  title        = {Botnet Detection by Integrating Multiple Machine Learning Models},
  booktitle    = {{ICISSP}},
  pages        = {366--373},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/Teseleanu24,
  author       = {George Teseleanu},
  title        = {Security Analysis of an Image Encryption Based on the Kronecker Xor
                  Product, the Hill Cipher and the Sigmoid Logistic Map},
  booktitle    = {{ICISSP}},
  pages        = {467--473},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/Teseleanu24a,
  author       = {George Teseleanu},
  title        = {Security Analysis of an Image Encryption Scheme Based on a New Secure
                  Variant of Hill Cipher and 1D Chaotic Maps},
  booktitle    = {{ICISSP}},
  pages        = {745--749},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/Tezcan24,
  author       = {Cihangir Tezcan},
  title        = {GPU-Based Brute Force Cryptanalysis of {KLEIN}},
  booktitle    = {{ICISSP}},
  pages        = {884--889},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/TrammellGISZ24,
  author       = {Ariane Trammell and
                  Benjamin Gehring and
                  Marco Isele and
                  Yvo Spielmann and
                  Valentin Zahnd},
  title        = {Towards Automated Information Security Governance},
  booktitle    = {{ICISSP}},
  pages        = {120--127},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/UemuraF24,
  author       = {Shusaku Uemura and
                  Kazuhide Fukushima},
  title        = {Feasibility of Random Forest with Fully Homomorphic Encryption Applied
                  to Network Data},
  booktitle    = {{ICISSP}},
  pages        = {534--545},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/UmraniV024,
  author       = {Alia Umrani and
                  Apurva K. Vangujar and
                  Paolo Palmieri},
  title        = {Anonymous Multi-Receiver Certificateless Hybrid Signcryption for Broadcast
                  Communication},
  booktitle    = {{ICISSP}},
  pages        = {733--744},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/ValoggiaSRB24,
  author       = {Philippe Valoggia and
                  Anastasia Sergeeva and
                  Arianna Rossi and
                  Marietjie Botes},
  title        = {Learning from the Dark Side About How (not) to Engineer Privacy: Analysis
                  of Dark Patterns Taxonomies from an {ISO} 29100 Perspective},
  booktitle    = {{ICISSP}},
  pages        = {774--784},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/VaneziKP24,
  author       = {Evangelia Vanezi and
                  Georgia M. Kapitsaki and
                  Anna Philippou},
  title        = {What's Your Purpose? An Approach to Incorporating {GDPR} Purposes
                  into Requirements Analysis},
  booktitle    = {{ICISSP}},
  pages        = {907--914},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/VijayanFK24,
  author       = {Visakh K. Vijayan and
                  Maria Francis and
                  Kotaro Kataoka},
  title        = {Off-Chaining Approaches for Cost-Efficiency in Threshold-Based Elliptic
                  Curve Systems over Blockchains},
  booktitle    = {{ICISSP}},
  pages        = {411--422},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/WakabayashiWNW24,
  author       = {Ryousuke Wakabayashi and
                  Lihua Wang and
                  Ryo Nojima and
                  Atsushi Waseda},
  title        = {Security Evaluation of Decision Tree Meets Data Anonymization},
  booktitle    = {{ICISSP}},
  pages        = {853--860},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/WillM24,
  author       = {Newton Carlos Will and
                  Carlos Alberto Maziero},
  title        = {Enclave Management Models for Safe Execution of Software Components},
  booktitle    = {{ICISSP}},
  pages        = {474--485},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/ZaidenbergKME24,
  author       = {Nezer Jacob Zaidenberg and
                  Michael Kiperberg and
                  Eliav Menachi and
                  Asaf Eitani},
  title        = {Detecting eBPF Rootkits Using Virtualization and Memory Forensics},
  booktitle    = {{ICISSP}},
  pages        = {254--261},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/ZareiV24,
  author       = {Amir Zarei and
                  Staal Amund Vinterbo},
  title        = {Secure Multiparty Computation of the Laplace Mechanism},
  booktitle    = {{ICISSP}},
  pages        = {582--593},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@proceedings{DBLP:conf/icissp/2024,
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  publisher    = {{SCITEPRESS}},
  year         = {2024}
}
@inproceedings{DBLP:conf/icissp/000123,
  author       = {Luca Vigan{\`{o}}},
  title        = {Cybersecurity, Nicolas Cage and Peppa Pig},
  booktitle    = {{ICISSP}},
  pages        = {7},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/0001V23,
  author       = {Alexandros Karakasidis and
                  Vassilios Vassalos},
  title        = {On the Design of {GDPR} Compliant Workflows for Responsible Neuroimage
                  Data Sharing},
  booktitle    = {{ICISSP}},
  pages        = {600--607},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/AlJuaidLS23,
  author       = {Nouf Al{-}Juaid and
                  Alexei Lisitsa and
                  Sven Schewe},
  title        = {Secure Joint Querying Over Federated Graph Databases Utilising {SMPC}
                  Protocols},
  booktitle    = {{ICISSP}},
  pages        = {210--217},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/AlagarswamyBDLMSTW23,
  author       = {Devi Padmavathi Alagarswamy and
                  Christian Berghoff and
                  Vasilios Danos and
                  Fabian Langer and
                  Thora Markert and
                  Georg Schneider and
                  Arndt von Twickel and
                  Fabian Woitschek},
  title        = {Towards Audit Requirements for AI-Based Systems in Mobility Applications},
  booktitle    = {{ICISSP}},
  pages        = {339--348},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/AlaniMM23,
  author       = {Mohammed M. Alani and
                  Atefeh Mashatan and
                  Ali Miri},
  title        = {XMeDNN: An Explainable Deep Neural Network System for Intrusion Detection
                  in Internet of Medical Things},
  booktitle    = {{ICISSP}},
  pages        = {144--151},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/AlbaneseCCIMMRS23,
  author       = {Daniele Albanese and
                  Rosangela Casolare and
                  Giovanni Ciaramella and
                  Giacomo Iadarola and
                  Fabio Martinelli and
                  Francesco Mercaldo and
                  Marco Russodivito and
                  Antonella Santone},
  title        = {StegWare: {A} Novel Malware Model Exploiting Payload Steganography
                  and Dynamic Compilation},
  booktitle    = {{ICISSP}},
  pages        = {741--748},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/AlghamdiF23,
  author       = {Samiah Alghamdi and
                  Steven Furnell},
  title        = {Assessing Security and Privacy Insights for Smart Home Users},
  booktitle    = {{ICISSP}},
  pages        = {592--599},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/AntognazzaBPS23,
  author       = {Francesco Antognazza and
                  Alessandro Barenghi and
                  Gerardo Pelosi and
                  Ruggero Susella},
  title        = {An Efficient Unified Architecture for Polynomial Multiplications in
                  Lattice-Based Cryptoschemes},
  booktitle    = {{ICISSP}},
  pages        = {81--88},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/BalajiAF23,
  author       = {Kaushik Krishnan Balaji and
                  Dimah Almani and
                  Steven Furnell},
  title        = {Assessing the Impact of Attacks on Connected and Autonomous Vehicles
                  in Vehicular Ad Hoc Networks},
  booktitle    = {{ICISSP}},
  pages        = {774--782},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/BartschGKM0PP23,
  author       = {Witali Bartsch and
                  Prosanta Gope and
                  Elif Bilge Kavun and
                  Owen Millwood and
                  Andriy Panchenko and
                  Aryan Mohammadi Pasikhani and
                  Ilia Polian},
  title        = {Design Rationale for Symbiotically Secure Key Management Systems in
                  IoT and Beyond},
  booktitle    = {{ICISSP}},
  pages        = {583--591},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/BauspiessVMCKR23,
  author       = {Pia Bauspie{\ss} and
                  Lasse Vad and
                  H{\aa}vard Myrekrok and
                  Anamaria Costache and
                  Jascha Kolberg and
                  Christian Rathgeb},
  title        = {On the Feasibility of Fully Homomorphic Encryption of Minutiae-Based
                  Fingerprint Representations},
  booktitle    = {{ICISSP}},
  pages        = {462--470},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/BelalisSA23,
  author       = {Ilias Belalis and
                  Georgios P. Spathoulas and
                  Ioannis Anagnostopoulos},
  title        = {Evading Detection During Network Reconnaissance},
  booktitle    = {{ICISSP}},
  pages        = {528--534},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/BellizziVCH23,
  author       = {Jennifer Bellizzi and
                  Mark Vella and
                  Christian Colombo and
                  Julio C. Hernandez{-}Castro},
  title        = {Using Infrastructure-Based Agents to Enhance Forensic Logging of Third-Party
                  Applications},
  booktitle    = {{ICISSP}},
  pages        = {389--401},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/BodeiCVMM23,
  author       = {Chiara Bodei and
                  Gianpiero Costantino and
                  Marco De Vincenzi and
                  Ilaria Matteucci and
                  Anna Monreale},
  title        = {Vehicle Data Collection: {A} Privacy Policy Analysis and Comparison},
  booktitle    = {{ICISSP}},
  pages        = {626--633},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/BorcherdingPGB23,
  author       = {Anne Borcherding and
                  Nikolay Penkov and
                  Mark Giraud and
                  J{\"{u}}rgen Beyerer},
  title        = {SWaTEval: An Evaluation Framework for Stateful Web Application Testing},
  booktitle    = {{ICISSP}},
  pages        = {430--441},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/Bracamonte0L23,
  author       = {Vanessa Bracamonte and
                  Sebastian Pape and
                  Sascha L{\"{o}}bner},
  title        = {Comparing the Effect of Privacy and Non-Privacy Social Media Photo
                  Tools on Factors of Privacy Concern},
  booktitle    = {{ICISSP}},
  pages        = {669--676},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/Bryce23,
  author       = {Ciar{\'{a}}n Bryce},
  title        = {An Analysis of Cybersecurity Awareness Efforts for Swiss SMEs},
  booktitle    = {{ICISSP}},
  pages        = {381--388},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/BullockE23,
  author       = {Harrison Bullock and
                  Matthew Edwards},
  title        = {Temporal Constraints in Online Dating Fraud Classification},
  booktitle    = {{ICISSP}},
  pages        = {535--542},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/BurdiakDTLRKMPFKHMV23,
  author       = {Patrik Burdiak and
                  Emir Dervisevic and
                  Amina Tankovic and
                  Filip Lauterbach and
                  Jan Rozhon and
                  Lukas Kapicak and
                  Libor Michalek and
                  Dzana Pivac and
                  Merima Fehric and
                  Enio Kaljic and
                  Mirza Hamza and
                  Miralem Mehic and
                  Miroslav Vozn{\'{a}}k},
  title        = {Use-Case Denial of Service Attack on Actual Quantum Key Distribution
                  Nodes},
  booktitle    = {{ICISSP}},
  pages        = {89--94},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/Chabanne23,
  author       = {Herv{\'{e}} Chabanne},
  title        = {A Biometric Self Authentication Scheme},
  booktitle    = {{ICISSP}},
  pages        = {749--756},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/ChenLX23,
  author       = {Shaojie Chen and
                  Bo Lang and
                  Chong Xie},
  title        = {Fast-Flux Malicious Domain Name Detection Method Based on Domain Resolution
                  Spatial Features},
  booktitle    = {{ICISSP}},
  pages        = {240--251},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/DantasBKNS23,
  author       = {Yuri Gil Dantas and
                  Simon Barner and
                  Pei Ke and
                  Vivek Nigam and
                  Ulrich Sch{\"{o}}pp},
  title        = {Automating Vehicle {SOA} Threat Analysis Using a Model-Based Methodology},
  booktitle    = {{ICISSP}},
  pages        = {180--191},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/DantasS23,
  author       = {Yuri Gil Dantas and
                  Ulrich Sch{\"{o}}pp},
  title        = {SeCloud: Computer-Aided Support for Selecting Security Measures for
                  Cloud Architectures},
  booktitle    = {{ICISSP}},
  pages        = {264--275},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/DienerB23,
  author       = {Michael Diener and
                  Thomas Bolz},
  title        = {Cloud Inspector: {A} Tool-Based Approach for Public Administrations
                  to Establish Information Security Processes Towards Public Clouds},
  booktitle    = {{ICISSP}},
  pages        = {543--551},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/DieterichSSSP23,
  author       = {Am{\'{e}}lie Dieterich and
                  Matthias Schopp and
                  Lars Stiemert and
                  Christoph Steininger and
                  Daniela P{\"{o}}hn},
  title        = {Evaluation of Persistence Methods Used by Malware on Microsoft Windows
                  Systems},
  booktitle    = {{ICISSP}},
  pages        = {552--559},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/DimaratosP23,
  author       = {Anastasia Dimaratos and
                  Daniela P{\"{o}}hn},
  title        = {Evaluation Scheme to Analyze Keystroke Dynamics Methods},
  booktitle    = {{ICISSP}},
  pages        = {357--365},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/DorafshanianM23,
  author       = {Mahboobeh Dorafshanian and
                  Mohamed Mejri},
  title        = {Differential Privacy: Toward a Better Tuning of the Privacy Budget
                  ({\(\epsilon\)}) Based on Risk},
  booktitle    = {{ICISSP}},
  pages        = {783--792},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/DrevinSDKA23,
  author       = {G{\"{u}}nther R. Drevin and
                  Dirk P. Snyman and
                  Lynette Drevin and
                  Hennie A. Kruger and
                  Johann Allers},
  title        = {The Story of Safety Snail and Her e-Mail: {A} Digital Wellness and
                  Cybersecurity Serious Game for Pre-School Children},
  booktitle    = {{ICISSP}},
  pages        = {519--527},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/EipperP23,
  author       = {Andreas Eipper and
                  Daniela P{\"{o}}hn},
  title        = {How to Design a Blue Team Scenario for Beginners on the Example of
                  Brute-Force Attacks on Authentications},
  booktitle    = {{ICISSP}},
  pages        = {477--484},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/ElsteC23,
  author       = {James R. Elste and
                  David T. Croasdell},
  title        = {Cyber Teaching Hospitals: Developing Cyber Workforce Competence},
  booktitle    = {{ICISSP}},
  pages        = {643--650},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/EmuraY23,
  author       = {Keita Emura and
                  Masato Yoshimi},
  title        = {An End-to-End Encrypted Cache System with Time-Dependent Access Control},
  booktitle    = {{ICISSP}},
  pages        = {321--328},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/ErdoganHBTP23,
  author       = {Gencer Erdogan and
                  Ragnhild Halvorsrud and
                  Costas Boletsis and
                  Simeon Tverdal and
                  John Brian Pickering},
  title        = {Cybersecurity Awareness and Capacities of SMEs},
  booktitle    = {{ICISSP}},
  pages        = {296--304},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/FarhatAMZ23,
  author       = {Saida Farhat and
                  Manel Abdelkader and
                  Amel Meddeb{-}Makhlouf and
                  Faouzi Zarai},
  title        = {Evaluation of DoS/DDoS Attack Detection with {ML} Techniques on {CIC-IDS2017}
                  Dataset},
  booktitle    = {{ICISSP}},
  pages        = {287--295},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/FloresGKBV23,
  author       = {C{\'{e}}sar V{\'{a}}squez Flores and
                  Jos{\'{e}} Gonzales and
                  Miranda Kajtazi and
                  Joseph Bugeja and
                  Bahtijar Vogel},
  title        = {Human Factors for Cybersecurity Awareness in a Remote Work Environment},
  booktitle    = {{ICISSP}},
  pages        = {608--616},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/GalliBJCP23,
  author       = {Filippo Galli and
                  Sayan Biswas and
                  Kangsoo Jung and
                  Tommaso Cucinotta and
                  Catuscia Palamidessi},
  title        = {Group Privacy for Personalized Federated Learning},
  booktitle    = {{ICISSP}},
  pages        = {252--263},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/GuerraMOF23,
  author       = {Michele Guerra and
                  Roberto Milanese and
                  Rocco Oliveto and
                  Fausto Fasano},
  title        = {RPCDroid: Runtime Identification of Permission Usage Contexts in Android
                  Applications},
  booktitle    = {{ICISSP}},
  pages        = {714--721},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/HanTT0ML23,
  author       = {Chansu Han and
                  Akira Tanaka and
                  Jun'ichi Takeuchi and
                  Takeshi Takahashi and
                  Tomohiro Morikawa and
                  Tsung{-}Nan Lin},
  title        = {Towards Long-Term Continuous Tracing of Internet-Wide Scanning Campaigns
                  Based on Darknet Analysis},
  booktitle    = {{ICISSP}},
  pages        = {617--625},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/HasegawaHF23,
  author       = {Kento Hasegawa and
                  Seira Hidano and
                  Kazuhide Fukushima},
  title        = {Automating {XSS} Vulnerability Testing Using Reinforcement Learning},
  booktitle    = {{ICISSP}},
  pages        = {70--80},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/HeidHRS23,
  author       = {Kris Heid and
                  Jens Heider and
                  Matthias Ritscher and
                  Jan{-}Peter Stotz},
  title        = {Tracing Cryptographic Agility in Android and iOS Apps},
  booktitle    = {{ICISSP}},
  pages        = {38--45},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/HoferRSM23,
  author       = {Philipp Hofer and
                  Michael Roland and
                  Philipp Schwarz and
                  Ren{\'{e}} Mayrhofer},
  title        = {Efficient Aggregation of Face Embeddings for Decentralized Face Recognition
                  Deployments},
  booktitle    = {{ICISSP}},
  pages        = {279--286},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/ImanCJBG23,
  author       = {Mohammad Reza Heidari Iman and
                  Pavel Chikul and
                  Gert Jervan and
                  Hayretdin Bahsi and
                  Tara Ghasempouri},
  title        = {Anomalous File System Activity Detection Through Temporal Association
                  Rule Mining},
  booktitle    = {{ICISSP}},
  pages        = {733--740},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/JulkuK23,
  author       = {Jukka Julku and
                  Markku Kyl{\"{a}}np{\"{a}}{\"{a}}},
  title        = {Towards a Rust {SDK} for Keystone Enclave Application Development},
  booktitle    = {{ICISSP}},
  pages        = {29--37},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/KaksonenHR23,
  author       = {Rauli Kaksonen and
                  Kimmo Halunen and
                  Juha R{\"{o}}ning},
  title        = {Vulnerabilities in IoT Devices, Backends, Applications, and Components},
  booktitle    = {{ICISSP}},
  pages        = {659--668},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/KamalI23,
  author       = {Ahmad Akmal Aminuddin Mohd Kamal and
                  Keiichi Iwamura},
  title        = {TTP-Aided Searchable Encryption of Documents Using Threshold Secret
                  Sharing},
  booktitle    = {{ICISSP}},
  pages        = {442--449},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/Khoumsi23,
  author       = {Ahmed Khoumsi},
  title        = {Automata-Based Study of Dynamic Access Control Policies},
  booktitle    = {{ICISSP}},
  pages        = {218--227},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/KiperbergRKZ23,
  author       = {Michael Kiperberg and
                  Aleksei Rozman and
                  Aleksei Kuraev and
                  Nezer Zaidenberg},
  title        = {{PDIFT:} {A} Practical Dynamic Information-Flow Tracker},
  booktitle    = {{ICISSP}},
  pages        = {192--198},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/KlineK23,
  author       = {Jace Kline and
                  Prasad Kulkarni},
  title        = {A Framework for Assessing Decompiler Inference Accuracy of Source-Level
                  Program Constructs},
  booktitle    = {{ICISSP}},
  pages        = {228--239},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/KokesL23,
  author       = {Josef Kokes and
                  R{\'{o}}bert L{\'{o}}rencz},
  title        = {On the Use of Multiple Approximations in the Linear Cryptanalysis
                  of Baby Rijndael},
  booktitle    = {{ICISSP}},
  pages        = {174--179},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/LauterbachMRBZV23,
  author       = {Filip Lauterbach and
                  Libor Michalek and
                  Piotr Rydlichowski and
                  Patrik Burdiak and
                  Jaroslav Zdralek and
                  Miroslav Vozn{\'{a}}k},
  title        = {Measurements of Cross-Border Quantum Key Distribution Link},
  booktitle    = {{ICISSP}},
  pages        = {418--423},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/LealWMMBM023,
  author       = {Erika A. Leal and
                  Cimone Wright{-}Hamor and
                  Joseph B. Manzano and
                  Nicholas J. Multari and
                  Kevin J. Barker and
                  David O. Manz and
                  Jiang Ming},
  title        = {Assessing Risk in High Performance Computing Attacks},
  booktitle    = {{ICISSP}},
  pages        = {793--803},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/LeichtH23,
  author       = {Jens Leicht and
                  Maritta Heisel},
  title        = {{P2BAC:} Privacy Policy Based Access Control Using {P-LPL}},
  booktitle    = {{ICISSP}},
  pages        = {686--697},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/Leitner23,
  author       = {Maria Leitner},
  title        = {A Scenario-Driven Cyber Security Awareness Exercise Utilizing Dynamic
                  Polling: Methodology and Lessons Learned},
  booktitle    = {{ICISSP}},
  pages        = {634--642},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/LiZSZ23,
  author       = {Lu Li and
                  Guanling Zhao and
                  Kai Shi and
                  Fengjun Zhang},
  title        = {A Stochastic Game Model for Cloud Platform Security},
  booktitle    = {{ICISSP}},
  pages        = {152--162},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/LohmannAM23,
  author       = {Pedro A. Lohmann and
                  Carlos Albuquerque and
                  Raphael Machado},
  title        = {Systematic Literature Review of Threat Modeling Concepts},
  booktitle    = {{ICISSP}},
  pages        = {163--173},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/LoumponiasRDTVK23,
  author       = {Kostas Loumponias and
                  Sotiris Raptis and
                  Eleni Darra and
                  Theodora Tsikrika and
                  Stefanos Vrochidis and
                  Ioannis Kompatsiaris},
  title        = {Forecasting Cyber-Attacks to Destination Ports Using Machine Learning},
  booktitle    = {{ICISSP}},
  pages        = {757--764},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/LuanHB23,
  author       = {Kaiying Luan and
                  Ragnhild Halvorsrud and
                  Costas Boletsis},
  title        = {Evaluation of a Tool to Increase Cybersecurity Awareness Among Non-experts
                  {(SME} Employees)},
  booktitle    = {{ICISSP}},
  pages        = {509--518},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/MarquesS23,
  author       = {Ant{\'{o}}nio Marques and
                  Bruno Sousa},
  title        = {{CHARRA-PM:} An Attestation Approach Relying on the Passport Model},
  booktitle    = {{ICISSP}},
  pages        = {349--356},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/MaugeriDBP23,
  author       = {Marcello Maugeri and
                  Cristian Daniele and
                  Giampaolo Bella and
                  Erik Poll},
  title        = {Evaluating the Fork-Awareness of Coverage-Guided Fuzzers},
  booktitle    = {{ICISSP}},
  pages        = {424--429},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/MercaldoMS23,
  author       = {Francesco Mercaldo and
                  Fabio Martinelli and
                  Antonella Santone},
  title        = {An Explainable Convolutional Neural Network for Dynamic Android Malware
                  Detection},
  booktitle    = {{ICISSP}},
  pages        = {305--312},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/NarisadaBFK23,
  author       = {Shintaro Narisada and
                  Shohei Beppu and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  title        = {Concrete Quantum Circuits to Prepare Generalized Dicke States on a
                  Quantum Machine},
  booktitle    = {{ICISSP}},
  pages        = {329--338},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/NeupaneS23,
  author       = {Ashish Neupane and
                  Weiqing Sun},
  title        = {Exploring False Demand Attacks in Power Grids with High {PV} Penetration},
  booktitle    = {{ICISSP}},
  pages        = {124--134},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/NichoS23,
  author       = {Mathew Nicho and
                  Ibrahim Sabry},
  title        = {Bypassing Multiple Security Layers Using Malicious {USB} Human Interface
                  Device},
  booktitle    = {{ICISSP}},
  pages        = {501--508},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/OhiraDAF23,
  author       = {Shuji Ohira and
                  Araya Kibrom Desta and
                  Ismail Arai and
                  Kazutoshi Fujikawa},
  title        = {{IVNPROTECT:} Isolable and Traceable Lightweight CAN-Bus Kernel-Level
                  Protection for Securing in-Vehicle Communication},
  booktitle    = {{ICISSP}},
  pages        = {17--28},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/OkadaF23,
  author       = {Hiroki Okada and
                  Kazuhide Fukushima},
  title        = {Revisiting the {DFT} Test in the {NIST} {SP} 800-22 Randomness Test
                  Suite},
  booktitle    = {{ICISSP}},
  pages        = {366--372},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/Pavlov0E23,
  author       = {Vitomir Pavlov and
                  Florian Hahn and
                  Mohammad El{-}Hajj},
  title        = {Security Aspects of Digital Twins in IoT},
  booktitle    = {{ICISSP}},
  pages        = {560--567},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/RabasBL23,
  author       = {Tom{\'{a}}s Rabas and
                  Jir{\'{\i}} Bucek and
                  R{\'{o}}bert L{\'{o}}rencz},
  title        = {{SPA} Attack on {NTRU} Protected Implementation with Sparse Representation
                  of Private Key},
  booktitle    = {{ICISSP}},
  pages        = {135--143},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/RaschkeHS23,
  author       = {Philip Raschke and
                  Patrick Herbke and
                  Henry Schwerdtner},
  title        = {t.ex-Graph: Automated Web Tracker Detection Using Centrality Metrics
                  and Data Flow Characteristics},
  booktitle    = {{ICISSP}},
  pages        = {199--209},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/RetiES23,
  author       = {Daniel Reti and
                  Karina Elzer and
                  Hans Dieter Schotten},
  title        = {{SCANTRAP:} Protecting Content Management Systems from Vulnerability
                  Scanners with Cyber Deception and Obfuscation},
  booktitle    = {{ICISSP}},
  pages        = {485--492},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/RieraAPR23,
  author       = {Francisco Blas {Izquierdo Riera} and
                  Magnus Almgren and
                  Pablo Picazo{-}Sanchez and
                  Christian Rohner},
  title        = {Clipaha: {A} Scheme to Perform Password Stretching on the Client},
  booktitle    = {{ICISSP}},
  pages        = {58--69},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/RochaAP23,
  author       = {Alexandra Rocha and
                  Rui Alves and
                  Tiago Pedrosa},
  title        = {Query Log Analysis for {SQL} Injection Detection},
  booktitle    = {{ICISSP}},
  pages        = {471--476},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/RocklWM23,
  author       = {Jonas R{\"{o}}ckl and
                  Adam Wagenh{\"{a}}user and
                  Tilo M{\"{u}}ller},
  title        = {Veto: Prohibit Outdated Edge System Software from Booting},
  booktitle    = {{ICISSP}},
  pages        = {46--57},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/RuelleGR23,
  author       = {Fr{\'{e}}d{\'{e}}ric Ruell{\'{e}} and
                  Quentin Guella{\"{e}}n and
                  Arnaud Rosay},
  title        = {{SHOID:} {A} Secure Herd of IoT Devices Firmware Update Protocol},
  booktitle    = {{ICISSP}},
  pages        = {373--380},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/SamirJ23,
  author       = {Areeg Samir and
                  H{\aa}vard Dagenborg Johansen},
  title        = {A Self-Configuration Controller To Detect, Identify, and Recover Misconfiguration
                  at IoT Edge Devices and Containerized Cluster System},
  booktitle    = {{ICISSP}},
  pages        = {765--773},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/SeidPB23,
  author       = {Elias Seid and
                  Oliver Popov and
                  Fredrik Blix},
  title        = {Towards Security Attack Event Monitoring for Cyber Physical-Systems},
  booktitle    = {{ICISSP}},
  pages        = {722--732},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/SeitzTGH23,
  author       = {Ludwig Seitz and
                  Marco Tiloca and
                  Martin Gunnarsson and
                  Rikard H{\"{o}}glund},
  title        = {Secure Software Updates for IoT Based on Industry Requirements},
  booktitle    = {{ICISSP}},
  pages        = {698--705},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/Stremlau23,
  author       = {Thorsten P. Stremlau},
  title        = {Protecting IoT Ecosystems and {AI} Leveraging {TCG} Standards},
  booktitle    = {{ICISSP}},
  pages        = {11},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/SugaiSTO23,
  author       = {Risa Sugai and
                  Yuichi Sei and
                  Yasuyuki Tahara and
                  Akihiko Ohsuga},
  title        = {A k-Anonymization Method for Social Network Data with Link Prediction},
  booktitle    = {{ICISSP}},
  pages        = {493--500},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/TangOB23,
  author       = {Feiyang Tang and
                  Bjarte M. {\O}stvold and
                  Magiel Bruntink},
  title        = {Identifying Personal Data Processing for Code Review},
  booktitle    = {{ICISSP}},
  pages        = {568--575},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/TavolatoLE23,
  author       = {Paul Tavolato and
                  Robert Luh and
                  Sebastian Eresheim},
  title        = {A Game Theoretic Analysis of Cyber Threats},
  booktitle    = {{ICISSP}},
  pages        = {706--713},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/Teseleanu23,
  author       = {George Teseleanu},
  title        = {Security Analysis of a Color Image Encryption Scheme Based on Dynamic
                  Substitution and Diffusion Operations},
  booktitle    = {{ICISSP}},
  pages        = {410--417},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/TokasES23,
  author       = {Shukun Tokas and
                  Gencer Erdogan and
                  Ketil St{\o}len},
  title        = {Privacy-Aware IoT: State-of-the-Art and Challenges},
  booktitle    = {{ICISSP}},
  pages        = {450--461},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/TranNE23,
  author       = {Thanh Tran and
                  Phu Nguyen and
                  Gencer Erdogan},
  title        = {A Systematic Review of Secure IoT Data Sharing},
  booktitle    = {{ICISSP}},
  pages        = {95--105},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/Volkamer23,
  author       = {Melanie Volkamer},
  title        = {Usable Security: Security 'Warnings' 2.0},
  booktitle    = {{ICISSP}},
  pages        = {5},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/WalkowP23,
  author       = {Marcus Walkow and
                  Daniela P{\"{o}}hn},
  title        = {Systematically Searching for Identity-Related Information in the Internet
                  with {OSINT} Tools},
  booktitle    = {{ICISSP}},
  pages        = {402--409},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/WangAH23,
