Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "ICISSP"
@inproceedings{DBLP:conf/icissp/0001UGWM24, author = {Ali Ahmed and Victor Ungureanu and Tarek Gaber and Craig A. Watterson and Fatma Masmoudi}, title = {Smart Home Privacy: {A} Scoping Review}, booktitle = {{ICISSP}}, pages = {635--642}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/AksoyVMPK24, author = {Ahmet Aksoy and Sundeep Varma and Ganesha Moorthy and Enya Pan and Gorkem Kar}, title = {Comparative Analysis of Feature Selection Algorithms for Automated IoT Device Fingerprinting}, booktitle = {{ICISSP}}, pages = {430--437}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/Alcaraz24, author = {Cristina Alcaraz}, title = {Safeguarding Industry 5.0 Ecosystems Through Digital Twins}, booktitle = {{ICISSP}}, pages = {5}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/AldabjanFCP24, author = {Aseel Aldabjan and Steven Furnell and Xavier Carpent and Maria Papadaki}, title = {Cybersecurity Incident Response Readiness in Organisations}, booktitle = {{ICISSP}}, pages = {262--269}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/AlipourjeddiM24, author = {Narges Alipourjeddi and Ali Miri}, title = {Preserving Privacy in High-Dimensional Data Publishing}, booktitle = {{ICISSP}}, pages = {845--852}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/AnderssonS24, author = {Josefin Andersson and Elias Seid}, title = {The Classification and Impact of Cyber Attacks Targeting Critical Service Providers}, booktitle = {{ICISSP}}, pages = {137--145}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/AurnaHOTKK24, author = {Nahid Ferdous Aurna and Md Delwar Hossain and Hideya Ochiai and Yuzo Taenaka and Latifur Khan and Youki Kadobayashi}, title = {Banking Malware Detection: Leveraging Federated Learning with Conditional Model Updates and Client Data Heterogeneity}, booktitle = {{ICISSP}}, pages = {309--319}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/BagheriJD24, author = {Sally Bagheri and Andreas Jacobsson and Paul Davidsson}, title = {Smart Homes as Digital Ecosystems: Exploring Privacy in IoT Contexts}, booktitle = {{ICISSP}}, pages = {869--877}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/BarretoRC024, author = {Jackson Barreto and Paulina Rutecka and Karina Cicha and Pedro Pinto}, title = {The Status and Management of Web-Related Security at Higher Education Institutions in Poland}, booktitle = {{ICISSP}}, pages = {789--798}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/BozorgiJA24, author = {Arastoo Bozorgi and Mahya Soleimani Jadidi and Jonathan Anderson}, title = {{UPSS:} {A} Global, Least-Privileged Storage System with Stronger Security and Better Performance}, booktitle = {{ICISSP}}, pages = {660--671}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/BrodschelmG24, author = {Lukas Brodschelm and Marcus Gelderie}, title = {Using {ILP} to Learn AppArmor Policies}, booktitle = {{ICISSP}}, pages = {766--773}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/BuchananGU24, author = {William J. Buchanan and Sam Grierson and Daniel Uribe}, title = {Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode}, booktitle = {{ICISSP}}, pages = {226--233}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/ButtnerG24, author = {Andre B{\"{u}}ttner and Nils Gruschka}, title = {Evaluating the Influence of Multi-Factor Authentication and Recovery Settings on the Security and Accessibility of User Accounts}, booktitle = {{ICISSP}}, pages = {691--700}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/ChakrabortyB24, author = {Olive Chakraborty and Aymen Boudguiga}, title = {A Decentralized Federated Learning Using Reputation}, booktitle = {{ICISSP}}, pages = {799--806}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/ChikulBM24, author = {Pavel Chikul and Hayretdin Bahsi and Olaf Maennel}, title = {The Design and Implementation of a Semantic Web Framework for the Event-Centric Digital Forensics Analysis}, booktitle = {{ICISSP}}, pages = {570--581}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/Conti24, author = {Mauro Conti}, title = {Covert {\&} Side Stories: Threats Evolution in Traditional and Modern Technologies}, booktitle = {{ICISSP}}, pages = {7}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/DebonoS24, author = {David Debono and Aleandro Sultana}, title = {Desktop Crypto Wallets: {A} Digital Forensic Investigation and Analysis of Remnants and Traces on end-User Machines}, booktitle = {{ICISSP}}, pages = {350--357}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/DeloueeD0K24, author = {Majid Lotfian Delouee and Victoria Degeler and Peter Amthor and Boris Koldehofe}, title = {{APP-CEP:} Adaptive Pattern-Level Privacy Protection in Complex Event Processing Systems}, booktitle = {{ICISSP}}, pages = {486--497}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/DelvecchioZBS24, author = {Tony Delvecchio and Sander Zeijlemaker and Giancarlo De Bernardis and Michael Siegel}, title = {Revolutionizing Board Cyber-Risk Management Using Collaborative Gaming}, booktitle = {{ICISSP}}, pages = {112--119}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/DoganB24, author = {Ali Dogan and Kemal Bicakci}, title = {{KAIME:} Central Bank Digital Currency with Realistic and Modular Privacy}, booktitle = {{ICISSP}}, pages = {672--681}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/EleshinIRI24, author = {Farida Eleshin and Patrick Iradukunda and David Ishimwe Ruberamitwe and Eric Ishimwe}, title = {Your Robot Might Be Inadvertently or Deliberately Spying on You: {A} Critical Analysis of Privacy Practices in the Robotics Industry}, booktitle = {{ICISSP}}, pages = {219--225}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/FarooqHFR24, author = {Muhammad Ali Farooq and Syed Muhammad Fasih Ul Hassan and Muhammad Umer Farooq and Abid Rafique}, title = {High Throughput Neural Network for Network Intrusion Detection on FPGAs: An Algorithm-Architecture Interaction}, booktitle = {{ICISSP}}, pages = {423--429}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/GazoPH24, author = {Dakouri Gazo and Asma Patel and Mohammad Hasan}, title = {Effectiveness of Malware Incident Management in Security Operations Centres: Trends, Challenges and Research Directions}, booktitle = {{ICISSP}}, pages = {162--169}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/GelderieLB24, author = {Marcus Gelderie and Maximilian Luff and Lukas Brodschelm}, title = {Differential Privacy for Distributed Traffic Monitoring in Smart Cities}, booktitle = {{ICISSP}}, pages = {758--765}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/GoncalvesM24, author = {Brian Goncalves and Atefeh Mashatan}, title = {Towards Generalized Diffie-Hellman-esque Key Agreement via Generic Split {KEM} Construction}, booktitle = {{ICISSP}}, pages = {594--608}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/GuerinC0M24, author = {Sylvain Gu{\'{e}}rin and Jo{\"{e}}l Champeau and Salvador Mart{\'{\i}}nez and Ra{\'{u}}l Mazo}, title = {Security Contracts a Property-Based Approach to Support Security Patterns}, booktitle = {{ICISSP}}, pages = {103--111}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/GuerraMDPF24, author = {Michele Guerra and Roberto Milanese and Michele Deodato and Vittorio Perozzi and Fausto Fasano}, title = {Visual Attention and Privacy Indicators in Android: Insights from Eye Tracking}, booktitle = {{ICISSP}}, pages = {320--329}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/HasegawaHSKFMK24, author = {Kento Hasegawa and Katsutoshi Hanahara and Hiroshi Sugisaki and Minoru Kozu and Kazuhide Fukushima and Yosuke Murakami and Shinsaku Kiyomoto}, title = {Vulnerability Information Sharing Platform for Securing Hardware Supply Chains}, booktitle = {{ICISSP}}, pages = {403--410}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/HeinrichWOM24, author = {Tiago Heinrich and Newton Carlos Will and Rafael R. Obelheiro and Carlos Alberto Maziero}, title = {Anywhere on Earth: {A} Look at Regional Characteristics of DRDoS Attacks}, booktitle = {{ICISSP}}, pages = {21--29}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/HeinrichWOM24a, author = {Tiago Heinrich and Newton Carlos Will and Rafael R. Obelheiro and Carlos Alberto Maziero}, title = {A Categorical Data Approach for Anomaly Detection in WebAssembly Applications}, booktitle = {{ICISSP}}, pages = {275--284}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/HintzRS24, author = {Jan Hintz and Jacob R{\"{u}}he and Ingo Siegert}, title = {AnonEmoFace: Emotion Preserving Facial Anonymization}, booktitle = {{ICISSP}}, pages = {785--788}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/HosseinzadehCB24, author = {Arghavan Hosseinzadeh and Jessica Chwalek and Robin Brandst{\"{a}}dter}, title = {Policy-Driven XACML-Based Architecture for Dynamic Enforcement of Multiparty Computation}, booktitle = {{ICISSP}}, pages = {81--89}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/HousselL24, author = {Paul R. B. Houssel and Luis A. Leiva}, title = {User Re-Authentication via Mouse Movements and Recurrent Neural Networks}, booktitle = {{ICISSP}}, pages = {652--659}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/HuT24, author = {Wanyu Hu and Vrizlynn L. L. Thing}, title = {CPE-Identifier: Automated {CPE} Identification and {CVE} Summaries Annotation with Deep Learning and {NLP}}, booktitle = {{ICISSP}}, pages = {67--78}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/IadarolaMMPS24, author = {Giacomo Iadarola and Fabio Martinelli and Francesco Mercaldo and Luca Petrillo and Antonella Santone}, title = {Cybersecurity-Related Tweet Classification by Explainable Deep Learning}, booktitle = {{ICISSP}}, pages = {438--445}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/JakubeitPS24, author = {Philipp Jakubeit and Andreas Peter and Maarten van Steen}, title = {RoomKey: Extracting a Volatile Key with Information from the Local WiFi Environment Reconstructable Within a Designated Area}, booktitle = {{ICISSP}}, pages = {558--569}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/JawedPKHS24, author = {Mohammed Jawed and Sriram Parameshwaran and Nitesh Kumar and Anand Handa and Sandeep K. Shukla}, title = {ArkThor: Threat Categorization Based on Malware's {C2} Communication}, booktitle = {{ICISSP}}, pages = {203--210}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/KaksonenHLR24, author = {Rauli Kaksonen and Kimmo Halunen and Marko Laakso and Juha R{\"{o}}ning}, title = {Automating IoT Security Standard Testing by Common Security Tools}, booktitle = {{ICISSP}}, pages = {42--53}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/KalhorD24, author = {Borna Kalhor and Sanchari Das}, title = {Evaluating the Security and Privacy Risk Postures of Virtual Assistants}, booktitle = {{ICISSP}}, pages = {154--161}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/KimL24, author = {Seo{-}Yi Kim and Il{-}Gu Lee}, title = {{LSTM} Autoencoder-Based Insider Abnormal Behavior Detection Using De-Identified Data}, booktitle = {{ICISSP}}, pages = {609--620}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/KobayashiY24, author = {Ryosuke Kobayashi and Rie Shigetomi Yamaguchi}, title = {Forgery Resistance of User Authentication Methods Using Location, Wi-Fi and Their Correlation}, booktitle = {{ICISSP}}, pages = {709--716}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/KohlerM24, author = {Daniel K{\"{o}}hler and Christoph Meinel}, title = {The Right Tool for the Job: Contextualization of Cybersecurity Education and Assessment Methods}, booktitle = {{ICISSP}}, pages = {234--241}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/Kokolakis24, author = {Spyros Kokolakis}, title = {Security, Privacy and the "Human Factor": Making Sense of the Paradoxes of Security and Privacy Behaviour}, booktitle = {{ICISSP}}, pages = {9--11}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/KoltaiGA24, author = {Beatrix Koltai and Andr{\'{a}}s Gazdag and Gergely {\'{A}}cs}, title = {Supporting {CAN} Bus Anomaly Detection with Correlation Data}, booktitle = {{ICISSP}}, pages = {285--296}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/KumarMB24, author = {Vimal Kumar and Juliette Mayo and Khadija Bahiss}, title = {ADMIn: Attacks on Dataset, Model and Input: {A} Threat Model for {AI} Based Software}, booktitle = {{ICISSP}}, pages = {170--178}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/LanzaLO24, author = {Claudia Lanza and Abdelkader Lahmadi and Fabian Osmond}, title = {An Empirical Study of Ransomware Vulnerabilities Descriptions}, booktitle = {{ICISSP}}, pages = {146--153}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/LevshunV24, author = {Dmitry Levshun and Dmitry Vesnin}, title = {Exploring {BERT} for Predicting Vulnerability Categories in Device Configurations}, booktitle = {{ICISSP}}, pages = {452--461}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/LienBK24, author = {Eirik Lien and Karl Magnus Gr{\o}nning Bergh and Sokratis K. Katsikas}, title = {Perceptions of Cyber Security Risk of the Norwegian Advanced Metering Infrastructure}, booktitle = {{ICISSP}}, pages = {187--194}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/LiuDDS24, author = {Changwei Liu and Louis DiValentin and Aolin Ding and Malek Ben Salem}, title = {Build a Computationally Efficient Strong Defense Against Adversarial Example Attacks}, booktitle = {{ICISSP}}, pages = {358--365}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/LiuG24, author = {Kunlong Liu and Trinabh Gupta}, title = {Federated Learning with Differential Privacy and an Untrusted Aggregator}, booktitle = {{ICISSP}}, pages = {379--389}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/LuL24, author = {Chun{-}Shien Lu and Chao{-}Hsuan Lin}, title = {Robust Image Deepfake Detection with Perceptual Hashing}, booktitle = {{ICISSP}}, pages = {374--378}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/MaciUC24, author = {Antonio Maci and Giuseppe Urbano and Antonio Coscia}, title = {Deep Q-Networks for Imbalanced Multi-Class Malware Classification}, booktitle = {{ICISSP}}, pages = {342--349}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/MackovaBS24, author = {Katerina Mackov{\'{a}} and Dominik Benk and Martin Srot{\'{y}}r}, title = {Enhancing Cybersecurity Through Comparative Analysis of Deep Learning Models for Anomaly Detection}, booktitle = {{ICISSP}}, pages = {682--690}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/MaderL24, author = {Julia Mader and Thomas Lor{\"{u}}nser}, title = {Feasibility of Privacy Preserving Minutiae-Based Fingerprint Matching}, booktitle = {{ICISSP}}, pages = {899--906}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/MarruccoABM24, author = {Fabrizia Marrucco and Mosabbah Mushir Ahmed and Bechir Bouali and Alieeldin Mady}, title = {EMplifier: Hybrid Electromagnetic Probe for Side Channel and Fault Injection Analysis}, booktitle = {{ICISSP}}, pages = {815--822}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/Maugeri24, author = {Marcello Maugeri}, title = {Fuzzing Matter(s): {A} White Paper for Fuzzing the Matter Protocol}, booktitle = {{ICISSP}}, pages = {446--451}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/McConnellLSW24, author = {John McConnell and Yair Levy and Marti Snyder and Ling Wang}, title = {The Role of Heuristics and Biases in Linux Server Administrators' Information Security Policy Compliance at Healthcare Organizations}, booktitle = {{ICISSP}}, pages = {30--41}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/McWeeneyMV24, author = {Bernard McWeeney and Ilya Mudritskiy and Renaat Verbruggen}, title = {Analysis of Payload Confidentiality for the IoT/ {LPWAN} Technology 'Lora'}, booktitle = {{ICISSP}}, pages = {90--102}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/MeguroKNHFSH24, author = {Ryo Meguro and Hiroya Kato and Shintaro Narisada and Seira Hidano and Kazuhide Fukushima and Takuo Suganuma and Masahiro Hiji}, title = {Gradient-Based Clean Label Backdoor Attack to Graph Neural Networks}, booktitle = {{ICISSP}}, pages = {510--521}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/MiglioreCT24, author = {Andrea Migliore and Stelvio Cimato and Gabriella Trucco}, title = {Efficient Secure Computation of Edit Distance on Genomic Data}, booktitle = {{ICISSP}}, pages = {878--883}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/MoralesRBJS24, author = {Gabriel A. Morales and Farhan Tajwar Romit and Adam Bienek{-}Parrish and Patrick Jenkins and Rocky Slavin}, title = {IoT Device Classification Using Link-Level Features for Traditional Machine Learning and Large Language Models}, booktitle = {{ICISSP}}, pages = {297--308}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/MoustafaNGE24, author = {Mariam Moustafa and Arto Niemi and Philip Ginzboorg and Jan{-}Erik Ekberg}, title = {Attestation with Constrained Relying Party}, booktitle = {{ICISSP}}, pages = {701--708}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/NguyenCHFB24, author = {Huynh Phuong Thanh Nguyen and Zhi Chen and Kento Hasegawa and Kazuhide Fukushima and Razvan Beuran}, title = {PenGym: Pentesting Training Framework for Reinforcement Learning Agents}, booktitle = {{ICISSP}}, pages = {498--509}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/OhLJCL24, author = {Ye{-}Sol Oh and Yeon{-}Ji Lee and Jiwon Jang and Hyunwoo Choi and Il{-}Gu Lee}, title = {Implementation and Analysis of Covert Channel Using iBeacon}, booktitle = {{ICISSP}}, pages = {861--868}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/OzgunTS24, author = {Kagan {\"{O}}zg{\"{u}}n and Ayse Tosun and Mehmet Tahir Sandikkaya}, title = {A Recommender System to Detect Distributed Denial of Service Attacks with Network and Transport Layer Features}, booktitle = {{ICISSP}}, pages = {390--397}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/PailletCC24, author = {Justine Paillet and Olive Chakraborty and Marina Checri}, title = {Pure Multi Key {BGV} Implementation}, booktitle = {{ICISSP}}, pages = {807--814}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/PareK24, author = {Anjali Pare and Prasad A. Kulkarni}, title = {Exploring Errors in Binary-Level {CFG} Recovery}, booktitle = {{ICISSP}}, pages = {546--557}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/PatzeltNDHHS24, author = {Luca Patzelt and Georg Neugebauer and Meik D{\"{o}}ll and Sacha Hack and Tim Hoener and Marko Schuba}, title = {A Framework for {E2E} Audit Trails in System Architectures of Different Enterprise Classes}, booktitle = {{ICISSP}}, pages = {750--757}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/PauwMD24, author = {C{\'{e}}drick De Pauw and Jan Tobias M{\"{u}}hlberg and Jean{-}Michel Dricot}, title = {An Improved PUF-Based Privacy-Preserving IoT Protocol for Cloud Storage}, booktitle = {{ICISSP}}, pages = {725--732}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/PirkerH24, author = {Martin Pirker and Robert Haas}, title = {A Brief Reflection on Trusted Platform Module Support}, booktitle = {{ICISSP}}, pages = {890--898}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/PohlerSHHN24, author = {Luca P{\"{o}}hler and Marko Schuba and Tim Hoener and Sacha Hack and Georg Neugebauer}, title = {An Open-Source Approach to {OT} Asset Management in Industrial Environments}, booktitle = {{ICISSP}}, pages = {128--136}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/PrillardBT24, author = {Ophelia Prillard and Costas Boletsis and Shukun Tokas}, title = {Ethical Design for Data Privacy and User Privacy Awareness in the Metaverse}, booktitle = {{ICISSP}}, pages = {333--341}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/Raciti24, author = {Mario Raciti}, title = {Conceptualising an Anti-Digital Forensics Kill Chain for Smart Homes}, booktitle = {{ICISSP}}, pages = {831--837}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/RahmanHOKSR24, author = {Md. Mahbubur Rahman and Md Delwar Hossain and Hideya Ochiai and Youki Kadobayashi and Tanjim Sakib and Syed Taha Yeasin Ramadan}, title = {Vision Based Malware Classification Using Deep Neural Network with Hybrid Data Augmentation}, booktitle = {{ICISSP}}, pages = {823--830}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/RajputA24, author = {Amitesh Singh Rajput and Arnav Agrawal}, title = {Blockchain for Privacy-Preserving Data Distribution in Healthcare}, booktitle = {{ICISSP}}, pages = {621--631}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/RashidMM24, author = {Fatema Rashid and Ali Miri and Atefeh Mashatan}, title = {PETRIoT - {A} Privacy Enhancing Technology Recommendation Framework for IoT Computing}, booktitle = {{ICISSP}}, pages = {838--844}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/RibesMGP24, author = {Stefano Ribes and Fabio Malatesta and Grazia Garzo and Alessandro Palumbo}, title = {Machine Learning-Based Classification of Hardware Trojans in FPGAs Implementing {RISC-V} Cores}, booktitle = {{ICISSP}}, pages = {717--724}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/RuedlingerKLHTV24, author = {Andreas R{\"{u}}edlinger and Rebecca Klauser and Pavlos Lamprakis and Markus Happe and Bernhard Tellenbach and Onur Veyisoglu and Ariane Trammell}, title = {FeedMeter: Evaluating the Quality