  author       = {Yichao Wang and
                  Budi Arief and
                  Julio C. Hernandez{-}Castro},
  title        = {Dark Ending: What Happens when a Dark Web Market Closes down},
  booktitle    = {{ICISSP}},
  pages        = {106--117},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/WatanabeMKU23,
  author       = {Ryu Watanabe and
                  Takashi Matsunaka and
                  Ayumu Kubota and
                  Jumpei Urakawa},
  title        = {Machine Learning Based Prediction of Vulnerability Information Subject
                  to a Security Alert},
  booktitle    = {{ICISSP}},
  pages        = {313--320},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/WolfLT23,
  author       = {Zechariah Wolf and
                  Eric Larson and
                  Mitchell A. Thornton},
  title        = {Data Leakage in Isolated Virtualized Enterprise Computing Systems},
  booktitle    = {{ICISSP}},
  pages        = {118--123},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/ZhangWHWZS23,
  author       = {Hanwen Zhang and
                  Wenyong Wang and
                  Lisheng Huang and
                  Junrui Wu and
                  Fengjun Zhang and
                  Kai Shi},
  title        = {Correlating Intrusion Detection with Attack Graph on Virtual Computer
                  Networkings},
  booktitle    = {{ICISSP}},
  pages        = {651--658},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/Zhong023,
  author       = {Yinzheng Zhong and
                  Alexei Lisitsa},
  title        = {Online Transition-Based Feature Generation for Anomaly Detection in
                  Concurrent Data Streams},
  booktitle    = {{ICISSP}},
  pages        = {576--582},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/ZolotavkinBLMK23,
  author       = {Yevhen Zolotavkin and
                  Yurii Baryshev and
                  Vitalii Lukichov and
                  Jannik M{\"{a}}hn and
                  Stefan K{\"{o}}psell},
  title        = {Improving Unlinkability in {C-ITS:} {A} Methodology For Optimal Obfuscation},
  booktitle    = {{ICISSP}},
  pages        = {677--685},
  publisher    = {SciTePress},
  year         = {2023}
}
@proceedings{DBLP:conf/icissp/2022s,
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Information Systems Security and Privacy - 7th International Conference,
                  {ICISSP} 2021, Virtual Event, February 11-13, 2021, and 8th International
                  Conference, {ICISSP} 2022, Virtual Event, February 9-11, 2022, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1851},
  publisher    = {Springer},
  year         = {2023}
}
@proceedings{DBLP:conf/icissp/2023,
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  publisher    = {SciTePress},
  year         = {2023}
}
@inproceedings{DBLP:conf/icissp/AarlandG22,
  author       = {Mari Aarland and
                  Terje Gj{\o}s{\ae}ter},
  title        = {Digital Supply Chain Vulnerabilities in Critical Infrastructure: {A}
                  Systematic Literature Review on Cybersecurity in the Energy Sector},
  booktitle    = {{ICISSP}},
  pages        = {326--333},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/Al-JuaidLS22,
  author       = {Nouf Al{-}Juaid and
                  Alexei Lisitsa and
                  Sven Schewe},
  title        = {{SMPG:} Secure Multi Party Computation on Graph Databases},
  booktitle    = {{ICISSP}},
  pages        = {463--471},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/AlShuhailS22,
  author       = {Asma AlShuhail and
                  Jianhue Shao},
  title        = {Semantic Attack on Disassociated Transactions},
  booktitle    = {{ICISSP}},
  pages        = {60--72},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/AlasmariW022,
  author       = {Sultan Alasmari and
                  Weichao Wang and
                  Yu Wang},
  title        = {Incentivisation of Outsourced Network Testing: View from Platform
                  Perspective},
  booktitle    = {{ICISSP}},
  pages        = {499--506},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/AlbalawiVC22,
  author       = {Abdullah Albalawi and
                  Vassilios G. Vassilakis and
                  Radu Calinescu},
  title        = {Protecting Shared Virtualized Environments against Cache Side-channel
                  Attacks},
  booktitle    = {{ICISSP}},
  pages        = {507--514},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/AliHJLST22,
  author       = {Muhammad Ali and
                  Monem Hamid and
                  Jacob Jasser and
                  Joachim Lerman and
                  Samod Shetty and
                  Fabio Di Troia},
  title        = {Profile Hidden Markov Model Malware Detection and {API} Call Obfuscation},
  booktitle    = {{ICISSP}},
  pages        = {688--695},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/AlmarwaniK022,
  author       = {Maryam Almarwani and
                  Boris Konev and
                  Alexei Lisitsa},
  title        = {Zero Update Encryption Adjustment on Encrypted Database Queries},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1851},
  pages        = {25--47},
  publisher    = {Springer},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/AlmarwaniKL22,
  author       = {Maryam Almarwani and
                  Boris Konev and
                  Alexei Lisitsa},
  title        = {Efficient and Secure Encryption Adjustment for {JSON} Data},
  booktitle    = {{ICISSP}},
  pages        = {307--313},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/AnagrehLV22,
  author       = {Mohammad Anagreh and
                  Peeter Laud and
                  Eero Vainikko},
  title        = {Privacy-preserving Parallel Computation of Shortest Path Algorithms
                  with Low Round Complexity},
  booktitle    = {{ICISSP}},
  pages        = {37--47},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/BaksiU22,
  author       = {Rudra Prasad Baksi and
                  Shambhu J. Upadhyaya},
  title        = {Game Theoretic Analysis of Ransomware: {A} Preliminary Study},
  booktitle    = {{ICISSP}},
  pages        = {242--251},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/BaksiU22a,
  author       = {Rudra Prasad Baksi and
                  Shambhu J. Upadhyaya},
  title        = {A Game Theoretic Approach to the Design of Mitigation Strategies for
                  Generic Ransomware},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1851},
  pages        = {104--124},
  publisher    = {Springer},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/BarberF22,
  author       = {Flora Barber and
                  Steven Furnell},
  title        = {Benchmarking Consumer Data and Privacy Knowledge in Connected and
                  Autonomous Vehicles},
  booktitle    = {{ICISSP}},
  pages        = {426--434},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/BarberF22a,
  author       = {Flora Barber and
                  Steven Furnell},
  title        = {Evaluating Consumer Understanding and Awareness of Connected and Autonomous
                  Vehicle Data Privacy},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1851},
  pages        = {48--71},
  publisher    = {Springer},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/BartonBPSA22,
  author       = {Jon Barton and
                  William J. Buchanan and
                  Nikolaos Pitropakis and
                  Sarwar Sayeed and
                  Will Abramson},
  title        = {Post Quantum Cryptography Analysis of {TLS} Tunneling on a Constrained
                  Device},
  booktitle    = {{ICISSP}},
  pages        = {551--561},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/BorcherdingFKMB22,
  author       = {Anne Borcherding and
                  Lukas Feldmann and
                  Markus Karch and
                  Ankush Meshram and
                  J{\"{u}}rgen Beyerer},
  title        = {Towards a Better Understanding of Machine Learning based Network Intrusion
                  Detection Systems in Industrial Networks},
  booktitle    = {{ICISSP}},
  pages        = {314--325},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/BorcherdingTB22,
  author       = {Anne Borcherding and
                  Philipp Takacs and
                  J{\"{u}}rgen Beyerer},
  title        = {Cluster Crash: Learning from Recent Vulnerabilities in Communication
                  Stacks},
  booktitle    = {{ICISSP}},
  pages        = {334--344},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/BracamonteI22,
  author       = {Vanessa Bracamonte and
                  Takamasa Isohara},
  title        = {Comparing Perception of Disclosure of Different Types of Information
                  Related to Automated Tools},
  booktitle    = {{ICISSP}},
  pages        = {544--550},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/CanU22,
  author       = {{\"{O}}zg{\"{u}} Can and
                  Murat Osman {\"{U}}nalir},
  title        = {Revisiting Ontology Based Access Control: The Case for Ontology Based
                  Data Access},
  booktitle    = {{ICISSP}},
  pages        = {515--518},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/CanU22a,
  author       = {{\"{O}}zg{\"{u}} Can and
                  Murat Osman {\"{U}}nalir},
  title        = {Improving Data Security and Privacy for Ontology Based Data Access},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1851},
  pages        = {72--90},
  publisher    = {Springer},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/CarrierVTL22,
  author       = {Tristan Carrier and
                  Princy Victor and
                  Ali Tekeoglu and
                  Arash Habibi Lashkari},
  title        = {Detecting Obfuscated Malware using Memory Feature Engineering},
  booktitle    = {{ICISSP}},
  pages        = {177--188},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/CatuognoG22,
  author       = {Luigi Catuogno and
                  Clemente Galdi},
  title        = {On Tracking Ransomware on the File System},
  booktitle    = {{ICISSP}},
  pages        = {210--219},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/ChenLTH22,
  author       = {Shang{-}Wen Chen and
                  Jian{-}Wei Liao and
                  Chia{-}Wei Tien and
                  Jung{-}Hsin Hsiao},
  title        = {Impact of Cross-standard Cell Libraries on Machine Learning based
                  Hardware Trojan Detection},
  booktitle    = {{ICISSP}},
  pages        = {420--425},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/ChoudhuryLN22,
  author       = {Robert Choudhury and
                  Zhiyuan Luo and
                  Khuong An Nguyen},
  title        = {Malware in Motion},
  booktitle    = {{ICISSP}},
  pages        = {595--602},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/CilliMMV22,
  author       = {Claudio Cilli and
                  Giulio Magnanini and
                  Lorenzo Manduca and
                  Fabrizio Venettoni},
  title        = {"Fake News Detector": An Automatic System for the Reliability Evaluation
                  of Digital News},
  booktitle    = {{ICISSP}},
  pages        = {15--24},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/CivekT22,
  author       = {Asl{\'{\i}} Basak Civek and
                  Cihangir Tezcan},
  title        = {Differential-linear Attacks on Permutation Ciphers Revisited: Experiments
                  on Ascon and DryGASCON},
  booktitle    = {{ICISSP}},
  pages        = {202--209},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/CivekT22a,
  author       = {Asl{\'{\i}} Basak Civek and
                  Cihangir Tezcan},
  title        = {Experimentally Obtained Differential-Linear Distinguishers for Permutations
                  of {ASCON} and DryGASCON},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1851},
  pages        = {91--103},
  publisher    = {Springer},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/DaoudaghM22,
  author       = {Said Daoudagh and
                  Eda Marchetti},
  title        = {The {GDPR} Compliance and Access Control Systems: Challenges and Research
                  Opportunities},
  booktitle    = {{ICISSP}},
  pages        = {571--578},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/DavidianVK22,
  author       = {Matan Davidian and
                  Natalia Vanetik and
                  Michael Kiperberg},
  title        = {Ransomware Detection with Deep Neural Networks},
  booktitle    = {{ICISSP}},
  pages        = {656--663},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/DaviesS22,
  author       = {Jack R. Davies and
                  Jianhua Shao},
  title        = {Utility of Anonymised Data in Decision Tree Derivation},
  booktitle    = {{ICISSP}},
  pages        = {273--280},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/DemetriouBH22,
  author       = {Phil Demetriou and
                  Ingolf Becker and
                  Stephen Hailes},
  title        = {Who Watches the Watchers: {A} Multi-Task Benchmark for Anomaly Detection},
  booktitle    = {{ICISSP}},
  pages        = {579--586},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/Ebad22,
  author       = {Shouki A. Ebad},
  title        = {An Exploratory Study of Why UMLsec Is Not Adopted},
  booktitle    = {{ICISSP}},
  pages        = {357--364},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/ElmiligiS22,
  author       = {Haytham Elmiligi and
                  Sherif Saad},
  title        = {iProfile: Collecting and Analyzing Keystroke Dynamics from Android
                  Users},
  booktitle    = {{ICISSP}},
  pages        = {621--628},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/FahlanderE0D22,
  author       = {Per Fahlander and
                  Mathias Ekstedt and
                  Preetam Mukherjee and
                  Ashish Kumar Dwivedi},
  title        = {Containment Strategy Formalism in a Probabilistic Threat Modelling
                  Framework},
  booktitle    = {{ICISSP}},
  pages        = {108--120},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/GaficTKHQ22,
  author       = {Melisa Gafic and
                  Simon Tjoa and
                  Peter Kieseberg and
                  Otto Hellwig and
                  Gerald Quirchmayr},
  title        = {Cyber Exercises in Computer Science Education},
  booktitle    = {{ICISSP}},
  pages        = {404--411},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/HallJLS22,
  author       = {Joanne L. Hall and
                  Jomin John and
                  Jessica Liebig and
                  Anju Skariah},
  title        = {Age Bias in Finger Vein Biometric Research},
  booktitle    = {{ICISSP}},
  pages        = {472--477},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/HeidTHS22,
  author       = {Kris Heid and
                  Tobias Tefke and
                  Jens Heider and
                  Ralf C. Staudemeyer},
  title        = {Android Data Storage Locations and What App Developers Do with It
                  from a Security and Privacy Perspective},
  booktitle    = {{ICISSP}},
  pages        = {378--387},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/HekkalaHV22,
  author       = {Julius Hekkala and
                  Kimmo Halunen and
                  Visa Antero Vallivaara},
  title        = {Implementing Post-quantum Cryptography for Developers},
  booktitle    = {{ICISSP}},
  pages        = {73--83},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/IssakhaniVTL22,
  author       = {Maryam Issakhani and
                  Princy Victor and
                  Ali Tekeoglu and
                  Arash Habibi Lashkari},
  title        = {{PDF} Malware Detection based on Stacking Learning},
  booktitle    = {{ICISSP}},
  pages        = {562--570},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/KanamoriSTN22,
  author       = {Sachiko Kanamori and
                  Hirotsune Sato and
                  Naoya Tabata and
                  Ryo Nojima},
  title        = {Construction of a Support Tool for User Reading of Privacy Policies
                  and Assessment of its User Impact},
  booktitle    = {{ICISSP}},
  pages        = {412--419},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/KarimniaMS22,
  author       = {Rooya Karimnia and
                  Kaie Maennel and
                  Mahtab Shahin},
  title        = {Culturally-sensitive Cybersecurity Awareness Program Design for Iranian
                  High-school Students},
  booktitle    = {{ICISSP}},
  pages        = {121--132},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/KiechleBNB022,
  author       = {Valentin Kiechle and
                  Matthias B{\"{o}}rsig and
                  Sven Nitzsche and
                  Ingmar Baumgart and
                  J{\"{u}}rgen Becker},
  title        = {{PREUNN:} Protocol Reverse Engineering using Neural Networks},
  booktitle    = {{ICISSP}},
  pages        = {345--356},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/KumazakiHYST22,
  author       = {Masahito Kumazaki and
                  Hirokazu Hasegawa and
                  Yukiko Yamaguchi and
                  Hajime Shimada and
                  Hiroki Takakura},
  title        = {Cyber Attack Stage Tracing System based on Attack Scenario Comparison},
  booktitle    = {{ICISSP}},
  pages        = {587--594},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/KunduPV22,
  author       = {Rohon Kundu and
                  Alessandro De Piccoli and
                  Andrea Visconti},
  title        = {Public Key Compression and Fast Polynomial Multiplication for {NTRU}
                  using the Corrected Hybridized NTT-Karatsuba Method},
  booktitle    = {{ICISSP}},
  pages        = {145--153},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/LangnerSFQ22,
  author       = {Gregor Langner and
                  Florian Skopik and
                  Steven Furnell and
                  Gerald Quirchmayr},
  title        = {A Tailored Model for Cyber Security Education Utilizing a Cyber Range},
  booktitle    = {{ICISSP}},
  pages        = {365--377},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/LeePPPT22,
  author       = {Hoseong Asher Lee and
                  Nikhil Prathapani and
                  Rajesh Paturi and
                  Sarp Parmaksiz and
                  Fabio Di Troia},
  title        = {NLP-based User Authentication through Mouse Dynamics},
  booktitle    = {{ICISSP}},
  pages        = {696--702},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/LeeSAS0SLT22,
  author       = {Matthew Lee and
                  Joshua Sylvester and
                  Sunjoli Aggarwal and
                  Aviraj Sinha and
                  Michael A. Taylor and
                  Nathan Srirama and
                  Eric C. Larson and
                  Mitchell A. Thornton},
  title        = {Side Channel Identification using Granger Time Series Clustering with
                  Applications to Control Systems},
  booktitle    = {{ICISSP}},
  pages        = {290--298},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/LingE22,
  author       = {Engla Rencelj Ling and
                  Mathias Ekstedt},
  title        = {Estimating the Time-To-Compromise of Exploiting Industrial Control
                  System Vulnerabilities},
  booktitle    = {{ICISSP}},
  pages        = {96--107},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/LorunserWK22,
  author       = {Thomas Lor{\"{u}}nser and
                  Florian Wohner and
                  Stephan Krenn},
  title        = {A Privacy-Preserving Auction Platform with Public Verifiability for
                  Smart Manufacturing},
  booktitle    = {{ICISSP}},
  pages        = {637--647},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/MadiSSG22,
  author       = {Abbass Madi and
                  Oana Stan and
                  Renaud Sirdey and
                  C{\'{e}}dric Gouy{-}Pailler},
  title        = {SecTL: Secure and Verifiable Transfer Learning-based inference},
  booktitle    = {{ICISSP}},
  pages        = {220--229},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/MaurelVR22,
  author       = {H{\'{e}}lo{\"{\i}}se Maurel and
                  Santiago A. Vidal and
                  Tamara Rezk},
  title        = {Comparing the Detection of {XSS} Vulnerabilities in Node.js and a
                  Multi-tier JavaScript-based Language via Deep Learning},
  booktitle    = {{ICISSP}},
  pages        = {189--201},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/MercaldoMS022,
  author       = {Francesco Mercaldo and
                  Fabio Martinelli and
                  Antonella Santone and
                  Vinod P.},
  title        = {On the Influence of Image Settings in Deep Learning-based Malware
                  Detection},
  booktitle    = {{ICISSP}},
  pages        = {669--676},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/MohammadianL022,
  author       = {Hesamodin Mohammadian and
                  Arash Habibi Lashkari and
                  Ali A. Ghorbani},
  title        = {Evaluating Deep Learning-based {NIDS} in Adversarial Settings},
  booktitle    = {{ICISSP}},
  pages        = {435--444},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/NabeelG22,
  author       = {Mohamad Nabeel and
                  Christine Gro{\ss}e},
  title        = {Classifying {COVID-19} Disinformation on Twitter using a Convolutional
                  Neural Network},
  booktitle    = {{ICISSP}},
  pages        = {264--272},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/NaserediniGSBSC22,
  author       = {Amir Naseredini and
                  Stefan Gast and
                  Martin Schwarzl and
                  Pedro Miguel Sousa Bernardo and
                  Amel Smajic and
                  Claudio Canella and
                  Martin Berger and
                  Daniel Gruss},
  title        = {Systematic Analysis of Programming Languages and Their Execution Environments
                  for Spectre Attacks},
  booktitle    = {{ICISSP}},
  pages        = {48--59},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/OttMG22,
  author       = {David Ott and
                  Dennis Moreau and
                  Manish Gaur},
  title        = {Planning for Cryptographic Readiness in an Era of Quantum Computing
                  Advancement},
  booktitle    = {{ICISSP}},
  pages        = {491--498},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/PattiyanonA22,
  author       = {Charnon Pattiyanon and
                  Toshiaki Aoki},
  title        = {Analysis and Enhancement of Self-sovereign Identity System Properties
                  Compiling Standards and Regulations},
  booktitle    = {{ICISSP}},
  pages        = {133--144},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/Picazo-SanchezA22,
  author       = {Pablo Picazo{-}Sanchez and
                  Maximilian Algehed and
                  Andrei Sabelfeld},
  title        = {DeDup.js: Discovering Malicious and Vulnerable Extensions by Detecting
                  Duplication},
  booktitle    = {{ICISSP}},
  pages        = {528--535},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/PonsardM22,
  author       = {Christophe Ponsard and
                  Philippe Massonet},
  title        = {Survey and Guidelines about Learning Cyber Security Risk Assessment},
  booktitle    = {{ICISSP}},
  pages        = {536--543},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/RahmanMHA22,
  author       = {Md. Rashedur Rahman and
                  Elizabeth Miller and
                  Moinul Hossain and
                  Aisha I. Ali{-}Gombe},
  title        = {Intent-aware Permission Architecture: {A} Model for Rethinking Informed
                  Consent for Android Apps},
  booktitle    = {{ICISSP}},
  pages        = {154--164},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/Rashid22,
  author       = {Awais Rashid},
  title        = {Why Rigorous Underpinnings for Cyber Security Education and Training
                  Matter? Experiences from CyBOK: The Cyber Security Body of Knowledge},
  booktitle    = {{ICISSP}},
  pages        = {5},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/RosayCCL22,
  author       = {Arnaud Rosay and
                  Elo{\"{\i}}se Cheval and
                  Florent Carlier and
                  Pascal Leroux},
  title        = {Network Intrusion Detection: {A} Comprehensive Analysis of {CIC-IDS2017}},
  booktitle    = {{ICISSP}},
  pages        = {25--36},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/RuckaW22,
  author       = {Agnieszka Rucka and
                  Wojciech Wodo},
  title        = {On the {LPSE} Password Meter's Discrepancies among Different Datasets},
  booktitle    = {{ICISSP}},
  pages        = {255--263},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/Sadeh22,
  author       = {Norman M. Sadeh},
  title        = {Why Usability Has Become Privacy's Biggest Challenge and What We Can
                  Do About It},
  booktitle    = {{ICISSP}},
  pages        = {9},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/Samarati22,
  author       = {Pierangela Samarati},
  title        = {Data Security and Privacy in Emerging Scenarios},
  booktitle    = {{ICISSP}},
  pages        = {7},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/SandovalL22,
  author       = {Itzel V{\'{a}}zquez Sandoval and
                  Gabriele Lenzini},
  title        = {Can We Formally Catch Cheating in E-exams?},
  booktitle    = {{ICISSP}},
  pages        = {648--655},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/SerretLG22,
  author       = {Elsa Serret and
                  Antoine Lesueur and
                  Alban Gabillon},
  title        = {Linguistic Steganography for Messaging Applications},
  booktitle    = {{ICISSP}},
  pages        = {519--527},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/SertkayaK22,
  author       = {Isa Sertkaya and
                  {\"{O}}znur Kalkar},
  title        = {Cryptanalysis of Some Electronic Checkbook Schemes},
  booktitle    = {{ICISSP}},
  pages        = {603--612},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/SnymanK22,
  author       = {Dirk P. Snyman and
                  Hennie A. Kruger},
  title        = {The Role of Information Deserts in Information Security Awareness
                  and Behaviour},
  booktitle    = {{ICISSP}},
  pages        = {613--620},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/Soares22,
  author       = {Alberto Magno Muniz Soares},
  title        = {WhatsApp Web Client Live Forensics Technique},
  booktitle    = {{ICISSP}},
  pages        = {629--636},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/TalbiVLFC022,
  author       = {Adam Talbi and
                  Arthur Viens and
                  Louis{-}Cl{\'{e}}ment Leroux and
                  Morgane Fran{\c{c}}ois and
                  Mathias Caillol and
                  Nga Nguyen},
  title        = {Feature Importance and Deep Learning for Android Malware Detection},
  booktitle    = {{ICISSP}},
  pages        = {453--462},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/TavolatoLE22,
  author       = {Paul Tavolato and
                  Robert Luh and
                  Sebastian Eresheim},
  title        = {Formalizing Real-world Threat Scenarios},
  booktitle    = {{ICISSP}},
  pages        = {281--289},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/UljansB22,
  author       = {Austris Uljans and
                  Bernhards Blumbergs},
  title        = {Industrial and Automation Control System Cyber Range Prototype for
                  Offensive Capability Development},
  booktitle    = {{ICISSP}},
  pages        = {478--490},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/VeronesePFL22,
  author       = {Leonardo Veronese and
                  Francesco Palmarini and
                  Riccardo Focardi and
                  Flaminia L. Luccio},
  title        = {A Fast and Cost-effective Design for FPGA-based Fuzzy Rainbow Tradeoffs},
  booktitle    = {{ICISSP}},
  pages        = {165--176},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/WangB22,
  author       = {Tian Wang and
                  Masooda N. Bashir},
  title        = {An Analysis of Cloud Certifications' Performance on Privacy Protections},
  booktitle    = {{ICISSP}},
  pages        = {299--306},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/WareusDTH22,
  author       = {Emil W{\aa}reus and
                  Anton Duppils and
                  Magnus Tullberg and
                  Martin Hell},
  title        = {Security Issue Classification for Vulnerability Management with Semi-supervised
                  Learning},
  booktitle    = {{ICISSP}},
  pages        = {84--95},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/WenS22,
  author       = {Shengyuan Wen and
                  Weiqing Sun},
  title        = {SpamFender: {A} Semi-supervised Incremental Spam Classification System
                  across Social Networks},
  booktitle    = {{ICISSP}},
  pages        = {388--395},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/WerdenML22,
  author       = {David Werden and
                  Matthew Muccioli and
                  Anyi Liu},
  title        = {TEEm: {A} Tangle-based Elastic Emulator for Storing Connected Vehicle
                  Data in a Distributed Ledger Technology},
  booktitle    = {{ICISSP}},
  pages        = {230--241},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/WuSZYLZGLH22,
  author       = {Yixiong Wu and
                  Shangru Song and
                  Jianwei Zhuge and
                  Tingting Yin and
                  Tianyi Li and
                  Junmin Zhu and
                  Guannan Guo and
                  Yue Liu and
                  Jianju Hu},
  title        = {ICScope: Detecting and Measuring Vulnerable {ICS} Devices Exposed
                  on the Internet},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1851},
  pages        = {1--24},
  publisher    = {Springer},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/XiaoNFS22,
  author       = {Junhui Xiao and
                  Ashish Neupane and
                  Hiba F. Fayoumi and
                  Weiqing Sun},
  title        = {A Novel Key Exchange Protocol using Logic Algebra for the Factorization
                  Problem},
  booktitle    = {{ICISSP}},
  pages        = {396--403},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/YassinR22,
  author       = {Ghadeer I. Yassin and
                  Lakshmish Ramaswamy},
  title        = {Effective {\&} Efficient Access Control in Smart Farms: Opportunities,
                  Challenges {\&} Potential Approaches},
  booktitle    = {{ICISSP}},
  pages        = {445--452},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/YonamineTK22,
  author       = {Shun Yonamine and
                  Yuzo Taenaka and
                  Youki Kadobayashi},
  title        = {Tamer: {A} Sandbox for Facilitating and Automating IoT Malware Analysis
                  with Techniques to Elicit Malicious Behavior},
  booktitle    = {{ICISSP}},
  pages        = {677--687},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@proceedings{DBLP:conf/icissp/2020s,
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Information Systems Security and Privacy - 6th International Conference,
                  {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1545},
  publisher    = {Springer},
  year         = {2022}
}
@proceedings{DBLP:conf/icissp/2022,
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  publisher    = {{SCITEPRESS}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icissp/0002E0SE21,
  author       = {Clemens Brunner and
                  G{\"{u}}nther Eibl and
                  Peter Fr{\"{o}}hlich and
                  Andreas Sackl and
                  Dominik Engel},
  title        = {Who Stores the Private Key? An Exploratory Study about User Preferences
                  of Key Management for Blockchain-based Applications},
  booktitle    = {{ICISSP}},
  pages        = {23--32},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/0018O021,
  author       = {Yan Yan and
                  Elisabeth Oswald and
                  Srinivas Vivek},
  title        = {An Analytic Attack against {ARX} Addition Exploiting Standard Side-channel
                  Leakage},
  booktitle    = {{ICISSP}},
  pages        = {89--97},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/0046CKLG21,
  author       = {Lu Zhang and
                  Reginald Cushing and
                  Ralph Koning and
                  Cees de Laat and
                  Paola Grosso},
  title        = {Profiling and Discriminating of Containerized {ML} Applications in
                  Digital Data Marketplaces {(DDM)}},
  booktitle    = {{ICISSP}},
  pages        = {508--515},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/AkandeT21,
  author       = {Alexander O. Akande and
                  Vu N. Tran},
  title        = {Predicting Security Program Effectiveness in Bring-Your-Own-Device
                  Deployment in Organizations},
  booktitle    = {{ICISSP}},
  pages        = {55--65},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/Al-MaweeCM21,
  author       = {Wassnaa Al{-}Mawee and
                  Steve Carr and
                  Jean Mayo},
  title        = {Admonita: {A} Recommendation-based Trust Model for Dynamic Data Integrity},
  booktitle    = {{ICISSP}},
  pages        = {273--282},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/AlmarwaniKL21,
  author       = {Maryam Almarwani and
                  Boris Konev and
                  Alexei Lisitsa},
  title        = {Release-aware In-out Encryption Adjustment in MongoDB Query Processing},
  booktitle    = {{ICISSP}},
  pages        = {714--722},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/AlturkiKKNST21,
  author       = {Musab A. Alturki and
                  Tajana Ban Kirigin and
                  Max I. Kanovich and
                  Vivek Nigam and
                  Andre Scedrov and
                  Carolyn L. Talcott},
  title        = {On Security Analysis of Periodic Systems: Expressiveness and Complexity},
  booktitle    = {{ICISSP}},
  pages        = {43--54},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/AmitYKZ21,
  author       = {Guy Amit and
                  Amir Yeshooroon and
                  Michael Kiperberg and
                  Nezer J. Zaidenberg},
  title        = {DLP-Visor: {A} Hypervisor-based Data Leakage Prevention System},
  booktitle    = {{ICISSP}},
  pages        = {416--423},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/AnagrehVL21,
  author       = {Mohammad Anagreh and
                  Eero Vainikko and
                  Peeter Laud},
  title        = {Parallel Privacy-preserving Computation of Minimum Spanning Trees},
  booktitle    = {{ICISSP}},
  pages        = {181--190},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/AyotteBHS21,
  author       = {Blaine Ayotte and
                  Mahesh K. Banavar and
                  Daqing Hou and
                  Stephanie Schuckers},
  title        = {Study of Intra- and Inter-user Variance in Password Keystroke Dynamics},
  booktitle    = {{ICISSP}},
  pages        = {467--474},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/BasuKB21,
  author       = {Srijita Basu and
                  Sandip Karmakar and
                  Debasish Bera},
  title        = {Blockchain based Secured Virtual Machine Image Monitor},
  booktitle    = {{ICISSP}},
  pages        = {432--439},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/BhattacharjyaS21,
  author       = {Sairath Bhattacharjya and
                  Hossein Saiedian},
  title        = {A Novel Simplified Framework to Secure IoT Communications},
  booktitle    = {{ICISSP}},
  pages        = {399--406},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/BohmVP21,
  author       = {Fabian B{\"{o}}hm and
                  Manfred Vielberth and
                  G{\"{u}}nther Pernul},
  title        = {Bridging Knowledge Gaps in Security Analytics},
  booktitle    = {{ICISSP}},
  pages        = {98--108},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/BoudguigaSFLC21,
  author       = {Aymen Boudguiga and
                  Oana Stan and
                  Abdessamad Fazzat and
                  Houda Labiod and
                  Pierre{-}Emmanuel Clet},
  title        = {Privacy Preserving Services for Intelligent Transportation Systems
                  with Homomorphic Encryption},
  booktitle    = {{ICISSP}},
  pages        = {684--693},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/BracamonteTK21,
  author       = {Vanessa Bracamonte and
                  Welderufael B. Tesfay and
                  Shinsaku Kiyomoto},
  title        = {Towards Exploring User Perception of a Privacy Sensitive Information
                  Detection Tool},
  booktitle    = {{ICISSP}},
  pages        = {628--634},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/BryantS21,
  author       = {Blake D. Bryant and
                  Hossein Saiedian},
  title        = {A State Saturation Attack against Massively Multiplayer Online Videogames},
  booktitle    = {{ICISSP}},
  pages        = {217--225},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/CadalzoTOMW21,
  author       = {Lucas Cadalzo and
                  Christopher H. Todd and
                  Banjo Obayomi and
                  W. Brad Moore and
                  Anthony C. Wong},
  title        = {Canopy: {A} Learning-based Approach for Automatic Low-and-Slow DDoS
                  Mitigation},
  booktitle    = {{ICISSP}},
  pages        = {356--367},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/CasolareMMS21,
  author       = {Rosangela Casolare and
                  Fabio Martinelli and
                  Francesco Mercaldo and
                  Antonella Santone},
  title        = {Colluding Covert Channel for Malicious Information Exfiltration in
                  Android Environment},
  booktitle    = {{ICISSP}},
  pages        = {811--818},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/ChabanneDG21,
  author       = {Herv{\'{e}} Chabanne and
                  Vincent Despiegel and
                  Linda Guiga},
  title        = {A Protection against the Extraction of Neural Network Models},
  booktitle    = {{ICISSP}},
  pages        = {258--269},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/CholterES21,
  author       = {William La Cholter and
                  Matthew Elder and
                  Antonius Stalick},
  title        = {Windows Malware Binaries in {C/C++} GitHub Repositories: Prevalence
                  and Lessons Learned},
  booktitle    = {{ICISSP}},
  pages        = {475--484},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/DahdahLKLDG21,
  author       = {Christian Dahdah and
                  Coline Van Leeuwen and
                  Ziad Kheil and
                  J{\'{e}}r{\^{o}}me Lacan and
                  Jonathan Detchart and
                  Thibault Gateau},
  title        = {Enabling Monetization of Depreciating Data on Blockchains},
  booktitle    = {{ICISSP}},
  pages        = {500--507},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/DamT21,
  author       = {Khanh{-}Huu{-}The Dam and
                  Tayssir Touili},
  title        = {{MADLIRA:} {A} Tool for Android Malware Detection},
  booktitle    = {{ICISSP}},
  pages        = {670--675},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/DangTS21,
  author       = {Dennis Dang and
                  Fabio Di Troia and
                  Mark Stamp},
  title        = {Malware Classification using Long Short-term Memory Models},
  booktitle    = {{ICISSP}},
  pages        = {743--752},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/DaoudaghMSBA21,
  author       = {Said Daoudagh and
                  Eda Marchetti and
                  Vincenzo Savarino and
                  Roberto Di Bernardo and
                  Marco Alessi},
  title        = {How to Improve the {GDPR} Compliance through Consent Management and
                  Access Control},
  booktitle    = {{ICISSP}},
  pages        = {534--541},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/DavilaLT21,
  author       = {Carlos Ocanto D{\'{a}}vila and
                  Roc{\'{\i}}o Cabrera Lozoya and
                  Slim Trabelsi},
  title        = {Sociocultural Influences for Password Definition: An AI-based Study},
  booktitle    = {{ICISSP}},
  pages        = {542--549},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/ErdoganRZZBAOPK21,
  author       = {Gencer Erdogan and
                  Antonio {\'{A}}lvarez Romero and
                  Niccol{\`{o}} Zazzeri and
                  Anze Zitnik and
                  Mariano Basile and
                  Giorgio Aprile and
                  Mafalda Os{\'{o}}rio and
                  Claudia Pani and
                  Ioannis Kechaoglou},
  title        = {Developing Cyber-risk Centric Courses and Training Material for Cyber
                  Ranges: {A} Systematic Approach},
  booktitle    = {{ICISSP}},
  pages        = {702--713},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/Filiol21,
  author       = {Eric Filiol},
  title        = {Unconventional Attack against Voting Machines Enlarging the Scope
                  of Cybersecurity Risk Analysis},
  booktitle    = {{ICISSP}},
  pages        = {763--770},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/FloodCC021,
  author       = {Robert Flood and
                  Sheung Shi Chan and
                  Wei Chen and
                  David Aspinall},
  title        = {Checking Contact Tracing App Implementations},
  booktitle    = {{ICISSP}},
  pages        = {133--144},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/Garg21,
  author       = {Vaibhav Garg},
  title        = {A Lemon by Any Other Label},
  booktitle    = {{ICISSP}},
  pages        = {558--565},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/Grosse21,
  author       = {Christine Gro{\ss}e},
  title        = {Enhanced Information Management in Inter-organisational Planning for
                  Critical Infrastructure Protection: Case and Framework},
  booktitle    = {{ICISSP}},
  pages        = {319--330},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/GuilleyRQ21,
  author       = {Sylvain Guilley and
                  Michel Le Rolland and
                  Damien Quenson},
  title        = {Implementing Secure Applications Thanks to an Integrated Secure Element},
  booktitle    = {{ICISSP}},
  pages        = {566--571},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/HaarB21,
  author       = {Christoph Haar and
                  Erik Buchmann},
  title        = {Securing Orchestrated Containers with {BSI} Module {SYS.1.6}},
  booktitle    = {{ICISSP}},
  pages        = {676--683},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/HaglMP21,
  author       = {Jakob Hagl and
                  Oliver Mann and
                  Martin Pirker},
  title        = {Securing the Linux Boot Process: From Start to Finish},
  booktitle    = {{ICISSP}},
  pages        = {604--610},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/HasegawaT21,
  author       = {Hirokazu Hasegawa and
                  Hiroki Takakura},
  title        = {A Dynamic Access Control System based on Situations of Users},
  booktitle    = {{ICISSP}},
  pages        = {653--660},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/HazhirpasandEN21,
  author       = {Mohammadreza Hazhirpasand and
                  Arash Ale Ebrahim and
                  Oscar Nierstrasz},
  title        = {Stopping {DNS} Rebinding Attacks in the Browser},
  booktitle    = {{ICISSP}},
  pages        = {596--603},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/HnainiRCT21,
  author       = {Hiba Hnaini and
                  Luka Le Roux and
                  Jo{\"{e}}l Champeau and
                  Ciprian Teodorov},
  title        = {Security Property Modeling},
  booktitle    = {{ICISSP}},
  pages        = {694--701},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/HuangTSS21,
  author       = {Elliu Huang and
                  Fabio Di Troia and
                  Mark Stamp and
                  Preethi Sundaravaradhan},
  title        = {A New Dataset for Smartphone Gesture-based Authentication},
  booktitle    = {{ICISSP}},
  pages        = {771--780},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/HutschenreuterC21,
  author       = {Helmar Hutschenreuter and
                  Salva Daneshgadeh {\c{C}}akmak{\c{c}}i and
                  Christian Maeder and
                  Thomas Kemmerich},
  title        = {Ontology-based Cybersecurity and Resilience Framework},
  booktitle    = {{ICISSP}},
  pages        = {458--466},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/IrvanTK0Y21,
  author       = {Mhd Irvan and
                  Tran Phuong Thao and
                  Ryosuke Kobayashi and
                  Toshiyuki Nakata and
                  Rie Shigetomi Yamaguchi},
  title        = {Learning from Smartphone Location Data as Anomaly Detection for Behavioral
                  Authentication through Deep Neuroevolution},
  booktitle    = {{ICISSP}},
  pages        = {723--728},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/JacobQL21,
  author       = {Stephen Jacob and
                  Yuansong Qiao and
                  Brian Lee},
  title        = {Detecting Cyber Security Attacks against a Microservices Application
                  using Distributed Tracing},
  booktitle    = {{ICISSP}},
  pages        = {588--595},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/JurecekJL21,
  author       = {Martin Jurecek and
                  Olha Jureckov{\'{a}} and
                  R{\'{o}}bert L{\'{o}}rencz},
  title        = {Improving Classification of Malware Families using Learning a Distance
                  Metric},
  booktitle    = {{ICISSP}},
  pages        = {643--652},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/JurecekK21,
  author       = {Martin Jurecek and
                  Matous Koz{\'{a}}k},
  title        = {Representation of {PE} Files using {LSTM} Networks},
  booktitle    = {{ICISSP}},
  pages        = {516--525},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/KadenaNR21,
  author       = {Esmeralda Kadena and
                  Huu Phuoc Dai Nguyen and
                  Lourdes Ruiz},
  title        = {Mobile Robots: An Overview of Data and Security},
  booktitle    = {{ICISSP}},
  pages        = {291--299},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/KaleTS21,
  author       = {Aparna Sunil Kale and
                  Fabio Di Troia and
                  Mark Stamp},
  title        = {Malware Classification with Word Embedding Features},
  booktitle    = {{ICISSP}},
  pages        = {733--742},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/KallT21,
  author       = {Sabrina Kall and
                  Slim Trabelsi},
  title        = {An Asynchronous Federated Learning Approach for a Security Source
                  Code Scanner},
  booktitle    = {{ICISSP}},
  pages        = {572--579},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/KamalI21,
  author       = {Ahmad Akmal Aminuddin Mohd Kamal and
                  Keiichi Iwamura},
  title        = {Improvement of Secure Multi-Party Multiplication of (k, n) Threshold
                  Secret Sharing Using Only {N} = k Servers},
  booktitle    = {{ICISSP}},
  pages        = {77--88},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/KiperbergZ21,
  author       = {Michael Kiperberg and
                  Nezer J. Zaidenberg},
  title        = {HyperPass: Secure Password Input Platform},
  booktitle    = {{ICISSP}},
  pages        = {580--587},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/KlaudelR21,
  author       = {Witold Klaudel and
                  Artur Rataj},
  title        = {Towards a Formalisation of Expert's Knowledge for an Automatic Construction
                  of a Vulnerability Model of a Cyberphysical System},
  booktitle    = {{ICISSP}},
  pages        = {391--398},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/KokesML21,
  author       = {Josef Kokes and
                  Jonatan Matejka and
                  R{\'{o}}bert L{\'{o}}rencz},
  title        = {Automatic Detection and Decryption of {AES} by Monitoring S-Box Access},
  booktitle    = {{ICISSP}},
  pages        = {172--180},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/KotlabaBL21,
  author       = {Luk{\'{a}}s Kotlaba and
                  Simona Buchoveck{\'{a}} and
                  R{\'{o}}bert L{\'{o}}rencz},
  title        = {Active Directory Kerberoasting Attack: Detection using Machine Learning
                  Techniques},
  booktitle    = {{ICISSP}},
  pages        = {376--383},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/KushnirFREZ21,
  author       = {Malte Kushnir and
                  Olivier Favre and
                  Marc Rennhard and
                  Damiano Esposito and
                  Valentin Zahnd},
  title        = {Automated Black Box Detection of {HTTP} {GET} Request-based Access
                  Control Vulnerabilities in Web Applications},
  booktitle    = {{ICISSP}},
  pages        = {204--216},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/LouniciRNTO21,
  author       = {Sofiane Lounici and
                  Marco Rosa and
                  Carlo Maria Negri and
                  Slim Trabelsi and
                  Melek {\"{O}}nen},
  title        = {Optimizing Leak Detection in Open-source Platforms with Machine Learning
                  Techniques},
  booktitle    = {{ICISSP}},
  pages        = {145--159},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/Maffei21,
  author       = {Matteo Maffei},
  title        = {Practical and Provably Sound Static Analysis of Ethereum Smart Contracts},
  booktitle    = {{ICISSP}},
  pages        = {7},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/MandalM21,
  author       = {Debashis Mandal and
                  Chandan Mazumdar},
  title        = {Towards an Ontology for Enterprise Level Information Security Policy
                  Analysis},
  booktitle    = {{ICISSP}},
  pages        = {492--499},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/MartinyBDJM21,
  author       = {Karsten Martiny and
                  Linda Briesemeister and
                  Grit Denker and
                  Mark F. St. John and
                  Ron Moore},
  title        = {Protecting Privacy during a Pandemic Outbreak},
  booktitle    = {{ICISSP}},
  pages        = {308--318},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/McClaryS21,
  author       = {Jack McClary and
                  Sid Stamm},
  title        = {Understanding How People Weigh the Costs and Benefits of using Facebook},
  booktitle    = {{ICISSP}},
  pages        = {526--533},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/NagashimaII21,
  author       = {Nozomi Nagashima and
                  Masaki Inamura and
                  Keiichi Iwamura},
  title        = {Implementation of Secondary Available Digital Content Protection Schemes
                  using Identity-based Signatures},
  booktitle    = {{ICISSP}},
  pages        = {485--491},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/NakataO21,
  author       = {Ryotaro Nakata and
                  Akira Otsuka},
  title        = {CyExec*: Automatic Generation of Randomized Cyber Range Scenarios},
  booktitle    = {{ICISSP}},
  pages        = {226--236},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/NakataO21a,
  author       = {Ryotaro Nakata and
                  Akira Otsuka},
  title        = {Evaluation of Vulnerability Reproducibility in Container-based Cyber
                  Range},
  booktitle    = {{ICISSP}},
  pages        = {635--642},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/NeuschmiedWHSK21,
  author       = {Helmut Neuschmied and
                  Martin Winter and
                  Katharina Hofer{-}Schmitz and
                  Branka Stojanovic and
                  Ulrike Kleb},
  title        = {Two Stage Anomaly Detection for Network Intrusion Detection},
  booktitle    = {{ICISSP}},
  pages        = {450--457},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/NguyenTIU21,
  author       = {Hai Ngoc Nguyen and
                  Songpon Teerakanok and
                  Atsuo Inomata and
                  Tetsutaro Uehara},
  title        = {The Comparison of Word Embedding Techniques in RNNs for Vulnerability
                  Detection},
  booktitle    = {{ICISSP}},
  pages        = {109--120},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/NguyenTIU21a,
  author       = {Hoang Viet Nguyen and
                  Songpon Teerakanok and
                  Atsuo Inomata and
                  Tetsutaro Uehara},
  title        = {The Proposal of Double Agent Architecture using Actor-critic Algorithm
                  for Penetration Testing},
  booktitle    = {{ICISSP}},
  pages        = {440--449},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/NiedermaierHFM21,
  author       = {Matthias Niedermaier and
                  Thomas Hanka and
                  Florian Fischer and
                  Dominik Merli},
  title        = {A Secure Network Scanner Architecture for Asset Management in Strongly
                  Segmented {ICS} Networks},
  booktitle    = {{ICISSP}},
  pages        = {347--355},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/OlssonT21,
  author       = {Christoffer Olsson and
                  Mohsen Toorani},
  title        = {A Permissioned Blockchain-based System for Collaborative Drug Discovery},
  booktitle    = {{ICISSP}},
  pages        = {121--132},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/OsliakSMD21,
  author       = {Oleksii Osliak and
                  Andrea Saracino and
                  Fabio Martinelli and
                  Theo Dimitrakos},
  title        = {Towards Collaborative Cyber Threat Intelligence for Security Management},
  booktitle    = {{ICISSP}},
  pages        = {339--346},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/OzcelikMBS21,
  author       = {Ilker {\"{O}}z{\c{c}}elik and
                  Sai Medury and
                  Justin T. Broaddus and
                  Anthony Skjellum},
  title        = {An Overview of Cryptographic Accumulators},
  booktitle    = {{ICISSP}},
  pages        = {661--669},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/PachecoS21,
  author       = {Yulexis Pacheco and
                  Weiqing Sun},
  title        = {Adversarial Machine Learning: {A} Comparative Study on Contemporary
                  Intrusion Detection Datasets},
  booktitle    = {{ICISSP}},
  pages        = {160--171},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/PatzerB21,
  author       = {Florian Patzer and
                  J{\"{u}}rgen Beyerer},
  title        = {Efficient Semantic Representation of Network Access Control Configuration
                  for Ontology-based Security Analysis},
  booktitle    = {{ICISSP}},
  pages        = {550--557},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/Perrig21,
  author       = {Adrian Perrig},
  title        = {New Directions for High-throughput and High-security Communication},
  booktitle    = {{ICISSP}},
  pages        = {5},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/PhamSSSPH21,
  author       = {Stefanie Pham and
                  Matthias Schopp and
                  Lars Stiemert and
                  Sebastian Seeber and
                  Daniela P{\"{o}}hn and
                  Wolfgang Hommel},
  title        = {Field Studies on the Impact of Cryptographic Signatures and Encryption
                  on Phishing Emails},
  booktitle    = {{ICISSP}},
  pages        = {384--390},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/PilipchukHR21,
  author       = {Roman Pilipchuk and
                  Robert Heinrich and
                  Ralf H. Reussner},
  title        = {Automatically Extracting Business Level Access Control Requirements
                  from {BPMN} Models to Align {RBAC} Policies},
  booktitle    = {{ICISSP}},
  pages        = {300--307},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/PonsardD21,
  author       = {Christophe Ponsard and
                  Denis Darquennes},
  title        = {Towards Formal Security Verification of Over-the-Air Update Protocol:
                  Requirements, Survey and UpKit Case Study},
  booktitle    = {{ICISSP}},
  pages        = {800--808},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/PretoriusDM21,
  author       = {Morn{\'{e}} Pretorius and
                  Nelisiwe Dlamini and
                  Sthembile Mthethwa},
  title        = {Towards Academic and Skills Credentialing Standards and Distributed
                  Ledger Technologies},
  booktitle    = {{ICISSP}},
  pages        = {249--257},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/PuchtaGP21,
  author       = {Alexander Puchta and
                  Sebastian Groll and
                  G{\"{u}}nther Pernul},
  title        = {Leveraging Dynamic Information for Identity and Access Management:
                  An Extension of Current Enterprise {IAM} Architecture},
  booktitle    = {{ICISSP}},
  pages        = {611--618},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/Raimondo0021,
  author       = {Mariapia Raimondo and
                  Simona Bernardi and
                  Stefano Marrone},
  title        = {On Formalising and Analysing the Tweetchain Protocol},
  booktitle    = {{ICISSP}},
  pages        = {781--791},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/RayHSB21,
  author       = {Aratrika Ray and
                  Daqing Hou and
                  Stephanie Schuckers and
                  Abbie Barbir},
  title        = {Continuous Authentication based on Hand Micro-movement during Smartphone
                  Form Filling by Seated Human Subjects},
  booktitle    = {{ICISSP}},
  pages        = {424--431},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/Renaud21,
  author       = {Karen Renaud},
  title        = {Accessible Cyber Security: The Next Frontier?},
  booktitle    = {{ICISSP}},
  pages        = {9--18},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/SchatzRS21,
  author       = {David Schatz and
                  Michael Rossberg and
                  Guenter Schaefer},
  title        = {Hydra: Practical Metadata Security for Contact Discovery, Messaging,
                  and Dialing},
  booktitle    = {{ICISSP}},
  pages        = {191--203},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/ShakedR21,
  author       = {Avi Shaked and
                  Yoram Reich},
  title        = {Model-based Threat and Risk Assessment for Systems Design},
  booktitle    = {{ICISSP}},
  pages        = {331--338},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/Sommervoll21,
  author       = {{\AA}vald {\AA}slaugson Sommervoll},
  title        = {Dreaming of Keys: Introducing the Phantom Gradient Attack},
  booktitle    = {{ICISSP}},
  pages        = {619--627},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/SonntagM21,
  author       = {Michael Sonntag and
                  Ren{\'{e}} Mayrhofer},
  title        = {Experiences and Recommendations from Operating a Tor Exit Node at
                  a University},
  booktitle    = {{ICISSP}},
  pages        = {283--290},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/SvecBH21,
  author       = {Peter Svec and
                  Stefan Balogh and
                  Martin Homola},
  title        = {Experimental Evaluation of Description Logic Concept Learning Algorithms
                  for Static Malware Detection},
  booktitle    = {{ICISSP}},
  pages        = {792--799},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/Sy21,
  author       = {Bon Sy},
  title        = {Linking Biometric Voice Identity with Self-monitoring Health Data
                  as a Temporal-spatial Event Stored in a Mobile Device},
  booktitle    = {{ICISSP}},
  pages        = {407--415},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/UralA21,
  author       = {{\"{O}}zg{\"{u}}r Ural and
                  Cengiz Acart{\"{u}}rk},
  title        = {Automatic Detection of Cyber Security Events from Turkish Twitter
                  Stream and Newspaper Data},
  booktitle    = {{ICISSP}},
  pages        = {66--76},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/WagnerHH21,
  author       = {Paul Wagner and
                  Kris Heid and
                  Jens Heider},
  title        = {Remote WebAuthn: {FIDO2} Authentication for Less Accessible Devices},
  booktitle    = {{ICISSP}},
  pages        = {368--375},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/WahabHSB21,
  author       = {Ahmed Anu Wahab and
                  Daqing Hou and
                  Stephanie Schuckers and
                  Abbie Barbir},
  title        = {Utilizing Keystroke Dynamics as Additional Security Measure to Protect
                  Account Recovery Mechanism},
  booktitle    = {{ICISSP}},
  pages        = {33--42},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/WuZYLZGLH21,
  author       = {Yixiong Wu and
                  Jianwei Zhuge and
                  Tingting Yin and
                  Tianyi Li and
                  Junmin Zhu and
                  Guannan Guo and
                  Yue Liu and
                  Jianju Hu},
  title        = {From Exposed to Exploited: Drawing the Picture of Industrial Control
                  Systems Security Status in the Internet Age},
  booktitle    = {{ICISSP}},
  pages        = {237--248},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/ZhaoBS21,
  author       = {Jing Zhao and
                  Samanvitha Basole and
                  Mark Stamp},
  title        = {Malware Classification with {GMM-HMM} Models},
  booktitle    = {{ICISSP}},
  pages        = {753--762},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@proceedings{DBLP:conf/icissp/2021,
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  publisher    = {{SCITEPRESS}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icissp/0002MMTJK20,
  author       = {Masahiro Ishii and
                  Satoshi Matsuura and
                  Kento Mori and
                  Masahiko Tomoishi and
                  Yong Jin and
                  Yoshiaki Kitaguchi},
  title        = {A Study of Classification of Texts into Categories of Cybersecurity
                  Incident and Attack with Topic Models},
  booktitle    = {{ICISSP}},
  pages        = {639--646},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/AkerlundG20,
  author       = {Agnes {\AA}kerlund and
                  Christine Gro{\ss}e},
  title        = {Integration of Data Envelopment Analysis in Business Process Models:
                  {A} Novel Approach to Measure Information Security},
  booktitle    = {{ICISSP}},
  pages        = {281--288},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/AlmeidaV020,
  author       = {Rafael Almeida and
                  Pedro Vieira{-}Marques and
                  Ana Ferreira},
  title        = {Patients to Mobilize Their Data: Secure and Flexible mHealth Delegation},
  booktitle    = {{ICISSP}},
  pages        = {552--560},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/AnagrehVL20,
  author       = {Mohammad Anagreh and
                  Eero Vainikko and
                  Peeter Laud},
  title        = {Speeding Up the Computation of Elliptic Curve Scalar Multiplication
                  based on {CRT} and {DRM}},
  booktitle    = {{ICISSP}},
  pages        = {176--184},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/AriefPCH20,
  author       = {Budi Arief and
                  Andy Periam and
                  Or{\c{c}}un {\c{C}}etin and
                  Julio C. Hernandez{-}Castro},
  title        = {Using Eyetracker to Find Ways to Mitigate Ransomware},
  booktitle    = {{ICISSP}},
  pages        = {448--456},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/Barni20,
  author       = {Mauro Barni},
  title        = {Backdooring Deep Learning Architectures: Threats and (some) Opportunities},
  booktitle    = {{ICISSP}},
  pages        = {15--16},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/BernardeschiDPR20,
  author       = {Cinzia Bernardeschi and
                  Gianluca Dini and
                  Maurizio Palmieri and
                  Francesco Racciatti},
  title        = {Analysis of Security Attacks in Wireless Sensor Networks: From {UPPAAL}
                  to Castalia},
  booktitle    = {{ICISSP}},
  pages        = {815--824},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/BoudguigaSSC20,
  author       = {Aymen Boudguiga and
                  Oana Stan and
                  Hichem Sedjelmaci and
                  Sergiu Carpov},
  title        = {Homomorphic Encryption at Work for Private Analysis of Security Logs},
  booktitle    = {{ICISSP}},
  pages        = {515--523},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/BowditchABPH20,
  author       = {William Bowditch and
                  Will Abramson and
                  William J. Buchanan and
                  Nikolaos Pitropakis and
                  Adam J. Hall},
  title        = {Privacy-preserving Surveillance Methods using Homomorphic Encryption},
  booktitle    = {{ICISSP}},
  pages        = {240--248},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/BracamonteHTK20,
  author       = {Vanessa Bracamonte and
                  Seira Hidano and
                  Welderufael B. Tesfay and
                  Shinsaku Kiyomoto},
  title        = {Evaluating the Effect of Justification and Confidence Information
                  on User Perception of a Privacy Policy Summarization Tool},
  booktitle    = {{ICISSP}},
  pages        = {142--151},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/BracamonteHTK20a,
  author       = {Vanessa Bracamonte and
                  Seira Hidano and
                  Welderufael B. Tesfay and
                  Shinsaku Kiyomoto},
  title        = {Effects of Explanatory Information on Privacy Policy Summarization
                  Tool Perception},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1545},
  pages        = {156--177},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/BraccialeLRN020,
  author       = {Lorenzo Bracciale and
                  Pierpaolo Loreti and
                  Emanuele Raso and
                  Maurizio Naldi and
                  Giuseppe Bianchi},
  title        = {CoProtect: Collaborative Management of Cryptographic Keys for Data
                  Security in Cloud Systems},
  booktitle    = {{ICISSP}},
  pages        = {361--368},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/BromanderSESB20,
  author       = {Siri Bromander and
                  Morton Swimmer and
                  Martin Eian and
                  Geir Skjotskift and
                  Fredrik Borg},
  title        = {Modeling Cyber Threat Intelligence},
  booktitle    = {{ICISSP}},
  pages        = {273--280},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/BrunnerKUE20,
  author       = {Clemens Brunner and
                  Fabian Knirsch and
                  Andreas Unterweger and
                  Dominik Engel},
  title        = {A Comparison of Blockchain-based {PKI} Implementations},
  booktitle    = {{ICISSP}},
  pages        = {333--340},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/BuchoveckaLBK20,
  author       = {Simona Buchoveck{\'{a}} and
                  R{\'{o}}bert L{\'{o}}rencz and
                  Jir{\'{\i}} Bucek and
                  Filip Kod{\'{y}}tek},
  title        = {Lightweight Authentication and Secure Communication Suitable for IoT
                  Devices},
  booktitle    = {{ICISSP}},
  pages        = {75--83},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/BuchoveckaLBK20a,
  author       = {Simona Buchoveck{\'{a}} and
                  R{\'{o}}bert L{\'{o}}rencz and
                  Jir{\'{\i}} Bucek and
                  Filip Kod{\'{y}}tek},
  title        = {Symmetric and Asymmetric Schemes for Lightweight Secure Communication},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1545},
  pages        = {97--114},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/ButunLS20,
  author       = {Ismail Butun and
                  Alexios Lekidis and
                  Daniel Ricardo dos Santos},
  title        = {Security and Privacy in Smart Grids: Challenges, Current Solutions
                  and Future Opportunities},
  booktitle    = {{ICISSP}},
  pages        = {733--741},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/ChristouPPMB20,