of Community-Driven Threat Intelligence}, booktitle = {{ICISSP}}, pages = {54--66}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/ScottL0K24, author = {Jackie Scott and Yair Levy and Wei Li and Ajoy Kumar}, title = {Comparing Phishing Training and Campaign Methods for Mitigating Malicious Emails in Organizations}, booktitle = {{ICISSP}}, pages = {643--651}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/SeidPB24, author = {Elias Seid and Oliver Popov and Fredrik Blix}, title = {An Automated Adaptive Security Framework for Cyber-Physical Systems}, booktitle = {{ICISSP}}, pages = {242--253}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/SinghTG024, author = {Arunab Singh and Maryam Tanha and Yashsvi Girdhar and Aaron Hunter}, title = {Interpretable Android Malware Detection Based on Dynamic Analysis}, booktitle = {{ICISSP}}, pages = {195--202}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/SpitzL24, author = {Stephan Spitz and Alexander Lawall}, title = {Silicon-Integrated Security Solutions Driving IoT Security}, booktitle = {{ICISSP}}, pages = {398--402}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/StavrouPV24, author = {Eliana Stavrou and Andriani Piki and Panayiotis Varnava}, title = {Merging Policy and Practice: Crafting Effective Social Engineering Awareness-Raising Policies}, booktitle = {{ICISSP}}, pages = {179--186}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/StevanLLDP24, author = {Antoine Stevan and Thomas Lavaur and J{\'{e}}r{\^{o}}me Lacan and Jonathan Detchart and Tanguy P{\'{e}}rennou}, title = {Performance Evaluation of Polynomial Commitments for Erasure Code Based Information Dispersal}, booktitle = {{ICISSP}}, pages = {522--533}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/Stremlau24, author = {Thorsten P. Stremlau}, title = {Integrating Post-Quantum Cryptography into Trusted Computing Group Standards}, booktitle = {{ICISSP}}, pages = {15}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/TavolatoLEGS24, author = {Paul Tavolato and Robert Luh and Sebastian Eresheim and Simon Gmeiner and Sebastian Schrittwieser}, title = {Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process}, booktitle = {{ICISSP}}, pages = {211--218}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/TejapijayaSSK24, author = {Thanawat Tejapijaya and Prarinya Siritanawan and Karin Sumongkayothin and Kazunori Kotani}, title = {Botnet Detection by Integrating Multiple Machine Learning Models}, booktitle = {{ICISSP}}, pages = {366--373}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/Teseleanu24, author = {George Teseleanu}, title = {Security Analysis of an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map}, booktitle = {{ICISSP}}, pages = {467--473}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/Teseleanu24a, author = {George Teseleanu}, title = {Security Analysis of an Image Encryption Scheme Based on a New Secure Variant of Hill Cipher and 1D Chaotic Maps}, booktitle = {{ICISSP}}, pages = {745--749}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/Tezcan24, author = {Cihangir Tezcan}, title = {GPU-Based Brute Force Cryptanalysis of {KLEIN}}, booktitle = {{ICISSP}}, pages = {884--889}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/TrammellGISZ24, author = {Ariane Trammell and Benjamin Gehring and Marco Isele and Yvo Spielmann and Valentin Zahnd}, title = {Towards Automated Information Security Governance}, booktitle = {{ICISSP}}, pages = {120--127}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/UemuraF24, author = {Shusaku Uemura and Kazuhide Fukushima}, title = {Feasibility of Random Forest with Fully Homomorphic Encryption Applied to Network Data}, booktitle = {{ICISSP}}, pages = {534--545}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/UmraniV024, author = {Alia Umrani and Apurva K. Vangujar and Paolo Palmieri}, title = {Anonymous Multi-Receiver Certificateless Hybrid Signcryption for Broadcast Communication}, booktitle = {{ICISSP}}, pages = {733--744}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/ValoggiaSRB24, author = {Philippe Valoggia and Anastasia Sergeeva and Arianna Rossi and Marietjie Botes}, title = {Learning from the Dark Side About How (not) to Engineer Privacy: Analysis of Dark Patterns Taxonomies from an {ISO} 29100 Perspective}, booktitle = {{ICISSP}}, pages = {774--784}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/VaneziKP24, author = {Evangelia Vanezi and Georgia M. Kapitsaki and Anna Philippou}, title = {What's Your Purpose? An Approach to Incorporating {GDPR} Purposes into Requirements Analysis}, booktitle = {{ICISSP}}, pages = {907--914}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/VijayanFK24, author = {Visakh K. Vijayan and Maria Francis and Kotaro Kataoka}, title = {Off-Chaining Approaches for Cost-Efficiency in Threshold-Based Elliptic Curve Systems over Blockchains}, booktitle = {{ICISSP}}, pages = {411--422}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/WakabayashiWNW24, author = {Ryousuke Wakabayashi and Lihua Wang and Ryo Nojima and Atsushi Waseda}, title = {Security Evaluation of Decision Tree Meets Data Anonymization}, booktitle = {{ICISSP}}, pages = {853--860}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/WillM24, author = {Newton Carlos Will and Carlos Alberto Maziero}, title = {Enclave Management Models for Safe Execution of Software Components}, booktitle = {{ICISSP}}, pages = {474--485}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/ZaidenbergKME24, author = {Nezer Jacob Zaidenberg and Michael Kiperberg and Eliav Menachi and Asaf Eitani}, title = {Detecting eBPF Rootkits Using Virtualization and Memory Forensics}, booktitle = {{ICISSP}}, pages = {254--261}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/ZareiV24, author = {Amir Zarei and Staal Amund Vinterbo}, title = {Secure Multiparty Computation of the Laplace Mechanism}, booktitle = {{ICISSP}}, pages = {582--593}, publisher = {{SCITEPRESS}}, year = {2024} }
@proceedings{DBLP:conf/icissp/2024, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, publisher = {{SCITEPRESS}}, year = {2024} }
@inproceedings{DBLP:conf/icissp/000123, author = {Luca Vigan{\`{o}}}, title = {Cybersecurity, Nicolas Cage and Peppa Pig}, booktitle = {{ICISSP}}, pages = {7}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/0001V23, author = {Alexandros Karakasidis and Vassilios Vassalos}, title = {On the Design of {GDPR} Compliant Workflows for Responsible Neuroimage Data Sharing}, booktitle = {{ICISSP}}, pages = {600--607}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/AlJuaidLS23, author = {Nouf Al{-}Juaid and Alexei Lisitsa and Sven Schewe}, title = {Secure Joint Querying Over Federated Graph Databases Utilising {SMPC} Protocols}, booktitle = {{ICISSP}}, pages = {210--217}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/AlagarswamyBDLMSTW23, author = {Devi Padmavathi Alagarswamy and Christian Berghoff and Vasilios Danos and Fabian Langer and Thora Markert and Georg Schneider and Arndt von Twickel and Fabian Woitschek}, title = {Towards Audit Requirements for AI-Based Systems in Mobility Applications}, booktitle = {{ICISSP}}, pages = {339--348}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/AlaniMM23, author = {Mohammed M. Alani and Atefeh Mashatan and Ali Miri}, title = {XMeDNN: An Explainable Deep Neural Network System for Intrusion Detection in Internet of Medical Things}, booktitle = {{ICISSP}}, pages = {144--151}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/AlbaneseCCIMMRS23, author = {Daniele Albanese and Rosangela Casolare and Giovanni Ciaramella and Giacomo Iadarola and Fabio Martinelli and Francesco Mercaldo and Marco Russodivito and Antonella Santone}, title = {StegWare: {A} Novel Malware Model Exploiting Payload Steganography and Dynamic Compilation}, booktitle = {{ICISSP}}, pages = {741--748}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/AlghamdiF23, author = {Samiah Alghamdi and Steven Furnell}, title = {Assessing Security and Privacy Insights for Smart Home Users}, booktitle = {{ICISSP}}, pages = {592--599}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/AntognazzaBPS23, author = {Francesco Antognazza and Alessandro Barenghi and Gerardo Pelosi and Ruggero Susella}, title = {An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes}, booktitle = {{ICISSP}}, pages = {81--88}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/BalajiAF23, author = {Kaushik Krishnan Balaji and Dimah Almani and Steven Furnell}, title = {Assessing the Impact of Attacks on Connected and Autonomous Vehicles in Vehicular Ad Hoc Networks}, booktitle = {{ICISSP}}, pages = {774--782}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/BartschGKM0PP23, author = {Witali Bartsch and Prosanta Gope and Elif Bilge Kavun and Owen Millwood and Andriy Panchenko and Aryan Mohammadi Pasikhani and Ilia Polian}, title = {Design Rationale for Symbiotically Secure Key Management Systems in IoT and Beyond}, booktitle = {{ICISSP}}, pages = {583--591}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/BauspiessVMCKR23, author = {Pia Bauspie{\ss} and Lasse Vad and H{\aa}vard Myrekrok and Anamaria Costache and Jascha Kolberg and Christian Rathgeb}, title = {On the Feasibility of Fully Homomorphic Encryption of Minutiae-Based Fingerprint Representations}, booktitle = {{ICISSP}}, pages = {462--470}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/BelalisSA23, author = {Ilias Belalis and Georgios P. Spathoulas and Ioannis Anagnostopoulos}, title = {Evading Detection During Network Reconnaissance}, booktitle = {{ICISSP}}, pages = {528--534}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/BellizziVCH23, author = {Jennifer Bellizzi and Mark Vella and Christian Colombo and Julio C. Hernandez{-}Castro}, title = {Using Infrastructure-Based Agents to Enhance Forensic Logging of Third-Party Applications}, booktitle = {{ICISSP}}, pages = {389--401}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/BodeiCVMM23, author = {Chiara Bodei and Gianpiero Costantino and Marco De Vincenzi and Ilaria Matteucci and Anna Monreale}, title = {Vehicle Data Collection: {A} Privacy Policy Analysis and Comparison}, booktitle = {{ICISSP}}, pages = {626--633}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/BorcherdingPGB23, author = {Anne Borcherding and Nikolay Penkov and Mark Giraud and J{\"{u}}rgen Beyerer}, title = {SWaTEval: An Evaluation Framework for Stateful Web Application Testing}, booktitle = {{ICISSP}}, pages = {430--441}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/Bracamonte0L23, author = {Vanessa Bracamonte and Sebastian Pape and Sascha L{\"{o}}bner}, title = {Comparing the Effect of Privacy and Non-Privacy Social Media Photo Tools on Factors of Privacy Concern}, booktitle = {{ICISSP}}, pages = {669--676}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/Bryce23, author = {Ciar{\'{a}}n Bryce}, title = {An Analysis of Cybersecurity Awareness Efforts for Swiss SMEs}, booktitle = {{ICISSP}}, pages = {381--388}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/BullockE23, author = {Harrison Bullock and Matthew Edwards}, title = {Temporal Constraints in Online Dating Fraud Classification}, booktitle = {{ICISSP}}, pages = {535--542}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/BurdiakDTLRKMPFKHMV23, author = {Patrik Burdiak and Emir Dervisevic and Amina Tankovic and Filip Lauterbach and Jan Rozhon and Lukas Kapicak and Libor Michalek and Dzana Pivac and Merima Fehric and Enio Kaljic and Mirza Hamza and Miralem Mehic and Miroslav Vozn{\'{a}}k}, title = {Use-Case Denial of Service Attack on Actual Quantum Key Distribution Nodes}, booktitle = {{ICISSP}}, pages = {89--94}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/Chabanne23, author = {Herv{\'{e}} Chabanne}, title = {A Biometric Self Authentication Scheme}, booktitle = {{ICISSP}}, pages = {749--756}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/ChenLX23, author = {Shaojie Chen and Bo Lang and Chong Xie}, title = {Fast-Flux Malicious Domain Name Detection Method Based on Domain Resolution Spatial Features}, booktitle = {{ICISSP}}, pages = {240--251}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/DantasBKNS23, author = {Yuri Gil Dantas and Simon Barner and Pei Ke and Vivek Nigam and Ulrich Sch{\"{o}}pp}, title = {Automating Vehicle {SOA} Threat Analysis Using a Model-Based Methodology}, booktitle = {{ICISSP}}, pages = {180--191}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/DantasS23, author = {Yuri Gil Dantas and Ulrich Sch{\"{o}}pp}, title = {SeCloud: Computer-Aided Support for Selecting Security Measures for Cloud Architectures}, booktitle = {{ICISSP}}, pages = {264--275}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/DienerB23, author = {Michael Diener and Thomas Bolz}, title = {Cloud Inspector: {A} Tool-Based Approach for Public Administrations to Establish Information Security Processes Towards Public Clouds}, booktitle = {{ICISSP}}, pages = {543--551}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/DieterichSSSP23, author = {Am{\'{e}}lie Dieterich and Matthias Schopp and Lars Stiemert and Christoph Steininger and Daniela P{\"{o}}hn}, title = {Evaluation of Persistence Methods Used by Malware on Microsoft Windows Systems}, booktitle = {{ICISSP}}, pages = {552--559}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/DimaratosP23, author = {Anastasia Dimaratos and Daniela P{\"{o}}hn}, title = {Evaluation Scheme to Analyze Keystroke Dynamics Methods}, booktitle = {{ICISSP}}, pages = {357--365}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/DorafshanianM23, author = {Mahboobeh Dorafshanian and Mohamed Mejri}, title = {Differential Privacy: Toward a Better Tuning of the Privacy Budget ({\(\epsilon\)}) Based on Risk}, booktitle = {{ICISSP}}, pages = {783--792}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/DrevinSDKA23, author = {G{\"{u}}nther R. Drevin and Dirk P. Snyman and Lynette Drevin and Hennie A. Kruger and Johann Allers}, title = {The Story of Safety Snail and Her e-Mail: {A} Digital Wellness and Cybersecurity Serious Game for Pre-School Children}, booktitle = {{ICISSP}}, pages = {519--527}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/EipperP23, author = {Andreas Eipper and Daniela P{\"{o}}hn}, title = {How to Design a Blue Team Scenario for Beginners on the Example of Brute-Force Attacks on Authentications}, booktitle = {{ICISSP}}, pages = {477--484}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/ElsteC23, author = {James R. Elste and David T. Croasdell}, title = {Cyber Teaching Hospitals: Developing Cyber Workforce Competence}, booktitle = {{ICISSP}}, pages = {643--650}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/EmuraY23, author = {Keita Emura and Masato Yoshimi}, title = {An End-to-End Encrypted Cache System with Time-Dependent Access Control}, booktitle = {{ICISSP}}, pages = {321--328}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/ErdoganHBTP23, author = {Gencer Erdogan and Ragnhild Halvorsrud and Costas Boletsis and Simeon Tverdal and John Brian Pickering}, title = {Cybersecurity Awareness and Capacities of SMEs}, booktitle = {{ICISSP}}, pages = {296--304}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/FarhatAMZ23, author = {Saida Farhat and Manel Abdelkader and Amel Meddeb{-}Makhlouf and Faouzi Zarai}, title = {Evaluation of DoS/DDoS Attack Detection with {ML} Techniques on {CIC-IDS2017} Dataset}, booktitle = {{ICISSP}}, pages = {287--295}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/FloresGKBV23, author = {C{\'{e}}sar V{\'{a}}squez Flores and Jos{\'{e}} Gonzales and Miranda Kajtazi and Joseph Bugeja and Bahtijar Vogel}, title = {Human Factors for Cybersecurity Awareness in a Remote Work Environment}, booktitle = {{ICISSP}}, pages = {608--616}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/GalliBJCP23, author = {Filippo Galli and Sayan Biswas and Kangsoo Jung and Tommaso Cucinotta and Catuscia Palamidessi}, title = {Group Privacy for Personalized Federated Learning}, booktitle = {{ICISSP}}, pages = {252--263}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/GuerraMOF23, author = {Michele Guerra and Roberto Milanese and Rocco Oliveto and Fausto Fasano}, title = {RPCDroid: Runtime Identification of Permission Usage Contexts in Android Applications}, booktitle = {{ICISSP}}, pages = {714--721}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/HanTT0ML23, author = {Chansu Han and Akira Tanaka and Jun'ichi Takeuchi and Takeshi Takahashi and Tomohiro Morikawa and Tsung{-}Nan Lin}, title = {Towards Long-Term Continuous Tracing of Internet-Wide Scanning Campaigns Based on Darknet Analysis}, booktitle = {{ICISSP}}, pages = {617--625}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/HasegawaHF23, author = {Kento Hasegawa and Seira Hidano and Kazuhide Fukushima}, title = {Automating {XSS} Vulnerability Testing Using Reinforcement Learning}, booktitle = {{ICISSP}}, pages = {70--80}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/HeidHRS23, author = {Kris Heid and Jens Heider and Matthias Ritscher and Jan{-}Peter Stotz}, title = {Tracing Cryptographic Agility in Android and iOS Apps}, booktitle = {{ICISSP}}, pages = {38--45}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/HoferRSM23, author = {Philipp Hofer and Michael Roland and Philipp Schwarz and Ren{\'{e}} Mayrhofer}, title = {Efficient Aggregation of Face Embeddings for Decentralized Face Recognition Deployments}, booktitle = {{ICISSP}}, pages = {279--286}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/ImanCJBG23, author = {Mohammad Reza Heidari Iman and Pavel Chikul and Gert Jervan and Hayretdin Bahsi and Tara Ghasempouri}, title = {Anomalous File System Activity Detection Through Temporal Association Rule Mining}, booktitle = {{ICISSP}}, pages = {733--740}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/JulkuK23, author = {Jukka Julku and Markku Kyl{\"{a}}np{\"{a}}{\"{a}}}, title = {Towards a Rust {SDK} for Keystone Enclave Application Development}, booktitle = {{ICISSP}}, pages = {29--37}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/KaksonenHR23, author = {Rauli Kaksonen and Kimmo Halunen and Juha R{\"{o}}ning}, title = {Vulnerabilities in IoT Devices, Backends, Applications, and Components}, booktitle = {{ICISSP}}, pages = {659--668}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/KamalI23, author = {Ahmad Akmal Aminuddin Mohd Kamal and Keiichi Iwamura}, title = {TTP-Aided Searchable Encryption of Documents Using Threshold Secret Sharing}, booktitle = {{ICISSP}}, pages = {442--449}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/Khoumsi23, author = {Ahmed Khoumsi}, title = {Automata-Based Study of Dynamic Access Control Policies}, booktitle = {{ICISSP}}, pages = {218--227}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/KiperbergRKZ23, author = {Michael Kiperberg and Aleksei Rozman and Aleksei Kuraev and Nezer Zaidenberg}, title = {{PDIFT:} {A} Practical Dynamic Information-Flow Tracker}, booktitle = {{ICISSP}}, pages = {192--198}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/KlineK23, author = {Jace Kline and Prasad Kulkarni}, title = {A Framework for Assessing Decompiler Inference Accuracy of Source-Level Program Constructs}, booktitle = {{ICISSP}}, pages = {228--239}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/KokesL23, author = {Josef Kokes and R{\'{o}}bert L{\'{o}}rencz}, title = {On the Use of Multiple Approximations in the Linear Cryptanalysis of Baby Rijndael}, booktitle = {{ICISSP}}, pages = {174--179}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/LauterbachMRBZV23, author = {Filip Lauterbach and Libor Michalek and Piotr Rydlichowski and Patrik Burdiak and Jaroslav Zdralek and Miroslav Vozn{\'{a}}k}, title = {Measurements of Cross-Border Quantum Key Distribution Link}, booktitle = {{ICISSP}}, pages = {418--423}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/LealWMMBM023, author = {Erika A. Leal and Cimone Wright{-}Hamor and Joseph B. Manzano and Nicholas J. Multari and Kevin J. Barker and David O. Manz and Jiang Ming}, title = {Assessing Risk in High Performance Computing Attacks}, booktitle = {{ICISSP}}, pages = {793--803}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/LeichtH23, author = {Jens Leicht and Maritta Heisel}, title = {{P2BAC:} Privacy Policy Based Access Control Using {P-LPL}}, booktitle = {{ICISSP}}, pages = {686--697}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/Leitner23, author = {Maria Leitner}, title = {A Scenario-Driven Cyber Security Awareness Exercise Utilizing Dynamic Polling: Methodology and Lessons Learned}, booktitle = {{ICISSP}}, pages = {634--642}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/LiZSZ23, author = {Lu Li and Guanling Zhao and Kai Shi and Fengjun Zhang}, title = {A Stochastic Game Model for Cloud Platform Security}, booktitle = {{ICISSP}}, pages = {152--162}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/LohmannAM23, author = {Pedro A. Lohmann and Carlos Albuquerque and Raphael Machado}, title = {Systematic Literature Review of Threat Modeling Concepts}, booktitle = {{ICISSP}}, pages = {163--173}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/LoumponiasRDTVK23, author = {Kostas Loumponias and Sotiris Raptis and Eleni Darra and Theodora Tsikrika and Stefanos Vrochidis and Ioannis Kompatsiaris}, title = {Forecasting Cyber-Attacks to Destination Ports Using Machine Learning}, booktitle = {{ICISSP}}, pages = {757--764}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/LuanHB23, author = {Kaiying Luan and Ragnhild Halvorsrud and Costas Boletsis}, title = {Evaluation of a Tool to Increase Cybersecurity Awareness Among Non-experts {(SME} Employees)}, booktitle = {{ICISSP}}, pages = {509--518}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/MarquesS23, author = {Ant{\'{o}}nio Marques and Bruno Sousa}, title = {{CHARRA-PM:} An Attestation Approach Relying on the Passport Model}, booktitle = {{ICISSP}}, pages = {349--356}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/MaugeriDBP23, author = {Marcello Maugeri and Cristian Daniele and Giampaolo Bella and Erik Poll}, title = {Evaluating the Fork-Awareness of Coverage-Guided Fuzzers}, booktitle = {{ICISSP}}, pages = {424--429}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/MercaldoMS23, author = {Francesco Mercaldo and Fabio Martinelli and Antonella Santone}, title = {An Explainable Convolutional Neural Network for Dynamic Android Malware Detection}, booktitle = {{ICISSP}}, pages = {305--312}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/NarisadaBFK23, author = {Shintaro Narisada and Shohei Beppu and Kazuhide Fukushima and Shinsaku Kiyomoto}, title = {Concrete Quantum Circuits to Prepare Generalized Dicke States on a Quantum Machine}, booktitle = {{ICISSP}}, pages = {329--338}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/NeupaneS23, author = {Ashish Neupane and Weiqing Sun}, title = {Exploring False Demand Attacks in Power Grids with High {PV} Penetration}, booktitle = {{ICISSP}}, pages = {124--134}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/NichoS23, author = {Mathew Nicho and Ibrahim Sabry}, title = {Bypassing Multiple Security Layers Using Malicious {USB} Human Interface Device}, booktitle = {{ICISSP}}, pages = {501--508}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/OhiraDAF23, author = {Shuji Ohira and Araya Kibrom Desta and Ismail Arai and Kazutoshi Fujikawa}, title = {{IVNPROTECT:} Isolable and Traceable Lightweight CAN-Bus Kernel-Level Protection for Securing in-Vehicle Communication}, booktitle = {{ICISSP}}, pages = {17--28}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/OkadaF23, author = {Hiroki Okada and Kazuhide Fukushima}, title = {Revisiting the {DFT} Test in the {NIST} {SP} 800-22 Randomness Test Suite}, booktitle = {{ICISSP}}, pages = {366--372}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/Pavlov0E23, author = {Vitomir Pavlov and Florian Hahn and Mohammad El{-}Hajj}, title = {Security Aspects of Digital Twins in IoT}, booktitle = {{ICISSP}}, pages = {560--567}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/RabasBL23, author = {Tom{\'{a}}s Rabas and Jir{\'{\i}} Bucek and R{\'{o}}bert L{\'{o}}rencz}, title = {{SPA} Attack on {NTRU} Protected Implementation with Sparse Representation of Private Key}, booktitle = {{ICISSP}}, pages = {135--143}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/RaschkeHS23, author = {Philip Raschke and Patrick Herbke and Henry Schwerdtner}, title = {t.ex-Graph: Automated Web Tracker Detection Using Centrality Metrics and Data Flow Characteristics}, booktitle = {{ICISSP}}, pages = {199--209}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/RetiES23, author = {Daniel Reti and Karina Elzer and Hans Dieter Schotten}, title = {{SCANTRAP:} Protecting Content Management Systems from Vulnerability Scanners with Cyber Deception and Obfuscation}, booktitle = {{ICISSP}}, pages = {485--492}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/RieraAPR23, author = {Francisco Blas {Izquierdo Riera} and Magnus Almgren and Pablo Picazo{-}Sanchez and Christian Rohner}, title = {Clipaha: {A} Scheme to Perform Password Stretching on the Client}, booktitle = {{ICISSP}}, pages = {58--69}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/RochaAP23, author = {Alexandra Rocha and Rui Alves and Tiago Pedrosa}, title = {Query Log Analysis for {SQL} Injection Detection}, booktitle = {{ICISSP}}, pages = {471--476}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/RocklWM23, author = {Jonas R{\"{o}}ckl and Adam Wagenh{\"{a}}user and Tilo M{\"{u}}ller}, title = {Veto: Prohibit Outdated Edge System Software from Booting}, booktitle = {{ICISSP}}, pages = {46--57}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/RuelleGR23, author = {Fr{\'{e}}d{\'{e}}ric Ruell{\'{e}} and Quentin Guella{\"{e}}n and Arnaud Rosay}, title = {{SHOID:} {A} Secure Herd of IoT Devices Firmware Update Protocol}, booktitle = {{ICISSP}}, pages = {373--380}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/SamirJ23, author = {Areeg Samir and H{\aa}vard Dagenborg Johansen}, title = {A Self-Configuration Controller To Detect, Identify, and Recover Misconfiguration at IoT Edge Devices and Containerized Cluster System}, booktitle = {{ICISSP}}, pages = {765--773}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/SeidPB23, author = {Elias Seid and Oliver Popov and Fredrik Blix}, title = {Towards Security Attack Event Monitoring for Cyber Physical-Systems}, booktitle = {{ICISSP}}, pages = {722--732}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/SeitzTGH23, author = {Ludwig Seitz and Marco Tiloca and Martin Gunnarsson and Rikard H{\"{o}}glund}, title = {Secure Software Updates for IoT Based on Industry Requirements}, booktitle = {{ICISSP}}, pages = {698--705}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/Stremlau23, author = {Thorsten P. Stremlau}, title = {Protecting IoT Ecosystems and {AI} Leveraging {TCG} Standards}, booktitle = {{ICISSP}}, pages = {11}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/SugaiSTO23, author = {Risa Sugai and Yuichi Sei and Yasuyuki Tahara and Akihiko Ohsuga}, title = {A k-Anonymization Method for Social Network Data with Link Prediction}, booktitle = {{ICISSP}}, pages = {493--500}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/TangOB23, author = {Feiyang Tang and Bjarte M. {\O}stvold and Magiel Bruntink}, title = {Identifying Personal Data Processing for Code Review}, booktitle = {{ICISSP}}, pages = {568--575}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/TavolatoLE23, author = {Paul Tavolato and Robert Luh and Sebastian Eresheim}, title = {A Game Theoretic Analysis of Cyber Threats}, booktitle = {{ICISSP}}, pages = {706--713}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/Teseleanu23, author = {George Teseleanu}, title = {Security Analysis of a Color Image Encryption Scheme Based on Dynamic Substitution and Diffusion Operations}, booktitle = {{ICISSP}}, pages = {410--417}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/TokasES23, author = {Shukun Tokas and Gencer Erdogan and Ketil St{\o}len}, title = {Privacy-Aware IoT: State-of-the-Art and Challenges}, booktitle = {{ICISSP}}, pages = {450--461}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/TranNE23, author = {Thanh Tran and Phu Nguyen and Gencer Erdogan}, title = {A Systematic Review of Secure IoT Data Sharing}, booktitle = {{ICISSP}}, pages = {95--105}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/Volkamer23, author = {Melanie Volkamer}, title = {Usable Security: Security 'Warnings' 2.0}, booktitle = {{ICISSP}}, pages = {5}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/WalkowP23, author = {Marcus Walkow and Daniela P{\"{o}}hn}, title = {Systematically Searching for Identity-Related Information in the Internet with {OSINT} Tools}, booktitle = {{ICISSP}}, pages = {402--409}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/WangAH23, author = {Yichao Wang and Budi Arief and Julio C. Hernandez{-}Castro}, title = {Dark Ending: What Happens when a Dark Web Market Closes down}, booktitle = {{ICISSP}}, pages = {106--117}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/WatanabeMKU23, author = {Ryu Watanabe and Takashi Matsunaka and Ayumu Kubota and Jumpei Urakawa}, title = {Machine Learning Based Prediction of Vulnerability Information Subject to a Security Alert}, booktitle = {{ICISSP}}, pages = {313--320}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/WolfLT23, author = {Zechariah Wolf and Eric Larson and Mitchell A. Thornton}, title = {Data Leakage in Isolated Virtualized Enterprise Computing Systems}, booktitle = {{ICISSP}}, pages = {118--123}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/ZhangWHWZS23, author = {Hanwen Zhang and Wenyong Wang and Lisheng Huang and Junrui Wu and Fengjun Zhang and Kai Shi}, title = {Correlating Intrusion Detection with Attack Graph on Virtual Computer Networkings}, booktitle = {{ICISSP}}, pages = {651--658}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/Zhong023, author = {Yinzheng Zhong and Alexei Lisitsa}, title = {Online Transition-Based Feature Generation for Anomaly Detection in Concurrent Data Streams}, booktitle = {{ICISSP}}, pages = {576--582}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/ZolotavkinBLMK23, author = {Yevhen Zolotavkin and Yurii Baryshev and Vitalii Lukichov and Jannik M{\"{a}}hn and Stefan K{\"{o}}psell}, title = {Improving Unlinkability in {C-ITS:} {A} Methodology For Optimal Obfuscation}, booktitle = {{ICISSP}}, pages = {677--685}, publisher = {SciTePress}, year = {2023} }
@proceedings{DBLP:conf/icissp/2022s, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Information Systems Security and Privacy - 7th International Conference, {ICISSP} 2021, Virtual Event, February 11-13, 2021, and 8th International Conference, {ICISSP} 2022, Virtual Event, February 9-11, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1851}, publisher = {Springer}, year = {2023} }
@proceedings{DBLP:conf/icissp/2023, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/AarlandG22, author = {Mari Aarland and Terje Gj{\o}s{\ae}ter}, title = {Digital Supply Chain Vulnerabilities in Critical Infrastructure: {A} Systematic Literature Review on Cybersecurity in the Energy Sector}, booktitle = {{ICISSP}}, pages = {326--333}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/Al-JuaidLS22, author = {Nouf Al{-}Juaid and Alexei Lisitsa and Sven Schewe}, title = {{SMPG:} Secure Multi Party Computation on Graph Databases}, booktitle = {{ICISSP}}, pages = {463--471}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/AlShuhailS22, author = {Asma AlShuhail and Jianhue Shao}, title = {Semantic Attack on Disassociated Transactions}, booktitle = {{ICISSP}}, pages = {60--72}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/AlasmariW022, author = {Sultan Alasmari and Weichao Wang and Yu Wang}, title = {Incentivisation of Outsourced Network Testing: View from Platform Perspective}, booktitle = {{ICISSP}}, pages = {499--506}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/AlbalawiVC22, author = {Abdullah Albalawi and Vassilios G. Vassilakis and Radu Calinescu}, title = {Protecting Shared Virtualized Environments against Cache Side-channel Attacks}, booktitle = {{ICISSP}}, pages = {507--514}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/AliHJLST22, author = {Muhammad Ali and Monem Hamid and Jacob Jasser and Joachim Lerman and Samod Shetty and Fabio Di Troia}, title = {Profile Hidden Markov Model Malware Detection and {API} Call Obfuscation}, booktitle = {{ICISSP}}, pages = {688--695}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/AlmarwaniK022, author = {Maryam Almarwani and Boris Konev and Alexei Lisitsa}, title = {Zero Update Encryption Adjustment on Encrypted Database Queries}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1851}, pages = {25--47}, publisher = {Springer}, year = {2022} }
@inproceedings{DBLP:conf/icissp/AlmarwaniKL22, author = {Maryam Almarwani and Boris Konev and Alexei Lisitsa}, title = {Efficient and Secure Encryption Adjustment for {JSON} Data}, booktitle = {{ICISSP}}, pages = {307--313}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/AnagrehLV22, author = {Mohammad Anagreh and Peeter Laud and Eero Vainikko}, title = {Privacy-preserving Parallel Computation of Shortest Path Algorithms with Low Round Complexity}, booktitle = {{ICISSP}}, pages = {37--47}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/BaksiU22, author = {Rudra Prasad Baksi and Shambhu J. Upadhyaya}, title = {Game Theoretic Analysis of Ransomware: {A} Preliminary Study}, booktitle = {{ICISSP}}, pages = {242--251}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/BaksiU22a, author = {Rudra Prasad Baksi and Shambhu J. Upadhyaya}, title = {A Game Theoretic Approach to the Design of Mitigation Strategies for Generic Ransomware}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1851}, pages = {104--124}, publisher = {Springer}, year = {2022} }
@inproceedings{DBLP:conf/icissp/BarberF22, author = {Flora Barber and Steven Furnell}, title = {Benchmarking Consumer Data and Privacy Knowledge in Connected and Autonomous Vehicles}, booktitle = {{ICISSP}}, pages = {426--434}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/BarberF22a, author = {Flora Barber and Steven Furnell}, title = {Evaluating Consumer Understanding and Awareness of Connected and Autonomous Vehicle Data Privacy}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1851}, pages = {48--71}, publisher = {Springer}, year = {2022} }
@inproceedings{DBLP:conf/icissp/BartonBPSA22, author = {Jon Barton and William J. Buchanan and Nikolaos Pitropakis and Sarwar Sayeed and Will Abramson}, title = {Post Quantum Cryptography Analysis of {TLS} Tunneling on a Constrained Device}, booktitle = {{ICISSP}}, pages = {551--561}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/BorcherdingFKMB22, author = {Anne Borcherding and Lukas Feldmann and Markus Karch and Ankush Meshram and J{\"{u}}rgen Beyerer}, title = {Towards a Better Understanding of Machine Learning based Network Intrusion Detection Systems in Industrial Networks}, booktitle = {{ICISSP}}, pages = {314--325}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/BorcherdingTB22, author = {Anne Borcherding and Philipp Takacs and J{\"{u}}rgen Beyerer}, title = {Cluster Crash: Learning from Recent Vulnerabilities in Communication Stacks}, booktitle = {{ICISSP}}, pages = {334--344}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/BracamonteI22, author = {Vanessa Bracamonte and Takamasa Isohara}, title = {Comparing Perception of Disclosure of Different Types of Information Related to Automated Tools}, booktitle = {{ICISSP}}, pages = {544--550}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/CanU22, author = {{\"{O}}zg{\"{u}} Can and Murat Osman {\"{U}}nalir}, title = {Revisiting Ontology Based Access Control: The Case for Ontology Based Data Access}, booktitle = {{ICISSP}}, pages = {515--518}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/CanU22a, author = {{\"{O}}zg{\"{u}} Can and Murat Osman {\"{U}}nalir}, title = {Improving Data Security and Privacy for Ontology Based Data Access}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1851}, pages = {72--90}, publisher = {Springer}, year = {2022} }
@inproceedings{DBLP:conf/icissp/CarrierVTL22, author = {Tristan Carrier and Princy Victor and Ali Tekeoglu and Arash Habibi Lashkari}, title = {Detecting Obfuscated Malware using Memory Feature Engineering}, booktitle = {{ICISSP}}, pages = {177--188}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/CatuognoG22, author = {Luigi Catuogno and Clemente Galdi}, title = {On Tracking Ransomware on the File System}, booktitle = {{ICISSP}}, pages = {210--219}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/ChenLTH22, author = {Shang{-}Wen Chen and Jian{-}Wei Liao and Chia{-}Wei Tien and Jung{-}Hsin Hsiao}, title = {Impact of Cross-standard Cell Libraries on Machine Learning based Hardware Trojan Detection}, booktitle = {{ICISSP}}, pages = {420--425}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/ChoudhuryLN22, author = {Robert Choudhury and Zhiyuan Luo and Khuong An Nguyen}, title = {Malware in Motion}, booktitle = {{ICISSP}}, pages = {595--602}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/CilliMMV22, author = {Claudio Cilli and Giulio Magnanini and Lorenzo Manduca and Fabrizio Venettoni}, title = {"Fake News Detector": An Automatic System for the Reliability Evaluation of Digital News}, booktitle = {{ICISSP}}, pages = {15--24}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/CivekT22, author = {Asl{\'{\i}} Basak Civek and Cihangir Tezcan}, title = {Differential-linear Attacks on Permutation Ciphers Revisited: Experiments on Ascon and DryGASCON}, booktitle = {{ICISSP}}, pages = {202--209}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/CivekT22a, author = {Asl{\'{\i}} Basak Civek and Cihangir Tezcan}, title = {Experimentally Obtained Differential-Linear Distinguishers for Permutations of {ASCON} and DryGASCON}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1851}, pages = {91--103}, publisher = {Springer}, year = {2022} }
@inproceedings{DBLP:conf/icissp/DaoudaghM22, author = {Said Daoudagh and Eda Marchetti}, title = {The {GDPR} Compliance and Access Control Systems: Challenges and Research Opportunities}, booktitle = {{ICISSP}}, pages = {571--578}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/DavidianVK22, author = {Matan Davidian and Natalia Vanetik and Michael Kiperberg}, title = {Ransomware Detection with Deep Neural Networks}, booktitle = {{ICISSP}}, pages = {656--663}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/DaviesS22, author = {Jack R. Davies and Jianhua Shao}, title = {Utility of Anonymised Data in Decision Tree Derivation}, booktitle = {{ICISSP}}, pages = {273--280}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/DemetriouBH22, author = {Phil Demetriou and Ingolf Becker and Stephen Hailes}, title = {Who Watches the Watchers: {A} Multi-Task Benchmark for Anomaly Detection}, booktitle = {{ICISSP}}, pages = {579--586}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/Ebad22, author = {Shouki A. Ebad}, title = {An Exploratory Study of Why UMLsec Is Not Adopted}, booktitle = {{ICISSP}}, pages = {357--364}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/ElmiligiS22, author = {Haytham Elmiligi and Sherif Saad}, title = {iProfile: Collecting and Analyzing Keystroke Dynamics from Android Users}, booktitle = {{ICISSP}}, pages = {621--628}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/FahlanderE0D22, author = {Per Fahlander and Mathias Ekstedt and Preetam Mukherjee and Ashish Kumar Dwivedi}, title = {Containment Strategy Formalism in a Probabilistic Threat Modelling Framework}, booktitle = {{ICISSP}}, pages = {108--120}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/GaficTKHQ22, author = {Melisa Gafic and Simon Tjoa and Peter Kieseberg and Otto Hellwig and Gerald Quirchmayr}, title = {Cyber Exercises in Computer Science Education}, booktitle = {{ICISSP}}, pages = {404--411}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/HallJLS22, author = {Joanne L. Hall and Jomin John and Jessica Liebig and Anju Skariah}, title = {Age Bias in Finger Vein Biometric Research}, booktitle = {{ICISSP}}, pages = {472--477}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/HeidTHS22, author = {Kris Heid and Tobias Tefke and Jens Heider and Ralf C. Staudemeyer}, title = {Android Data Storage Locations and What App Developers Do with It from a Security and Privacy Perspective}, booktitle = {{ICISSP}}, pages = {378--387}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/HekkalaHV22, author = {Julius Hekkala and Kimmo Halunen and Visa Antero Vallivaara}, title = {Implementing Post-quantum Cryptography for Developers}, booktitle = {{ICISSP}}, pages = {73--83}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/IssakhaniVTL22, author = {Maryam Issakhani and Princy Victor and Ali Tekeoglu and Arash Habibi Lashkari}, title = {{PDF} Malware Detection based on Stacking Learning}, booktitle = {{ICISSP}}, pages = {562--570}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/KanamoriSTN22, author = {Sachiko Kanamori and Hirotsune Sato and Naoya Tabata and Ryo Nojima}, title = {Construction of a Support Tool for User Reading of Privacy Policies and Assessment of its User Impact}, booktitle = {{ICISSP}}, pages = {412--419}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/KarimniaMS22, author = {Rooya Karimnia and Kaie Maennel and Mahtab Shahin}, title = {Culturally-sensitive Cybersecurity Awareness Program Design for Iranian High-school Students}, booktitle = {{ICISSP}}, pages = {121--132}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/KiechleBNB022, author = {Valentin Kiechle and Matthias B{\"{o}}rsig and Sven Nitzsche and Ingmar Baumgart and J{\"{u}}rgen Becker}, title = {{PREUNN:} Protocol Reverse Engineering using Neural Networks}, booktitle = {{ICISSP}}, pages = {345--356}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/KumazakiHYST22, author = {Masahito Kumazaki and Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada and Hiroki Takakura}, title = {Cyber Attack Stage Tracing System based on Attack Scenario Comparison}, booktitle = {{ICISSP}}, pages = {587--594}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/KunduPV22, author = {Rohon Kundu and Alessandro De Piccoli and Andrea Visconti}, title = {Public Key Compression and Fast Polynomial Multiplication for {NTRU} using the Corrected Hybridized NTT-Karatsuba Method}, booktitle = {{ICISSP}}, pages = {145--153}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/LangnerSFQ22, author = {Gregor Langner and Florian Skopik and Steven Furnell and Gerald Quirchmayr}, title = {A Tailored Model for Cyber Security Education Utilizing a Cyber Range}, booktitle = {{ICISSP}}, pages = {365--377}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/LeePPPT22, author = {Hoseong Asher Lee and Nikhil Prathapani and Rajesh Paturi and Sarp Parmaksiz and Fabio Di Troia}, title = {NLP-based User Authentication through Mouse Dynamics}, booktitle = {{ICISSP}}, pages = {696--702}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/LeeSAS0SLT22, author = {Matthew Lee and Joshua Sylvester and Sunjoli Aggarwal and Aviraj Sinha and Michael A. Taylor and Nathan Srirama and Eric C. Larson and Mitchell A. Thornton}, title = {Side Channel Identification using Granger Time Series Clustering with Applications to Control Systems}, booktitle = {{ICISSP}}, pages = {290--298}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/LingE22, author = {Engla Rencelj Ling and Mathias Ekstedt}, title = {Estimating the Time-To-Compromise of Exploiting Industrial Control System Vulnerabilities}, booktitle = {{ICISSP}}, pages = {96--107}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/LorunserWK22, author = {Thomas Lor{\"{u}}nser and Florian Wohner and Stephan Krenn}, title = {A Privacy-Preserving Auction Platform with Public Verifiability for Smart Manufacturing}, booktitle = {{ICISSP}}, pages = {637--647}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/MadiSSG22, author = {Abbass Madi and Oana Stan and Renaud Sirdey and C{\'{e}}dric Gouy{-}Pailler}, title = {SecTL: Secure and Verifiable Transfer Learning-based inference}, booktitle = {{ICISSP}}, pages = {220--229}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/MaurelVR22, author = {H{\'{e}}lo{\"{\i}}se Maurel and Santiago A. Vidal and Tamara Rezk}, title = {Comparing the Detection of {XSS} Vulnerabilities in Node.js and a Multi-tier JavaScript-based Language via Deep Learning}, booktitle = {{ICISSP}}, pages = {189--201}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/MercaldoMS022, author = {Francesco Mercaldo and Fabio Martinelli and Antonella Santone and Vinod P.