  author       = {Orestis Christou and
                  Nikolaos Pitropakis and
                  Pavlos Papadopoulos and
                  Sean McKeown and
                  William J. Buchanan},
  title        = {Phishing {URL} Detection Through Top-level Domain Analysis: {A} Descriptive
                  Approach},
  booktitle    = {{ICISSP}},
  pages        = {289--298},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/ChuL20,
  author       = {Ge Chu and
                  Alexei Lisitsa},
  title        = {Ontology-based Automation of Penetration Testing},
  booktitle    = {{ICISSP}},
  pages        = {713--720},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/CiobanuFMMS20,
  author       = {Madalina G. Ciobanu and
                  Fausto Fasano and
                  Fabio Martinelli and
                  Francesco Mercaldo and
                  Antonella Santone},
  title        = {Accidental Sensitive Data Leaks Prevention via Formal Verification},
  booktitle    = {{ICISSP}},
  pages        = {825--834},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/ColomboV20,
  author       = {Christian Colombo and
                  Mark Vella},
  title        = {Towards a Comprehensive Solution for Secure Cryptographic Protocol
                  Execution based on Runtime Verification},
  booktitle    = {{ICISSP}},
  pages        = {765--774},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/DanielsB20,
  author       = {Jesse Daniels and
                  Sajal Bhatia},
  title        = {Legislation and the Negative Impact on Cybersecurity in Healthcare},
  booktitle    = {{ICISSP}},
  pages        = {691--697},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/DaoudaghLM20,
  author       = {Said Daoudagh and
                  Francesca Lonetti and
                  Eda Marchetti},
  title        = {Assessing Testing Strategies for Access Control Systems: {A} Controlled
                  Experiment},
  booktitle    = {{ICISSP}},
  pages        = {107--118},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/DebarBT20,
  author       = {Herv{\'{e}} Debar and
                  Razvan Beuran and
                  Yasuo Tan},
  title        = {A Quantitative Study of Vulnerabilities in the Internet of Medical
                  Things},
  booktitle    = {{ICISSP}},
  pages        = {164--175},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/DelongDF20,
  author       = {Maxence Delong and
                  Baptiste David and
                  Eric Filiol},
  title        = {Detection of Crawler Traps: Formalization and Implementation Defeating
                  Protection on Internet and on the {TOR} Network},
  booktitle    = {{ICISSP}},
  pages        = {775--783},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/DiopLLT20,
  author       = {A{\"{\i}}da Diop and
                  Maryline Laurent and
                  Jean Leneutre and
                  Jacques Traor{\'{e}}},
  title        = {CoRA: {A} Scalable Collective Remote Attestation Protocol for Sensor
                  Networks},
  booktitle    = {{ICISSP}},
  pages        = {84--95},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/FacchiniGSD20,
  author       = {Simone Facchini and
                  Giacomo Giorgi and
                  Andrea Saracino and
                  Gianluca Dini},
  title        = {Multi-level Distributed Intrusion Detection System for an IoT based
                  Smart Home Environment},
  booktitle    = {{ICISSP}},
  pages        = {705--712},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/FasanoMMS20,
  author       = {Fausto Fasano and
                  Fabio Martinelli and
                  Francesco Mercaldo and
                  Antonella Santone},
  title        = {Android Run-time Permission Exploitation User Awareness by Means of
                  Formal Methods},
  booktitle    = {{ICISSP}},
  pages        = {804--814},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/FilhoG20,
  author       = {Eduardo Magalh{\~{a}}es De Lacerda Filho and
                  Vin{\'{\i}}cius P. Gon{\c{c}}alves},
  title        = {Achieving Privacy, Security, and Interoperability among Biometric
                  Networks using Symmetric Encryption},
  booktitle    = {{ICISSP}},
  pages        = {481--489},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/FujiiII20,
  author       = {Wataru Fujii and
                  Keiichi Iwamura and
                  Masaki Inamura},
  title        = {Secure Comparison and Interval Test Protocols based on Three-party
                  {MPC}},
  booktitle    = {{ICISSP}},
  pages        = {698--704},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/GencL20,
  author       = {Ziya Alper Gen{\c{c}} and
                  Gabriele Lenzini},
  title        = {Dual-use Research in Ransomware Attacks: {A} Discussion on Ransomware
                  Defence Intelligence},
  booktitle    = {{ICISSP}},
  pages        = {585--592},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/GiorgiSM20,
  author       = {Giacomo Giorgi and
                  Andrea Saracino and
                  Fabio Martinelli},
  title        = {Email Spoofing Attack Detection through an End to End Authorship Attribution
                  System},
  booktitle    = {{ICISSP}},
  pages        = {64--74},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/GiorgiSM20a,
  author       = {Giacomo Giorgi and
                  Andrea Saracino and
                  Fabio Martinelli},
  title        = {End to End Autorship Email Verification Framework for a Secure Communication},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1545},
  pages        = {73--96},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/Gladychev20,
  author       = {Nikolai Gladychev},
  title        = {Computer Viruses: The Abstract Theory Revisited},
  booktitle    = {{ICISSP}},
  pages        = {406--414},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/GuarinoMZCR20,
  author       = {Alfonso Guarino and
                  Delfina Malandrino and
                  Rocco Zaccagnino and
                  Federico Cozza and
                  Antonio Rapuano},
  title        = {On Analyzing Third-party Tracking via Machine Learning},
  booktitle    = {{ICISSP}},
  pages        = {532--539},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/Guerra-Manzanares20,
  author       = {Alejandro Guerra{-}Manzanares and
                  Jorge Medina{-}Galindo and
                  Hayretdin Bahsi and
                  Sven N{\~{o}}mm},
  title        = {MedBIoT: Generation of an IoT Botnet Dataset in a Medium-sized IoT
                  Network},
  booktitle    = {{ICISSP}},
  pages        = {207--218},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/Guerra-Manzanares20a,
  author       = {Alejandro Guerra{-}Manzanares and
                  Jorge Medina{-}Galindo and
                  Hayretdin Bahsi and
                  Sven N{\~{o}}mm},
  title        = {Using MedBIoT Dataset to Build Effective Machine Learning-Based IoT
                  Botnet Detection Systems},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1545},
  pages        = {222--243},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/GuigaR20,
  author       = {Linda Guiga and
                  A. W. Roscoe},
  title        = {Neural Network Security: Hiding {CNN} Parameters with Guided Grad-CAM},
  booktitle    = {{ICISSP}},
  pages        = {611--618},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/GunduM20,
  author       = {Tapiwa Gundu and
                  Nthabiseng Modiba},
  title        = {Building Competitive Advantage from Ubuntu: An African Information
                  Security Awareness Model},
  booktitle    = {{ICISSP}},
  pages        = {569--576},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/GunnarssonG20,
  author       = {Martin Gunnarsson and
                  Christian Gehrmann},
  title        = {Secure Ownership Transfer for the Internet of Things},
  booktitle    = {{ICISSP}},
  pages        = {33--44},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/GunnarssonG20a,
  author       = {Martin Gunnarsson and
                  Christian Gehrmann},
  title        = {Secure Ownership Transfer for Resource Constrained IoT Infrastructures},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1545},
  pages        = {22--47},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/HavurSK20,
  author       = {Giray Havur and
                  Miel Vander Sande and
                  Sabrina Kirrane},
  title        = {Greater Control and Transparency in Personal Data Processing},
  booktitle    = {{ICISSP}},
  pages        = {655--662},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/HegartyH20,
  author       = {Robert Hegarty and
                  John Haggerty},
  title        = {Presence Metadata in the Internet of Things: Challenges and Opportunities},
  booktitle    = {{ICISSP}},
  pages        = {631--638},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/HeidingOWL20,
  author       = {Fredrik Heiding and
                  Mohammad{-}Ali Omer and
                  Andreas Wallstr{\"{o}}m and
                  Robert Lagerstr{\"{o}}m},
  title        = {Securing IoT Devices using Geographic and Continuous Login Blocking:
                  {A} Honeypot Study},
  booktitle    = {{ICISSP}},
  pages        = {424--431},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/HidanoK20,
  author       = {Seira Hidano and
                  Shinsaku Kiyomoto},
  title        = {Recommender Systems Robust to Data Poisoning using Trim Learning},
  booktitle    = {{ICISSP}},
  pages        = {721--724},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/HosseinzadehEJ20,
  author       = {Arghavan Hosseinzadeh and
                  Andreas Eitel and
                  Christian Jung},
  title        = {A Systematic Approach toward Extracting Technically Enforceable Policies
                  from Data Usage Control Requirements},
  booktitle    = {{ICISSP}},
  pages        = {397--405},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/HuttelS20,
  author       = {Hans H{\"{u}}ttel and
                  Vilim Staroveski},
  title        = {Secrecy and Authenticity Properties of the Lightning Network Protocol},
  booktitle    = {{ICISSP}},
  pages        = {119--130},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/HuttelS20a,
  author       = {Hans H{\"{u}}ttel and
                  Vilim Staroveski},
  title        = {Key Agreement in the Lightning Network Protocol},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1545},
  pages        = {139--155},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/JasserK20,
  author       = {Stefanie Jasser and
                  Jonas Kelbert},
  title        = {An Approach to Secure Legacy Software Systems},
  booktitle    = {{ICISSP}},
  pages        = {299--309},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/Jost020,
  author       = {David Jost and
                  Mathias Fischer},
  title        = {Accountant: Protection of Data Integrity and Identification of Malicious
                  Nodes in In-network Data Processing},
  booktitle    = {{ICISSP}},
  pages        = {561--568},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/JurecekL20,
  author       = {Martin Jurecek and
                  R{\'{o}}bert L{\'{o}}rencz},
  title        = {Distance Metric Learning using Particle Swarm Optimization to Improve
                  Static Malware Detection},
  booktitle    = {{ICISSP}},
  pages        = {725--732},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/Katsikas20,
  author       = {Sokratis K. Katsikas},
  title        = {Leveraging Blockchain Technology to Enhance Security and Privacy in
                  the Internet of Things},
  booktitle    = {{ICISSP}},
  pages        = {5},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/Kneuper20,
  author       = {Ralf Kneuper},
  title        = {Translating Data Protection into Software Requirements},
  booktitle    = {{ICISSP}},
  pages        = {257--264},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/KnirschUUE20,
  author       = {Fabian Knirsch and
                  Andreas Unterweger and
                  Maximilian Unterrainer and
                  Dominik Engel},
  title        = {Comparison of the Paillier and ElGamal Cryptosystems for Smart Grid
                  Aggregation Protocols},
  booktitle    = {{ICISSP}},
  pages        = {232--239},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/KotlabaBL20,
  author       = {Luk{\'{a}}s Kotlaba and
                  Simona Buchoveck{\'{a}} and
                  R{\'{o}}bert L{\'{o}}rencz},
  title        = {Active Directory Kerberoasting Attack: Monitoring and Detection Techniques},
  booktitle    = {{ICISSP}},
  pages        = {432--439},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/KrasnowskiLM20,
  author       = {Piotr Krasnowski and
                  J{\'{e}}r{\^{o}}me Lebrun and
                  Bruno Martin},
  title        = {Introducing a Verified Authenticated Key Exchange Protocol over Voice
                  Channels for Secure Voice Communication},
  booktitle    = {{ICISSP}},
  pages        = {683--690},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/LagerstromXE20,
  author       = {Robert Lagerstr{\"{o}}m and
                  Wenjun Xiong and
                  Mathias Ekstedt},
  title        = {Threat Modeling and Attack Simulations of Smart Cities: {A} Literature
                  Review and Explorative Study},
  booktitle    = {{ICISSP}},
  pages        = {369--376},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/LandauerSWHR20,
  author       = {Max Landauer and
                  Florian Skopik and
                  Markus Wurzenberger and
                  Wolfgang Hotwagner and
                  Andreas Rauber},
  title        = {Visualizing Syscalls using Self-organizing Maps for System Intrusion
                  Detection},
  booktitle    = {{ICISSP}},
  pages        = {349--360},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/LathouwersEH20,
  author       = {Sophie Lathouwers and
                  Maarten H. Everts and
                  Marieke Huisman},
  title        = {Verifying Sanitizer Correctness through Black-Box Learning: {A} Symbolic
                  Finite Transducer Approach},
  booktitle    = {{ICISSP}},
  pages        = {784--795},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/LefonsPT20,
  author       = {Ezio Lefons and
                  Sebastiano Pizzutilo and
                  Filippo Tangorra},
  title        = {Host Fingerprinting for Web Servers Authentication},
  booktitle    = {{ICISSP}},
  pages        = {45--51},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/LinFS20,
  author       = {Hsiao{-}Ying Lin and
                  Chengfang Fang and
                  Jie Shi},
  title        = {Bident Structure for Neural Network Model Protection},
  booktitle    = {{ICISSP}},
  pages        = {377--384},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/LindenhoferOP20,
  author       = {Julian Lindenhofer and
                  Rene Offenthaler and
                  Martin Pirker},
  title        = {A Curious Exploration of Malicious {PDF} Documents},
  booktitle    = {{ICISSP}},
  pages        = {577--584},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/ListikSH20,
  author       = {V{\'{\i}}t List{\'{\i}}k and
                  Jan Sediv{\'{y}} and
                  V{\'{a}}clav Hlav{\'{a}}c},
  title        = {Email Image Spam Classification based on ResNet Convolutional Neural
                  Network},
  booktitle    = {{ICISSP}},
  pages        = {457--464},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/MaghrebiA20,
  author       = {Houssem Maghrebi and
                  Davide Alessio},
  title        = {Revisiting Higher-order Computational Attacks against White-box Implementations},
  booktitle    = {{ICISSP}},
  pages        = {265--272},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/MalderleBMW020,
  author       = {Timo Malderle and
                  Felix Boes and
                  Gina Muuss and
                  Matthias W{\"{u}}bbeling and
                  Michael Meier},
  title        = {Credential Intelligence Agency: {A} Threat Intelligence Approach to
                  Mitigate Identity Theft},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1545},
  pages        = {115--138},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/MalderleKLW020,
  author       = {Timo Malderle and
                  Sven Knauer and
                  Martin Lang and
                  Matthias W{\"{u}}bbeling and
                  Michael Meier},
  title        = {Track Down Identity Leaks using Threat Intelligence},
  booktitle    = {{ICISSP}},
  pages        = {96--106},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/MartinelliMRS20,
  author       = {Fabio Martinelli and
                  Francesco Mercaldo and
                  Domenico Raucci and
                  Antonella Santone},
  title        = {Bank Credit Risk Management based on Data Mining Techniques},
  booktitle    = {{ICISSP}},
  pages        = {837--843},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/MauriCD20,
  author       = {Lara Mauri and
                  Stelvio Cimato and
                  Ernesto Damiani},
  title        = {A Formal Approach for the Analysis of the {XRP} Ledger Consensus Protocol},
  booktitle    = {{ICISSP}},
  pages        = {52--63},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/MauriCD20a,
  author       = {Lara Mauri and
                  Stelvio Cimato and
                  Ernesto Damiani},
  title        = {Untangling the {XRP} Ledger: Insights and Analysis},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1545},
  pages        = {48--72},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/MendsaikhanHYS20,
  author       = {Otgonpurev Mendsaikhan and
                  Hirokazu Hasegawa and
                  Yukiko Yamaguchi and
                  Hajime Shimada},
  title        = {Quantifying the Significance of Cybersecurity Text through Semantic
                  Similarity and Named Entity Recognition},
  booktitle    = {{ICISSP}},
  pages        = {325--332},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/MoubarakF20,
  author       = {Joanna Moubarak and
                  Tony Feghali},
  title        = {Comparing Machine Learning Techniques for Malware Detection},
  booktitle    = {{ICISSP}},
  pages        = {844--851},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/MoubarakFC20,
  author       = {Joanna Moubarak and
                  Eric Filiol and
                  Maroun Chamoun},
  title        = {The Blockchain Potential in Computer Virology},
  booktitle    = {{ICISSP}},
  pages        = {796--803},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/NisslmuellerF0D20,
  author       = {Utz Nisslmueller and
                  Klaus{-}Tycho Foerster and
                  Stefan Schmid and
                  Christian Decker},
  title        = {Toward Active and Passive Confidentiality Attacks on Cryptocurrency
                  Off-chain Networks},
  booktitle    = {{ICISSP}},
  pages        = {7--14},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/NisslmuellerF0D20a,
  author       = {Utz Nisslmueller and
                  Klaus{-}Tycho Foerster and
                  Stefan Schmid and
                  Christian Decker},
  title        = {Inferring Sensitive Information in Cryptocurrency Off-Chain Networks
                  Using Probing and Timing Attacks},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1545},
  pages        = {1--21},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/NitschkeRHK20,
  author       = {Mirja Nitschke and
                  Christian Roth and
                  Christian Hoyer and
                  Dogan Kesdogan},
  title        = {Harmonized Group Mix for {ITS}},
  booktitle    = {{ICISSP}},
  pages        = {152--163},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/NitschkeRHK20a,
  author       = {Mirja Nitschke and
                  Christian Roth and
                  Christian Hoyer and
                  Dogan Kesdogan},
  title        = {Harmonic Group Mix: {A} Framework for Anonymous and Authenticated
                  Broadcast Messages in Vehicle-to-Vehicle Environments},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1545},
  pages        = {178--200},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/NyblomWKO20,
  author       = {Philip Nyblom and
                  Gaute Wangen and
                  Mazaher Kianpour and
                  Grethe {\O}stby},
  title        = {The Root Causes of Compromised Accounts at the University},
  booktitle    = {{ICISSP}},
  pages        = {540--551},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/OrenderMZ20,
  author       = {Jason Orender and
                  Ravi Mukkamala and
                  Mohammad Zubair},
  title        = {Is Ethereum's ProgPoW {ASIC} Resistant?},
  booktitle    = {{ICISSP}},
  pages        = {310--316},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/OstbyK20,
  author       = {Grethe {\O}stby and
                  Basel Katt},
  title        = {Maturity Modelling to Prepare for Cyber Crisis Escalation and Management},
  booktitle    = {{ICISSP}},
  pages        = {249--256},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/OtungM20,
  author       = {Andikan Otung and
                  Andrew P. Martin},
  title        = {Distributed Defence of Service (DiDoS): {A} Network-layer Reputation-based
                  DDoS Mitigation Architecture},
  booktitle    = {{ICISSP}},
  pages        = {619--630},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/PabloAI20,
  author       = {{\'{A}}lvaro de Pablo and
                  Oscar Araque and
                  Carlos Angel Iglesias},
  title        = {Radical Text Detection based on Stylometry},
  booktitle    = {{ICISSP}},
  pages        = {524--531},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/PfrangMFB20,
  author       = {Steffen Pfrang and
                  David Meier and
                  Andreas Fleig and
                  J{\"{u}}rgen Beyerer},
  title        = {A Meta Model for a Comprehensive Description of Network Protocols
                  Improving Security Tests},
  booktitle    = {{ICISSP}},
  pages        = {671--682},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/PlessingO20,
  author       = {Paul Plessing and
                  Olamide Omolola},
  title        = {Revisiting Privacy-aware Blockchain Public Key Infrastructure},
  booktitle    = {{ICISSP}},
  pages        = {415--423},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/PonsardGP20,
  author       = {Christophe Ponsard and
                  Jeremy Grandclaudon and
                  Nicolas Point},
  title        = {Methodology and Feedback about Systematic Cybersecurity Experts Auditing
                  in Belgium},
  booktitle    = {{ICISSP}},
  pages        = {754--759},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/QbeahAM20,
  author       = {Mohammad Qbea'h and
                  Saed Alrabaee and
                  Djedjiga Mouheb},
  title        = {An Analytical Scanning Technique to Detect and Prevent the Transformed
                  {SQL} Injection and {XSS} Attacks},
  booktitle    = {{ICISSP}},
  pages        = {603--610},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/SbaiDD20,
  author       = {Anass Sbai and
                  Cyril Drocourt and
                  Gilles Dequen},
  title        = {{CCA} Secure Unidirectional {PRE} with Key Pair in the Standard Model
                  without Pairings},
  booktitle    = {{ICISSP}},
  pages        = {440--447},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/ScholnastTK20,
  author       = {Hubert Sch{\"{o}}lnast and
                  Paul Tavolato and
                  Philipp Kreimel},
  title        = {Anomaly Detection in Communication Networks of Cyber-physical Systems
                  using Cross-over Data Compression},
  booktitle    = {{ICISSP}},
  pages        = {498--505},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/SnymanK20,
  author       = {Dirk Snyman and
                  Hennie A. Kruger},
  title        = {External Contextual Factors in Information Security Behaviour},
  booktitle    = {{ICISSP}},
  pages        = {185--194},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/SnymanK20a,
  author       = {Dirk Snyman and
                  Hennie A. Kruger},
  title        = {Contextual Factors in Information Security Group Behaviour: {A} Comparison
                  of Two Studies},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1545},
  pages        = {201--221},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/StachGW0M20,
  author       = {Christoph Stach and
                  Corinna Giebler and
                  Manuela Wagner and
                  Christian Weber and
                  Bernhard Mitschang},
  title        = {{AMNESIA:} {A} Technical Solution towards GDPR-compliant Machine Learning},
  booktitle    = {{ICISSP}},
  pages        = {21--32},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/SultanJ20,
  author       = {Shizra Sultan and
                  Christian Damsgaard Jensen},
  title        = {Privacy-preserving Measures in Smart City Video Surveillance Systems},
  booktitle    = {{ICISSP}},
  pages        = {506--514},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/SunDGCGRMTAL20,
  author       = {Tithnara Nicolas Sun and
                  Bastien Drouot and
                  Fahad Rafique Golra and
                  Jo{\"{e}}l Champeau and
                  Sylvain Gu{\'{e}}rin and
                  Luka Le Roux and
                  Ra{\'{u}}l Mazo and
                  Ciprian Teodorov and
                  Lionel Van Aertryck and
                  Bernard L'Hostis},
  title        = {A Domain-specific Modeling Framework for Attack Surface Modeling},
  booktitle    = {{ICISSP}},
  pages        = {341--348},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/SundstromLPP20,
  author       = {Andrew Sundstrom and
                  Damas W. Limoge and
                  Vadim Pinskiy and
                  Matthew Putman},
  title        = {Securing Industrial Production from Sophisticated Cyberattacks},
  booktitle    = {{ICISSP}},
  pages        = {663--670},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/SymeonidisL20,
  author       = {Iraklis Symeonidis and
                  Gabriele Lenzini},
  title        = {Systematization of Threats and Requirements for Private Messaging
                  with Untrusted Servers: The Case of e-Mailing and Instant Messaging},
  booktitle    = {{ICISSP}},
  pages        = {593--602},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/TantikulN20,
  author       = {Phitchayaphong Tantikul and
                  Sudsanguan Ngamsuriyaroj},
  title        = {Exploring Vulnerabilities in Solidity Smart Contract},
  booktitle    = {{ICISSP}},
  pages        = {317--324},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/TeradoH20,
  author       = {Ryosuke Terado and
                  Morihiro Hayashida},
  title        = {Improving Accuracy and Speed of Network-based Intrusion Detection
                  using Gradient Boosting Trees},
  booktitle    = {{ICISSP}},
  pages        = {490--497},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/ThompsonE20,
  author       = {Andreas Thompson and
                  Gencer Erdogan},
  title        = {Tool Support for Risk-driven Planning of Trustworthy Smart IoT Systems
                  within DevOps},
  booktitle    = {{ICISSP}},
  pages        = {742--753},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/Tochikubo20,
  author       = {Kouya Tochikubo},
  title        = {New General Secret Sharing Scheme using Hierarchical Threshold Scheme:
                  Improvement of Information Rates for Specified Participants},
  booktitle    = {{ICISSP}},
  pages        = {647--654},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/UwizeyemunguP20,
  author       = {Sylvestre Uwizeyemungu and
                  Placide Poba{-}Nzaou},
  title        = {Privacy with Health Information Technologies: What Story Do Data Breaches
                  in {US} Tell Us?},
  booktitle    = {{ICISSP}},
  pages        = {131--141},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/WirtzH20,
  author       = {Roman Wirtz and
                  Maritta Heisel},
  title        = {Risk Identification: From Requirements to Threat Models},
  booktitle    = {{ICISSP}},
  pages        = {385--396},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/WodoS20,
  author       = {Wojciech Wodo and
                  Damian Stygar},
  title        = {Security of Digital Banking Systems in Poland: Users Study 2019},
  booktitle    = {{ICISSP}},
  pages        = {221--231},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/XuZ20,
  author       = {Shuaijianni Xu and
                  Liang Feng Zhang},
  title        = {A Homomorphic Proxy Re-authenticators based Efficient Multi-client
                  Non-interactive Verifiable Computation Scheme},
  booktitle    = {{ICISSP}},
  pages        = {195--206},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/ZhouHKI20,
  author       = {Jiaxing Zhou and
                  Miyuki Hirose and
                  Yoshio Kakizaki and
                  Atsuo Inomata},
  title        = {Evaluation to Classify Ransomware Variants based on Correlations between
                  APIs},
  booktitle    = {{ICISSP}},
  pages        = {465--472},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/ZinsmaierLW20,
  author       = {Sandra Domenique Zinsmaier and
                  Hanno Langweg and
                  Marcel Waldvogel},
  title        = {A Practical Approach to Stakeholder-driven Determination of Security
                  Requirements based on the {GDPR} and Common Criteria},
  booktitle    = {{ICISSP}},
  pages        = {473--480},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@proceedings{DBLP:conf/icissp/2019s,
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Information Systems Security and Privacy - 5th International Conference,
                  {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  publisher    = {Springer},
  year         = {2020}
}
@proceedings{DBLP:conf/icissp/2020,
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  publisher    = {{SCITEPRESS}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icissp/0001MFKT19,
  author       = {Partha Sarathi Roy and
                  Kirill Morozov and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  title        = {Security Analysis and Efficient Implementation of Code-based Signature
                  Schemes},
  booktitle    = {{ICISSP}},
  pages        = {213--220},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/0002F19,
  author       = {Carlos Moreno and
                  Sebastian Fischmeister},
  title        = {Sender Authentication for Automotive In-Vehicle Networks through Dual
                  Analog Measurements to Determine the Location of the Transmitter},
  booktitle    = {{ICISSP}},
  pages        = {596--605},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/0006EVRDM19,
  author       = {Gaurav Sharma and
                  Soultana Ellinidou and
                  Tristan Vanspouwen and
                  Th{\'{e}}o Rigas and
                  Jean{-}Michel Dricot and
                  Olivier Markowitch},
  title        = {Identity-based {TLS} for Cloud of Chips},
  booktitle    = {{ICISSP}},
  pages        = {44--54},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/AkkuzuAA19,
  author       = {Gulsum Akkuzu and
                  Benjamin Aziz and
                  Mo Adda},
  title        = {Fuzzy Logic Decision based Collaborative Privacy Management Framework
                  for Online Social Networks},
  booktitle    = {{ICISSP}},
  pages        = {674--684},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/Al-MaweeBCM19,
  author       = {Wassnaa Al{-}Mawee and
                  Paul J. Bonamy and
                  Steve Carr and
                  Jean Mayo},
  title        = {Maia: {A} Language for Mandatory Integrity Controls of Structured
                  Data},
  booktitle    = {{ICISSP}},
  pages        = {257--265},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/Al-WahahF19,
  author       = {Mouiad Al{-}Wahah and
                  Csilla Farkas},
  title        = {Monotonic and Non-monotonic Context Delegation},
  booktitle    = {{ICISSP}},
  pages        = {449--460},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/AlmarwaniKL19,
  author       = {Maryam Almarwani and
                  Boris Konev and
                  Alexei Lisitsa},
  title        = {Flexible Access Control and Confidentiality over Encrypted Data for
                  Document-based Database},
  booktitle    = {{ICISSP}},
  pages        = {606--614},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/AlmarwaniKL19a,
  author       = {Maryam Almarwani and
                  Boris Konev and
                  Alexei Lisitsa},
  title        = {Fine-Grained Access Control for Querying Over Encrypted Document-Oriented
                  Database},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {403--425},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/AlotaibiAFC19,
  author       = {Saud Alotaibi and
                  Abdulrahman Alruban and
                  Steven Furnell and
                  Nathan L. Clarke},
  title        = {A Novel Behaviour Profiling Approach to Continuous Authentication
                  for Mobile Applications},
  booktitle    = {{ICISSP}},
  pages        = {246--251},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/AnagrehVL19,
  author       = {Mohammad Anagreh and
                  Eero Vainikko and
                  Peeter Laud},
  title        = {Accelerate Performance for Elliptic Curve Scalar Multiplication based
                  on {NAF} by Parallel Computing},
  booktitle    = {{ICISSP}},
  pages        = {238--245},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/AugotCG19,
  author       = {Daniel Augot and
                  Herv{\'{e}} Chabanne and
                  William George},
  title        = {Practical Solutions to Save Bitcoins Applied to an Identity System
                  Proposal},
  booktitle    = {{ICISSP}},
  pages        = {511--518},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/BajanKD19,
  author       = {Pierre{-}Marie Bajan and
                  Christophe Kiennert and
                  Herv{\'{e}} Debar},
  title        = {Methodology of a Network Simulation in the Context of an Evaluation:
                  Application to an {IDS}},
  booktitle    = {{ICISSP}},
  pages        = {378--388},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/BartoliniCM19,
  author       = {Cesare Bartolini and
                  Antonello Calabr{\`{o}} and
                  Eda Marchetti},
  title        = {Enhancing Business Process Modelling with Data Protection Compliance:
                  An Ontology-based Proposal},
  booktitle    = {{ICISSP}},
  pages        = {421--428},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/Ben-BassatR19,
  author       = {Ilan Ben{-}Bassat and
                  Erez Rokah},
  title        = {Locality-Sensitive Hashing for Efficient Web Application Security
                  Testing},
  booktitle    = {{ICISSP}},
  pages        = {193--204},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/BernardeschiDP19,
  author       = {Cinzia Bernardeschi and
                  Andrea Domenici and
                  Maurizio Palmieri},
  title        = {Modeling and Simulation of Attacks on Cyber-physical Systems},
  booktitle    = {{ICISSP}},
  pages        = {700--708},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/BhodiaPTS19,
  author       = {Niket Bhodia and
                  Pratikkumar Prajapati and
                  Fabio Di Troia and
                  Mark Stamp},
  title        = {Transfer Learning for Image-based Malware Classification},
  booktitle    = {{ICISSP}},
  pages        = {719--726},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/BisphamAG19,
  author       = {Mary K. Bispham and
                  Ioannis Agrafiotis and
                  Michael Goldsmith},
  title        = {Nonsense Attacks on Google Assistant and Missense Attacks on Amazon
                  Alexa},
  booktitle    = {{ICISSP}},
  pages        = {75--87},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/BisphamAG19a,
  author       = {Mary K. Bispham and
                  Ioannis Agrafiotis and
                  Michael Goldsmith},
  title        = {Attack and Defence Modelling for Attacks via the Speech Interface},
  booktitle    = {{ICISSP}},
  pages        = {519--527},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/BisphamAG19b,
  author       = {Mary K. Bispham and
                  Ioannis Agrafiotis and
                  Michael Goldsmith},
  title        = {The Security of the Speech Interface: {A} Modelling Framework and
                  Proposals for New Defence Mechanisms},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {288--316},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/BisphamRAG19,
  author       = {Mary K. Bispham and
                  Alastair Janse van Rensburg and
                  Ioannis Agrafiotis and
                  Michael Goldsmith},
  title        = {Black-Box Attacks via the Speech Interface Using Linguistically Crafted
                  Input},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {93--120},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/Blumbergs19,
  author       = {Bernhards Blumbergs},
  title        = {Remote Exploit Development for Cyber Red Team Computer Network Operations
                  Targeting Industrial Control Systems},
  booktitle    = {{ICISSP}},
  pages        = {88--99},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/BodeiG19,
  author       = {Chiara Bodei and
                  Letterio Galletta},
  title        = {Tracking Data Trajectories in IoT},
  booktitle    = {{ICISSP}},
  pages        = {572--579},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/BodeiG19a,
  author       = {Chiara Bodei and
                  Letterio Galletta},
  title        = {Analysing the Provenance of IoT Data},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {358--381},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/BracamonteHTK19,
  author       = {Vanessa Bracamonte and
                  Seira Hidano and
                  Welderufael B. Tesfay and
                  Shinsaku Kiyomoto},
  title        = {Evaluating Privacy Policy Summarization: An Experimental Study among
                  Japanese Users},
  booktitle    = {{ICISSP}},
  pages        = {370--377},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/BracamonteHTK19a,
  author       = {Vanessa Bracamonte and
                  Seira Hidano and
                  Welderufael B. Tesfay and
                  Shinsaku Kiyomoto},
  title        = {User Study of the Effectiveness of a Privacy Policy Summarization
                  Tool},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {186--206},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/BrunnerKE19,
  author       = {Clemens Brunner and
                  Fabian Knirsch and
                  Dominik Engel},
  title        = {{SPROOF:} {A} Platform for Issuing and Verifying Documents in a Public
                  Blockchain},
  booktitle    = {{ICISSP}},
  pages        = {15--25},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/BrunnerKE19a,
  author       = {Clemens Brunner and
                  Fabian Knirsch and
                  Dominik Engel},
  title        = {{SPROOF:} {A} Decentralized Platform for Attribute-Based Authentication},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {1--23},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/Buchanan19,
  author       = {Bill Buchanan},
  title        = {Building the Future: Tokenization, Blockchain and Citizen-focused
                  Systems},
  booktitle    = {{ICISSP}},
  pages        = {5},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/ButunG19,
  author       = {Ismail Butun and
                  Mikael Gidlund},
  title        = {Location Privacy Assured Internet of Things},
  booktitle    = {{ICISSP}},
  pages        = {623--630},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/CaiWZSH19,
  author       = {Jiahao Cai and
                  Zihao Wei and
                  Yingjie Zhang and
                  Siwei Sun and
                  Lei Hu},
  title        = {Zero-sum Distinguishers for Round-reduced {GIMLI} Permutation},
  booktitle    = {{ICISSP}},
  pages        = {38--43},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/CatuognoG19,
  author       = {Luigi Catuogno and
                  Clemente Galdi},
  title        = {A Fine-grained General Purpose Secure Storage Facility for Trusted
                  Execution Environment},
  booktitle    = {{ICISSP}},
  pages        = {588--595},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/CatuognoG19a,
  author       = {Luigi Catuogno and
                  Clemente Galdi},
  title        = {Improving Interoperability in Multi-domain Enterprise Right Management
                  Applications},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {382--402},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/ChabanneDR19,
  author       = {Herv{\'{e}} Chabanne and
                  Emmanuelle Dottax and
                  Franck Rondepierre},
  title        = {Smart-card Deployment of an Electronic Voting Protocol},
  booktitle    = {{ICISSP}},
  pages        = {503--510},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/ChamatidisS19,
  author       = {Ilias Chamatidis and
                  Georgios P. Spathoulas},
  title        = {Machine Learning for All: {A} More Robust Federated Learning Framework},
  booktitle    = {{ICISSP}},
  pages        = {544--551},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/ChavanTS19,
  author       = {Neeraj Chavan and
                  Fabio Di Troia and
                  Mark Stamp},
  title        = {A Comparative Analysis of Android Malware},
  booktitle    = {{ICISSP}},
  pages        = {664--673},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/CorayCS19,
  author       = {Sein Coray and
                  Iwen Coisel and
                  Ignacio Sanchez},
  title        = {Improved Forensic Recovery of {PKZIP} Stream Cipher Passwords},
  booktitle    = {{ICISSP}},
  pages        = {328--335},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/CostaBT19,
  author       = {Lu{\'{\i}}s Costa and
                  Jo{\~{a}}o Paulo Barros and
                  Miguel Tavares},
  title        = {Vulnerabilities in IoT Devices for Smart Home Environment},
  booktitle    = {{ICISSP}},
  pages        = {615--622},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/DaoudaghLM19,
  author       = {Said Daoudagh and
                  Francesca Lonetti and
                  Eda Marchetti},
  title        = {A Decentralized Solution for Combinatorial Testing of Access Control
                  Engine},
  booktitle    = {{ICISSP}},
  pages        = {126--135},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/DaoudaghLM19a,
  author       = {Said Daoudagh and
                  Francesca Lonetti and
                  Eda Marchetti},
  title        = {A General Framework for Decentralized Combinatorial Testing of Access
                  Control Engine: Examples of Application},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {207--229},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/EzureI19,
  author       = {Takuya Ezure and
                  Masaki Inamura},
  title        = {An Order-specified Aggregate Authority-transfer Signature},
  booktitle    = {{ICISSP}},
  pages        = {309--318},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/EzureI19a,
  author       = {Takuya Ezure and
                  Masaki Inamura},
  title        = {Proposal and Performance Evaluation of an Order-Specified Aggregate
                  Authority-Transfer Signature},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {121--136},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/FallK19,
  author       = {Doudou Fall and
                  Youki Kadobayashi},
  title        = {The Common Vulnerability Scoring System vs. Rock Star Vulnerabilities:
                  Why the Discrepancy?},
  booktitle    = {{ICISSP}},
  pages        = {405--411},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/FasanoMMNS19,
  author       = {Fausto Fasano and
                  Fabio Martinelli and
                  Francesco Mercaldo and
                  Vittoria Nardone and
                  Antonella Santone},
  title        = {Spyware Detection using Temporal Logic},
  booktitle    = {{ICISSP}},
  pages        = {690--699},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/FiliolH19,
  author       = {Eric Filiol and
                  Abhilash Hota},
  title        = {Solving a Hard Instance of Suspicious Behaviour Detection with Sparse
                  Binary Vectors Clustering},
  booktitle    = {{ICISSP}},
  pages        = {635--644},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/FrumentoD19,
  author       = {Enrico Frumento and
                  Carlo Dambra},
  title        = {The {HERMENEUT} Project: Enterprises Intangible Risk Management via
                  Economic Models based on Simulation of Modern Cyber Attacks},
  booktitle    = {{ICISSP}},
  pages        = {495--502},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/Fukushima0NFKG19,
  author       = {Kazuhide Fukushima and
                  Damien Marion and
                  Yuto Nakano and
                  Adrien Facon and
                  Shinsaku Kiyomoto and
                  Sylvain Guilley},
  title        = {Experiment on Side-Channel Key-Recovery using a Real {LPWA} End-device},
  booktitle    = {{ICISSP}},
  pages        = {67--74},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/Fukushima0NFKG19a,
  author       = {Kazuhide Fukushima and
                  Damien Marion and
                  Yuto Nakano and
                  Adrien Facon and
                  Shinsaku Kiyomoto and
                  Sylvain Guilley},
  title        = {Evaluation of Side-Channel Key-Recovery Attacks on LoRaWAN End-Device},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {74--92},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/GrosseNS19,
  author       = {Christine Gro{\ss}e and
                  Maja Nyman and
                  Leif Sundberg},
  title        = {Information Technology Consulting Firms' Readiness for Managing Information
                  Security Incidents},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {48--73},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/GuanGL0K19,
  author       = {Zhi Guan and
                  Abba Garba and
                  Anran Li and
                  Zhong Chen and
                  Nesrine Kaaniche},
  title        = {AuthLedger: {A} Novel Blockchain-based Domain Name Authentication
                  Scheme},
  booktitle    = {{ICISSP}},
  pages        = {345--352},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/Guerra-Manzanares19,
  author       = {Alejandro Guerra{-}Manzanares and
                  Sven N{\~{o}}mm and
                  Hayretdin Bahsi},
  title        = {In-depth Feature Selection and Ranking for Automated Detection of
                  Mobile Malware},
  booktitle    = {{ICISSP}},
  pages        = {274--283},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/HormannF19,
  author       = {Ricardo Hormann and
                  Eric Fischer},
  title        = {Detecting Anomalies by using Self-Organizing Maps in Industrial Environments},
  booktitle    = {{ICISSP}},
  pages        = {336--344},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/HotaI19,
  author       = {Abhilash Hota and
                  Paul Irolla},
  title        = {Deep Neural Networks for Android Malware Detection},
  booktitle    = {{ICISSP}},
  pages        = {657--663},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/Irolla19,
  author       = {Paul Irolla},
  title        = {Systematic Characterization of a Sequence Group},
  booktitle    = {{ICISSP}},
  pages        = {645--656},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/JensenKG19,
  author       = {Meiko Jensen and
                  Sahil Kapila and
                  Nils Gruschka},
  title        = {Towards Aligning {GDPR} Compliance with Software Development: {A}
                  Research Agenda},
  booktitle    = {{ICISSP}},
  pages        = {389--396},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/KatsikeasJHL19,
  author       = {Sotirios Katsikeas and
                  Pontus Johnson and
                  Simon Hacks and
                  Robert Lagerstr{\"{o}}m},
  title        = {Probabilistic Modeling and Simulation of Vehicular Cyber Attacks:
                  An Application of the Meta Attack Language},
  booktitle    = {{ICISSP}},
  pages        = {175--182},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/KhanNB19,
  author       = {Nadir Khan and
                  Sven Nitzsche and
                  J{\"{u}}rgen Becker},
  title        = {A Secure Framework with Remote Configuration of Intellectual Property},
  booktitle    = {{ICISSP}},
  pages        = {564--571},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/KiperbergLRAZ19,
  author       = {Michael Kiperberg and
                  Roee Leon and
                  Amit Resh and
                  Asaf Algawi and
                  Nezer Zaidenberg},
  title        = {Hypervisor-assisted Atomic Memory Acquisition in Modern Systems},
  booktitle    = {{ICISSP}},
  pages        = {155--162},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/KiwanukaAAPF19,
  author       = {Fred N. Kiwanuka and
                  Ja'far Alqatawna and
                  Anang Hudaya Muhamad Amin and
                  Sujni Paul and
                  Hossam Faris},
  title        = {Towards Automated Comprehensive Feature Engineering for Spam Detection},
  booktitle    = {{ICISSP}},
  pages        = {429--437},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/LestyanABS19,
  author       = {Szilvia Lestyan and
                  Gergely {\'{A}}cs and
                  Gergely Bicz{\'{o}}k and
                  Zsolt Szalay},
  title        = {Extracting Vehicle Sensor Signals from {CAN} Logs for Driver Re-identification},
  booktitle    = {{ICISSP}},
  pages        = {136--145},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/ListikLSH19,
  author       = {V{\'{\i}}t List{\'{\i}}k and
                  Simon Let and
                  Jan Sediv{\'{y}} and
                  V{\'{a}}clav Hlav{\'{a}}c},
  title        = {Phishing Email Detection based on Named Entity Recognition},
  booktitle    = {{ICISSP}},
  pages        = {252--256},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/Loutfi19,
  author       = {Ijlal Loutfi},
  title        = {SMMDecoy: Detecting {GPU} Keyloggers using Security by Deception Techniques},
  booktitle    = {{ICISSP}},
  pages        = {580--587},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/MadhusudanSMZP19,
  author       = {Akash Madhusudan and
                  Iraklis Symeonidis and
                  Mustafa A. Mustafa and
                  Ren Zhang and
                  Bart Preneel},
  title        = {SC2Share: Smart Contract for Secure Car Sharing},
  booktitle    = {{ICISSP}},
  pages        = {163--171},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/MashhadaniCL19,
  author       = {Shahlaa Mashhadani and
                  Nathan L. Clarke and
                  Fudong Li},
  title        = {Identification and Extraction of Digital Forensic Evidence from Multimedia
                  Data Sources using Multi-algorithmic Fusion},
  booktitle    = {{ICISSP}},
  pages        = {438--448},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/MeinigTM19,
  author       = {Michael Meinig and
                  Peter Tr{\"{o}}ger and
                  Christoph Meinel},
  title        = {Finding Classification Zone Violations with Anonymized Message Flow
                  Analysis},
  booktitle    = {{ICISSP}},
  pages        = {284--292},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/MohassebAJL19,
  author       = {Alaa Mohasseb and
                  Benjamin Aziz and
                  Jeyong Jung and
                  Julak Lee},
  title        = {Predicting CyberSecurity Incidents using Machine Learning Algorithms:
                  {A} Case Study of Korean SMEs},
  booktitle    = {{ICISSP}},
  pages        = {230--237},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/MoriK19,
  author       = {Takafumi Mori and
                  Hiroaki Kikuchi},
  title        = {Robust Person Identification based on {DTW} Distance of Multiple-Joint
                  Gait Pattern},
  booktitle    = {{ICISSP}},
  pages        = {221--229},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/MucciB19,
  author       = {Daniele Mucci and
                  Bernhards Blumbergs},
  title        = {{TED:} {A} Container based Tool to Perform Security Risk Assessment
                  for {ELF} Binaries},
  booktitle    = {{ICISSP}},
  pages        = {361--369},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/NguyenRMD19,
  author       = {Hoai Phuong Nguyen and
                  Florent Retraint and
                  Fr{\'{e}}d{\'{e}}ric Morain{-}Nicolier and
                  Agn{\`{e}}s Delahaies},
  title        = {An Image Forgery Detection Solution based on {DCT} Coefficient Analysis},
  booktitle    = {{ICISSP}},
  pages        = {487--494},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/NymanG19,
  author       = {Maja Nyman and
                  Christine Gro{\ss}e},
  title        = {Are You Ready When It Counts? {IT} Consulting Firm's Information Security
                  Incident Management},
  booktitle    = {{ICISSP}},
  pages        = {26--37},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/OlukoyaMO19,
  author       = {Oluwafemi Olukoya and
                  Lewis Mackenzie and
                  Inah Omoronyia},
  title        = {Permission-based Risk Signals for App Behaviour Characterization in
                  Android Apps},
  booktitle    = {{ICISSP}},
  pages        = {183--192},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/OudahGB19,
  author       = {Hussein Oudah and
                  Bogdan V. Ghita and
                  Taimur Bakhshi},
  title        = {A Novel Features Set for Internet Traffic Classification using Burstiness},
  booktitle    = {{ICISSP}},
  pages        = {397--404},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/PatzerLMB19,
  author       = {Florian Patzer and
                  Philipp L{\"{u}}dtke and
                  Ankush Meshram and
                  J{\"{u}}rgen Beyerer},
  title        = {Context-Aware Software-Defined Networking for Automated Incident Response
                  in Industrial Networks},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {137--161},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/PatzerMH19,
  author       = {Florian Patzer and
                  Ankush Meshram and
                  Maximilian He{\ss}},
  title        = {Automated Incident Response for Industrial Control Systems Leveraging
                  Software-defined Networking},
  booktitle    = {{ICISSP}},
  pages        = {319--327},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/PfrangGBMB19,
  author       = {Steffen Pfrang and
                  Mark Giraud and
                  Anne Borcherding and
                  David Meier and
                  J{\"{u}}rgen Beyerer},
  title        = {Design of an Example Network Protocol for Security Tests Targeting
                  Industrial Automation Systems},
  booktitle    = {{ICISSP}},
  pages        = {727--738},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/Pietro19,
  author       = {Roberto Di Pietro},
  title        = {Next Generation Information Warfare: Challenges and Research Directions},
  booktitle    = {{ICISSP}},
  pages        = {7--8},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/PietroCR19,
  author       = {Roberto Di Pietro and
                  Maurantonio Caprolu and
                  Simone Raponi},
  title        = {Next Generation Information Warfare: Rationales, Scenarios, Threats,
                  and Open Issues},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {24--47},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/PonsardG19,
  author       = {Christophe Ponsard and
                  Jeremy Grandclaudon},
  title        = {Guidelines and Tool Support for Building a Cybersecurity Awareness
                  Program for SMEs},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {335--357},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/PonsardGB19,
  author       = {Christophe Ponsard and
                  Jeremy Grandclaudon and
                  S{\'{e}}bastien Bal},
  title        = {Survey and Lessons Learned on Raising {SME} Awareness about Cybersecurity},
  booktitle    = {{ICISSP}},
  pages        = {558--563},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/Quirchmayr19,
  author       = {Gerald Quirchmayr},
  title        = {Challenges of {GDPR} and the {NIS} Directive},
  booktitle    = {{ICISSP}},
  pages        = {9},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/Reza0E19,
  author       = {Khondker Jahid Reza and
                  Md Zahidul Islam and
                  Vladimir Estivill{-}Castro},
  title        = {Privacy Preservation of Social Network Users Against Attribute Inference
                  Attacks via Malicious Data Mining},
  booktitle    = {{ICISSP}},
  pages        = {412--420},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/Reza0E19a,
  author       = {Khondker Jahid Reza and
                  Md Zahidul Islam and
                  Vladimir Estivill{-}Castro},
  title        = {Protection of User-Defined Sensitive Attributes on Online Social Networks
                  Against Attribute Inference Attack via Adversarial Data Mining},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {230--249},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/SaadBE19,
  author       = {Sherif Saad and
                  William Briguglio and
                  Haytham Elmiligi},
  title        = {The Curious Case of Machine Learning in Malware Detection},
  booktitle    = {{ICISSP}},
  pages        = {528--535},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/SaaudiTF19,
  author       = {Ahmed Saaudi and
                  Yan Tong and
                  Csilla Farkas},
  title        = {Probabilistic Graphical Model on Detecting Insiders: Modeling with
                  {SGD-HMM}},
  booktitle    = {{ICISSP}},
  pages        = {461--470},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/SatoHT19,
  author       = {Yuya Sato and
                  Hirokazu Hasegawa and
                  Hiroki Takakura},
  title        = {Construction of Secure Internal Networks with Communication Classifying
                  System},
  booktitle    = {{ICISSP}},
  pages        = {552--557},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/SchwittmannWW19,
  author       = {Lorenz Schwittmann and
                  Matth{\"{a}}us Wander and
                  Torben Weis},
  title        = {Mobile Devices as Digital Sextants for Zero-Permission Geolocation},
  booktitle    = {{ICISSP}},
  pages        = {55--66},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/SnymanK19,
  author       = {Dirk Snyman and
                  Hennie A. Kruger},
  title        = {Theorising on Information Cascades and Sequential Decision-making
                  for Analysing Security Behaviour},
  booktitle    = {{ICISSP}},
  pages        = {205--212},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/Sonntag19,
  author       = {Michael Sonntag},
  title        = {Malicious {DNS} Traffic in Tor: Analysis and Countermeasures},
  booktitle    = {{ICISSP}},
  pages        = {536--543},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/SpagnueloFL19,
  author       = {Dayana Spagnuelo and
                  Ana Ferreira and
                  Gabriele Lenzini},
  title        = {Accomplishing Transparency within the General Data Protection Regulation},
  booktitle    = {{ICISSP}},
  pages        = {114--125},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/SpagnueloFL19a,
  author       = {Dayana Spagnuelo and
                  Ana Ferreira and
                  Gabriele Lenzini},
  title        = {Transparency Enhancing Tools and the {GDPR:} Do They Match?},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {162--185},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/TavolatoT19,
  author       = {Paul Tavolato and
                  Christina Tavolato{-}W{\"{o}}tzl},
  title        = {Analytical Modelling of Cyber-physical Systems},
  booktitle    = {{ICISSP}},
  pages        = {685--689},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/TorresSAP19,
  author       = {Jos{\'{e}} Torres and
                  Sergio de los Santos and
                  Efthimios Alepis and
                  Constantinos Patsakis},
  title        = {Behavioral Biometric Authentication in Android Unlock Patterns through
                  Machine Learning},
  booktitle    = {{ICISSP}},
  pages        = {146--154},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/TorresSAP19a,
  author       = {Jos{\'{e}} Torres and
                  Sergio de los Santos and
                  Efthimios Alepis and
                  Constantinos Patsakis},
  title        = {User Behavioral Biometrics and Machine Learning Towards Improving
                  User Authentication in Smartphones},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {250--271},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/UlzFPS19,
  author       = {Thomas Ulz and
                  Markus Feldbacher and
                  Thomas W. Pieber and
                  Christian Steger},
  title        = {Sensing Danger: Exploiting Sensors to Build Covert Channels},
  booktitle    = {{ICISSP}},
  pages        = {100--113},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/VendittiF19,
  author       = {Antonello Venditti and
                  Fausto Fasano},
  title        = {A Systematic Approach to Choose the Data Warehouse Architecture},
  booktitle    = {{ICISSP}},
  pages        = {711--718},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/WahshehL19,
  author       = {Heider A. M. Wahsheh and
                  Flaminia L. Luccio},
  title        = {Evaluating Security, Privacy and Usability Features of {QR} Code Readers},
  booktitle    = {{ICISSP}},
  pages        = {266--273},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/WeinhardtO19,
  author       = {Stephanie Weinhardt and
                  Olamide Omolola},
  title        = {Usability of Policy Authoring Tools: {A} Layered Approach},
  booktitle    = {{ICISSP}},
  pages        = {301--308},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/XiongKL19,
  author       = {Wenjun Xiong and
                  Fredrik Krantz and
                  Robert Lagerstr{\"{o}}m},
  title        = {Threat Modeling and Attack Simulations of Connected Vehicles: {A}
                  Research Outlook},
  booktitle    = {{ICISSP}},
  pages        = {479--486},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/XiongKL19a,
  author       = {Wenjun Xiong and
                  Fredrik Krantz and
                  Robert Lagerstr{\"{o}}m},
  title        = {Threat Modeling and Attack Simulations of Connected Vehicles: Proof
                  of Concept},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {272--287},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/YamadaKMI19,
  author       = {Michihiro Yamada and
                  Hiroaki Kikuchi and
                  Naoki Matsuyama and
                  Koji Inui},
  title        = {Mathematical Model to Estimate Loss by Cyber Incident in Japan},
  booktitle    = {{ICISSP}},
  pages        = {353--360},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/YonamineKMT19,
  author       = {Shun Yonamine and
                  Youki Kadobayashi and
                  Daisuke Miyamoto and
                  Yuzo Taenaka},
  title        = {Towards Automated Characterization of Malware's High-level Mechanism
                  using Virtual Machine Introspection},
  booktitle    = {{ICISSP}},
  pages        = {471--478},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/YoshinoSNS19,
  author       = {Masayuki Yoshino and
                  Takayuki Suzuki and
                  Ken Naganuma and
                  Hisayoshi Sato},
  title        = {Definition and Efficient Construction of Encrypted k-anonymization
                  Scheme},
  booktitle    = {{ICISSP}},
  pages        = {293--300},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/ZaidenbergKYLAR19,
  author       = {Nezer Jacob Zaidenberg and
                  Michael Kiperberg and
                  Raz Ben Yehuda and
                  Roee Leon and
                  Asaf Algawi and
                  Amit Resh},
  title        = {Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {317--334},
  publisher    = {Springer},
  year         = {2019}
}
@proceedings{DBLP:conf/icissp/2018s,
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Information Systems Security and Privacy - 4th International Conference,
                  {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  publisher    = {Springer},
  year         = {2019}
}
@proceedings{DBLP:conf/icissp/2019,
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  publisher    = {SciTePress},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/AbomharaKOH18,
  author       = {Mohamed Abomhara and
                  Geir M. K{\o}ien and
                  Vladimir A. Oleshchuk and
                  Mohamed Hamid},
  title        = {Towards Risk-aware Access Control Framework for Healthcare Information
                  Sharing},
  booktitle    = {{ICISSP}},
  pages        = {312--321},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/AburawiLC18,
  author       = {Nahla Aburawi and
                  Alexei Lisitsa and
                  Frans Coenen},
  title        = {Querying Encrypted Graph Databases},
  booktitle    = {{ICISSP}},
  pages        = {447--451},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/Alepis18,
  author       = {Efthimios Alepis},
  title        = {Notify This: Exploiting Android Notifications for Fun and Profit},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {86--108},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/AlpersPOR18,
  author       = {Sascha Alpers and
                  Roman Pilipchuk and
                  Andreas Oberweis and
                  Ralf H. Reussner},
  title        = {Identifying Needs for a Holistic Modelling Approach to Privacy Aspects
                  in Enterprise Software Systems},
  booktitle    = {{ICISSP}},
  pages        = {74--82},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/AlpersPOR18a,
  author       = {Sascha Alpers and
                  Roman Pilipchuk and
                  Andreas Oberweis and
                  Ralf H. Reussner},
  title        = {The Current State of the Holistic Privacy and Security Modelling Approach
                  in Business Process and Software Architecture Modelling},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {109--124},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/AlqahtaniCHG18,
  author       = {Ohud Alqahtani and
                  Zhiyuan Chen and
                  Qiong Huang and
                  Karthik Gottipati},
  title        = {Is Bigger Safer? Analyzing Factors Related to Data Breaches using
                  Publicly Available Information},
  booktitle    = {{ICISSP}},
  pages        = {373--378},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/AlshehriCB18,
  author       = {Abdullah Alshehri and
                  Frans Coenen and
                  Danushka Bollegala},
  title        = {Spectral Analysis of Keystroke Streams: Towards Effective Real-time
                  Continuous User Authentication},
  booktitle    = {{ICISSP}},
  pages        = {62--73},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/AlvesM18,
  author       = {Thiago Alves and
                  Thomas H. Morris},
  title        = {Hardware-based Cyber Threats},
  booktitle    = {{ICISSP}},