}, title = {On the Influence of Image Settings in Deep Learning-based Malware Detection}, booktitle = {{ICISSP}}, pages = {669--676}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/MohammadianL022, author = {Hesamodin Mohammadian and Arash Habibi Lashkari and Ali A. Ghorbani}, title = {Evaluating Deep Learning-based {NIDS} in Adversarial Settings}, booktitle = {{ICISSP}}, pages = {435--444}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/NabeelG22, author = {Mohamad Nabeel and Christine Gro{\ss}e}, title = {Classifying {COVID-19} Disinformation on Twitter using a Convolutional Neural Network}, booktitle = {{ICISSP}}, pages = {264--272}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/NaserediniGSBSC22, author = {Amir Naseredini and Stefan Gast and Martin Schwarzl and Pedro Miguel Sousa Bernardo and Amel Smajic and Claudio Canella and Martin Berger and Daniel Gruss}, title = {Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks}, booktitle = {{ICISSP}}, pages = {48--59}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/OttMG22, author = {David Ott and Dennis Moreau and Manish Gaur}, title = {Planning for Cryptographic Readiness in an Era of Quantum Computing Advancement}, booktitle = {{ICISSP}}, pages = {491--498}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/PattiyanonA22, author = {Charnon Pattiyanon and Toshiaki Aoki}, title = {Analysis and Enhancement of Self-sovereign Identity System Properties Compiling Standards and Regulations}, booktitle = {{ICISSP}}, pages = {133--144}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/Picazo-SanchezA22, author = {Pablo Picazo{-}Sanchez and Maximilian Algehed and Andrei Sabelfeld}, title = {DeDup.js: Discovering Malicious and Vulnerable Extensions by Detecting Duplication}, booktitle = {{ICISSP}}, pages = {528--535}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/PonsardM22, author = {Christophe Ponsard and Philippe Massonet}, title = {Survey and Guidelines about Learning Cyber Security Risk Assessment}, booktitle = {{ICISSP}}, pages = {536--543}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/RahmanMHA22, author = {Md. Rashedur Rahman and Elizabeth Miller and Moinul Hossain and Aisha I. Ali{-}Gombe}, title = {Intent-aware Permission Architecture: {A} Model for Rethinking Informed Consent for Android Apps}, booktitle = {{ICISSP}}, pages = {154--164}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/Rashid22, author = {Awais Rashid}, title = {Why Rigorous Underpinnings for Cyber Security Education and Training Matter? Experiences from CyBOK: The Cyber Security Body of Knowledge}, booktitle = {{ICISSP}}, pages = {5}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/RosayCCL22, author = {Arnaud Rosay and Elo{\"{\i}}se Cheval and Florent Carlier and Pascal Leroux}, title = {Network Intrusion Detection: {A} Comprehensive Analysis of {CIC-IDS2017}}, booktitle = {{ICISSP}}, pages = {25--36}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/RuckaW22, author = {Agnieszka Rucka and Wojciech Wodo}, title = {On the {LPSE} Password Meter's Discrepancies among Different Datasets}, booktitle = {{ICISSP}}, pages = {255--263}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/Sadeh22, author = {Norman M. Sadeh}, title = {Why Usability Has Become Privacy's Biggest Challenge and What We Can Do About It}, booktitle = {{ICISSP}}, pages = {9}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/Samarati22, author = {Pierangela Samarati}, title = {Data Security and Privacy in Emerging Scenarios}, booktitle = {{ICISSP}}, pages = {7}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/SandovalL22, author = {Itzel V{\'{a}}zquez Sandoval and Gabriele Lenzini}, title = {Can We Formally Catch Cheating in E-exams?}, booktitle = {{ICISSP}}, pages = {648--655}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/SerretLG22, author = {Elsa Serret and Antoine Lesueur and Alban Gabillon}, title = {Linguistic Steganography for Messaging Applications}, booktitle = {{ICISSP}}, pages = {519--527}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/SertkayaK22, author = {Isa Sertkaya and {\"{O}}znur Kalkar}, title = {Cryptanalysis of Some Electronic Checkbook Schemes}, booktitle = {{ICISSP}}, pages = {603--612}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/SnymanK22, author = {Dirk P. Snyman and Hennie A. Kruger}, title = {The Role of Information Deserts in Information Security Awareness and Behaviour}, booktitle = {{ICISSP}}, pages = {613--620}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/Soares22, author = {Alberto Magno Muniz Soares}, title = {WhatsApp Web Client Live Forensics Technique}, booktitle = {{ICISSP}}, pages = {629--636}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/TalbiVLFC022, author = {Adam Talbi and Arthur Viens and Louis{-}Cl{\'{e}}ment Leroux and Morgane Fran{\c{c}}ois and Mathias Caillol and Nga Nguyen}, title = {Feature Importance and Deep Learning for Android Malware Detection}, booktitle = {{ICISSP}}, pages = {453--462}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/TavolatoLE22, author = {Paul Tavolato and Robert Luh and Sebastian Eresheim}, title = {Formalizing Real-world Threat Scenarios}, booktitle = {{ICISSP}}, pages = {281--289}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/UljansB22, author = {Austris Uljans and Bernhards Blumbergs}, title = {Industrial and Automation Control System Cyber Range Prototype for Offensive Capability Development}, booktitle = {{ICISSP}}, pages = {478--490}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/VeronesePFL22, author = {Leonardo Veronese and Francesco Palmarini and Riccardo Focardi and Flaminia L. Luccio}, title = {A Fast and Cost-effective Design for FPGA-based Fuzzy Rainbow Tradeoffs}, booktitle = {{ICISSP}}, pages = {165--176}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/WangB22, author = {Tian Wang and Masooda N. Bashir}, title = {An Analysis of Cloud Certifications' Performance on Privacy Protections}, booktitle = {{ICISSP}}, pages = {299--306}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/WareusDTH22, author = {Emil W{\aa}reus and Anton Duppils and Magnus Tullberg and Martin Hell}, title = {Security Issue Classification for Vulnerability Management with Semi-supervised Learning}, booktitle = {{ICISSP}}, pages = {84--95}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/WenS22, author = {Shengyuan Wen and Weiqing Sun}, title = {SpamFender: {A} Semi-supervised Incremental Spam Classification System across Social Networks}, booktitle = {{ICISSP}}, pages = {388--395}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/WerdenML22, author = {David Werden and Matthew Muccioli and Anyi Liu}, title = {TEEm: {A} Tangle-based Elastic Emulator for Storing Connected Vehicle Data in a Distributed Ledger Technology}, booktitle = {{ICISSP}}, pages = {230--241}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/WuSZYLZGLH22, author = {Yixiong Wu and Shangru Song and Jianwei Zhuge and Tingting Yin and Tianyi Li and Junmin Zhu and Guannan Guo and Yue Liu and Jianju Hu}, title = {ICScope: Detecting and Measuring Vulnerable {ICS} Devices Exposed on the Internet}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1851}, pages = {1--24}, publisher = {Springer}, year = {2022} }
@inproceedings{DBLP:conf/icissp/XiaoNFS22, author = {Junhui Xiao and Ashish Neupane and Hiba F. Fayoumi and Weiqing Sun}, title = {A Novel Key Exchange Protocol using Logic Algebra for the Factorization Problem}, booktitle = {{ICISSP}}, pages = {396--403}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/YassinR22, author = {Ghadeer I. Yassin and Lakshmish Ramaswamy}, title = {Effective {\&} Efficient Access Control in Smart Farms: Opportunities, Challenges {\&} Potential Approaches}, booktitle = {{ICISSP}}, pages = {445--452}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/YonamineTK22, author = {Shun Yonamine and Yuzo Taenaka and Youki Kadobayashi}, title = {Tamer: {A} Sandbox for Facilitating and Automating IoT Malware Analysis with Techniques to Elicit Malicious Behavior}, booktitle = {{ICISSP}}, pages = {677--687}, publisher = {{SCITEPRESS}}, year = {2022} }
@proceedings{DBLP:conf/icissp/2020s, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Information Systems Security and Privacy - 6th International Conference, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1545}, publisher = {Springer}, year = {2022} }
@proceedings{DBLP:conf/icissp/2022, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, publisher = {{SCITEPRESS}}, year = {2022} }
@inproceedings{DBLP:conf/icissp/0002E0SE21, author = {Clemens Brunner and G{\"{u}}nther Eibl and Peter Fr{\"{o}}hlich and Andreas Sackl and Dominik Engel}, title = {Who Stores the Private Key? An Exploratory Study about User Preferences of Key Management for Blockchain-based Applications}, booktitle = {{ICISSP}}, pages = {23--32}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/0018O021, author = {Yan Yan and Elisabeth Oswald and Srinivas Vivek}, title = {An Analytic Attack against {ARX} Addition Exploiting Standard Side-channel Leakage}, booktitle = {{ICISSP}}, pages = {89--97}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/0046CKLG21, author = {Lu Zhang and Reginald Cushing and Ralph Koning and Cees de Laat and Paola Grosso}, title = {Profiling and Discriminating of Containerized {ML} Applications in Digital Data Marketplaces {(DDM)}}, booktitle = {{ICISSP}}, pages = {508--515}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/AkandeT21, author = {Alexander O. Akande and Vu N. Tran}, title = {Predicting Security Program Effectiveness in Bring-Your-Own-Device Deployment in Organizations}, booktitle = {{ICISSP}}, pages = {55--65}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/Al-MaweeCM21, author = {Wassnaa Al{-}Mawee and Steve Carr and Jean Mayo}, title = {Admonita: {A} Recommendation-based Trust Model for Dynamic Data Integrity}, booktitle = {{ICISSP}}, pages = {273--282}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/AlmarwaniKL21, author = {Maryam Almarwani and Boris Konev and Alexei Lisitsa}, title = {Release-aware In-out Encryption Adjustment in MongoDB Query Processing}, booktitle = {{ICISSP}}, pages = {714--722}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/AlturkiKKNST21, author = {Musab A. Alturki and Tajana Ban Kirigin and Max I. Kanovich and Vivek Nigam and Andre Scedrov and Carolyn L. Talcott}, title = {On Security Analysis of Periodic Systems: Expressiveness and Complexity}, booktitle = {{ICISSP}}, pages = {43--54}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/AmitYKZ21, author = {Guy Amit and Amir Yeshooroon and Michael Kiperberg and Nezer J. Zaidenberg}, title = {DLP-Visor: {A} Hypervisor-based Data Leakage Prevention System}, booktitle = {{ICISSP}}, pages = {416--423}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/AnagrehVL21, author = {Mohammad Anagreh and Eero Vainikko and Peeter Laud}, title = {Parallel Privacy-preserving Computation of Minimum Spanning Trees}, booktitle = {{ICISSP}}, pages = {181--190}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/AyotteBHS21, author = {Blaine Ayotte and Mahesh K. Banavar and Daqing Hou and Stephanie Schuckers}, title = {Study of Intra- and Inter-user Variance in Password Keystroke Dynamics}, booktitle = {{ICISSP}}, pages = {467--474}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/BasuKB21, author = {Srijita Basu and Sandip Karmakar and Debasish Bera}, title = {Blockchain based Secured Virtual Machine Image Monitor}, booktitle = {{ICISSP}}, pages = {432--439}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/BhattacharjyaS21, author = {Sairath Bhattacharjya and Hossein Saiedian}, title = {A Novel Simplified Framework to Secure IoT Communications}, booktitle = {{ICISSP}}, pages = {399--406}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/BohmVP21, author = {Fabian B{\"{o}}hm and Manfred Vielberth and G{\"{u}}nther Pernul}, title = {Bridging Knowledge Gaps in Security Analytics}, booktitle = {{ICISSP}}, pages = {98--108}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/BoudguigaSFLC21, author = {Aymen Boudguiga and Oana Stan and Abdessamad Fazzat and Houda Labiod and Pierre{-}Emmanuel Clet}, title = {Privacy Preserving Services for Intelligent Transportation Systems with Homomorphic Encryption}, booktitle = {{ICISSP}}, pages = {684--693}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/BracamonteTK21, author = {Vanessa Bracamonte and Welderufael B. Tesfay and Shinsaku Kiyomoto}, title = {Towards Exploring User Perception of a Privacy Sensitive Information Detection Tool}, booktitle = {{ICISSP}}, pages = {628--634}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/BryantS21, author = {Blake D. Bryant and Hossein Saiedian}, title = {A State Saturation Attack against Massively Multiplayer Online Videogames}, booktitle = {{ICISSP}}, pages = {217--225}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/CadalzoTOMW21, author = {Lucas Cadalzo and Christopher H. Todd and Banjo Obayomi and W. Brad Moore and Anthony C. Wong}, title = {Canopy: {A} Learning-based Approach for Automatic Low-and-Slow DDoS Mitigation}, booktitle = {{ICISSP}}, pages = {356--367}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/CasolareMMS21, author = {Rosangela Casolare and Fabio Martinelli and Francesco Mercaldo and Antonella Santone}, title = {Colluding Covert Channel for Malicious Information Exfiltration in Android Environment}, booktitle = {{ICISSP}}, pages = {811--818}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/ChabanneDG21, author = {Herv{\'{e}} Chabanne and Vincent Despiegel and Linda Guiga}, title = {A Protection against the Extraction of Neural Network Models}, booktitle = {{ICISSP}}, pages = {258--269}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/CholterES21, author = {William La Cholter and Matthew Elder and Antonius Stalick}, title = {Windows Malware Binaries in {C/C++} GitHub Repositories: Prevalence and Lessons Learned}, booktitle = {{ICISSP}}, pages = {475--484}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/DahdahLKLDG21, author = {Christian Dahdah and Coline Van Leeuwen and Ziad Kheil and J{\'{e}}r{\^{o}}me Lacan and Jonathan Detchart and Thibault Gateau}, title = {Enabling Monetization of Depreciating Data on Blockchains}, booktitle = {{ICISSP}}, pages = {500--507}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/DamT21, author = {Khanh{-}Huu{-}The Dam and Tayssir Touili}, title = {{MADLIRA:} {A} Tool for Android Malware Detection}, booktitle = {{ICISSP}}, pages = {670--675}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/DangTS21, author = {Dennis Dang and Fabio Di Troia and Mark Stamp}, title = {Malware Classification using Long Short-term Memory Models}, booktitle = {{ICISSP}}, pages = {743--752}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/DaoudaghMSBA21, author = {Said Daoudagh and Eda Marchetti and Vincenzo Savarino and Roberto Di Bernardo and Marco Alessi}, title = {How to Improve the {GDPR} Compliance through Consent Management and Access Control}, booktitle = {{ICISSP}}, pages = {534--541}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/DavilaLT21, author = {Carlos Ocanto D{\'{a}}vila and Roc{\'{\i}}o Cabrera Lozoya and Slim Trabelsi}, title = {Sociocultural Influences for Password Definition: An AI-based Study}, booktitle = {{ICISSP}}, pages = {542--549}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/ErdoganRZZBAOPK21, author = {Gencer Erdogan and Antonio {\'{A}}lvarez Romero and Niccol{\`{o}} Zazzeri and Anze Zitnik and Mariano Basile and Giorgio Aprile and Mafalda Os{\'{o}}rio and Claudia Pani and Ioannis Kechaoglou}, title = {Developing Cyber-risk Centric Courses and Training Material for Cyber Ranges: {A} Systematic Approach}, booktitle = {{ICISSP}}, pages = {702--713}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/Filiol21, author = {Eric Filiol}, title = {Unconventional Attack against Voting Machines Enlarging the Scope of Cybersecurity Risk Analysis}, booktitle = {{ICISSP}}, pages = {763--770}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/FloodCC021, author = {Robert Flood and Sheung Shi Chan and Wei Chen and David Aspinall}, title = {Checking Contact Tracing App Implementations}, booktitle = {{ICISSP}}, pages = {133--144}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/Garg21, author = {Vaibhav Garg}, title = {A Lemon by Any Other Label}, booktitle = {{ICISSP}}, pages = {558--565}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/Grosse21, author = {Christine Gro{\ss}e}, title = {Enhanced Information Management in Inter-organisational Planning for Critical Infrastructure Protection: Case and Framework}, booktitle = {{ICISSP}}, pages = {319--330}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/GuilleyRQ21, author = {Sylvain Guilley and Michel Le Rolland and Damien Quenson}, title = {Implementing Secure Applications Thanks to an Integrated Secure Element}, booktitle = {{ICISSP}}, pages = {566--571}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/HaarB21, author = {Christoph Haar and Erik Buchmann}, title = {Securing Orchestrated Containers with {BSI} Module {SYS.1.6}}, booktitle = {{ICISSP}}, pages = {676--683}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/HaglMP21, author = {Jakob Hagl and Oliver Mann and Martin Pirker}, title = {Securing the Linux Boot Process: From Start to Finish}, booktitle = {{ICISSP}}, pages = {604--610}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/HasegawaT21, author = {Hirokazu Hasegawa and Hiroki Takakura}, title = {A Dynamic Access Control System based on Situations of Users}, booktitle = {{ICISSP}}, pages = {653--660}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/HazhirpasandEN21, author = {Mohammadreza Hazhirpasand and Arash Ale Ebrahim and Oscar Nierstrasz}, title = {Stopping {DNS} Rebinding Attacks in the Browser}, booktitle = {{ICISSP}}, pages = {596--603}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/HnainiRCT21, author = {Hiba Hnaini and Luka Le Roux and Jo{\"{e}}l Champeau and Ciprian Teodorov}, title = {Security Property Modeling}, booktitle = {{ICISSP}}, pages = {694--701}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/HuangTSS21, author = {Elliu Huang and Fabio Di Troia and Mark Stamp and Preethi Sundaravaradhan}, title = {A New Dataset for Smartphone Gesture-based Authentication}, booktitle = {{ICISSP}}, pages = {771--780}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/HutschenreuterC21, author = {Helmar Hutschenreuter and Salva Daneshgadeh {\c{C}}akmak{\c{c}}i and Christian Maeder and Thomas Kemmerich}, title = {Ontology-based Cybersecurity and Resilience Framework}, booktitle = {{ICISSP}}, pages = {458--466}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/IrvanTK0Y21, author = {Mhd Irvan and Tran Phuong Thao and Ryosuke Kobayashi and Toshiyuki Nakata and Rie Shigetomi Yamaguchi}, title = {Learning from Smartphone Location Data as Anomaly Detection for Behavioral Authentication through Deep Neuroevolution}, booktitle = {{ICISSP}}, pages = {723--728}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/JacobQL21, author = {Stephen Jacob and Yuansong Qiao and Brian Lee}, title = {Detecting Cyber Security Attacks against a Microservices Application using Distributed Tracing}, booktitle = {{ICISSP}}, pages = {588--595}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/JurecekJL21, author = {Martin Jurecek and Olha Jureckov{\'{a}} and R{\'{o}}bert L{\'{o}}rencz}, title = {Improving Classification of Malware Families using Learning a Distance Metric}, booktitle = {{ICISSP}}, pages = {643--652}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/JurecekK21, author = {Martin Jurecek and Matous Koz{\'{a}}k}, title = {Representation of {PE} Files using {LSTM} Networks}, booktitle = {{ICISSP}}, pages = {516--525}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/KadenaNR21, author = {Esmeralda Kadena and Huu Phuoc Dai Nguyen and Lourdes Ruiz}, title = {Mobile Robots: An Overview of Data and Security}, booktitle = {{ICISSP}}, pages = {291--299}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/KaleTS21, author = {Aparna Sunil Kale and Fabio Di Troia and Mark Stamp}, title = {Malware Classification with Word Embedding Features}, booktitle = {{ICISSP}}, pages = {733--742}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/KallT21, author = {Sabrina Kall and Slim Trabelsi}, title = {An Asynchronous Federated Learning Approach for a Security Source Code Scanner}, booktitle = {{ICISSP}}, pages = {572--579}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/KamalI21, author = {Ahmad Akmal Aminuddin Mohd Kamal and Keiichi Iwamura}, title = {Improvement of Secure Multi-Party Multiplication of (k, n) Threshold Secret Sharing Using Only {N} = k Servers}, booktitle = {{ICISSP}}, pages = {77--88}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/KiperbergZ21, author = {Michael Kiperberg and Nezer J. Zaidenberg}, title = {HyperPass: Secure Password Input Platform}, booktitle = {{ICISSP}}, pages = {580--587}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/KlaudelR21, author = {Witold Klaudel and Artur Rataj}, title = {Towards a Formalisation of Expert's Knowledge for an Automatic Construction of a Vulnerability Model of a Cyberphysical System}, booktitle = {{ICISSP}}, pages = {391--398}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/KokesML21, author = {Josef Kokes and Jonatan Matejka and R{\'{o}}bert L{\'{o}}rencz}, title = {Automatic Detection and Decryption of {AES} by Monitoring S-Box Access}, booktitle = {{ICISSP}}, pages = {172--180}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/KotlabaBL21, author = {Luk{\'{a}}s Kotlaba and Simona Buchoveck{\'{a}} and R{\'{o}}bert L{\'{o}}rencz}, title = {Active Directory Kerberoasting Attack: Detection using Machine Learning Techniques}, booktitle = {{ICISSP}}, pages = {376--383}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/KushnirFREZ21, author = {Malte Kushnir and Olivier Favre and Marc Rennhard and Damiano Esposito and Valentin Zahnd}, title = {Automated Black Box Detection of {HTTP} {GET} Request-based Access Control Vulnerabilities in Web Applications}, booktitle = {{ICISSP}}, pages = {204--216}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/LouniciRNTO21, author = {Sofiane Lounici and Marco Rosa and Carlo Maria Negri and Slim Trabelsi and Melek {\"{O}}nen}, title = {Optimizing Leak Detection in Open-source Platforms with Machine Learning Techniques}, booktitle = {{ICISSP}}, pages = {145--159}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/Maffei21, author = {Matteo Maffei}, title = {Practical and Provably Sound Static Analysis of Ethereum Smart Contracts}, booktitle = {{ICISSP}}, pages = {7}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/MandalM21, author = {Debashis Mandal and Chandan Mazumdar}, title = {Towards an Ontology for Enterprise Level Information Security Policy Analysis}, booktitle = {{ICISSP}}, pages = {492--499}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/MartinyBDJM21, author = {Karsten Martiny and Linda Briesemeister and Grit Denker and Mark F. St. John and Ron Moore}, title = {Protecting Privacy during a Pandemic Outbreak}, booktitle = {{ICISSP}}, pages = {308--318}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/McClaryS21, author = {Jack McClary and Sid Stamm}, title = {Understanding How People Weigh the Costs and Benefits of using Facebook}, booktitle = {{ICISSP}}, pages = {526--533}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/NagashimaII21, author = {Nozomi Nagashima and Masaki Inamura and Keiichi Iwamura}, title = {Implementation of Secondary Available Digital Content Protection Schemes using Identity-based Signatures}, booktitle = {{ICISSP}}, pages = {485--491}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/NakataO21, author = {Ryotaro Nakata and Akira Otsuka}, title = {CyExec*: Automatic Generation of Randomized Cyber Range Scenarios}, booktitle = {{ICISSP}}, pages = {226--236}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/NakataO21a, author = {Ryotaro Nakata and Akira Otsuka}, title = {Evaluation of Vulnerability Reproducibility in Container-based Cyber Range}, booktitle = {{ICISSP}}, pages = {635--642}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/NeuschmiedWHSK21, author = {Helmut Neuschmied and Martin Winter and Katharina Hofer{-}Schmitz and Branka Stojanovic and Ulrike Kleb}, title = {Two Stage Anomaly Detection for Network Intrusion Detection}, booktitle = {{ICISSP}}, pages = {450--457}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/NguyenTIU21, author = {Hai Ngoc Nguyen and Songpon Teerakanok and Atsuo Inomata and Tetsutaro Uehara}, title = {The Comparison of Word Embedding Techniques in RNNs for Vulnerability Detection}, booktitle = {{ICISSP}}, pages = {109--120}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/NguyenTIU21a, author = {Hoang Viet Nguyen and Songpon Teerakanok and Atsuo Inomata and Tetsutaro Uehara}, title = {The Proposal of Double Agent Architecture using Actor-critic Algorithm for Penetration Testing}, booktitle = {{ICISSP}}, pages = {440--449}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/NiedermaierHFM21, author = {Matthias Niedermaier and Thomas Hanka and Florian Fischer and Dominik Merli}, title = {A Secure Network Scanner Architecture for Asset Management in Strongly Segmented {ICS} Networks}, booktitle = {{ICISSP}}, pages = {347--355}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/OlssonT21, author = {Christoffer Olsson and Mohsen Toorani}, title = {A Permissioned Blockchain-based System for Collaborative Drug Discovery}, booktitle = {{ICISSP}}, pages = {121--132}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/OsliakSMD21, author = {Oleksii Osliak and Andrea Saracino and Fabio Martinelli and Theo Dimitrakos}, title = {Towards Collaborative Cyber Threat Intelligence for Security Management}, booktitle = {{ICISSP}}, pages = {339--346}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/OzcelikMBS21, author = {Ilker {\"{O}}z{\c{c}}elik and Sai Medury and Justin T. Broaddus and Anthony Skjellum}, title = {An Overview of Cryptographic Accumulators}, booktitle = {{ICISSP}}, pages = {661--669}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/PachecoS21, author = {Yulexis Pacheco and Weiqing Sun}, title = {Adversarial Machine Learning: {A} Comparative Study on Contemporary Intrusion Detection Datasets}, booktitle = {{ICISSP}}, pages = {160--171}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/PatzerB21, author = {Florian Patzer and J{\"{u}}rgen Beyerer}, title = {Efficient Semantic Representation of Network Access Control Configuration for Ontology-based Security Analysis}, booktitle = {{ICISSP}}, pages = {550--557}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/Perrig21, author = {Adrian Perrig}, title = {New Directions for High-throughput and High-security Communication}, booktitle = {{ICISSP}}, pages = {5}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/PhamSSSPH21, author = {Stefanie Pham and Matthias Schopp and Lars Stiemert and Sebastian Seeber and Daniela P{\"{o}}hn and Wolfgang Hommel}, title = {Field Studies on the Impact of Cryptographic Signatures and Encryption on Phishing Emails}, booktitle = {{ICISSP}}, pages = {384--390}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/PilipchukHR21, author = {Roman Pilipchuk and Robert Heinrich and Ralf H. Reussner}, title = {Automatically Extracting Business Level Access Control Requirements from {BPMN} Models to Align {RBAC} Policies}, booktitle = {{ICISSP}}, pages = {300--307}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/PonsardD21, author = {Christophe Ponsard and Denis Darquennes}, title = {Towards Formal Security Verification of Over-the-Air Update Protocol: Requirements, Survey and UpKit Case Study}, booktitle = {{ICISSP}}, pages = {800--808}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/PretoriusDM21, author = {Morn{\'{e}} Pretorius and Nelisiwe Dlamini and Sthembile Mthethwa}, title = {Towards Academic and Skills Credentialing Standards and Distributed Ledger Technologies}, booktitle = {{ICISSP}}, pages = {249--257}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/PuchtaGP21, author = {Alexander Puchta and Sebastian Groll and G{\"{u}}nther Pernul}, title = {Leveraging Dynamic Information for Identity and Access Management: An Extension of Current Enterprise {IAM} Architecture}, booktitle = {{ICISSP}}, pages = {611--618}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/Raimondo0021, author = {Mariapia Raimondo and Simona Bernardi and Stefano Marrone}, title = {On Formalising and Analysing the Tweetchain Protocol}, booktitle = {{ICISSP}}, pages = {781--791}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/RayHSB21, author = {Aratrika Ray and Daqing Hou and Stephanie Schuckers and Abbie Barbir}, title = {Continuous Authentication based on Hand Micro-movement during Smartphone Form Filling by Seated Human Subjects}, booktitle = {{ICISSP}}, pages = {424--431}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/Renaud21, author = {Karen Renaud}, title = {Accessible Cyber Security: The Next Frontier?}, booktitle = {{ICISSP}}, pages = {9--18}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/SchatzRS21, author = {David Schatz and Michael Rossberg and Guenter Schaefer}, title = {Hydra: Practical Metadata Security for Contact Discovery, Messaging, and Dialing}, booktitle = {{ICISSP}}, pages = {191--203}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/ShakedR21, author = {Avi Shaked and Yoram Reich}, title = {Model-based Threat and Risk Assessment for Systems Design}, booktitle = {{ICISSP}}, pages = {331--338}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/Sommervoll21, author = {{\AA}vald {\AA}slaugson Sommervoll}, title = {Dreaming of Keys: Introducing the Phantom Gradient Attack}, booktitle = {{ICISSP}}, pages = {619--627}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/SonntagM21, author = {Michael Sonntag and Ren{\'{e}} Mayrhofer}, title = {Experiences and Recommendations from Operating a Tor Exit Node at a University}, booktitle = {{ICISSP}}, pages = {283--290}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/SvecBH21, author = {Peter Svec and Stefan Balogh and Martin Homola}, title = {Experimental Evaluation of Description Logic Concept Learning Algorithms for Static Malware Detection}, booktitle = {{ICISSP}}, pages = {792--799}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/Sy21, author = {Bon Sy}, title = {Linking Biometric Voice Identity with Self-monitoring Health Data as a Temporal-spatial Event Stored in a Mobile Device}, booktitle = {{ICISSP}}, pages = {407--415}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/UralA21, author = {{\"{O}}zg{\"{u}}r Ural and Cengiz Acart{\"{u}}rk}, title = {Automatic Detection of Cyber Security Events from Turkish Twitter Stream and Newspaper Data}, booktitle = {{ICISSP}}, pages = {66--76}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/WagnerHH21, author = {Paul Wagner and Kris Heid and Jens Heider}, title = {Remote WebAuthn: {FIDO2} Authentication for Less Accessible Devices}, booktitle = {{ICISSP}}, pages = {368--375}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/WahabHSB21, author = {Ahmed Anu Wahab and Daqing Hou and Stephanie Schuckers and Abbie Barbir}, title = {Utilizing Keystroke Dynamics as Additional Security Measure to Protect Account Recovery Mechanism}, booktitle = {{ICISSP}}, pages = {33--42}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/WuZYLZGLH21, author = {Yixiong Wu and Jianwei Zhuge and Tingting Yin and Tianyi Li and Junmin Zhu and Guannan Guo and Yue Liu and Jianju Hu}, title = {From Exposed to Exploited: Drawing the Picture of Industrial Control Systems Security Status in the Internet Age}, booktitle = {{ICISSP}}, pages = {237--248}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/ZhaoBS21, author = {Jing Zhao and Samanvitha Basole and Mark Stamp}, title = {Malware Classification with {GMM-HMM} Models}, booktitle = {{ICISSP}}, pages = {753--762}, publisher = {{SCITEPRESS}}, year = {2021} }
@proceedings{DBLP:conf/icissp/2021, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, publisher = {{SCITEPRESS}}, year = {2021} }
@inproceedings{DBLP:conf/icissp/0002MMTJK20, author = {Masahiro Ishii and Satoshi Matsuura and Kento Mori and Masahiko Tomoishi and Yong Jin and Yoshiaki Kitaguchi}, title = {A Study of Classification of Texts into Categories of Cybersecurity Incident and Attack with Topic Models}, booktitle = {{ICISSP}}, pages = {639--646}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/AkerlundG20, author = {Agnes {\AA}kerlund and Christine Gro{\ss}e}, title = {Integration of Data Envelopment Analysis in Business Process Models: {A} Novel Approach to Measure Information Security}, booktitle = {{ICISSP}}, pages = {281--288}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/AlmeidaV020, author = {Rafael Almeida and Pedro Vieira{-}Marques and Ana Ferreira}, title = {Patients to Mobilize Their Data: Secure and Flexible mHealth Delegation}, booktitle = {{ICISSP}}, pages = {552--560}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/AnagrehVL20, author = {Mohammad Anagreh and Eero Vainikko and Peeter Laud}, title = {Speeding Up the Computation of Elliptic Curve Scalar Multiplication based on {CRT} and {DRM}}, booktitle = {{ICISSP}}, pages = {176--184}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/AriefPCH20, author = {Budi Arief and Andy Periam and Or{\c{c}}un {\c{C}}etin and Julio C. Hernandez{-}Castro}, title = {Using Eyetracker to Find Ways to Mitigate Ransomware}, booktitle = {{ICISSP}}, pages = {448--456}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/Barni20, author = {Mauro Barni}, title = {Backdooring Deep Learning Architectures: Threats and (some) Opportunities}, booktitle = {{ICISSP}}, pages = {15--16}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/BernardeschiDPR20, author = {Cinzia Bernardeschi and Gianluca Dini and Maurizio Palmieri and Francesco Racciatti}, title = {Analysis of Security Attacks in Wireless Sensor Networks: From {UPPAAL} to Castalia}, booktitle = {{ICISSP}}, pages = {815--824}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/BoudguigaSSC20, author = {Aymen Boudguiga and Oana Stan and Hichem Sedjelmaci and Sergiu Carpov}, title = {Homomorphic Encryption at Work for Private Analysis of Security Logs}, booktitle = {{ICISSP}}, pages = {515--523}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/BowditchABPH20, author = {William Bowditch and Will Abramson and William J. Buchanan and Nikolaos Pitropakis and Adam J. Hall}, title = {Privacy-preserving Surveillance Methods using Homomorphic Encryption}, booktitle = {{ICISSP}}, pages = {240--248}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/BracamonteHTK20, author = {Vanessa Bracamonte and Seira Hidano and Welderufael B. Tesfay and Shinsaku Kiyomoto}, title = {Evaluating the Effect of Justification and Confidence Information on User Perception of a Privacy Policy Summarization Tool}, booktitle = {{ICISSP}}, pages = {142--151}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/BracamonteHTK20a, author = {Vanessa Bracamonte and Seira Hidano and Welderufael B. Tesfay and Shinsaku Kiyomoto}, title = {Effects of Explanatory Information on Privacy Policy Summarization Tool Perception}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1545}, pages = {156--177}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/icissp/BraccialeLRN020, author = {Lorenzo Bracciale and Pierpaolo Loreti and Emanuele Raso and Maurizio Naldi and Giuseppe Bianchi}, title = {CoProtect: Collaborative Management of Cryptographic Keys for Data Security in Cloud Systems}, booktitle = {{ICISSP}}, pages = {361--368}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/BromanderSESB20, author = {Siri Bromander and Morton Swimmer and Martin Eian and Geir Skjotskift and Fredrik Borg}, title = {Modeling Cyber Threat Intelligence}, booktitle = {{ICISSP}}, pages = {273--280}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/BrunnerKUE20, author = {Clemens Brunner and Fabian Knirsch and Andreas Unterweger and Dominik Engel}, title = {A Comparison of Blockchain-based {PKI} Implementations}, booktitle = {{ICISSP}}, pages = {333--340}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/BuchoveckaLBK20, author = {Simona Buchoveck{\'{a}} and R{\'{o}}bert L{\'{o}}rencz and Jir{\'{\i}} Bucek and Filip Kod{\'{y}}tek}, title = {Lightweight Authentication and Secure Communication Suitable for IoT Devices}, booktitle = {{ICISSP}}, pages = {75--83}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/BuchoveckaLBK20a, author = {Simona Buchoveck{\'{a}} and R{\'{o}}bert L{\'{o}}rencz and Jir{\'{\i}} Bucek and Filip Kod{\'{y}}tek}, title = {Symmetric and Asymmetric Schemes for Lightweight Secure Communication}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1545}, pages = {97--114}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/icissp/ButunLS20, author = {Ismail Butun and Alexios Lekidis and Daniel Ricardo dos Santos}, title = {Security and Privacy in Smart Grids: Challenges, Current Solutions and Future Opportunities}, booktitle = {{ICISSP}}, pages = {733--741}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/ChristouPPMB20, author = {Orestis Christou and Nikolaos Pitropakis and Pavlos Papadopoulos and Sean McKeown and William J. Buchanan}, title = {Phishing {URL} Detection Through Top-level Domain Analysis: {A} Descriptive Approach}, booktitle = {{ICISSP}}, pages = {289--298}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/ChuL20, author = {Ge Chu and Alexei Lisitsa}, title = {Ontology-based Automation of Penetration Testing}, booktitle = {{ICISSP}}, pages = {713--720}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/CiobanuFMMS20, author = {Madalina G. Ciobanu and Fausto Fasano and Fabio Martinelli and Francesco Mercaldo and Antonella Santone}, title = {Accidental Sensitive Data Leaks Prevention via Formal Verification}, booktitle = {{ICISSP}}, pages = {825--834}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/ColomboV20, author = {Christian Colombo and Mark Vella}, title = {Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification}, booktitle = {{ICISSP}}, pages = {765--774}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/DanielsB20, author = {Jesse Daniels and Sajal Bhatia}, title = {Legislation and the Negative Impact on Cybersecurity in Healthcare}, booktitle = {{ICISSP}}, pages = {691--697}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/DaoudaghLM20, author = {Said Daoudagh and Francesca Lonetti and Eda Marchetti}, title = {Assessing Testing Strategies for Access Control Systems: {A} Controlled Experiment}, booktitle = {{ICISSP}}, pages = {107--118}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/DebarBT20, author = {Herv{\'{e}} Debar and Razvan Beuran and Yasuo Tan}, title = {A Quantitative Study of Vulnerabilities in the Internet of Medical Things}, booktitle = {{ICISSP}}, pages = {164--175}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/DelongDF20, author = {Maxence Delong and Baptiste David and Eric Filiol}, title = {Detection of Crawler Traps: Formalization and Implementation Defeating Protection on Internet and on the {TOR} Network}, booktitle = {{ICISSP}}, pages = {775--783}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/DiopLLT20, author = {A{\"{\i}}da Diop and Maryline Laurent and Jean Leneutre and Jacques Traor{\'{e}}}, title = {CoRA: {A} Scalable Collective Remote Attestation Protocol for Sensor Networks}, booktitle = {{ICISSP}}, pages = {84--95}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/FacchiniGSD20, author = {Simone Facchini and Giacomo Giorgi and Andrea Saracino and Gianluca Dini}, title = {Multi-level Distributed Intrusion Detection System for an IoT based Smart Home Environment}, booktitle = {{ICISSP}}, pages = {705--712}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/FasanoMMS20, author = {Fausto Fasano and Fabio Martinelli and Francesco Mercaldo and Antonella Santone}, title = {Android Run-time