  pages        = {259--266},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/Anderson18,
  author       = {Ross Anderson},
  title        = {Sustainable Security - an Internet of Durable Goods},
  booktitle    = {{ICISSP}},
  pages        = {7},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/BacciBMMMV18,
  author       = {Alessandro Bacci and
                  Alberto Bartoli and
                  Fabio Martinelli and
                  Eric Medvet and
                  Francesco Mercaldo and
                  Corrado Aaron Visaggio},
  title        = {Impact of Code Obfuscation on Android Malware Detection based on Static
                  and Dynamic Analysis},
  booktitle    = {{ICISSP}},
  pages        = {379--385},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/BacciMMM18,
  author       = {Alessandro Bacci and
                  Fabio Martinelli and
                  Eric Medvet and
                  Francesco Mercaldo},
  title        = {VizMal: {A} Visualization Tool for Analyzing the Behavior of Android
                  Malware},
  booktitle    = {{ICISSP}},
  pages        = {517--525},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/BadjiD18,
  author       = {Radja Badji and
                  Fida Kamal Dankar},
  title        = {A Risk-aware Access Control Model for Biomedical Research Platforms},
  booktitle    = {{ICISSP}},
  pages        = {322--328},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/BarrosL18,
  author       = {Martina J. Zucule de Barros and
                  Horst Lazarek},
  title        = {A Cyber Safety Model for Schools in Mozambique},
  booktitle    = {{ICISSP}},
  pages        = {251--258},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/CalderonHYS18,
  author       = {Paul Calderon and
                  Hirokazu Hasegawa and
                  Yukiko Yamaguchi and
                  Hajime Shimada},
  title        = {Malware Detection based on {HTTPS} Characteristic via Machine Learning},
  booktitle    = {{ICISSP}},
  pages        = {410--417},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/DagherMMM18,
  author       = {Gaby G. Dagher and
                  Praneeth Babu Marella and
                  Matea Milojkovic and
                  Jordan Mohler},
  title        = {BroncoVote: Secure Voting System using Ethereum's Blockchain},
  booktitle    = {{ICISSP}},
  pages        = {96--107},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/DeyBS18,
  author       = {Alexandre Dey and
                  Loic Beheshti and
                  Marie{-}Kerguelen Sido},
  title        = {Health State of Google's PlayStore - Finding Malware in Large Sets
                  of Applications from the Android Market},
  booktitle    = {{ICISSP}},
  pages        = {538--544},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/DieschPK18,
  author       = {Rainer Diesch and
                  Matthias Pfaff and
                  Helmut Krcmar},
  title        = {Prerequisite to Measure Information Security - {A} State of the Art
                  Literature Review},
  booktitle    = {{ICISSP}},
  pages        = {207--215},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/EiblBE18,
  author       = {G{\"{u}}nther Eibl and
                  Sebastian Burkhart and
                  Dominik Engel},
  title        = {Unsupervised Holiday Detection from Low-resolution Smart Metering
                  Data},
  booktitle    = {{ICISSP}},
  pages        = {477--486},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/EiblBE18a,
  author       = {G{\"{u}}nther Eibl and
                  Sebastian Burkhart and
                  Dominik Engel},
  title        = {Insights into Unsupervised Holiday Detection from Low-Resolution Smart
                  Metering Data},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {281--302},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/EignerKT18,
  author       = {Oliver Eigner and
                  Philipp Kreimel and
                  Paul Tavolato},
  title        = {Attacks on Industrial Control Systems - Modeling and Anomaly Detection},
  booktitle    = {{ICISSP}},
  pages        = {581--588},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/EreminK18,
  author       = {Aleksandr Eremin and
                  Konstantin Kogos},
  title        = {Incoming Call Implicit User Authentication - User Authentication via
                  Hand Movement Pattern},
  booktitle    = {{ICISSP}},
  pages        = {24--29},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/EreminKV18,
  author       = {Aleksandr Eremin and
                  Konstantin Kogos and
                  Yana Valatskayte},
  title        = {Touch and Move: Incoming Call User Authentication},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {26--39},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/FerreiraM18,
  author       = {Ana Ferreira and
                  Pedro Manuel Vieira Marques},
  title        = {Phishing Through Time: {A} Ten Year Story based on Abstracts},
  booktitle    = {{ICISSP}},
  pages        = {225--232},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/FiliolJD18,
  author       = {Eric Filiol and
                  J. Nicolas and
                  Maxence Delong},
  title        = {Statistical and Combinatorial Analysis of the {TOR} Routing Protocol
                  - Structural Weaknesses Identified in the {TOR} Network},
  booktitle    = {{ICISSP}},
  pages        = {507--516},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/Fortuna0B18,
  author       = {Pedro Fortuna and
                  Nuno Pereira and
                  Ismail Butun},
  title        = {A Framework for Web Application Integrity},
  booktitle    = {{ICISSP}},
  pages        = {487--493},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/FredjLC18,
  author       = {Feten Ben Fredj and
                  Nadira Lammari and
                  Isabelle Comyn{-}Wattiau},
  title        = {Relational Database Anonymization - {A} Model-driven Guiding Approach},
  booktitle    = {{ICISSP}},
  pages        = {161--170},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/GaoW18,
  author       = {Yuanyuan Gao and
                  Kunpeng Wang},
  title        = {Probability Preservation Property with Relative Error and Its Applications},
  booktitle    = {{ICISSP}},
  pages        = {461--468},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/GencLRS18,
  author       = {Ziya Alper Gen{\c{c}} and
                  Gabriele Lenzini and
                  Peter Y. A. Ryan and
                  Itzel V{\'{a}}zquez Sandoval},
  title        = {A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System},
  booktitle    = {{ICISSP}},
  pages        = {83--95},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/GencLRS18a,
  author       = {Ziya Alper Gen{\c{c}} and
                  Gabriele Lenzini and
                  Peter Y. A. Ryan and
                  Itzel V{\'{a}}zquez Sandoval},
  title        = {A Critical Security Analysis of the Password-Based Authentication
                  Honeywords System Under Code-Corruption Attack},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {125--151},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/GougeonL18,
  author       = {Thomas Gougeon and
                  Patrick Lacharme},
  title        = {How to Break CaptchaStar},
  booktitle    = {{ICISSP}},
  pages        = {41--51},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/GougeonL18a,
  author       = {Thomas Gougeon and
                  Patrick Lacharme},
  title        = {A Simple Attack on CaptchaStar},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {66--85},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/GrafK18,
  author       = {Roman Graf and
                  Ross King},
  title        = {Cyber Threat Information Classification and Life Cycle Management
                  using Smart Contracts},
  booktitle    = {{ICISSP}},
  pages        = {304--311},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/HakbilenPEU18,
  author       = {Onur Hakbilen and
                  Piraveen Perinparajan and
                  Michael Eikeland and
                  Nils Ulltveit{-}Moe},
  title        = {{SAFEPASS} - Presenting a Convenient, Portable and Secure Password
                  Manager},
  booktitle    = {{ICISSP}},
  pages        = {292--303},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/HamidiSM18,
  author       = {Mona Hamidi and
                  Mina Sheikhalishahi and
                  Fabio Martinelli},
  title        = {Secure Two-party Agglomerative Hierarchical Clustering Construction},
  booktitle    = {{ICISSP}},
  pages        = {432--437},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/HaupertM18,
  author       = {Vincent Haupert and
                  Tilo M{\"{u}}ller},
  title        = {On App-based Matrix Code Authentication in Online Banking},
  booktitle    = {{ICISSP}},
  pages        = {149--160},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/HerwonoE18,
  author       = {Ian Herwono and
                  Fadi Ali El{-}Moussa},
  title        = {Automated Detection of the Early Stages of Cyber Kill Chain},
  booktitle    = {{ICISSP}},
  pages        = {182--189},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/HuangTS18,
  author       = {Jasper Huang and
                  Fabio Di Troia and
                  Mark Stamp},
  title        = {Acoustic Gait Analysis using Support Vector Machines},
  booktitle    = {{ICISSP}},
  pages        = {545--552},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/HummerGKFP18,
  author       = {Matthias Hummer and
                  Sebastian Groll and
                  Michael Kunz and
                  Ludwig Fuchs and
                  G{\"{u}}nther Pernul},
  title        = {Measuring Identity and Access Management Performance - An Expert Survey
                  on Possible Performance Indicators},
  booktitle    = {{ICISSP}},
  pages        = {233--240},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/HunterW18,
  author       = {Aaron Hunter and
                  Ken Wong},
  title        = {Decoy Systems with Low Energy Bluetooth Communication},
  booktitle    = {{ICISSP}},
  pages        = {404--409},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/Jacoby18,
  author       = {David Jacoby},
  title        = {Hacking the Security Industry for Fun and Profit and Humanity},
  booktitle    = {{ICISSP}},
  pages        = {5},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/JasserTSR18,
  author       = {Stefanie Jasser and
                  Katja Tuma and
                  Riccardo Scandariato and
                  Matthias Riebisch},
  title        = {Back to the Drawing Board - Bringing Security Constraints in an Architecture-centric
                  Software Development Process},
  booktitle    = {{ICISSP}},
  pages        = {438--446},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/KandoussiB18,
  author       = {Asmaa El Kandoussi and
                  Hanan El Bakkali},
  title        = {Novel Access Control Approach for Inter-organizational Workflows},
  booktitle    = {{ICISSP}},
  pages        = {345--352},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/KarlzenBH18,
  author       = {Henrik Karlz{\'{e}}n and
                  Johan E. Bengtsson and
                  Jonas Hallberg},
  title        = {A Test of Structured Threat Descriptions for Information Security
                  Risk Assessments},
  booktitle    = {{ICISSP}},
  pages        = {469--476},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/LeeOKL18,
  author       = {Wei{-}Han Lee and
                  Jorge Ortiz and
                  Bongjun Ko and
                  Ruby B. Lee},
  title        = {Inferring Smartphone Users' Handwritten Patterns by using Motion Sensors},
  booktitle    = {{ICISSP}},
  pages        = {139--148},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/LuhTTS18,
  author       = {Robert Luh and
                  Marlies Temper and
                  Simon Tjoa and
                  Sebastian Schrittwieser},
  title        = {{APT} {RPG:} Design of a Gamified Attacker/Defender Meta Model},
  booktitle    = {{ICISSP}},
  pages        = {526--537},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/MarellaMMD18,
  author       = {Praneeth Babu Marella and
                  Matea Milojkovic and
                  Jordan Mohler and
                  Gaby G. Dagher},
  title        = {GenVote: Blockchain-Based Customizable and Secure Voting Platform},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {152--171},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/MartinelliMN18,
  author       = {Fabio Martinelli and
                  Francesco Mercaldo and
                  Vittoria Nardone},
  title        = {Identifying Insecure Features in Android Applications using Model
                  Checking},
  booktitle    = {{ICISSP}},
  pages        = {589--596},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/MartinelliMNOS18,
  author       = {Fabio Martinelli and
                  Francesco Mercaldo and
                  Vittoria Nardone and
                  Albina Orlando and
                  Antonella Santone},
  title        = {Who's Driving My Car? {A} Machine Learning based Approach to Driver
                  Identification},
  booktitle    = {{ICISSP}},
  pages        = {367--372},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/MartinelliMNOS18a,
  author       = {Fabio Martinelli and
                  Francesco Mercaldo and
                  Vittoria Nardone and
                  Albina Orlando and
                  Antonella Santone},
  title        = {Cluster Analysis for Driver Aggressiveness Identification},
  booktitle    = {{ICISSP}},
  pages        = {562--569},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/MauriCD18,
  author       = {Lara Mauri and
                  Stelvio Cimato and
                  Ernesto Damiani},
  title        = {A Comparative Analysis of Current Cryptocurrencies},
  booktitle    = {{ICISSP}},
  pages        = {127--138},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/MaynardMS18,
  author       = {Peter Maynard and
                  Kieran McLaughlin and
                  Sakir Sezer},
  title        = {Using Application Layer Metrics to Detect Advanced {SCADA} Attacks},
  booktitle    = {{ICISSP}},
  pages        = {418--425},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/MeinigM18,
  author       = {Michael Meinig and
                  Christoph Meinel},
  title        = {Securing the Flow - Data Flow Analysis with Operational Node Structures},
  booktitle    = {{ICISSP}},
  pages        = {241--250},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/MigdalR18,
  author       = {Denis Migdal and
                  Christophe Rosenberger},
  title        = {Towards a Personal Identity Code Respecting Privacy},
  booktitle    = {{ICISSP}},
  pages        = {267--274},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/MorissetS18,
  author       = {Charles Morisset and
                  David Sanchez},
  title        = {VisABAC: {A} Tool for Visualising {ABAC} Policies},
  booktitle    = {{ICISSP}},
  pages        = {117--126},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/MorissetS18a,
  author       = {Charles Morisset and
                  David Sanchez},
  title        = {On Building a Visualisation Tool for Access Control Policies},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {215--239},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/NagarajanTAS18,
  author       = {Prathiba Nagarajan and
                  Fabio Di Troia and
                  Thomas H. Austin and
                  Mark Stamp},
  title        = {Autocorrelation Analysis of Financial Botnet Traffic},
  booktitle    = {{ICISSP}},
  pages        = {599--606},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/Nazmul0C18,
  author       = {Rumana Nazmul and
                  Md. Rafiqul Islam and
                  Ahsan Raja Chowdhury},
  title        = {Alignment-free Cancellable Template Generation for Fingerprint based
                  Authentication},
  booktitle    = {{ICISSP}},
  pages        = {361--366},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/NguyenZRDMN18,
  author       = {Kim Trong Nguyen and
                  Cathel Zitzmann and
                  Florent Retraint and
                  Agn{\`{e}}s Delahaies and
                  Fr{\'{e}}d{\'{e}}ric Morain{-}Nicolier and
                  Hoai Phuong Nguyen},
  title        = {Face Spoofing Detection for Smartphones using a 3D Reconstruction
                  and the Motion Sensors},
  booktitle    = {{ICISSP}},
  pages        = {286--291},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/NinassiVR18,
  author       = {Alexandre Ninassi and
                  Sylvain Vernois and
                  Christophe Rosenberger},
  title        = {Privacy Compliant Multi-biometric Authentication on Smartphones},
  booktitle    = {{ICISSP}},
  pages        = {173--181},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/PatsakisA18,
  author       = {Constantinos Patsakis and
                  Efthimios Alepis},
  title        = {Knock-Knock: The Unbearable Lightness of Android Notifications},
  booktitle    = {{ICISSP}},
  pages        = {52--61},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/PfrangMFB18,
  author       = {Steffen Pfrang and
                  David Meier and
                  Michael Friedrich and
                  J{\"{u}}rgen Beyerer},
  title        = {Advancing Protocol Fuzzing for Industrial Automation and Control Systems},
  booktitle    = {{ICISSP}},
  pages        = {570--580},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/PonsardG18,
  author       = {Christophe Ponsard and
                  Jeremy Grandclaudon},
  title        = {Survey and Guidelines for the Design and Deployment of a Cyber Security
                  Label for SMEs},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {240--260},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/PonsardGD18,
  author       = {Christophe Ponsard and
                  Jeremy Grandclaudon and
                  Gautier Dallons},
  title        = {Towards a Cyber Security Label for SMEs: {A} European Perspective
                  -},
  booktitle    = {{ICISSP}},
  pages        = {426--431},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/Rosenberger18,
  author       = {Christophe Rosenberger},
  title        = {Evaluation of Biometric Template Protection Schemes based on a Transformation},
  booktitle    = {{ICISSP}},
  pages        = {216--224},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/SharafaldinLG18,
  author       = {Iman Sharafaldin and
                  Arash Habibi Lashkari and
                  Ali A. Ghorbani},
  title        = {Toward Generating a New Intrusion Detection Dataset and Intrusion
                  Traffic Characterization},
  booktitle    = {{ICISSP}},
  pages        = {108--116},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/SharafaldinLG18a,
  author       = {Iman Sharafaldin and
                  Arash Habibi Lashkari and
                  Ali A. Ghorbani},
  title        = {A Detailed Analysis of the {CICIDS2017} Data Set},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {172--188},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/SheikhalishahiH18,
  author       = {Mina Sheikhalishahi and
                  Mona Hamidi and
                  Fabio Martinelli},
  title        = {Privacy Preserving Collaborative Agglomerative Hierarchical Clustering
                  Construction},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {261--280},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/SilvaNS18,
  author       = {Marco Silva and
                  Ant{\'{o}}nio Nogueira and
                  Paulo Salvador},
  title        = {Modular Platform for Customer-Side Detection of {BGP} Redirection
                  Attacks},
  booktitle    = {{ICISSP}},
  pages        = {199--206},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/SinghRS18,
  author       = {Dilpreet Singh and
                  Ron Ruhl and
                  Hamman Samuel},
  title        = {Attack Tree for Modelling Unauthorized {EMV} Card Transactions at
                  {POS} Terminals},
  booktitle    = {{ICISSP}},
  pages        = {494--502},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/Stach18,
  author       = {Christoph Stach},
  title        = {Big Brother is Smart Watching You - Privacy Concerns about Health
                  and Fitness Applications},
  booktitle    = {{ICISSP}},
  pages        = {13--23},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/Stach18a,
  author       = {Christoph Stach},
  title        = {Fine-Grained Privacy Control for Fitness and Health Applications Using
                  the Privacy Management Platform},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {1--25},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/StachM18,
  author       = {Christoph Stach and
                  Bernhard Mitschang},
  title        = {{ACCESSORS} - {A} Data-Centric Permission Model for the Internet of
                  Things},
  booktitle    = {{ICISSP}},
  pages        = {30--40},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/StachM18a,
  author       = {Christoph Stach and
                  Bernhard Mitschang},
  title        = {Elicitation of Privacy Requirements for the Internet of Things Using
                  {ACCESSORS}},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {40--65},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/ToliP18,
  author       = {Christina{-}Angeliki Toli and
                  Bart Preneel},
  title        = {Privacy-preserving Biometric Authentication Model for e-Finance Applications},
  booktitle    = {{ICISSP}},
  pages        = {353--360},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/TorresS18,
  author       = {Jos{\'{e}} Torres and
                  Sergio de los Santos},
  title        = {Malicious {PDF} Documents Detection using Machine Learning Techniques
                  - {A} Practical Approach with Cloud Computing Applications},
  booktitle    = {{ICISSP}},
  pages        = {337--344},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/VasileiouF18,
  author       = {Ismini Vasileiou and
                  Steven Furnell},
  title        = {Enhancing Security Education - Recognising Threshold Concepts and
                  Other Influencing Factors},
  booktitle    = {{ICISSP}},
  pages        = {398--403},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/VasileiouF18a,
  author       = {Ismini Vasileiou and
                  Steven Furnell},
  title        = {Personalising Security Education: Factors Influencing Individual Awareness
                  and Compliance},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {189--200},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/VibertCBR18,
  author       = {Beno{\^{\i}}t Vibert and
                  Christophe Charrier and
                  Jean{-}Marie Le Bars and
                  Christophe Rosenberger},
  title        = {Towards an Optimal Template Reduction for Securing Embedded Fingerprint
                  Devices},
  booktitle    = {{ICISSP}},
  pages        = {329--336},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/WaagsnesU18,
  author       = {Henrik Waagsnes and
                  Nils Ulltveit{-}Moe},
  title        = {Intrusion Detection System Test Framework for {SCADA} Systems},
  booktitle    = {{ICISSP}},
  pages        = {275--285},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/WangZL18,
  author       = {Wenbo Wang and
                  Tianning Zang and
                  Yuqing Lan},
  title        = {The Rapid Extraction of Suspicious Traffic from Passive {DNS}},
  booktitle    = {{ICISSP}},
  pages        = {190--198},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/WongH18,
  author       = {Kenneth C. K. Wong and
                  Aaron Hunter},
  title        = {Managing Cybersecurity Break-ins Using Bluetooth Low Energy Devices
                  to Verify Attackers: {A} Practical Study},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {201--214},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/WurzenbergerSSF18,
  author       = {Markus Wurzenberger and
                  Florian Skopik and
                  Giuseppe Settanni and
                  Roman Fiedler},
  title        = {{AECID:} {A} Self-learning Anomaly Detection Approach based on Light-weight
                  Log Parser Models},
  booktitle    = {{ICISSP}},
  pages        = {386--397},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/YajamanamSTS18,
  author       = {Sravani Yajamanam and
                  Vikash Raja Samuel Selvin and
                  Fabio Di Troia and
                  Mark Stamp},
  title        = {Deep Learning versus Gist Descriptors for Image-based Malware Classification},
  booktitle    = {{ICISSP}},
  pages        = {553--561},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/ZhengW18,
  author       = {Kaiyan Zheng and
                  Peng Wang},
  title        = {Encryption Schemes based on a Single Permutation: PCBC, POFB, {PCFB}
                  and {PCTR}},
  booktitle    = {{ICISSP}},
  pages        = {452--460},
  publisher    = {SciTePress},
  year         = {2018}
}
@proceedings{DBLP:conf/icissp/2017s,
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Information Systems Security and Privacy - Third International Conference,
                  {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  publisher    = {Springer},
  year         = {2018}
}
@proceedings{DBLP:conf/icissp/2018,
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/AhmadiS17,
  author       = {Ahmad Ahmadi and
                  Reihaneh Safavi{-}Naini},
  title        = {Distance-bounding Identification},
  booktitle    = {{ICISSP}},
  pages        = {202--212},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/AhmadiS17a,
  author       = {Ahmad Ahmadi and
                  Reihaneh Safavi{-}Naini},
  title        = {Directional Distance-Bounding Identification},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  pages        = {197--221},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/AldayelA17,
  author       = {Mashael Aldayel and
                  Mohammad Alhussain},
  title        = {Enhanced Identification of Sensitive User Inputs in Mobile Applications},
  booktitle    = {{ICISSP}},
  pages        = {506--515},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/AlepisP17,
  author       = {Efthimios Alepis and
                  Constantinos Patsakis},
  title        = {There's Wally! Location Tracking in Android without Permissions},
  booktitle    = {{ICISSP}},
  pages        = {278--284},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/AlruhailyBC17,
  author       = {Nada Alruhaily and
                  Behzad Bordbar and
                  Tom Chothia},
  title        = {Towards an Understanding of the Misclassification Rates of Machine
                  Learning-based Malware Detection Systems},
  booktitle    = {{ICISSP}},
  pages        = {101--112},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/AlruhailyCB17,
  author       = {Nada Alruhaily and
                  Tom Chothia and
                  Behzad Bordbar},
  title        = {A Better Understanding of Machine Learning Malware Misclassifcation},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  pages        = {35--58},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/BannierF17,
  author       = {Arnaud Bannier and
                  Eric Filiol},
  title        = {Mathematical Backdoors in Symmetric Encryption Systems - Proposal
                  for a Backdoored AES-like Block Cipher},
  booktitle    = {{ICISSP}},
  pages        = {622--631},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/BarghVC17,
  author       = {Mortaza S. Bargh and
                  Marco Vink and
                  Sunil Choenni},
  title        = {On Usage Control in Relational Database Management Systems - Obligations
                  and Their Enforcement in Joining Datasets},
  booktitle    = {{ICISSP}},
  pages        = {190--201},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/BarghVC17a,
  author       = {Mortaza S. Bargh and
                  Marco Vink and
                  Sunil Choenni},
  title        = {On Using Obligations for Usage Control in Joining of Datasets},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  pages        = {173--196},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/BernardeschiNDP17,
  author       = {Cinzia Bernardeschi and
                  Marco Di Natale and
                  Gianluca Dini and
                  Maurizio Palmieri},
  title        = {Verifying Data Secure Flow in {AUTOSAR} Models by Static Analysis},
  booktitle    = {{ICISSP}},
  pages        = {704--713},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/Bertino17,
  author       = {Elisa Bertino},
  title        = {Security and Privacy in the IoT},
  booktitle    = {{ICISSP}},
  pages        = {5},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/BeukemaAS17,
  author       = {Wietze J. B. Beukema and
                  Thomas Attema and
                  Harm A. Schotanus},
  title        = {Internal Network Monitoring and Anomaly Detection through Host Clustering},
  booktitle    = {{ICISSP}},
  pages        = {694--703},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/BeuranPTCTS17,
  author       = {Razvan Beuran and
                  Cuong Pham and
                  Dat Tang and
                  Ken{-}ichi Chinen and
                  Yasuo Tan and
                  Yoichi Shinoda},
  title        = {CyTrONE: An Integrated Cybersecurity Training Framework},
  booktitle    = {{ICISSP}},
  pages        = {157--166},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/BuK17,
  author       = {Lake Bu and
                  Mark G. Karpovsky},
  title        = {A Design of Secure and ReliableWireless Transmission Channel for Implantable
                  Medical Devices},
  booktitle    = {{ICISSP}},
  pages        = {233--242},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/Cam-Winget17,
  author       = {Nancy Cam{-}Winget},
  title        = {Sensor Networks as the new Attack Target},
  booktitle    = {{ICISSP}},
  pages        = {7},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/CiminoV17,
  author       = {Mario Giovanni C. A. Cimino and
                  Gigliola Vaglini},
  title        = {Localization and Inhibition of Malicious Behaviors through a Model
                  Checking based Methodology},
  booktitle    = {{ICISSP}},
  pages        = {644--652},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/CimitileMM17,
  author       = {Aniello Cimitile and
                  Fabio Martinelli and
                  Francesco Mercaldo},
  title        = {Machine Learning Meets iOS Malware: Identifying Malicious Applications
                  on Apple Environment},
  booktitle    = {{ICISSP}},
  pages        = {487--492},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/CostantinoMMP17,
  author       = {Gianpiero Costantino and
                  Fabio Martinelli and
                  Ilaria Matteucci and
                  Marinella Petrocchi},
  title        = {Analysis of Data Sharing Agreements},
  booktitle    = {{ICISSP}},
  pages        = {167--178},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/CostantinoMMP17a,
  author       = {Gianpiero Costantino and
                  Fabio Martinelli and
                  Ilaria Matteucci and
                  Marinella Petrocchi},
  title        = {Efficient Detection of Conflicts in Data Sharing Agreements},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  pages        = {148--172},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/CourtoisM17,
  author       = {Nicolas T. Courtois and
                  Rebekah Mercer},
  title        = {Stealth Address and Key Management Techniques in Blockchain Systems},
  booktitle    = {{ICISSP}},
  pages        = {559--566},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/CozzaTCK17,
  author       = {Vittoria Cozza and
                  Zisis Tsiatsikas and
                  Mauro Conti and
                  Georgios Kambourakis},
  title        = {Why Snoopy Loves Online Services: An Analysis of (Lack of) Privacy
                  in Online Services},
  booktitle    = {{ICISSP}},
  pages        = {431--438},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/DamT17,
  author       = {Khanh{-}Huu{-}The Dam and
                  Tayssir Touili},
  title        = {Malware Detection based on Graph Classification},
  booktitle    = {{ICISSP}},
  pages        = {455--463},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/DamT17a,
  author       = {Khanh{-}Huu{-}The Dam and
                  Tayssir Touili},
  title        = {Extracting Android Malicious Behaviors},
  booktitle    = {{ICISSP}},
  pages        = {714--723},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/DuboisF17,
  author       = {Michel Dubois and
                  Eric Filiol},
  title        = {Hacking of the {AES} with Boolean Functions},
  booktitle    = {{ICISSP}},
  pages        = {599--609},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/DutaGT17,
  author       = {Cristina{-}Loredana Duta and
                  Laura Gheorghe and
                  Nicolae Tapus},
  title        = {Real-time {DSP} Implementations of Voice Encryption Algorithms},
  booktitle    = {{ICISSP}},
  pages        = {439--446},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/EbrahimyP17,
  author       = {Razgar Ebrahimy and
                  Zoya Pourmirza},
  title        = {Cyber-interdependency in Smart Energy Systems},
  booktitle    = {{ICISSP}},
  pages        = {529--537},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/EiblFHSBRE17,
  author       = {G{\"{u}}nther Eibl and
                  Cornelia Ferner and
                  Tobias Hildebrandt and
                  Florian Stertz and
                  Sebastian Burkhart and
                  Stefanie Rinderle{-}Ma and
                  Dominik Engel},
  title        = {Exploration of the Potential of Process Mining for Intrusion Detection
                  in Smart Metering},
  booktitle    = {{ICISSP}},
  pages        = {38--46},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/FukushimaHK17,
  author       = {Kazuhide Fukushima and
                  Seira Hidano and
                  Shinsaku Kiyomoto},
  title        = {White-box Implementation of Stream Cipher},
  booktitle    = {{ICISSP}},
  pages        = {263--269},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/GjertsenGBF17,
  author       = {Eyvind Garder B. Gjertsen and
                  Erlend Andreas Gj{\ae}re and
                  Maria Bartnes and
                  Waldo Rocha Flores},
  title        = {Gamification of Information Security Awareness and Training},
  booktitle    = {{ICISSP}},
  pages        = {59--70},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/HadadPSOR17,
  author       = {Tal Hadad and
                  Rami Puzis and
                  Bronislav Sidik and
                  Nir Ofek and
                  Lior Rokach},
  title        = {Application Marketplace Malware Detection by User Feedback Analysis},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  pages        = {1--19},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/HadadSOPR17,
  author       = {Tal Hadad and
                  Bronislav Sidik and
                  Nir Ofek and
                  Rami Puzis and
                  Lior Rokach},
  title        = {User Feedback Analysis for Mobile Malware Detection},
  booktitle    = {{ICISSP}},
  pages        = {83--94},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/HamadP17,
  author       = {Mohammad Hamad and
                  Vassilis Prevelakis},
  title        = {Secure APIs for Applications in Microkernel-based Systems},
  booktitle    = {{ICISSP}},
  pages        = {553--558},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/HatinCSR17,
  author       = {Julien Hatin and
                  Estelle Cherrier and
                  Jean{-}Jacques Schwartzmann and
                  Christophe Rosenberger},
  title        = {Privacy Preserving Transparent Mobile Authentication},
  booktitle    = {{ICISSP}},
  pages        = {354--361},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/HaupertM17,
  author       = {Vincent Haupert and
                  Tilo M{\"{u}}ller},
  title        = {Rest in Protection - {A} Kernel-level Approach to Mitigate {RIP} Tampering},
  booktitle    = {{ICISSP}},
  pages        = {25--37},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/HerwonoE17,
  author       = {Ian Herwono and
                  Fadi Ali El{-}Moussa},
  title        = {A Collaborative Tool for Modelling Multi-stage Attacks},
  booktitle    = {{ICISSP}},
  pages        = {312--317},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/HerwonoE17a,
  author       = {Ian Herwono and
                  Fadi Ali El{-}Moussa},
  title        = {A System for Detecting Targeted Cyber-Attacks Using Attack Patterns},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  pages        = {20--34},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/HuffmeyerHMSW17,
  author       = {Marc H{\"{u}}ffmeyer and
                  Pascal Hirmer and
                  Bernhard Mitschang and
                  Ulf Schreier and
                  Matthias Wieland},
  title        = {SitAC - {A} System for Situation-aware Access Control - Controlling
                  Access to Sensor Data},
  booktitle    = {{ICISSP}},
  pages        = {113--125},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/HuffmeyerHMSW17a,
  author       = {Marc H{\"{u}}ffmeyer and
                  Pascal Hirmer and
                  Bernhard Mitschang and
                  Ulf Schreier and
                  Matthias Wieland},
  title        = {Situation-Aware Access Control for Industrie 4.0},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  pages        = {59--83},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/HuynenL17,
  author       = {Jean{-}Louis Huynen and
                  Gabriele Lenzini},
  title        = {From Situation Awareness to Action: An Information Security Management
                  Toolkit for Socio-technical Security Retrospective and Prospective
                  Analysis},
  booktitle    = {{ICISSP}},
  pages        = {213--224},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/HuynenL17a,
  author       = {Jean{-}Louis Huynen and
                  Gabriele Lenzini},
  title        = {An Information Security Management for Socio-Technical Analysis of
                  System Security},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  pages        = {222--251},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/IrollaF17,
  author       = {Paul Irolla and
                  Eric Filiol},
  title        = {Glassbox: Dynamic Analysis Platform for Malware Android Applications
                  on Real Devices},
  booktitle    = {{ICISSP}},
  pages        = {610--621},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/KapratwarTS17,
  author       = {Ankita Kapratwar and
                  Fabio Di Troia and
                  Mark Stamp},
  title        = {Static and Dynamic Analysis of Android Malware},
  booktitle    = {{ICISSP}},
  pages        = {653--662},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/KarlssonHS17,
  author       = {Linus Karlsson and
                  Martin Hell and
                  Paul Stankovski},
  title        = {Improved Greedy Nonrandomness Detectors for Stream Ciphers},
  booktitle    = {{ICISSP}},
  pages        = {225--232},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/KarlssonHS17a,
  author       = {Linus Karlsson and
                  Martin Hell and
                  Paul Stankovski},
  title        = {Not So Greedy: Enhanced Subset Exploration for Nonrandomness Detectors},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  pages        = {273--294},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/KarlzenBH17,
  author       = {Henrik Karlz{\'{e}}n and
                  Johan E. Bengtsson and
                  Jonas Hallberg},
  title        = {Assessing Information Security Risks using Pairwise Weighting},
  booktitle    = {{ICISSP}},
  pages        = {318--324},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/KiperbergRAZ17,
  author       = {Michael Kiperberg and
                  Amit Resh and
                  Asaf Algawi and
                  Nezer Jacob Zaidenberg},
  title        = {System for Executing Encrypted Java Programs},
  booktitle    = {{ICISSP}},
  pages        = {245--252},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/KippeP17,
  author       = {J{\"{o}}rg Kippe and
                  Steffen Pfrang},
  title        = {Network and Topology Models to Support {IDS} Event Processing},
  booktitle    = {{ICISSP}},
  pages        = {372--379},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/KrennLS17,
  author       = {Stephan Krenn and
                  Thomas Lor{\"{u}}nser and
                  Christoph Striecks},
  title        = {Batch-verifiable Secret Sharing with Unconditional Privacy},
  booktitle    = {{ICISSP}},
  pages        = {303--311},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/KumarL17,
  author       = {Gautam Kumar and
                  Brent Lagesse},
  title        = {Limited Use Cryptographic Tokens in Securing Ephemeral Cloud Servers},
  booktitle    = {{ICISSP}},
  pages        = {447--454},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/LashkariDMG17,
  author       = {Arash Habibi Lashkari and
                  Gerard Draper{-}Gil and
                  Mohammad Saiful Islam Mamun and
                  Ali A. Ghorbani},
  title        = {Characterization of Tor Traffic using Time based Features},
  booktitle    = {{ICISSP}},
  pages        = {253--262},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/LeeLJML17,
  author       = {Wei{-}Han Lee and
                  Changchang Liu and
                  Shouling Ji and
                  Prateek Mittal and
                  Ruby B. Lee},
  title        = {Quantification of De-anonymization Risks in Social Networks},
  booktitle    = {{ICISSP}},
  pages        = {126--135},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/LeeLJML17a,
  author       = {Wei{-}Han Lee and
                  Changchang Liu and
                  Shouling Ji and
                  Prateek Mittal and
                  Ruby B. Lee},
  title        = {How to Quantify Graph De-anonymization Risks},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  pages        = {84--104},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/LigierCFS17,
  author       = {Damien Ligier and
                  Sergiu Carpov and
                  Caroline Fontaine and
                  Renaud Sirdey},
  title        = {Privacy Preserving Data Classification using Inner-product Functional
                  Encryption},
  booktitle    = {{ICISSP}},
  pages        = {423--430},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/LopesA17,
  author       = {Arthur Costa Lopes and
                  Diego F. Aranha},
  title        = {Platform-agnostic Low-intrusion Optical Data Exfiltration},
  booktitle    = {{ICISSP}},
  pages        = {474--480},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/LuhS0S17,
  author       = {Robert Luh and
                  Gregor Schramm and
                  Markus Wagner and
                  Sebastian Schrittwieser},
  title        = {Sequitur-based Inference and Analysis Framework for Malicious System
                  Behavior},
  booktitle    = {{ICISSP}},
  pages        = {632--643},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/LuhSMJ17,
  author       = {Robert Luh and
                  Sebastian Schrittwieser and
                  Stefan Marschalek and
                  Helge Janicke},
  title        = {Design of an Anomaly-based Threat Detection {\&} Explication System},
  booktitle    = {{ICISSP}},
  pages        = {397--402},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/LutasTC17,
  author       = {Andrei Lutas and
                  Daniel Ticle and
                  Octavian Cret},
  title        = {Hypervisor based Memory Introspection: Challenges, Problems and Limitations},
  booktitle    = {{ICISSP}},
  pages        = {285--294},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/MartinelliMNSV17,
  author       = {Fabio Martinelli and
                  Francesco Mercaldo and
                  Vittoria Nardone and
                  Antonella Santone and
                  Corrado Aaron Visaggio},
  title        = {Identifying Mobile Repackaged Applications through Formal Methods},
  booktitle    = {{ICISSP}},
  pages        = {673--682},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/MartinezEMZ17,
  author       = {V. Gayoso Mart{\'{\i}}nez and
                  Luis Hern{\'{a}}ndez Encinas and
                  Agust{\'{\i}}n Mart{\'{\i}}n Mu{\~{n}}oz and
                  J. Zhang},
  title        = {Breaking a Hitag2 Protocol with Low Cost Technology},
  booktitle    = {{ICISSP}},
  pages        = {579--584},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/MorenoF17,
  author       = {Carlos Moreno and
                  Sebastian Fischmeister},
  title        = {On the Security of Safety-critical Embedded Systems: Who Watches the
                  Watchers? Who Reprograms the Watchers?},
  booktitle    = {{ICISSP}},
  pages        = {493--498},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/NardoneV17,
  author       = {Vittoria Nardone and
                  Corrado Aaron Visaggio},
  title        = {"Mirror, Mirror on the Wall, Who is the Fairest One of All?" - Machine
                  Learning versus Model Checking: {A} Comparison between Two Static
                  Techniques for Malware Family Identification},
  booktitle    = {{ICISSP}},
  pages        = {663--672},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/OhtakeSZ17,
  author       = {Go Ohtake and
                  Reihaneh Safavi{-}Naini and
                  Liang Feng Zhang},
  title        = {Outsourcing Scheme of {ABE} Encryption Secure against Malicious Adversary},
  booktitle    = {{ICISSP}},
  pages        = {71--82},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/OmerovicNT17,
  author       = {Aida Omerovic and
                  Marit Kj{\o}snes Natvig and
                  Isabelle C. R. Tardy},
  title        = {Towards a Privacy Scorecard - Initial Design Exemplified on an Intelligent
                  Transport Systems Service},
  booktitle    = {{ICISSP}},
  pages        = {585--593},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/OrunsoluS17,
  author       = {Abdul A. Orunsolu and
                  Adesina S. Sodiya},
  title        = {An Anti-Phishing Kit Scheme for Secure Web Transactions},
  booktitle    = {{ICISSP}},
  pages        = {15--24},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/PahiLS17,
  author       = {Timea Pahi and
                  Maria Leitner and
                  Florian Skopik},
  title        = {Analysis and Assessment of Situational Awareness Models for National
                  Cyber Security Centers},
  booktitle    = {{ICISSP}},
  pages        = {334--345},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/PeacockJV17,
  author       = {Matthew Peacock and
                  Michael N. Johnstone and
                  Craig Valli},
  title        = {Security Issues with BACnet Value Handling},
  booktitle    = {{ICISSP}},
  pages        = {546--552},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/PeacockJV17a,
  author       = {Matthew Peacock and
                  Michael N. Johnstone and
                  Craig Valli},
  title        = {An Exploration of Some Security Issues Within the BACnet Protocol},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  pages        = {252--272},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/PereiraA17,
  author       = {Hilder V. L. Pereira and
                  Diego F. Aranha},
  title        = {Non-interactive Privacy-preserving k-NN Classifier},
  booktitle    = {{ICISSP}},
  pages        = {362--371},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/PfrangM17,
  author       = {Steffen Pfrang and
                  David Meier},
  title        = {On the Detection of Replay Attacks in Industrial Automation Networks
                  Operated with Profinet {IO}},
  booktitle    = {{ICISSP}},
  pages        = {683--693},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/PooryousefA17,
  author       = {Shahrooz Pooryousef and
                  Morteza Amini},
  title        = {Enhancing Accuracy of Android Malware Detection using Intent Instrumentation},
  booktitle    = {{ICISSP}},
  pages        = {380--388},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/Preneel17,
  author       = {Bart Preneel},
  title        = {The Future of Information Security},
  booktitle    = {{ICISSP}},
  pages        = {9},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/RauchbergerLS17,
  author       = {Julian Rauchberger and
                  Robert Luh and
                  Sebastian Schrittwieser},
  title        = {Longkit - {A} Universal Framework for {BIOS/UEFI} Rootkits in System
                  Management Mode},
  booktitle    = {{ICISSP}},
  pages        = {346--353},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/RegainiaS17,
  author       = {Loukmen Regainia and
                  S{\'{e}}bastien Salva},
  title        = {A Methodology of Security Pattern Classification and of Attack-Defense
                  Tree Generation},
  booktitle    = {{ICISSP}},
  pages        = {136--146},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/ReshetovaBA17,
  author       = {Elena Reshetova and
                  Filippo Bonazzi and
                  N. Asokan},
  title        = {SELint: An SEAndroid Policy Analysis Tool},
  booktitle    = {{ICISSP}},
  pages        = {47--58},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/RiemannG17,
  author       = {Robert Riemann and
                  St{\'{e}}phane Grumbach},
  title        = {Distributed Protocols at the Rescue for Trustworthy Online Voting},
  booktitle    = {{ICISSP}},
  pages        = {499--505},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/SalvaR17,
  author       = {S{\'{e}}bastien Salva and
                  Loukmen Regainia},
  title        = {A Security Pattern Classification Based on Data Integration},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  pages        = {105--129},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/SantosT17,
  author       = {Sergio de los Santos and
                  Jos{\'{e}} Torres},
  title        = {Macro Malware Detection using Machine Learning Techniques - {A} New
                  Approach},
  booktitle    = {{ICISSP}},
  pages        = {295--302},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/SedeeqCL17,
  author       = {Iman Sedeeq and
                  Frans Coenen and
                  Alexei Lisitsa},
  title        = {Attribute Permutation Steganography Detection using Attribute Position
                  Changes Count},
  booktitle    = {{ICISSP}},
  pages        = {95--100},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/SinghSACC17,
  author       = {Kalpana Singh and
                  Renaud Sirdey and
                  Fran{\c{c}}ois Artiguenave and
                  David Cohen and
                  Sergiu Carpov},
  title        = {Towards Confidentiality-strengthened Personalized Genomic Medicine
                  Embedding Homomorphic Cryptography},
  booktitle    = {{ICISSP}},
  pages        = {325--333},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/SoaresJ17,
  author       = {Alberto Magno Muniz Soares and
                  Rafael Tim{\'{o}}teo de Sousa J{\'{u}}nior},
  title        = {Forensic Analysis of Android Runtime {(ART)} Application Heap Objects
                  in Emulated and Real Devices},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  pages        = {130--147},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/SoaresS17,
  author       = {Alberto Magno Muniz Soares and
                  Rafael Tim{\'{o}}teo de Sousa Jr.},
  title        = {A Technique for Extraction and Analysis of Application Heap Objects
                  within Android Runtime {(ART)}},
  booktitle    = {{ICISSP}},
  pages        = {147--156},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/SonntagM17,
  author       = {Michael Sonntag and
                  Ren{\'{e}} Mayrhofer},
  title        = {Traffic Statistics of a High-Bandwidth Tor Exit Node},
  booktitle    = {{ICISSP}},
  pages        = {270--277},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/TelikicherlaAC17,
  author       = {Krishna Chaitanya Telikicherla and
                  Akash Agrawall and
                  Venkatesh Choppella},
  title        = {A Formal Model of Web Security Showing Malicious Cross Origin Requests
                  and Its Mitigation using {CORP}},
  booktitle    = {{ICISSP}},
  pages        = {516--523},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/Tezcan17,
  author       = {Cihangir Tezcan},
  title        = {Brute Force Cryptanalysis of {MIFARE} Classic Cards on {GPU}},
  booktitle    = {{ICISSP}},
  pages        = {524--528},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/ThuloE17,
  author       = {Motlatsi i Isaac Thulo and
                  Jan H. P. Eloff},
  title        = {Towards Optimized Security-aware (O-Sec) {VM} Placement Algorithms},
  booktitle    = {{ICISSP}},
  pages        = {411--422},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/UwizeyemunguP17,
  author       = {Sylvestre Uwizeyemungu and
                  Placide Poba{-}Nzaou},
  title        = {Health Information Exchange and Related IT-security Practices in European
                  Hospitals},
  booktitle    = {{ICISSP}},
  pages        = {538--545},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/VellaC17,
  author       = {Mark Vella and
                  Rachel Cilia},
  title        = {Memory Forensics of Insecure Android Inter-app Communications},
  booktitle    = {{ICISSP}},
  pages        = {481--486},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/VibertBRC17,
  author       = {Beno{\^{\i}}t Vibert and
                  Jean{-}Marie Le Bars and
                  Christophe Rosenberger and
                  Christophe Charrier},
  title        = {Fingerprint Class Recognition for Securing {EMV} Transaction},
  booktitle    = {{ICISSP}},
  pages        = {403--410},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/VolleroBSBMT17,
  author       = {Luca Vollero and
                  Daniele Biondo and
                  Roberto Setola and
                  Gianluca Bocci and
                  Rocco Mammoliti and
                  Alessandra Toma},
  title        = {Improving the Automatic Identification of Malicious Android Apps in
                  Unofficial Stores through Logo Analysis},
  booktitle    = {{ICISSP}},
  pages        = {567--572},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/VyasMK17,
  author       = {Tanvi Vyas and
                  Andrea Marchesini and
                  Christoph Kerschbaumer},
  title        = {Extending the Same Origin Policy with Origin Attributes},
  booktitle    = {{ICISSP}},
  pages        = {464--473},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/WaltE17,
  author       = {Est{\'{e}}e van der Walt and
                  Jan H. P. Eloff},
  title        = {Identity Deception Detection on Social Media Platforms},
  booktitle    = {{ICISSP}},
  pages        = {573--578},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/Yesuf17,
  author       = {Ahmed Seid Yesuf},
  title        = {A Review of Risk Identification Approaches in the Telecommunication
                  Domain},
  booktitle    = {{ICISSP}},
  pages        = {389--396},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/ZhiouaRAKS17,
  author       = {Zeineb Zhioua and
                  Yves Roudier and
                  Rab{\'{e}}a Ameur{-}Boulifa and
                  Takoua Kechiche and
                  Stuart Short},
  title        = {Tracking Dependent Information Flows},
  booktitle    = {{ICISSP}},
  pages        = {179--189},
  publisher    = {SciTePress},
  year         = {2017}
}
@proceedings{DBLP:conf/icissp/2016s,
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Information Systems Security and Privacy - Second International Conference,
                  {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {691},
  publisher    = {Springer},
  year         = {2017}
}
@proceedings{DBLP:conf/icissp/2017,
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  publisher    = {SciTePress},
  year         = {2017}
}
@inproceedings{DBLP:conf/icissp/AbduL16,
  author       = {Nadia Jemil Abdu and
                  Ulrike Lechner},
  title        = {A Threat Analysis Model for Identity and Access Management},
  booktitle    = {{ICISSP}},
  pages        = {498--502},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/AbuelgasimK16,
  author       = {Ammar Abuelgasim and
                  Anne Kayem},
  title        = {An Approach to Personalized Privacy Policy Recommendations on Online
                  Social Networks},
  booktitle    = {{ICISSP}},
  pages        = {126--137},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/AbuelgasimK16a,
  author       = {Ammar Abuelgasim and
                  Anne V. D. M. Kayem},
  title        = {A Snow-Ball Algorithm for Automating Privacy Policy Configuration
                  in Social Media},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {691},
  pages        = {108--129},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/AlsmadiXC16,
  author       = {Izzat Alsmadi and
                  Dianxiang Xu and
                  Jin{-}Hee Cho},
  title        = {Interaction-based Reputation Model in Online Social Networks},
  booktitle    = {{ICISSP}},
  pages        = {265--272},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/BalushiMS16,
  author       = {Abdullah Al Balushi and
                  Kieran McLaughlin and
                  Sakir Sezer},
  title        = {Contextual Intrusion Alerts for Scada Networks - An Ontology based
                  Approach for Intrusion Alerts Post Processing},
  booktitle    = {{ICISSP}},
  pages        = {457--464},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/BattistaMNSV16,
  author       = {Pasquale Battista and
                  Francesco Mercaldo and
                  Vittoria Nardone and
                  Antonella Santone and
                  Corrado Aaron Visaggio},
  title        = {Identification of Android Malware Families with Model Checking},
  booktitle    = {{ICISSP}},
  pages        = {542--547},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/BhanuDKLLLRRW16,
  author       = {Yogesh Bhanu and
                  Sebastian D{\"{a}}nnart and
                  Henning von Kielpinski and
                  Alexander Laux and
                  Ulrike Lechner and
                  Tobias Lehmann and
                  Andreas Rieb and
                  Martin Riedl and
                  Florian Wolf},
  title        = {A Cyberthreat Search Process and Service},
  booktitle    = {{ICISSP}},
  pages        = {528--535},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/BhattacharjeeSM16,
  author       = {Jaya Bhattacharjee and
                  Anirban Sengupta and
                  Chandan Mazumdar},
  title        = {A Quantitative Methodology for Security Risk Assessment of Enterprise
                  Business Processes},
  booktitle    = {{ICISSP}},
  pages        = {388--399},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/BittlR16,
  author       = {Sebastian Bittl and
                  Karsten Roscher},
  title        = {Efficient Authorization Authority Certificate Distribution in VANETs},
  booktitle    = {{ICISSP}},
  pages        = {85--96},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/BittlR16a,
  author       = {Sebastian Bittl and
                  Karsten Roscher},
  title        = {Efficient Distribution of Certificate Chains in VANETs},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {691},
  pages        = {86--107},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/BossiAB16,
  author       = {Simone Bossi and
                  Tea Anselmo and
                  Guido Bertoni},
  title        = {On {TLS} 1.3 - Early Performance Analysis in the IoT Field},
  booktitle    = {{ICISSP}},
  pages        = {117--125},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/BottaAGV16,
  author       = {Alessio Botta and
                  Aniello Avallone and
                  Mauro Garofalo and
                  Giorgio Ventre},
  title        = {Internet Streaming and Network Neutrality: Comparing the Performance
                  of Video Hosting Services},
  booktitle    = {{ICISSP}},
  pages        = {514--521},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/BroennerHS16,
  author       = {Simon Broenner and
                  Hans H{\"{o}}fken and
                  Marko Schuba},
  title        = {Streamlining Extraction and Analysis of Android {RAM} Images},
  booktitle    = {{ICISSP}},
  pages        = {255--264},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/ButtnerH16,
  author       = {Carsten B{\"{u}}ttner and
                  Sorin A. Huss},
  title        = {An Anonymous Geocast Scheme for {ITS} Applications},
  booktitle    = {{ICISSP}},
  pages        = {179--189},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/ButtnerH16a,
  author       = {Carsten B{\"{u}}ttner and
                  Sorin A. Huss},
  title        = {An Efficient Approach to Anonymous Distribution of {ITS} Messages
                  in Geographic Areas via {LTE} and {IRS} Networks},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {691},
  pages        = {192--214},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/ChenSLLYW16,
  author       = {Kang Chen and
                  Qingni Shen and
                  Cong Li and
                  Yang Luo and
                  Yahui Yang and
                  Zhonghai Wu},
  title        = {Sift - An Efficient Method for Co-residency Detection on Amazon {EC2}},
  booktitle    = {{ICISSP}},
  pages        = {423--431},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/Draper-GilLMG16,
  author       = {Gerard Draper{-}Gil and
                  Arash Habibi Lashkari and
                  Mohammad Saiful Islam Mamun and
                  Ali A. Ghorbani},
  title        = {Characterization of Encrypted and {VPN} Traffic using Time-related
                  Features},
  booktitle    = {{ICISSP}},
  pages        = {407--414},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/DutaGT16,
  author       = {Cristina{-}Loredana Duta and
                  Laura Gheorghe and
                  Nicolae Tapus},
  title        = {Performance Analysis of Real Time Implementations of Voice Encryption
                  Algorithms using Blackfin Processors},
  booktitle    = {{ICISSP}},
  pages        = {157--166},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/DutaGT16a,
  author       = {Cristina{-}Loredana Duta and
                  Laura Gheorghe and
                  Nicolae Tapus},
  title        = {Performance Comparison of Voice Encryption Algorithms Implemented
                  on Blackfin Platform},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {691},
  pages        = {169--191},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/ErdoganSA16,
  author       = {Gencer Erdogan and
                  Ketil St{\o}len and
                  Jan {\O}yvind Aagedal},
  title        = {Evaluation of the {CORAL} Approach for Risk-driven Security Testing
                  based on an Industrial Case Study},
  booktitle    = {{ICISSP}},
  pages        = {219--226},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/FerreiraL16,
  author       = {Ana Ferreira and
                  Gabriele Lenzini},
  title        = {Comparing and Integrating Break-the-Glass and Delegation in Role-based
                  Access Control for Healthcare},
  booktitle    = {{ICISSP}},
  pages        = {63--73},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/GeorgescuHOKY16,
  author       = {Marius Georgescu and
                  Hiroaki Hazeyama and
                  Takeshi Okuda and
                  Youki Kadobayashi and
                  S. Yamaguchi},
  title        = {The {STRIDE} Towards IPv6: {A} Comprehensive Threat Model for IPv6
                  Transition Technologies},
  booktitle    = {{ICISSP}},
  pages        = {243--254},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/GraaCCL16,
  author       = {Mariem Graa and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Jean{-}Louis Lanet},
  title        = {Tracking Explicit and Control Flows in Java and Native Android Apps
                  Code},
  booktitle    = {{ICISSP}},
  pages        = {307--316},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/GrafGRH16,
  author       = {Roman Graf and
                  Sergiu Gordea and
                  Heather M. Ryan and
                  Tibaut Houzanme},
  title        = {An Expert System for Facilitating an Institutional Risk Profile Definition
                  for Cyber Situational Awareness},
  booktitle    = {{ICISSP}},
  pages        = {347--354},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/HappaFNAGC16,
  author       = {Jassim Happa and
                  Graham Fairclough and
                  Jason R. C. Nurse and
                  Ioannis Agrafiotis and
                  Michael Goldsmith and
                  Sadie Creese},
  title        = {A Pragmatic System-failure Assessment and Response Model},
  booktitle    = {{ICISSP}},
  pages        = {503--508},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/HatinCSFR16,
  author       = {Julien Hatin and
                  Estelle Cherrier and
                  Jean{-}Jacques Schwartzmann and
                  Vincent Frey and
                  Christophe Rosenberger},
  title        = {A Continuous LoA Compliant Trust Evaluation Method},
  booktitle    = {{ICISSP}},
  pages        = {355--363},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/HeinS16,
  author       = {Daniel D. Hein and
                  Hossein Saiedian},
  title        = {Predicting Attack Prone Software Components using Repository Mined
                  Change Metrics},
  booktitle    = {{ICISSP}},
  pages        = {554--563},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/Hong16,
  author       = {Jason I. Hong},
  title        = {Privacy, Ethics and Big Data},
  booktitle    = {{ICISSP}},
  pages        = {5},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/HossainSK16,
  author       = {Md. Selim Hossain and
                  Ehsan Saeedi and
                  Yinan Kong},
  title        = {High-Performance {FPGA} Implementation of Elliptic Curve Cryptography
                  Processor over Binary Field {GF(2163)}},
  booktitle    = {{ICISSP}},
  pages        = {415--422},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/HranickyMRV16,
  author       = {Radek Hranicky and
                  Petr Matousek and
                  Ondrej Rysav{\'{y}} and
                  Vladim{\'{\i}}r Vesel{\'{y}}},
  title        = {Experimental Evaluation of Password Recovery in Encrypted Documents},
  booktitle    = {{ICISSP}},
  pages        = {299--306},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/IshiiIF16,
  author       = {Masahiro Ishii and
                  Atsuo Inomata and
                  Kazutoshi Fujikawa},
  title        = {A Construction of a Twisted Ate Pairing on a Family of Kawazoe-Takahashi
                  Curves at 192-bit Security Level and Its Cost Estimate},
  booktitle    = {{ICISSP}},
  pages        = {432--439},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/Izuakor16,
  author       = {Christine Izuakor},
  title        = {Understanding the Impact of Cyber Security Risks on Safety},
  booktitle    = {{ICISSP}},
  pages        = {509--513},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/JollyVR16,
  author       = {Germain Jolly and
                  Sylvain Vernois and
                  Christophe Rosenberger},
  title        = {An Observe-and-Detect Methodology for the Security and Functional
                  Testing of Smart Card Applications},
  booktitle    = {{ICISSP}},
  pages        = {282--289},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/KerschbaumerSB16,
  author       = {Christoph Kerschbaumer and