Permission Exploitation User Awareness by Means of Formal Methods}, booktitle = {{ICISSP}}, pages = {804--814}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/FilhoG20, author = {Eduardo Magalh{\~{a}}es De Lacerda Filho and Vin{\'{\i}}cius P. Gon{\c{c}}alves}, title = {Achieving Privacy, Security, and Interoperability among Biometric Networks using Symmetric Encryption}, booktitle = {{ICISSP}}, pages = {481--489}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/FujiiII20, author = {Wataru Fujii and Keiichi Iwamura and Masaki Inamura}, title = {Secure Comparison and Interval Test Protocols based on Three-party {MPC}}, booktitle = {{ICISSP}}, pages = {698--704}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/GencL20, author = {Ziya Alper Gen{\c{c}} and Gabriele Lenzini}, title = {Dual-use Research in Ransomware Attacks: {A} Discussion on Ransomware Defence Intelligence}, booktitle = {{ICISSP}}, pages = {585--592}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/GiorgiSM20, author = {Giacomo Giorgi and Andrea Saracino and Fabio Martinelli}, title = {Email Spoofing Attack Detection through an End to End Authorship Attribution System}, booktitle = {{ICISSP}}, pages = {64--74}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/GiorgiSM20a, author = {Giacomo Giorgi and Andrea Saracino and Fabio Martinelli}, title = {End to End Autorship Email Verification Framework for a Secure Communication}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1545}, pages = {73--96}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/icissp/Gladychev20, author = {Nikolai Gladychev}, title = {Computer Viruses: The Abstract Theory Revisited}, booktitle = {{ICISSP}}, pages = {406--414}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/GuarinoMZCR20, author = {Alfonso Guarino and Delfina Malandrino and Rocco Zaccagnino and Federico Cozza and Antonio Rapuano}, title = {On Analyzing Third-party Tracking via Machine Learning}, booktitle = {{ICISSP}}, pages = {532--539}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/Guerra-Manzanares20, author = {Alejandro Guerra{-}Manzanares and Jorge Medina{-}Galindo and Hayretdin Bahsi and Sven N{\~{o}}mm}, title = {MedBIoT: Generation of an IoT Botnet Dataset in a Medium-sized IoT Network}, booktitle = {{ICISSP}}, pages = {207--218}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/Guerra-Manzanares20a, author = {Alejandro Guerra{-}Manzanares and Jorge Medina{-}Galindo and Hayretdin Bahsi and Sven N{\~{o}}mm}, title = {Using MedBIoT Dataset to Build Effective Machine Learning-Based IoT Botnet Detection Systems}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1545}, pages = {222--243}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/icissp/GuigaR20, author = {Linda Guiga and A. W. Roscoe}, title = {Neural Network Security: Hiding {CNN} Parameters with Guided Grad-CAM}, booktitle = {{ICISSP}}, pages = {611--618}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/GunduM20, author = {Tapiwa Gundu and Nthabiseng Modiba}, title = {Building Competitive Advantage from Ubuntu: An African Information Security Awareness Model}, booktitle = {{ICISSP}}, pages = {569--576}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/GunnarssonG20, author = {Martin Gunnarsson and Christian Gehrmann}, title = {Secure Ownership Transfer for the Internet of Things}, booktitle = {{ICISSP}}, pages = {33--44}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/GunnarssonG20a, author = {Martin Gunnarsson and Christian Gehrmann}, title = {Secure Ownership Transfer for Resource Constrained IoT Infrastructures}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1545}, pages = {22--47}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/icissp/HavurSK20, author = {Giray Havur and Miel Vander Sande and Sabrina Kirrane}, title = {Greater Control and Transparency in Personal Data Processing}, booktitle = {{ICISSP}}, pages = {655--662}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/HegartyH20, author = {Robert Hegarty and John Haggerty}, title = {Presence Metadata in the Internet of Things: Challenges and Opportunities}, booktitle = {{ICISSP}}, pages = {631--638}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/HeidingOWL20, author = {Fredrik Heiding and Mohammad{-}Ali Omer and Andreas Wallstr{\"{o}}m and Robert Lagerstr{\"{o}}m}, title = {Securing IoT Devices using Geographic and Continuous Login Blocking: {A} Honeypot Study}, booktitle = {{ICISSP}}, pages = {424--431}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/HidanoK20, author = {Seira Hidano and Shinsaku Kiyomoto}, title = {Recommender Systems Robust to Data Poisoning using Trim Learning}, booktitle = {{ICISSP}}, pages = {721--724}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/HosseinzadehEJ20, author = {Arghavan Hosseinzadeh and Andreas Eitel and Christian Jung}, title = {A Systematic Approach toward Extracting Technically Enforceable Policies from Data Usage Control Requirements}, booktitle = {{ICISSP}}, pages = {397--405}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/HuttelS20, author = {Hans H{\"{u}}ttel and Vilim Staroveski}, title = {Secrecy and Authenticity Properties of the Lightning Network Protocol}, booktitle = {{ICISSP}}, pages = {119--130}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/HuttelS20a, author = {Hans H{\"{u}}ttel and Vilim Staroveski}, title = {Key Agreement in the Lightning Network Protocol}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1545}, pages = {139--155}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/icissp/JasserK20, author = {Stefanie Jasser and Jonas Kelbert}, title = {An Approach to Secure Legacy Software Systems}, booktitle = {{ICISSP}}, pages = {299--309}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/Jost020, author = {David Jost and Mathias Fischer}, title = {Accountant: Protection of Data Integrity and Identification of Malicious Nodes in In-network Data Processing}, booktitle = {{ICISSP}}, pages = {561--568}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/JurecekL20, author = {Martin Jurecek and R{\'{o}}bert L{\'{o}}rencz}, title = {Distance Metric Learning using Particle Swarm Optimization to Improve Static Malware Detection}, booktitle = {{ICISSP}}, pages = {725--732}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/Katsikas20, author = {Sokratis K. Katsikas}, title = {Leveraging Blockchain Technology to Enhance Security and Privacy in the Internet of Things}, booktitle = {{ICISSP}}, pages = {5}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/Kneuper20, author = {Ralf Kneuper}, title = {Translating Data Protection into Software Requirements}, booktitle = {{ICISSP}}, pages = {257--264}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/KnirschUUE20, author = {Fabian Knirsch and Andreas Unterweger and Maximilian Unterrainer and Dominik Engel}, title = {Comparison of the Paillier and ElGamal Cryptosystems for Smart Grid Aggregation Protocols}, booktitle = {{ICISSP}}, pages = {232--239}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/KotlabaBL20, author = {Luk{\'{a}}s Kotlaba and Simona Buchoveck{\'{a}} and R{\'{o}}bert L{\'{o}}rencz}, title = {Active Directory Kerberoasting Attack: Monitoring and Detection Techniques}, booktitle = {{ICISSP}}, pages = {432--439}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/KrasnowskiLM20, author = {Piotr Krasnowski and J{\'{e}}r{\^{o}}me Lebrun and Bruno Martin}, title = {Introducing a Verified Authenticated Key Exchange Protocol over Voice Channels for Secure Voice Communication}, booktitle = {{ICISSP}}, pages = {683--690}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/LagerstromXE20, author = {Robert Lagerstr{\"{o}}m and Wenjun Xiong and Mathias Ekstedt}, title = {Threat Modeling and Attack Simulations of Smart Cities: {A} Literature Review and Explorative Study}, booktitle = {{ICISSP}}, pages = {369--376}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/LandauerSWHR20, author = {Max Landauer and Florian Skopik and Markus Wurzenberger and Wolfgang Hotwagner and Andreas Rauber}, title = {Visualizing Syscalls using Self-organizing Maps for System Intrusion Detection}, booktitle = {{ICISSP}}, pages = {349--360}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/LathouwersEH20, author = {Sophie Lathouwers and Maarten H. Everts and Marieke Huisman}, title = {Verifying Sanitizer Correctness through Black-Box Learning: {A} Symbolic Finite Transducer Approach}, booktitle = {{ICISSP}}, pages = {784--795}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/LefonsPT20, author = {Ezio Lefons and Sebastiano Pizzutilo and Filippo Tangorra}, title = {Host Fingerprinting for Web Servers Authentication}, booktitle = {{ICISSP}}, pages = {45--51}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/LinFS20, author = {Hsiao{-}Ying Lin and Chengfang Fang and Jie Shi}, title = {Bident Structure for Neural Network Model Protection}, booktitle = {{ICISSP}}, pages = {377--384}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/LindenhoferOP20, author = {Julian Lindenhofer and Rene Offenthaler and Martin Pirker}, title = {A Curious Exploration of Malicious {PDF} Documents}, booktitle = {{ICISSP}}, pages = {577--584}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/ListikSH20, author = {V{\'{\i}}t List{\'{\i}}k and Jan Sediv{\'{y}} and V{\'{a}}clav Hlav{\'{a}}c}, title = {Email Image Spam Classification based on ResNet Convolutional Neural Network}, booktitle = {{ICISSP}}, pages = {457--464}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/MaghrebiA20, author = {Houssem Maghrebi and Davide Alessio}, title = {Revisiting Higher-order Computational Attacks against White-box Implementations}, booktitle = {{ICISSP}}, pages = {265--272}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/MalderleBMW020, author = {Timo Malderle and Felix Boes and Gina Muuss and Matthias W{\"{u}}bbeling and Michael Meier}, title = {Credential Intelligence Agency: {A} Threat Intelligence Approach to Mitigate Identity Theft}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1545}, pages = {115--138}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/icissp/MalderleKLW020, author = {Timo Malderle and Sven Knauer and Martin Lang and Matthias W{\"{u}}bbeling and Michael Meier}, title = {Track Down Identity Leaks using Threat Intelligence}, booktitle = {{ICISSP}}, pages = {96--106}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/MartinelliMRS20, author = {Fabio Martinelli and Francesco Mercaldo and Domenico Raucci and Antonella Santone}, title = {Bank Credit Risk Management based on Data Mining Techniques}, booktitle = {{ICISSP}}, pages = {837--843}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/MauriCD20, author = {Lara Mauri and Stelvio Cimato and Ernesto Damiani}, title = {A Formal Approach for the Analysis of the {XRP} Ledger Consensus Protocol}, booktitle = {{ICISSP}}, pages = {52--63}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/MauriCD20a, author = {Lara Mauri and Stelvio Cimato and Ernesto Damiani}, title = {Untangling the {XRP} Ledger: Insights and Analysis}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1545}, pages = {48--72}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/icissp/MendsaikhanHYS20, author = {Otgonpurev Mendsaikhan and Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada}, title = {Quantifying the Significance of Cybersecurity Text through Semantic Similarity and Named Entity Recognition}, booktitle = {{ICISSP}}, pages = {325--332}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/MoubarakF20, author = {Joanna Moubarak and Tony Feghali}, title = {Comparing Machine Learning Techniques for Malware Detection}, booktitle = {{ICISSP}}, pages = {844--851}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/MoubarakFC20, author = {Joanna Moubarak and Eric Filiol and Maroun Chamoun}, title = {The Blockchain Potential in Computer Virology}, booktitle = {{ICISSP}}, pages = {796--803}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/NisslmuellerF0D20, author = {Utz Nisslmueller and Klaus{-}Tycho Foerster and Stefan Schmid and Christian Decker}, title = {Toward Active and Passive Confidentiality Attacks on Cryptocurrency Off-chain Networks}, booktitle = {{ICISSP}}, pages = {7--14}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/NisslmuellerF0D20a, author = {Utz Nisslmueller and Klaus{-}Tycho Foerster and Stefan Schmid and Christian Decker}, title = {Inferring Sensitive Information in Cryptocurrency Off-Chain Networks Using Probing and Timing Attacks}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1545}, pages = {1--21}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/icissp/NitschkeRHK20, author = {Mirja Nitschke and Christian Roth and Christian Hoyer and Dogan Kesdogan}, title = {Harmonized Group Mix for {ITS}}, booktitle = {{ICISSP}}, pages = {152--163}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/NitschkeRHK20a, author = {Mirja Nitschke and Christian Roth and Christian Hoyer and Dogan Kesdogan}, title = {Harmonic Group Mix: {A} Framework for Anonymous and Authenticated Broadcast Messages in Vehicle-to-Vehicle Environments}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1545}, pages = {178--200}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/icissp/NyblomWKO20, author = {Philip Nyblom and Gaute Wangen and Mazaher Kianpour and Grethe {\O}stby}, title = {The Root Causes of Compromised Accounts at the University}, booktitle = {{ICISSP}}, pages = {540--551}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/OrenderMZ20, author = {Jason Orender and Ravi Mukkamala and Mohammad Zubair}, title = {Is Ethereum's ProgPoW {ASIC} Resistant?}, booktitle = {{ICISSP}}, pages = {310--316}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/OstbyK20, author = {Grethe {\O}stby and Basel Katt}, title = {Maturity Modelling to Prepare for Cyber Crisis Escalation and Management}, booktitle = {{ICISSP}}, pages = {249--256}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/OtungM20, author = {Andikan Otung and Andrew P. Martin}, title = {Distributed Defence of Service (DiDoS): {A} Network-layer Reputation-based DDoS Mitigation Architecture}, booktitle = {{ICISSP}}, pages = {619--630}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/PabloAI20, author = {{\'{A}}lvaro de Pablo and Oscar Araque and Carlos Angel Iglesias}, title = {Radical Text Detection based on Stylometry}, booktitle = {{ICISSP}}, pages = {524--531}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/PfrangMFB20, author = {Steffen Pfrang and David Meier and Andreas Fleig and J{\"{u}}rgen Beyerer}, title = {A Meta Model for a Comprehensive Description of Network Protocols Improving Security Tests}, booktitle = {{ICISSP}}, pages = {671--682}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/PlessingO20, author = {Paul Plessing and Olamide Omolola}, title = {Revisiting Privacy-aware Blockchain Public Key Infrastructure}, booktitle = {{ICISSP}}, pages = {415--423}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/PonsardGP20, author = {Christophe Ponsard and Jeremy Grandclaudon and Nicolas Point}, title = {Methodology and Feedback about Systematic Cybersecurity Experts Auditing in Belgium}, booktitle = {{ICISSP}}, pages = {754--759}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/QbeahAM20, author = {Mohammad Qbea'h and Saed Alrabaee and Djedjiga Mouheb}, title = {An Analytical Scanning Technique to Detect and Prevent the Transformed {SQL} Injection and {XSS} Attacks}, booktitle = {{ICISSP}}, pages = {603--610}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/SbaiDD20, author = {Anass Sbai and Cyril Drocourt and Gilles Dequen}, title = {{CCA} Secure Unidirectional {PRE} with Key Pair in the Standard Model without Pairings}, booktitle = {{ICISSP}}, pages = {440--447}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/ScholnastTK20, author = {Hubert Sch{\"{o}}lnast and Paul Tavolato and Philipp Kreimel}, title = {Anomaly Detection in Communication Networks of Cyber-physical Systems using Cross-over Data Compression}, booktitle = {{ICISSP}}, pages = {498--505}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/SnymanK20, author = {Dirk Snyman and Hennie A. Kruger}, title = {External Contextual Factors in Information Security Behaviour}, booktitle = {{ICISSP}}, pages = {185--194}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/SnymanK20a, author = {Dirk Snyman and Hennie A. Kruger}, title = {Contextual Factors in Information Security Group Behaviour: {A} Comparison of Two Studies}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1545}, pages = {201--221}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/icissp/StachGW0M20, author = {Christoph Stach and Corinna Giebler and Manuela Wagner and Christian Weber and Bernhard Mitschang}, title = {{AMNESIA:} {A} Technical Solution towards GDPR-compliant Machine Learning}, booktitle = {{ICISSP}}, pages = {21--32}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/SultanJ20, author = {Shizra Sultan and Christian Damsgaard Jensen}, title = {Privacy-preserving Measures in Smart City Video Surveillance Systems}, booktitle = {{ICISSP}}, pages = {506--514}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/SunDGCGRMTAL20, author = {Tithnara Nicolas Sun and Bastien Drouot and Fahad Rafique Golra and Jo{\"{e}}l Champeau and Sylvain Gu{\'{e}}rin and Luka Le Roux and Ra{\'{u}}l Mazo and Ciprian Teodorov and Lionel Van Aertryck and Bernard L'Hostis}, title = {A Domain-specific Modeling Framework for Attack Surface Modeling}, booktitle = {{ICISSP}}, pages = {341--348}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/SundstromLPP20, author = {Andrew Sundstrom and Damas W. Limoge and Vadim Pinskiy and Matthew Putman}, title = {Securing Industrial Production from Sophisticated Cyberattacks}, booktitle = {{ICISSP}}, pages = {663--670}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/SymeonidisL20, author = {Iraklis Symeonidis and Gabriele Lenzini}, title = {Systematization of Threats and Requirements for Private Messaging with Untrusted Servers: The Case of e-Mailing and Instant Messaging}, booktitle = {{ICISSP}}, pages = {593--602}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/TantikulN20, author = {Phitchayaphong Tantikul and Sudsanguan Ngamsuriyaroj}, title = {Exploring Vulnerabilities in Solidity Smart Contract}, booktitle = {{ICISSP}}, pages = {317--324}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/TeradoH20, author = {Ryosuke Terado and Morihiro Hayashida}, title = {Improving Accuracy and Speed of Network-based Intrusion Detection using Gradient Boosting Trees}, booktitle = {{ICISSP}}, pages = {490--497}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/ThompsonE20, author = {Andreas Thompson and Gencer Erdogan}, title = {Tool Support for Risk-driven Planning of Trustworthy Smart IoT Systems within DevOps}, booktitle = {{ICISSP}}, pages = {742--753}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/Tochikubo20, author = {Kouya Tochikubo}, title = {New General Secret Sharing Scheme using Hierarchical Threshold Scheme: Improvement of Information Rates for Specified Participants}, booktitle = {{ICISSP}}, pages = {647--654}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/UwizeyemunguP20, author = {Sylvestre Uwizeyemungu and Placide Poba{-}Nzaou}, title = {Privacy with Health Information Technologies: What Story Do Data Breaches in {US} Tell Us?}, booktitle = {{ICISSP}}, pages = {131--141}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/WirtzH20, author = {Roman Wirtz and Maritta Heisel}, title = {Risk Identification: From Requirements to Threat Models}, booktitle = {{ICISSP}}, pages = {385--396}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/WodoS20, author = {Wojciech Wodo and Damian Stygar}, title = {Security of Digital Banking Systems in Poland: Users Study 2019}, booktitle = {{ICISSP}}, pages = {221--231}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/XuZ20, author = {Shuaijianni Xu and Liang Feng Zhang}, title = {A Homomorphic Proxy Re-authenticators based Efficient Multi-client Non-interactive Verifiable Computation Scheme}, booktitle = {{ICISSP}}, pages = {195--206}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/ZhouHKI20, author = {Jiaxing Zhou and Miyuki Hirose and Yoshio Kakizaki and Atsuo Inomata}, title = {Evaluation to Classify Ransomware Variants based on Correlations between APIs}, booktitle = {{ICISSP}}, pages = {465--472}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/ZinsmaierLW20, author = {Sandra Domenique Zinsmaier and Hanno Langweg and Marcel Waldvogel}, title = {A Practical Approach to Stakeholder-driven Determination of Security Requirements based on the {GDPR} and Common Criteria}, booktitle = {{ICISSP}}, pages = {473--480}, publisher = {{SCITEPRESS}}, year = {2020} }
@proceedings{DBLP:conf/icissp/2019s, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1221}, publisher = {Springer}, year = {2020} }
@proceedings{DBLP:conf/icissp/2020, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/icissp/0001MFKT19, author = {Partha Sarathi Roy and Kirill Morozov and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, title = {Security Analysis and Efficient Implementation of Code-based Signature Schemes}, booktitle = {{ICISSP}}, pages = {213--220}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/0002F19, author = {Carlos Moreno and Sebastian Fischmeister}, title = {Sender Authentication for Automotive In-Vehicle Networks through Dual Analog Measurements to Determine the Location of the Transmitter}, booktitle = {{ICISSP}}, pages = {596--605}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/0006EVRDM19, author = {Gaurav Sharma and Soultana Ellinidou and Tristan Vanspouwen and Th{\'{e}}o Rigas and Jean{-}Michel Dricot and Olivier Markowitch}, title = {Identity-based {TLS} for Cloud of Chips}, booktitle = {{ICISSP}}, pages = {44--54}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/AkkuzuAA19, author = {Gulsum Akkuzu and Benjamin Aziz and Mo Adda}, title = {Fuzzy Logic Decision based Collaborative Privacy Management Framework for Online Social Networks}, booktitle = {{ICISSP}}, pages = {674--684}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/Al-MaweeBCM19, author = {Wassnaa Al{-}Mawee and Paul J. Bonamy and Steve Carr and Jean Mayo}, title = {Maia: {A} Language for Mandatory Integrity Controls of Structured Data}, booktitle = {{ICISSP}}, pages = {257--265}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/Al-WahahF19, author = {Mouiad Al{-}Wahah and Csilla Farkas}, title = {Monotonic and Non-monotonic Context Delegation}, booktitle = {{ICISSP}}, pages = {449--460}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/AlmarwaniKL19, author = {Maryam Almarwani and Boris Konev and Alexei Lisitsa}, title = {Flexible Access Control and Confidentiality over Encrypted Data for Document-based Database}, booktitle = {{ICISSP}}, pages = {606--614}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/AlmarwaniKL19a, author = {Maryam Almarwani and Boris Konev and Alexei Lisitsa}, title = {Fine-Grained Access Control for Querying Over Encrypted Document-Oriented Database}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {403--425}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/icissp/AlotaibiAFC19, author = {Saud Alotaibi and Abdulrahman Alruban and Steven Furnell and Nathan L. Clarke}, title = {A Novel Behaviour Profiling Approach to Continuous Authentication for Mobile Applications}, booktitle = {{ICISSP}}, pages = {246--251}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/AnagrehVL19, author = {Mohammad Anagreh and Eero Vainikko and Peeter Laud}, title = {Accelerate Performance for Elliptic Curve Scalar Multiplication based on {NAF} by Parallel Computing}, booktitle = {{ICISSP}}, pages = {238--245}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/AugotCG19, author = {Daniel Augot and Herv{\'{e}} Chabanne and William George}, title = {Practical Solutions to Save Bitcoins Applied to an Identity System Proposal}, booktitle = {{ICISSP}}, pages = {511--518}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/BajanKD19, author = {Pierre{-}Marie Bajan and Christophe Kiennert and Herv{\'{e}} Debar}, title = {Methodology of a Network Simulation in the Context of an Evaluation: Application to an {IDS}}, booktitle = {{ICISSP}}, pages = {378--388}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/BartoliniCM19, author = {Cesare Bartolini and Antonello Calabr{\`{o}} and Eda Marchetti}, title = {Enhancing Business Process Modelling with Data Protection Compliance: An Ontology-based Proposal}, booktitle = {{ICISSP}}, pages = {421--428}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/Ben-BassatR19, author = {Ilan Ben{-}Bassat and Erez Rokah}, title = {Locality-Sensitive Hashing for Efficient Web Application Security Testing}, booktitle = {{ICISSP}}, pages = {193--204}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/BernardeschiDP19, author = {Cinzia Bernardeschi and Andrea Domenici and Maurizio Palmieri}, title = {Modeling and Simulation of Attacks on Cyber-physical Systems}, booktitle = {{ICISSP}}, pages = {700--708}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/BhodiaPTS19, author = {Niket Bhodia and Pratikkumar Prajapati and Fabio Di Troia and Mark Stamp}, title = {Transfer Learning for Image-based Malware Classification}, booktitle = {{ICISSP}}, pages = {719--726}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/BisphamAG19, author = {Mary K. Bispham and Ioannis Agrafiotis and Michael Goldsmith}, title = {Nonsense Attacks on Google Assistant and Missense Attacks on Amazon Alexa}, booktitle = {{ICISSP}}, pages = {75--87}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/BisphamAG19a, author = {Mary K. Bispham and Ioannis Agrafiotis and Michael Goldsmith}, title = {Attack and Defence Modelling for Attacks via the Speech Interface}, booktitle = {{ICISSP}}, pages = {519--527}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/BisphamAG19b, author = {Mary K. Bispham and Ioannis Agrafiotis and Michael Goldsmith}, title = {The Security of the Speech Interface: {A} Modelling Framework and Proposals for New Defence Mechanisms}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {288--316}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/icissp/BisphamRAG19, author = {Mary K. Bispham and Alastair Janse van Rensburg and Ioannis Agrafiotis and Michael Goldsmith}, title = {Black-Box Attacks via the Speech Interface Using Linguistically Crafted Input}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {93--120}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/icissp/Blumbergs19, author = {Bernhards Blumbergs}, title = {Remote Exploit Development for Cyber Red Team Computer Network Operations Targeting Industrial Control Systems}, booktitle = {{ICISSP}}, pages = {88--99}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/BodeiG19, author = {Chiara Bodei and Letterio Galletta}, title = {Tracking Data Trajectories in IoT}, booktitle = {{ICISSP}}, pages = {572--579}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/BodeiG19a, author = {Chiara Bodei and Letterio Galletta}, title = {Analysing the Provenance of IoT Data}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {358--381}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/icissp/BracamonteHTK19, author = {Vanessa Bracamonte and Seira Hidano and Welderufael B. Tesfay and Shinsaku Kiyomoto}, title = {Evaluating Privacy Policy Summarization: An Experimental Study among Japanese Users}, booktitle = {{ICISSP}}, pages = {370--377}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/BracamonteHTK19a, author = {Vanessa Bracamonte and Seira Hidano and Welderufael B. Tesfay and Shinsaku Kiyomoto}, title = {User Study of the Effectiveness of a Privacy Policy Summarization Tool}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {186--206}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/icissp/BrunnerKE19, author = {Clemens Brunner and Fabian Knirsch and Dominik Engel}, title = {{SPROOF:} {A} Platform for Issuing and Verifying Documents in a Public Blockchain}, booktitle = {{ICISSP}}, pages = {15--25}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/BrunnerKE19a, author = {Clemens Brunner and Fabian Knirsch and Dominik Engel}, title = {{SPROOF:} {A} Decentralized Platform for Attribute-Based Authentication}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {1--23}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/icissp/Buchanan19, author = {Bill Buchanan}, title = {Building the Future: Tokenization, Blockchain and Citizen-focused Systems}, booktitle = {{ICISSP}}, pages = {5}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/ButunG19, author = {Ismail Butun and Mikael Gidlund}, title = {Location Privacy Assured Internet of Things}, booktitle = {{ICISSP}}, pages = {623--630}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/CaiWZSH19, author = {Jiahao Cai and Zihao Wei and Yingjie Zhang and Siwei Sun and Lei Hu}, title = {Zero-sum Distinguishers for Round-reduced {GIMLI} Permutation}, booktitle = {{ICISSP}}, pages = {38--43}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/CatuognoG19, author = {Luigi Catuogno and Clemente Galdi}, title = {A Fine-grained General Purpose Secure Storage Facility for Trusted Execution Environment}, booktitle = {{ICISSP}}, pages = {588--595}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/CatuognoG19a, author = {Luigi Catuogno and Clemente Galdi}, title = {Improving Interoperability in Multi-domain Enterprise Right Management Applications}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {382--402}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/icissp/ChabanneDR19, author = {Herv{\'{e}} Chabanne and Emmanuelle Dottax and Franck Rondepierre}, title = {Smart-card Deployment of an Electronic Voting Protocol}, booktitle = {{ICISSP}}, pages = {503--510}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/ChamatidisS19, author = {Ilias Chamatidis and Georgios P. Spathoulas}, title = {Machine Learning for All: {A} More Robust Federated Learning Framework}, booktitle = {{ICISSP}}, pages = {544--551}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/ChavanTS19, author = {Neeraj Chavan and Fabio Di Troia and Mark Stamp}, title = {A Comparative Analysis of Android Malware}, booktitle = {{ICISSP}}, pages = {664--673}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/CorayCS19, author = {Sein Coray and Iwen Coisel and Ignacio Sanchez}, title = {Improved Forensic Recovery of {PKZIP} Stream Cipher Passwords}, booktitle = {{ICISSP}}, pages = {328--335}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/CostaBT19, author = {Lu{\'{\i}}s Costa and Jo{\~{a}}o Paulo Barros and Miguel Tavares}, title = {Vulnerabilities in IoT Devices for Smart Home Environment}, booktitle = {{ICISSP}}, pages = {615--622}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/DaoudaghLM19, author = {Said Daoudagh and Francesca Lonetti and Eda Marchetti}, title = {A Decentralized Solution for Combinatorial Testing of Access Control Engine}, booktitle = {{ICISSP}}, pages = {126--135}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/DaoudaghLM19a, author = {Said Daoudagh and Francesca Lonetti and Eda Marchetti}, title = {A General Framework for Decentralized Combinatorial Testing of Access Control Engine: Examples of Application}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {207--229}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/icissp/EzureI19, author = {Takuya Ezure and Masaki Inamura}, title = {An Order-specified Aggregate Authority-transfer Signature}, booktitle = {{ICISSP}}, pages = {309--318}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/EzureI19a, author = {Takuya Ezure and Masaki Inamura}, title = {Proposal and Performance Evaluation of an Order-Specified Aggregate Authority-Transfer Signature}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {121--136}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/icissp/FallK19, author = {Doudou Fall and Youki Kadobayashi}, title = {The Common Vulnerability Scoring System vs. Rock Star Vulnerabilities: Why the Discrepancy?}, booktitle = {{ICISSP}}, pages = {405--411}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/FasanoMMNS19, author = {Fausto Fasano and Fabio Martinelli and Francesco Mercaldo and Vittoria Nardone and Antonella Santone}, title = {Spyware Detection using Temporal Logic}, booktitle = {{ICISSP}}, pages = {690--699}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/FiliolH19, author = {Eric Filiol and Abhilash Hota}, title = {Solving a Hard Instance of Suspicious Behaviour Detection with Sparse Binary Vectors Clustering}, booktitle = {{ICISSP}}, pages = {635--644}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/FrumentoD19, author = {Enrico Frumento and Carlo Dambra}, title = {The {HERMENEUT} Project: Enterprises Intangible Risk Management via Economic Models based on Simulation of Modern Cyber Attacks}, booktitle = {{ICISSP}}, pages = {495--502}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/Fukushima0NFKG19, author = {Kazuhide Fukushima and Damien Marion and Yuto Nakano and Adrien Facon and Shinsaku Kiyomoto and Sylvain Guilley}, title = {Experiment on Side-Channel Key-Recovery using a Real {LPWA} End-device}, booktitle = {{ICISSP}}, pages = {67--74}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/Fukushima0NFKG19a, author = {Kazuhide Fukushima and Damien Marion and Yuto Nakano and Adrien Facon and Shinsaku Kiyomoto and Sylvain Guilley}, title = {Evaluation of Side-Channel Key-Recovery Attacks on LoRaWAN End-Device}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {74--92}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/icissp/GrosseNS19, author = {Christine Gro{\ss}e and Maja Nyman and Leif Sundberg}, title = {Information Technology Consulting Firms' Readiness for Managing Information Security Incidents}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {48--73}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/icissp/GuanGL0K19, author = {Zhi Guan and Abba Garba and Anran Li and Zhong Chen and Nesrine Kaaniche}, title = {AuthLedger: {A} Novel Blockchain-based Domain Name Authentication Scheme}, booktitle = {{ICISSP}}, pages = {345--352}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/Guerra-Manzanares19, author = {Alejandro Guerra{-}Manzanares and Sven N{\~{o}}mm and Hayretdin Bahsi}, title = {In-depth Feature Selection and Ranking for Automated Detection of Mobile Malware}, booktitle = {{ICISSP}}, pages = {274--283}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/HormannF19, author = {Ricardo Hormann and Eric Fischer}, title = {Detecting Anomalies by using Self-Organizing Maps in Industrial Environments}, booktitle = {{ICISSP}}, pages = {336--344}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/HotaI19, author = {Abhilash Hota and Paul Irolla}, title = {Deep Neural Networks for Android Malware Detection}, booktitle = {{ICISSP}}, pages = {657--663}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/Irolla19, author = {Paul Irolla}, title = {Systematic Characterization of a Sequence Group}, booktitle = {{ICISSP}}, pages = {645--656}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/JensenKG19, author = {Meiko Jensen and Sahil Kapila and Nils Gruschka}, title = {Towards Aligning {GDPR} Compliance with Software Development: {A} Research Agenda}, booktitle = {{ICISSP}}, pages = {389--396}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/KatsikeasJHL19, author = {Sotirios Katsikeas and Pontus Johnson and Simon Hacks and Robert Lagerstr{\"{o}}m}, title = {Probabilistic Modeling and Simulation of Vehicular Cyber Attacks: An Application of the Meta Attack Language}, booktitle = {{ICISSP}}, pages = {175--182}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/KhanNB19, author = {Nadir Khan and Sven Nitzsche and J{\"{u}}rgen Becker}, title = {A Secure Framework with Remote Configuration of Intellectual Property}, booktitle = {{ICISSP}}, pages = {564--571}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/KiperbergLRAZ19, author = {Michael Kiperberg and Roee Leon and Amit Resh and Asaf Algawi and Nezer Zaidenberg}, title = {Hypervisor-assisted Atomic Memory Acquisition in Modern Systems}, booktitle = {{ICISSP}}, pages = {155--162}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/KiwanukaAAPF19, author = {Fred N. Kiwanuka and Ja'far Alqatawna and Anang Hudaya Muhamad Amin and Sujni Paul and Hossam Faris}, title = {Towards Automated Comprehensive Feature Engineering for Spam Detection}, booktitle = {{ICISSP}}, pages = {429--437}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/LestyanABS19, author = {Szilvia Lestyan and Gergely {\'{A}}cs and Gergely Bicz{\'{o}}k and Zsolt Szalay}, title = {Extracting Vehicle Sensor Signals from {CAN} Logs for Driver Re-identification}, booktitle = {{ICISSP}}, pages = {136--145}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/ListikLSH19, author = {V{\'{\i}}t List{\'{\i}}k and Simon Let and Jan Sediv{\'{y}} and V{\'{a}}clav Hlav{\'{a}}c}, title = {Phishing Email Detection based on Named Entity Recognition}, booktitle = {{ICISSP}}, pages = {252--256}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/Loutfi19, author = {Ijlal Loutfi}, title = {SMMDecoy: Detecting {GPU} Keyloggers using Security by Deception Techniques}, booktitle = {{ICISSP}}, pages = {580--587}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/MadhusudanSMZP19, author = {Akash Madhusudan and Iraklis Symeonidis and Mustafa A. Mustafa and Ren Zhang and Bart Preneel}, title = {SC2Share: Smart Contract for Secure Car Sharing}, booktitle = {{ICISSP}}, pages = {163--171}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/MashhadaniCL19, author = {Shahlaa Mashhadani and Nathan L. Clarke and Fudong Li}, title = {Identification and Extraction of Digital Forensic Evidence from Multimedia Data Sources using Multi-algorithmic Fusion}, booktitle = {{ICISSP}}, pages = {438--448}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/MeinigTM19, author = {Michael Meinig and Peter Tr{\"{o}}ger and Christoph Meinel}, title = {Finding Classification Zone Violations with Anonymized Message Flow Analysis}, booktitle = {{ICISSP}}, pages = {284--292}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/MohassebAJL19, author = {Alaa Mohasseb and Benjamin Aziz and Jeyong Jung and Julak Lee}, title = {Predicting CyberSecurity Incidents using Machine Learning Algorithms: {A} Case Study of Korean SMEs}, booktitle = {{ICISSP}}, pages = {230--237}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/MoriK19, author = {Takafumi Mori and Hiroaki Kikuchi}, title = {Robust Person Identification based on {DTW} Distance of Multiple-Joint Gait Pattern}, booktitle = {{ICISSP}}, pages = {221--229}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/MucciB19, author = {Daniele Mucci and Bernhards Blumbergs}, title = {{TED:} {A} Container based Tool to Perform Security Risk Assessment for {ELF} Binaries}, booktitle = {{ICISSP}}, pages = {361--369}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/NguyenRMD19, author = {Hoai Phuong Nguyen and Florent Retraint and Fr{\'{e}}d{\'{e}}ric Morain{-}Nicolier and Agn{\`{e}}s Delahaies}, title = {An Image Forgery Detection Solution based on {DCT} Coefficient Analysis}, booktitle = {{ICISSP}}, pages = {487--494}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/NymanG19, author = {Maja Nyman and Christine Gro{\ss}e}, title = {Are You Ready When It Counts? {IT} Consulting Firm's Information Security Incident Management}, booktitle = {{ICISSP}}, pages = {26--37}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/OlukoyaMO19, author = {Oluwafemi Olukoya and Lewis Mackenzie and Inah Omoronyia}, title = {Permission-based Risk Signals for App Behaviour Characterization in Android Apps}, booktitle = {{ICISSP}}, pages = {183--192}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/OudahGB19, author = {Hussein Oudah and Bogdan V. Ghita and Taimur Bakhshi}, title = {A Novel Features Set for Internet Traffic Classification using Burstiness}, booktitle = {{ICISSP}}, pages = {397--404}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/PatzerLMB19, author = {Florian Patzer and Philipp L{\"{u}}dtke and Ankush Meshram and J{\"{u}}rgen Beyerer}, title = {Context-Aware Software-Defined Networking for Automated Incident Response in Industrial Networks}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {137--161}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/icissp/PatzerMH19, author = {Florian Patzer and Ankush Meshram and Maximilian He{\ss}}, title = {Automated Incident Response for Industrial Control Systems Leveraging Software-defined Networking}, booktitle = {{ICISSP}}, pages = {319--327}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/PfrangGBMB19, author = {Steffen Pfrang and Mark Giraud and Anne Borcherding and David Meier and J{\"{u}}rgen Beyerer}, title = {Design of an Example Network Protocol for Security Tests Targeting Industrial Automation Systems}, booktitle = {{ICISSP}}, pages = {727--738}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/Pietro19, author = {Roberto Di Pietro}, title = {Next Generation Information Warfare: Challenges and Research Directions}, booktitle = {{ICISSP}}, pages = {7--8}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/PietroCR19, author = {Roberto Di Pietro and Maurantonio Caprolu and Simone Raponi}, title = {Next Generation Information Warfare: Rationales, Scenarios, Threats, and Open Issues}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {24--47}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/icissp/PonsardG19, author = {Christophe Ponsard and Jeremy Grandclaudon}, title = {Guidelines and Tool Support for Building a Cybersecurity Awareness Program for SMEs}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {335--357}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/icissp/PonsardGB19, author = {Christophe Ponsard and Jeremy Grandclaudon and S{\'{e}}bastien Bal}, title = {Survey and Lessons Learned on Raising {SME} Awareness about Cybersecurity}, booktitle = {{ICISSP}}, pages = {558--563}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/Quirchmayr19, author = {Gerald Quirchmayr}, title = {Challenges of {GDPR} and the {NIS} Directive}, booktitle = {{ICISSP}}, pages = {9}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/Reza0E19, author = {Khondker Jahid Reza and Md Zahidul Islam and Vladimir Estivill{-}Castro}, title = {Privacy Preservation of Social Network Users Against Attribute Inference Attacks via Malicious Data Mining}, booktitle = {{ICISSP}}, pages = {412--420}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/Reza0E19a, author = {Khondker Jahid Reza and Md Zahidul Islam and Vladimir Estivill{-}Castro}, title = {Protection of User-Defined Sensitive Attributes on Online Social Networks Against Attribute Inference Attack via Adversarial Data Mining}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {230--249}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/icissp/SaadBE19, author = {Sherif Saad and William Briguglio and Haytham Elmiligi}, title = {The Curious Case of Machine Learning in Malware Detection}, booktitle = {{ICISSP}}, pages = {528--535}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/SaaudiTF19, author = {Ahmed Saaudi and Yan Tong and Csilla Farkas}, title = {Probabilistic Graphical Model on Detecting Insiders: Modeling with {SGD-HMM}}, booktitle = {{ICISSP}}, pages = {461--470}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/SatoHT19, author = {Yuya Sato and Hirokazu Hasegawa and Hiroki Takakura}, title = {Construction of Secure Internal Networks with Communication Classifying System}, booktitle = {{ICISSP}}, pages = {552--557}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/SchwittmannWW19, author = {Lorenz Schwittmann and Matth{\"{a}}us Wander and Torben Weis}, title = {Mobile Devices as Digital Sextants for Zero-Permission Geolocation}, booktitle = {{ICISSP}}, pages = {55--66}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/SnymanK19, author = {Dirk Snyman and Hennie A. Kruger}, title = {Theorising on Information Cascades and Sequential Decision-making for Analysing Security Behaviour}, booktitle = {{ICISSP}}, pages = {205--212}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/Sonntag19, author = {Michael Sonntag}, title = {Malicious {DNS} Traffic in Tor: Analysis and Countermeasures}, booktitle = {{ICISSP}}, pages = {536--543}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/SpagnueloFL19, author = {Dayana Spagnuelo and Ana Ferreira and Gabriele Lenzini}, title = {Accomplishing Transparency within the General Data Protection Regulation}, booktitle = {{ICISSP}}, pages = {114--125}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/SpagnueloFL19a, author = {Dayana Spagnuelo and Ana Ferreira and Gabriele Lenzini}, title = {Transparency Enhancing Tools and the {GDPR:} Do They Match?}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {162--185}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/icissp/TavolatoT19, author = {Paul Tavolato and Christina Tavolato{-}W{\"{o}}tzl}, title = {Analytical Modelling of Cyber-physical Systems}, booktitle = {{ICISSP}}, pages = {685--689}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/TorresSAP19, author = {Jos{\'{e}} Torres and Sergio de los Santos and Efthimios Alepis and Constantinos Patsakis}, title = {Behavioral Biometric Authentication in Android Unlock Patterns through Machine Learning}, booktitle = {{ICISSP}}, pages = {146--154}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/TorresSAP19a, author = {Jos{\'{e}} Torres and Sergio de los Santos and Efthimios Alepis and Constantinos Patsakis}, title = {User Behavioral Biometrics and Machine Learning Towards Improving User Authentication in Smartphones}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {250--271}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/icissp/UlzFPS19, author = {Thomas Ulz and Markus Feldbacher and Thomas W. Pieber and Christian Steger}, title = {Sensing Danger: Exploiting Sensors to Build Covert Channels}, booktitle = {{ICISSP}}, pages = {100--113}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/VendittiF19, author = {Antonello Venditti and Fausto Fasano}, title = {A Systematic Approach to Choose the Data Warehouse Architecture}, booktitle = {{ICISSP}}, pages = {711--718}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/WahshehL19, author = {Heider A. M. Wahsheh and Flaminia L. Luccio}, title = {Evaluating Security, Privacy and Usability Features of {QR} Code Readers}, booktitle = {{ICISSP}}, pages = {266--273}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/WeinhardtO19, author = {Stephanie Weinhardt and Olamide Omolola}, title = {Usability of Policy Authoring Tools: {A} Layered Approach}, booktitle = {{ICISSP}}, pages = {301--308}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/XiongKL19, author = {Wenjun Xiong and Fredrik Krantz and Robert Lagerstr{\"{o}}m}, title = {Threat Modeling and Attack Simulations of Connected Vehicles: {A} Research Outlook}, booktitle = {{ICISSP}}, pages = {479--486}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/XiongKL19a, author = {Wenjun Xiong and Fredrik Krantz and Robert Lagerstr{\"{o}}m}, title = {Threat Modeling and Attack Simulations of Connected Vehicles: Proof of Concept}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {272--287}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/icissp/YamadaKMI19, author = {Michihiro Yamada and Hiroaki Kikuchi and Naoki Matsuyama and Koji Inui}, title = {Mathematical Model to Estimate Loss by Cyber Incident in Japan}, booktitle = {{ICISSP}}, pages = {353--360}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/YonamineKMT19, author = {Shun Yonamine and Youki Kadobayashi and Daisuke Miyamoto and Yuzo Taenaka}, title = {Towards Automated Characterization of Malware's High-level Mechanism using Virtual Machine Introspection}, booktitle = {{ICISSP}}, pages = {471--478}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/YoshinoSNS19, author = {Masayuki Yoshino and Takayuki Suzuki and Ken Naganuma and Hisayoshi Sato}, title = {Definition and Efficient Construction of Encrypted k-anonymization Scheme}, booktitle = {{ICISSP}}, pages = {293--300}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/ZaidenbergKYLAR19, author = {Nezer Jacob Zaidenberg and Michael Kiperberg and Raz Ben Yehuda and Roee Leon and Asaf Algawi and Amit Resh}, title = {Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {317--334}, publisher = {Springer}, year = {2019} }
@proceedings{DBLP:conf/icissp/2018s, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {977}, publisher = {Springer}, year = {2019} }
@proceedings{DBLP:conf/icissp/2019, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, publisher = {SciTePress}, year = {2019} }
@inproceedings{DBLP:conf/icissp/AbomharaKOH18, author = {Mohamed Abomhara and Geir M. K{\o}ien and Vladimir A. Oleshchuk and Mohamed Hamid}, title = {Towards Risk-aware Access Control Framework for Healthcare Information Sharing}, booktitle = {{ICISSP}}, pages = {312--321}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/AburawiLC18, author = {Nahla Aburawi and Alexei Lisitsa and Frans Coenen}, title = {Querying Encrypted Graph Databases}, booktitle = {{ICISSP}}, pages = {447--451}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/Alepis18, author = {Efthimios Alepis}, title = {Notify This: Exploiting Android Notifications for Fun and Profit}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {86--108}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icissp/AlpersPOR18, author = {Sascha Alpers and Roman Pilipchuk and Andreas Oberweis and Ralf H. Reussner}, title = {Identifying Needs for a Holistic Modelling Approach to Privacy Aspects in Enterprise Software Systems}, booktitle = {{ICISSP}}, pages = {74--82}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/AlpersPOR18a, author = {Sascha Alpers and Roman Pilipchuk and Andreas Oberweis and Ralf H. Reussner}, title = {The Current State of the Holistic Privacy and Security Modelling Approach in Business Process and Software Architecture Modelling}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {109--124}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icissp/AlqahtaniCHG18, author = {Ohud Alqahtani and Zhiyuan Chen and Qiong Huang and Karthik Gottipati}, title = {Is Bigger Safer? Analyzing Factors Related to Data Breaches using Publicly Available Information}, booktitle = {{ICISSP}}, pages = {373--378}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/AlshehriCB18, author = {Abdullah Alshehri and Frans Coenen and Danushka Bollegala}, title = {Spectral Analysis of Keystroke Streams: Towards Effective Real-time Continuous User Authentication}, booktitle = {{ICISSP}}, pages = {62--73}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/AlvesM18, author = {Thiago Alves and Thomas H. Morris}, title = {Hardware-based Cyber Threats}, booktitle = {{ICISSP}}, pages = {259--266}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/Anderson18, author = {Ross Anderson}, title = {Sustainable Security - an Internet of Durable Goods}, booktitle = {{ICISSP}}, pages = {7}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/BacciBMMMV18, author = {Alessandro Bacci and Alberto Bartoli and Fabio Martinelli and Eric Medvet and Francesco Mercaldo and Corrado Aaron Visaggio}, title = {Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis}, booktitle = {{ICISSP}}, pages = {379--385}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/BacciMMM18, author = {Alessandro Bacci and Fabio Martinelli and Eric Medvet and Francesco Mercaldo}, title = {VizMal: {A} Visualization Tool for Analyzing the Behavior of Android Malware}, booktitle = {{ICISSP}}, pages = {517--525}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/BadjiD18, author = {Radja Badji and Fida Kamal Dankar}, title = {A Risk-aware Access Control Model for Biomedical Research Platforms}, booktitle = {{ICISSP}}, pages = {322--328}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/BarrosL18, author = {Martina J. Zucule de Barros and Horst Lazarek}, title = {A Cyber Safety Model for Schools in Mozambique}, booktitle = {{ICISSP}}, pages = {251--258}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/CalderonHYS18, author = {Paul Calderon and Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada}, title = {Malware Detection based on {HTTPS} Characteristic via Machine Learning}, booktitle = {{ICISSP}}, pages = {410--417}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/DagherMMM18, author = {Gaby G. Dagher and Praneeth Babu Marella and Matea Milojkovic and Jordan Mohler}, title = {BroncoVote: Secure Voting System using Ethereum's Blockchain}, booktitle = {{ICISSP}}, pages = {96--107}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/DeyBS18, author = {Alexandre Dey and Loic Beheshti and Marie{-}Kerguelen Sido}, title = {Health State of Google's PlayStore - Finding Malware in Large Sets of Applications from the Android Market}, booktitle = {{ICISSP}}, pages = {538--544}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/DieschPK18, author = {Rainer Diesch and Matthias Pfaff and Helmut Krcmar}, title = {Prerequisite to Measure Information Security - {A} State of the Art Literature Review}, booktitle = {{ICISSP}}, pages = {207--215}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/EiblBE18, author = {G{\"{u}}nther Eibl and Sebastian Burkhart and Dominik Engel}, title = {Unsupervised Holiday Detection from Low-resolution Smart Metering Data}, booktitle = {{ICISSP}}, pages = {477--486}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/EiblBE18a, author = {G{\"{u}}nther Eibl and Sebastian Burkhart and Dominik Engel}, title = {Insights into Unsupervised Holiday Detection from Low-Resolution Smart Metering Data}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {281--302}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icissp/EignerKT18, author = {Oliver Eigner and Philipp Kreimel and Paul Tavolato}, title = {Attacks on Industrial Control Systems - Modeling and Anomaly Detection}, booktitle = {{ICISSP}}, pages = {581--588}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/EreminK18, author = {Aleksandr Eremin and Konstantin Kogos}, title = {Incoming Call Implicit User Authentication - User Authentication via Hand Movement Pattern}, booktitle = {{ICISSP}}, pages = {24--29}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/EreminKV18, author = {Aleksandr Eremin and Konstantin Kogos and Yana Valatskayte}, title = {Touch and Move: Incoming Call User Authentication}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {26--39}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icissp/FerreiraM18, author = {Ana Ferreira and Pedro Manuel Vieira Marques}, title = {Phishing Through Time: {A} Ten Year Story based on Abstracts}, booktitle = {{ICISSP}}, pages = {225--232}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/FiliolJD18, author = {Eric Filiol and J. Nicolas and Maxence Delong}, title = {Statistical and Combinatorial Analysis of the {TOR} Routing Protocol - Structural Weaknesses Identified in the {TOR} Network}, booktitle = {{ICISSP}}, pages = {507--516}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/Fortuna0B18, author = {Pedro Fortuna and Nuno Pereira and Ismail Butun}, title = {A Framework for Web Application Integrity}, booktitle = {{ICISSP}}, pages = {487--493}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/FredjLC18, author = {Feten Ben Fredj and Nadira Lammari and Isabelle Comyn{-}Wattiau}, title = {Relational Database Anonymization - {A} Model-driven Guiding Approach}, booktitle = {{ICISSP}}, pages = {161--170}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/GaoW18, author = {Yuanyuan Gao and Kunpeng Wang}, title = {Probability Preservation Property with Relative Error and Its Applications}, booktitle = {{ICISSP}}, pages = {461--468}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/GencLRS18, author = {Ziya Alper Gen{\c{c}} and Gabriele Lenzini and Peter Y. A. Ryan and Itzel V{\'{a}}zquez Sandoval}, title = {A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System}, booktitle = {{ICISSP}}, pages = {83--95}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/GencLRS18a, author = {Ziya Alper Gen{\c{c}} and Gabriele Lenzini and Peter Y. A. Ryan and Itzel V{\'{a}}zquez Sandoval}, title = {A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {125--151}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icissp/GougeonL18, author = {Thomas Gougeon and Patrick Lacharme}, title = {How to Break CaptchaStar}, booktitle = {{ICISSP}}, pages = {41--51}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/GougeonL18a, author = {Thomas Gougeon and Patrick Lacharme}, title = {A Simple Attack on CaptchaStar}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {66--85}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icissp/GrafK18, author = {Roman Graf and Ross King}, title = {Cyber Threat Information Classification and Life Cycle Management using Smart Contracts}, booktitle = {{ICISSP}}, pages = {304--311}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/HakbilenPEU18, author = {Onur Hakbilen and Piraveen Perinparajan and Michael Eikeland and Nils Ulltveit{-}Moe}, title = {{SAFEPASS} - Presenting a Convenient, Portable and Secure Password Manager}, booktitle = {{ICISSP}}, pages = {292--303}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/HamidiSM18, author = {Mona Hamidi and Mina Sheikhalishahi and Fabio Martinelli}, title = {Secure Two-party Agglomerative Hierarchical Clustering Construction}, booktitle = {{ICISSP}}, pages = {432--437}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/HaupertM18, author = {Vincent Haupert and Tilo M{\"{u}}ller}, title = {On App-based Matrix Code Authentication in Online Banking}, booktitle = {{ICISSP}}, pages = {149--160}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/HerwonoE18, author = {Ian Herwono and Fadi Ali El{-}Moussa}, title = {Automated Detection of the Early Stages of Cyber Kill Chain}, booktitle = {{ICISSP}}, pages = {182--189}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/HuangTS18, author = {Jasper Huang and Fabio Di Troia and Mark Stamp}, title = {Acoustic Gait Analysis using Support Vector Machines}, booktitle = {{ICISSP}}, pages = {545--552}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/HummerGKFP18, author = {Matthias Hummer and Sebastian Groll and Michael Kunz and Ludwig Fuchs and G{\"{u}}nther Pernul}, title = {Measuring Identity and Access Management Performance - An Expert Survey on Possible Performance Indicators}, booktitle = {{ICISSP}}, pages = {233--240}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/HunterW18, author = {Aaron Hunter and Ken Wong}, title = {Decoy Systems with Low Energy Bluetooth Communication}, booktitle = {{ICISSP}}, pages = {404--409}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/Jacoby18, author = {David Jacoby}, title = {Hacking the Security Industry for Fun and Profit and Humanity}, booktitle = {{ICISSP}}, pages = {5}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/JasserTSR18, author = {Stefanie Jasser and Katja Tuma and Riccardo Scandariato and Matthias Riebisch}, title = {Back to the Drawing Board - Bringing Security Constraints in an Architecture-centric Software Development Process}, booktitle = {{ICISSP}}, pages = {438--446}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/KandoussiB18, author = {Asmaa El Kandoussi and Hanan El Bakkali}, title = {Novel Access Control Approach for Inter-organizational Workflows}, booktitle = {{ICISSP}}, pages = {345--352}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/KarlzenBH18, author = {Henrik Karlz{\'{e}}n and Johan E. Bengtsson and Jonas Hallberg}, title = {A Test of Structured Threat Descriptions for Information Security Risk Assessments}, booktitle = {{ICISSP}}, pages = {469--476}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/LeeOKL18, author = {Wei{-}Han Lee and Jorge Ortiz and Bongjun Ko and Ruby B. Lee}, title = {Inferring Smartphone Users' Handwritten Patterns by using Motion Sensors}, booktitle = {{ICISSP}}, pages = {139--148}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/LuhTTS18, author = {Robert Luh and Marlies Temper and Simon Tjoa and Sebastian Schrittwieser}, title = {{APT} {RPG:} Design of a Gamified Attacker/Defender Meta Model}, booktitle = {{ICISSP}}, pages = {526--537}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/MarellaMMD18, author = {Praneeth Babu Marella and Matea Milojkovic and Jordan Mohler and Gaby G. Dagher}, title = {GenVote: Blockchain-Based Customizable and Secure Voting Platform}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {152--171}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icissp/MartinelliMN18, author = {Fabio Martinelli and Francesco Mercaldo and Vittoria Nardone}, title = {Identifying Insecure Features in Android Applications using Model Checking}, booktitle = {{ICISSP}}, pages = {589--596}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/MartinelliMNOS18, author = {Fabio Martinelli and Francesco Mercaldo and Vittoria Nardone and Albina Orlando and Antonella Santone}, title = {Who's Driving My Car? {A} Machine Learning based Approach to Driver Identification}, booktitle = {{ICISSP}}, pages = {367--372}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/MartinelliMNOS18a, author = {Fabio Martinelli and Francesco Mercaldo and Vittoria Nardone and Albina Orlando and Antonella Santone}, title = {Cluster Analysis for Driver Aggressiveness Identification}, booktitle = {{ICISSP}}, pages = {562--569}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/MauriCD18, author = {Lara Mauri and Stelvio Cimato and Ernesto Damiani}, title = {A Comparative Analysis of Current Cryptocurrencies}, booktitle = {{ICISSP}}, pages = {127--138}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/MaynardMS18, author = {Peter Maynard and Kieran McLaughlin and Sakir Sezer}, title = {Using Application Layer Metrics to Detect Advanced {SCADA} Attacks}, booktitle = {{ICISSP}}, pages = {418--425}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/MeinigM18, author = {Michael Meinig and Christoph Meinel}, title = {Securing the Flow - Data Flow Analysis with Operational Node Structures}, booktitle = {{ICISSP}}, pages = {241--250}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/MigdalR18, author = {Denis Migdal and Christophe Rosenberger}, title = {Towards a Personal Identity Code Respecting Privacy}, booktitle = {{ICISSP}}, pages = {267--274}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/MorissetS18, author = {Charles Morisset and David Sanchez}, title = {VisABAC: {A} Tool for Visualising {ABAC} Policies}, booktitle = {{ICISSP}}, pages = {117--126}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/MorissetS18a, author = {Charles Morisset and David Sanchez}, title = {On Building a Visualisation Tool for Access Control Policies}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {215--239}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icissp/NagarajanTAS18, author = {Prathiba Nagarajan and Fabio Di Troia and Thomas H. Austin and Mark Stamp}, title = {Autocorrelation Analysis of Financial Botnet Traffic}, booktitle = {{ICISSP}}, pages = {599--606}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/Nazmul0C18, author = {Rumana Nazmul and Md. Rafiqul Islam and Ahsan Raja Chowdhury}, title = {Alignment-free Cancellable Template Generation for Fingerprint based Authentication}, booktitle = {{ICISSP}}, pages = {361--366}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/NguyenZRDMN18, author = {Kim Trong Nguyen and Cathel Zitzmann and Florent Retraint and Agn