                  Sid Stamm and
                  Stefan Brunthaler},
  title        = {Injecting {CSP} for Fun and Security},
  booktitle    = {{ICISSP}},
  pages        = {15--25},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/KhanMLS16,
  author       = {Rafiullah Khan and
                  Kieran McLaughlin and
                  David M. Laverty and
                  Sakir Sezer},
  title        = {{IEEE} {C37.118-2} Synchrophasor Communication Framework - Overview,
                  Cyber Vulnerabilities Analysis and Performance Evaluation},
  booktitle    = {{ICISSP}},
  pages        = {167--178},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/LaviG16,
  author       = {Tamir Lavi and
                  Ehud Gudes},
  title        = {Trust-based Dynamic {RBAC}},
  booktitle    = {{ICISSP}},
  pages        = {317--324},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/LaxBNNF16,
  author       = {Gianluca Lax and
                  Francesco Buccafurri and
                  Serena Nicolazzo and
                  Antonino Nocera and
                  Lidia Fotia},
  title        = {A New Approach for Electronic Signature},
  booktitle    = {{ICISSP}},
  pages        = {440--447},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/Lenz16,
  author       = {Hans{-}Joachim Lenz},
  title        = {Tax Fraud and Investigation Procedures - Everybody, Every Where, Every
                  Time},
  booktitle    = {{ICISSP}},
  pages        = {7--8},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/Lenz16a,
  author       = {Hans{-}Joachim Lenz},
  title        = {Tax Fraud and Investigation: {A} Framework for a Knowledge Based Methodology},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {691},
  pages        = {3--13},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/LiSCYW16,
  author       = {Cong Li and
                  Qingni Shen and
                  Kang Chen and
                  Yahui Yang and
                  Zhonghai Wu},
  title        = {Whispers in the Cloud - {A} Covert Channel using the Result of Creating
                  a Virtual Machine},
  booktitle    = {{ICISSP}},
  pages        = {380--387},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/LiSDYW16,
  author       = {Wenting Li and
                  Qingni Shen and
                  Chuntao Dong and
                  Yahui Yang and
                  Zhonghai Wu},
  title        = {{DDHCS:} Distributed Denial-of-service Threat to {YARN} Clusters based
                  on Health Check Service},
  booktitle    = {{ICISSP}},
  pages        = {146--156},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/LiSDYW16a,
  author       = {Wenting Li and
                  Qingni Shen and
                  Chuntao Dong and
                  Yahui Yang and
                  Zhonghai Wu},
  title        = {{SEYARN:} Enhancing Security of {YARN} Clusters Based on Health Check
                  Service},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {691},
  pages        = {148--168},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/MaddarKCY16,
  author       = {Hela Maddar and
                  Wafa Kammoun and
                  Omar Cheikhrouhou and
                  Habib Youssef},
  title        = {Lightweight Trust Model with High Longevity for Wireless Sensor Networks},
  booktitle    = {{ICISSP}},
  pages        = {548--553},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/MarufuKW16,
  author       = {Anesu M. C. Marufu and
                  Anne V. D. M. Kayem and
                  Stephen D. Wolthusen},
  title        = {Fault-tolerant Distributed Continuous Double Auctioning on Computationally
                  Constrained Microgrids},
  booktitle    = {{ICISSP}},
  pages        = {448--456},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/MathewsJF16,
  author       = {M. Lisa Mathews and
                  Anupam Joshi and
                  Tim Finin},
  title        = {Detecting Botnets using a Collaborative Situational-aware {IDPS}},
  booktitle    = {{ICISSP}},
  pages        = {290--298},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/MaynardMS16,
  author       = {Peter Maynard and
                  Kieran McLaughlin and
                  Sakir Sezer},
  title        = {Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction},
  booktitle    = {{ICISSP}},
  pages        = {465--472},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/Mzila16,
  author       = {Phiwa Mzila},
  title        = {Review Analysis of Properties for an Ideal Secure Biometric Template
                  Scheme},
  booktitle    = {{ICISSP}},
  pages        = {333--339},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/NakamuraKTS16,
  author       = {Toru Nakamura and
                  Shinsaku Kiyomoto and
                  Welderufael B. Tesfay and
                  Jetzabel M. Serna},
  title        = {Personalised Privacy by Default Preferences - Experiment and Analysis},
  booktitle    = {{ICISSP}},
  pages        = {53--62},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/NakamuraKTS16a,
  author       = {Toru Nakamura and
                  Shinsaku Kiyomoto and
                  Welderufael B. Tesfay and
                  Jetzabel M. Serna},
  title        = {Easing the Burden of Setting Privacy Preferences: {A} Machine Learning
                  Approach},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {691},
  pages        = {44--63},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/PalBM16,
  author       = {Asim K. Pal and
                  Subrata Bose and
                  Arpita Maitra},
  title        = {Collaborative Information Service - Privacy Algebra for User Defined
                  Security},
  booktitle    = {{ICISSP}},
  pages        = {473--481},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/PaudelQI16,
  author       = {Nilakantha Paudel and
                  Marco Querini and
                  Giuseppe F. Italiano},
  title        = {Handwritten Signature Verification for Mobile Phones},
  booktitle    = {{ICISSP}},
  pages        = {46--52},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/PaudelQI16a,
  author       = {Nilakantha Paudel and
                  Marco Querini and
                  Giuseppe F. Italiano},
  title        = {Online Handwritten Signature Verification for Low-End Devices},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {691},
  pages        = {25--43},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/Pohn16,
  author       = {Daniela P{\"{o}}hn},
  title        = {Risk Management for Dynamic Metadata Exchange via a Trusted Third
                  Party},
  booktitle    = {{ICISSP}},
  pages        = {227--234},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/QiaoHS16,
  author       = {Kexin Qiao and
                  Lei Hu and
                  Siwei Sun},
  title        = {Differential Security Evaluation of Simeck with Dynamic Key-guessing
                  Techniques},
  booktitle    = {{ICISSP}},
  pages        = {74--84},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/QiaoHS16a,
  author       = {Kexin Qiao and
                  Lei Hu and
                  Siwei Sun},
  title        = {Differential Analysis on Simeck and {SIMON} with Dynamic Key-Guessing
                  Techniques},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {691},
  pages        = {64--85},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/R16,
  author       = {Feno Heriniaina R.},
  title        = {A Privacy Threat for Internet Users in Internet-censoring Countries},
  booktitle    = {{ICISSP}},
  pages        = {372--379},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/RampineN16,
  author       = {Edwin T. L. Rampine and
                  Cynthia H. Ngejane},
  title        = {A Brief Overview of Hybrid Schemes for Biometric Fingerprint Template
                  Security},
  booktitle    = {{ICISSP}},
  pages        = {340--346},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/ReshetovaBNBA16,
  author       = {Elena Reshetova and
                  Filippo Bonazzi and
                  Thomas Nyman and
                  Ravishankar Borgaonkar and
                  N. Asokan},
  title        = {Characterizing SEAndroid Policies in the Wild},
  booktitle    = {{ICISSP}},
  pages        = {482--489},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/SedeeqCL16,
  author       = {Iman Sedeeq and
                  Frans Coenen and
                  Alexei Lisitsa},
  title        = {A Statistical Approach to the Detection of {HTML} Attribute Permutation
                  Steganography},
  booktitle    = {{ICISSP}},
  pages        = {522--527},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/SettanniSSF16,
  author       = {Giuseppe Settanni and
                  Florian Skopik and
                  Yegor Shovgenya and
                  Roman Fiedler},
  title        = {A Collaborative Analysis System for Cross-organization Cyber Incident
                  Handling},
  booktitle    = {{ICISSP}},
  pages        = {105--116},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/ShaoLX16,
  author       = {C. Shao and
                  H. Li and
                  G. Xu},
  title        = {Quantitative Evaluation of Security on Cryptographic ICs against Fault
                  Injection Attacks},
  booktitle    = {{ICISSP}},
  pages        = {97--104},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/ShiHSS16,
  author       = {Danping Shi and
                  Lei Hu and
                  Siwei Sun and
                  Ling Song},
  title        = {Linear(hull) Cryptanalysis of Round-reduced Versions of {KATAN}},
  booktitle    = {{ICISSP}},
  pages        = {364--371},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/StenzelKBR16,
  author       = {Kurt Stenzel and
                  Kuzman Katkalov and
                  Marian Borek and
                  Wolfgang Reif},
  title        = {Declassification of Information with Complex Filter Functions},
  booktitle    = {{ICISSP}},
  pages        = {490--497},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/SugioIKH16,
  author       = {Nobuyuki Sugio and
                  Yasutaka Igarashi and
                  Toshinobu Kaneko and
                  Kenichi Higuchi},
  title        = {A Practical-time Attack on Reduced-round {MISTY1}},
  booktitle    = {{ICISSP}},
  pages        = {235--242},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/SusukiYS16,
  author       = {Hiroya Susuki and
                  Rie Shigetomi Yamaguchi and
                  Shizuo Sakamoto},
  title        = {Multi-factor Authentication Updating System Evaluation Dynamically
                  for Service Continuity},
  booktitle    = {{ICISSP}},
  pages        = {273--281},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/SymeonidisTP16,
  author       = {Iraklis Symeonidis and
                  Pagona Tsormpatzoudi and
                  Bart Preneel},
  title        = {Collateral Damage of Online Social Network Applications},
  booktitle    = {{ICISSP}},
  pages        = {536--541},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/TariqS16,
  author       = {Muhammad Imran Tariq and
                  Vito Santarcangelo},
  title        = {Analysis of {ISO} 27001: 2013 Controls Effectiveness for Cloud Computing},
  booktitle    = {{ICISSP}},
  pages        = {201--208},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/TeubertGM16,
  author       = {Dominik Teubert and
                  Fred Grossmann and
                  Ulrike Meyer},
  title        = {Anomaly-based Mobile Malware Detection: System Calls as Source for
                  Features},
  booktitle    = {{ICISSP}},
  pages        = {26--36},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/Tezcan16,
  author       = {Cihangir Tezcan},
  title        = {Truncated, Impossible, and Improbable Differential Analysis of {ASCON}},
  booktitle    = {{ICISSP}},
  pages        = {325--332},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/TriaLT16,
  author       = {Francesco Di Tria and
                  Ezio Lefons and
                  Filippo Tangorra},
  title        = {Improving Database Security in Web-based Environments},
  booktitle    = {{ICISSP}},
  pages        = {193--200},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/Ulltveit-MoePEN16,
  author       = {Nils Ulltveit{-}Moe and
                  Steffen Pfrang and
                  L{\'{a}}szl{\'{o}} Erd{\"{o}}di and
                  H{\'{e}}ctor Nebot},
  title        = {Mitigating Local Attacks Against a City Traffic Controller},
  booktitle    = {{ICISSP}},
  pages        = {209--218},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/UwizeyemunguP16,
  author       = {Sylvestre Uwizeyemungu and
                  Placide Poba{-}Nzaou},
  title        = {Security and Privacy Practices in Healthcare Information Systems:
                  {A} Cluster Analysis of European Hospitals},
  booktitle    = {{ICISSP}},
  pages        = {37--45},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/WambachB16,
  author       = {Tim Wambach and
                  Katharina Br{\"{a}}unlich},
  title        = {Retrospective Study of Third-party Web Tracking},
  booktitle    = {{ICISSP}},
  pages        = {138--145},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/WambachB16a,
  author       = {Tim Wambach and
                  Katharina Br{\"{a}}unlich},
  title        = {The Evolution of Third-Party Web Tracking},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {691},
  pages        = {130--147},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/Weippl16,
  author       = {Edgar R. Weippl},
  title        = {Ethics in Security Research},
  booktitle    = {{ICISSP}},
  pages        = {9},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/WeipplSR16,
  author       = {Edgar R. Weippl and
                  Sebastian Schrittwieser and
                  Sylvi Rennert},
  title        = {Empirical Research and Research Ethics in Information Security},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {691},
  pages        = {14--22},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/YangCWC16,
  author       = {Ching{-}Nung Yang and
                  Stelvio Cimato and
                  Jihi{-}Han Wu and
                  Song{-}Ruei Cai},
  title        = {3-Out-of-n Cheating Prevention Visual Cryptographic Schemes},
  booktitle    = {{ICISSP}},
  pages        = {400--406},
  publisher    = {SciTePress},
  year         = {2016}
}
@proceedings{DBLP:conf/icissp/2016,
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  publisher    = {SciTePress},
  year         = {2016}
}
@inproceedings{DBLP:conf/icissp/AblizZ15,
  author       = {Mehmud Abliz and
                  Taieb F. Znati},
  title        = {Defeating DDoS using Productive Puzzles},
  booktitle    = {{ICISSP}},
  pages        = {114--123},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/Accorsi15,
  author       = {Rafael Accorsi},
  title        = {A Posteriori Process Security Control},
  booktitle    = {{ICISSP}},
  pages        = {IS--5},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/AlishahiMT15,
  author       = {Mina Sheikh Alishahi and
                  Mohamed Mejri and
                  Nadia Tawbi},
  title        = {Clustering Spam Emails into Campaigns},
  booktitle    = {{ICISSP}},
  pages        = {90--97},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/AnjumRPF15,
  author       = {Bushra Anjum and
                  Manish Rajangam and
                  Harry G. Perros and
                  Wenjuan Fan},
  title        = {Filtering Unfair Users - {A} Hidden Markov Model Approach},
  booktitle    = {{ICISSP}},
  pages        = {147--154},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/ArakalaHDH15,
  author       = {Arathi Arakala and
                  Hao Hao and
                  Stephen A. Davis and
                  Kathy J. Horadam},
  title        = {The Palm Vein Graph - Feature Extraction and Matching},
  booktitle    = {{ICISSP}},
  pages        = {295--303},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/ArakalaHDH15a,
  author       = {Arathi Arakala and
                  Hao Hao and
                  Stephen A. Davis and
                  Kathy J. Horadam},
  title        = {The Palm Vein Graph for Biometric Authentication},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {199--218},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/BonneyHPS15,
  author       = {Gregor Bonney and
                  Hans H{\"{o}}fken and
                  Benedikt Paffen and
                  Marko Schuba},
  title        = {{ICS/SCADA} Security - Analysis of a Beckhoff {CX5020} {PLC}},
  booktitle    = {{ICISSP}},
  pages        = {137--142},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/ButtnerH15,
  author       = {Carsten B{\"{u}}ttner and
                  Sorin A. Huss},
  title        = {A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular
                  Ad Hoc Networks},
  booktitle    = {{ICISSP}},
  pages        = {259--269},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/ButtnerH15a,
  author       = {Carsten B{\"{u}}ttner and
                  Sorin A. Huss},
  title        = {An Efficient Anonymous Authenticated Key Agreement Protocol for Vehicular
                  Ad-Hoc Networks Based on Ring Signatures and the Elliptic Curve Integrated
                  Encryption Scheme},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {139--159},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/CourtoisEW15,
  author       = {Nicolas T. Courtois and
                  Pinar Emirdag and
                  Zhouyixing Wang},
  title        = {On Detection of Bitcoin Mining Redirection Attacks},
  booktitle    = {{ICISSP}},
  pages        = {98--105},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/Desfray15,
  author       = {Philippe Desfray},
  title        = {Model Repositories at the Enterprises and Systems Scale - The Modelio
                  Constellation Solution},
  booktitle    = {{ICISSP}},
  pages        = {IS--17},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/FavrePBC15,
  author       = {M{\'{e}}lanie Favre and
                  Sylvaine Picard and
                  Julien Bringer and
                  Herv{\'{e}} Chabanne},
  title        = {Balancing is the Key - Performing Finger Vein Template Protection
                  using Fuzzy Commitment},
  booktitle    = {{ICISSP}},
  pages        = {304--311},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/Ford15,
  author       = {Bryan Ford},
  title        = {Hiding in a Panopticon - Grand Challenges in Internet Anonymity},
  booktitle    = {{ICISSP}},
  pages        = {IS--9},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/Furnell15,
  author       = {Steven Furnell},
  title        = {From Passwords to Biometrics - In Pursuit of a Panacea},
  booktitle    = {{ICISSP}},
  pages        = {IS--7},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/Furnell15a,
  author       = {Steven M. Furnell},
  title        = {From Passwords to Biometrics: In Pursuit of a Panacea},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/HossainZ15,
  author       = {Al Amin Hossain and
                  Weining Zhang},
  title        = {Privacy and Security Concern of Online Social Networks from User Perspective},
  booktitle    = {{ICISSP}},
  pages        = {246--253},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/HusztiK15,
  author       = {Andrea Huszti and
                  Zita Kov{\'{a}}cs},
  title        = {Bilinear Pairing-based Hybrid Mixnet with Anonymity Revocation},
  booktitle    = {{ICISSP}},
  pages        = {238--245},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/Inamura15,
  author       = {Masaki Inamura},
  title        = {Expansions of {CHAP} - Modificationless on Its Structures of Packet
                  and Data Exchange},
  booktitle    = {{ICISSP}},
  pages        = {213--220},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/Jacobs15,
  author       = {Stuart Jacobs},
  title        = {Optimizing Cryptographically based Security in Wireless Networks},
  booktitle    = {{ICISSP}},
  pages        = {39--45},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/KangGK15,
  author       = {Bolam Kang and
                  Sung Cheol Goh and
                  Myungsun Kim},
  title        = {Private Web Search with Constant Round Efficiency},
  booktitle    = {{ICISSP}},
  pages        = {205--212},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/KimHKSPP15,
  author       = {Taegyu Kim and
                  Woomin Hwang and
                  Chulmin Kim and
                  Dong{-}Jae Shin and
                  Ki{-}Woong Park and
                  Kyu Ho Park},
  title        = {Malfinder: Accelerated Malware Classification System through Filtering
                  on Manycore System},
  booktitle    = {{ICISSP}},
  pages        = {17--26},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/KimP15,
  author       = {Taegyu Kim and
                  Ki{-}Woong Park},
  title        = {MalCore: Toward a Practical Malware Identification System Enhanced
                  with Manycore Technology},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {31--48},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/KnirschENFP15,
  author       = {Fabian Knirsch and
                  Dominik Engel and
                  Christian Neureiter and
                  Marc Fr{\^{\i}}ncu and
                  Viktor K. Prasanna},
  title        = {Model-driven Privacy Assessment in the Smart Grid},
  booktitle    = {{ICISSP}},
  pages        = {173--181},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/KnirschENFP15a,
  author       = {Fabian Knirsch and
                  Dominik Engel and
                  Christian Neureiter and
                  Marc Fr{\^{\i}}ncu and
                  Viktor K. Prasanna},
  title        = {Privacy Assessment of Data Flow Graphs for an Advanced Recommender
                  System in the Smart Grid},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {89--106},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/KoenePCSAORM15,
  author       = {Ansgar R. Koene and
                  Elvira Perez and
                  Christopher James Carter and
                  Ramona Statache and
                  Svenja Adolphs and
                  Claire O'Malley and
                  Tom Rodden and
                  Derek McAuley},
  title        = {Research Ethics and Public Trust, Preconditions for Continued Growth
                  of Internet Mediated Research - Public Confidence in Internet Mediate
                  Research},
  booktitle    = {{ICISSP}},
  pages        = {163--168},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/KrishnamachariN15,
  author       = {Sriram Krishnamachari and
                  Mehrdad Nojoumian and
                  Kemal Akkaya},
  title        = {Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational
                  vs Unconditional Security},
  booktitle    = {{ICISSP}},
  pages        = {106--113},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/KunzFNP15,
  author       = {Michael Kunz and
                  Ludwig Fuchs and
                  Michael Netter and
                  G{\"{u}}nther Pernul},
  title        = {Analyzing Quality Criteria in Role-based Identity and Access Management},
  booktitle    = {{ICISSP}},
  pages        = {64--72},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/KunzFNP15a,
  author       = {Michael Kunz and
                  Ludwig Fuchs and
                  Michael Netter and
                  G{\"{u}}nther Pernul},
  title        = {How to Discover High-Quality Roles? {A} Survey and Dependency Analysis
                  of Quality Criteria in Role Mining},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {49--67},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/LeeL15,
  author       = {Wei{-}Han Lee and
                  Ruby B. Lee},
  title        = {Multi-sensor Authentication to Improve Smartphone Security},
  booktitle    = {{ICISSP}},
  pages        = {270--280},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/LeeL15a,
  author       = {Wei{-}Han Lee and
                  Ruby B. Lee},
  title        = {Implicit Authentication for Smartphone Security},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {160--176},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/LehnhardtRSC15,
  author       = {Jan Lehnhardt and
                  Tobias Rho and
                  Adrian Spalka and
                  Armin B. Cremers},
  title        = {Performance-optimized Indexes for Inequality Searches on Encrypted
                  Data in Practice},
  booktitle    = {{ICISSP}},
  pages        = {221--229},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/LimYST15,
  author       = {Hyoyoung Lim and
                  Yukiko Yamaguchi and
                  Hajime Shimada and
                  Hiroki Takakura},
  title        = {Malware Classification Method Based on Sequence of Traffic Flow},
  booktitle    = {{ICISSP}},
  pages        = {230--237},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/MaiorcaACG15,
  author       = {Davide Maiorca and
                  Davide Ariu and
                  Igino Corona and
                  Giorgio Giacinto},
  title        = {A Structural and Content-based Approach for a Precise and Robust Detection
                  of Malicious {PDF} Files},
  booktitle    = {{ICISSP}},
  pages        = {27--36},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/MaiorcaACG15a,
  author       = {Davide Maiorca and
                  Davide Ariu and
                  Igino Corona and
                  Giorgio Giacinto},
  title        = {An Evasion Resilient Approach to the Detection of Malicious {PDF}
                  Files},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {68--85},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/McDaniel15,
  author       = {Patrick D. McDaniel},
  title        = {A New Science of Security Decision Making},
  booktitle    = {{ICISSP}},
  pages        = {IS--13},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/MoingS15,
  author       = {Josselyn Le Moing and
                  Ingo Stengel},
  title        = {The Smartphone as a Gait Recognition Device - Impact of Selected Parameters
                  on Gait Recognition},
  booktitle    = {{ICISSP}},
  pages        = {322--328},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/MoingS15a,
  author       = {Josselyn Le Moing and
                  Ingo Stengel},
  title        = {Impact of External Parameters on the Gait Recognition Using a Smartphone},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {219--233},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/MukherjeeM15,
  author       = {Preetam Mukherjee and
                  Chandan Mazumdar},
  title        = {A Novel Model of Security Policies and Requirements},
  booktitle    = {{ICISSP}},
  pages        = {73--82},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/NarayanaswamySS15,
  author       = {Jayagopal Narayanaswamy and
                  Raghav V. Sampangi and
                  Srinivas Sampalli},
  title        = {{HIDE:} Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic
                  Key Generation and Encryption},
  booktitle    = {{ICISSP}},
  pages        = {124--131},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/NergaardUG15,
  author       = {Henrik Nergaard and
                  Nils Ulltveit{-}Moe and
                  Terje Gj{\o}s{\ae}ter},
  title        = {A Scratch-based Graphical Policy Editor for {XACML}},
  booktitle    = {{ICISSP}},
  pages        = {182--190},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/NergaardUG15a,
  author       = {Henrik Nergaard and
                  Nils Ulltveit{-}Moe and
                  Terje Gj{\o}s{\ae}ter},
  title        = {ViSPE: {A} Graphical Policy Editor for {XACML}},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {107--121},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/NetterPRR15,
  author       = {Michael Netter and
                  G{\"{u}}nther Pernul and
                  Christian Richthammer and
                  Moritz Riesner},
  title        = {Privacy in Social Networks: Existing Challenges and Proposals for
                  Solutions},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {16--27},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/NoorafizaMUKS15,
  author       = {Matrazali Noorafiza and
                  Hiroshi Maeda and
                  Ryuya Uda and
                  Toshiyuki Kinoshita and
                  M. Shiratori},
  title        = {Vulnerability Analysis using Network Timestamps in Full Virtualization
                  Virtual Machine},
  booktitle    = {{ICISSP}},
  pages        = {83--89},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/Pernul15,
  author       = {G{\"{u}}nther Pernul},
  title        = {Privacy in Social Networks - Existing Challenges and Proposals for
                  Solution},
  booktitle    = {{ICISSP}},
  pages        = {IS--11},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/PrevelakisH15,
  author       = {Vassilis Prevelakis and
                  Mohammad Hamad},
  title        = {A Policy-based Communications Architecture for Vehicles},
  booktitle    = {{ICISSP}},
  pages        = {155--162},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/RoyM15,
  author       = {Puloma Roy and
                  Chandan Mazumdar},
  title        = {Modelling of Enterprise Insider Threats},
  booktitle    = {{ICISSP}},
  pages        = {132--136},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/SakpereK15,
  author       = {Aderonke Busayo Sakpere and
                  Anne V. D. M. Kayem},
  title        = {Adaptive Buffer Resizing for Efficient Anonymization of Streaming
                  Data with Minimal Information Loss},
  booktitle    = {{ICISSP}},
  pages        = {191--201},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/SakpereK15a,
  author       = {Aderonke Busayo Sakpere and
                  Anne V. D. M. Kayem},
  title        = {Supporting Streaming Data Anonymization with Expressions of User Privacy
                  Preferences},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {122--136},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/ShoufanAB15,
  author       = {Abdulhadi Shoufan and
                  Hassan Alnoon and
                  Joonsang Baek},
  title        = {On the Power Consumption of Cryptographic Processors in Civil Microdrones},
  booktitle    = {{ICISSP}},
  pages        = {283--290},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/ShoufanAB15a,
  author       = {Abdulhadi Shoufan and
                  Hassan Alnoon and
                  Joonsang Baek},
  title        = {Secure Communication in Civil Drones},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {177--195},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/TimpanaroCCF15,
  author       = {Juan Pablo Timpanaro and
                  Thibault Cholez and
                  Isabelle Chrisment and
                  Olivier Festor},
  title        = {Evaluation of the Anonymous {I2P} Network's Design Choices Against
                  Performance and Security},
  booktitle    = {{ICISSP}},
  pages        = {46--55},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/TondelLJ15,
  author       = {Inger Anne T{\o}ndel and
                  Maria B. Line and
                  Gorm Johansen},
  title        = {Assessing Information Security Risks of {AMI} - What Makes it so Difficult?},
  booktitle    = {{ICISSP}},
  pages        = {56--63},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/UwizeyemunguP15,
  author       = {Sylvestre Uwizeyemungu and
                  Placide Poba{-}Nzaou},
  title        = {Understanding Information Technology Security Standards Diffusion
                  - An Institutional Perspective},
  booktitle    = {{ICISSP}},
  pages        = {5--16},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/VibertYVBCR15,
  author       = {Beno{\^{\i}}t Vibert and
                  Zhigang Yao and
                  Sylvain Vernois and
                  Jean{-}Marie Le Bars and
                  Christophe Charrier and
                  Christophe Rosenberger},
  title        = {EvaBio Platform for the Evaluation Biometric System - Application
                  to the Optimization of the Enrollment Process for Fingerprints Devices},
  booktitle    = {{ICISSP}},
  pages        = {329--335},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/VibertYVBCR15a,
  author       = {Beno{\^{\i}}t Vibert and
                  Zhigang Yao and
                  Sylvain Vernois and
                  Jean{-}Marie Le Bars and
                  Christophe Charrier and
                  Christophe Rosenberger},
  title        = {EvaBio a New Modular Platform to Evaluate Biometric System},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {234--250},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/YaoBCR15,
  author       = {Zhigang Yao and
                  Jean{-}Marie Le Bars and
                  Christophe Charrier and
                  Christophe Rosenberger},
  title        = {Quality Assessment of Fingerprints with Minutiae Delaunay Triangulation},
  booktitle    = {{ICISSP}},
  pages        = {315--321},
  publisher    = {SciTePress},
  year         = {2015}
}
@inproceedings{DBLP:conf/icissp/YaoBCR15a,
  author       = {Zhigang Yao and
                  Jean{-}Marie Le Bars and
                  Christophe Charrier and
                  Christophe Rosenberger},
  title        = {Fingerprint Quality Assessment Combining Blind Image Quality, Texture
                  and Minutiae Features},
  booktitle    = {{ICISSP}},
  pages        = {336--343},
  publisher    = {SciTePress},
  year         = {2015}
}
@proceedings{DBLP:conf/icissp/2015,
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  publisher    = {SciTePress},
  year         = {2015}
}
@proceedings{DBLP:conf/icissp/2015s,
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Information Systems Security and Privacy - First International Conference,
                  {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  publisher    = {Springer},
  year         = {2015}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics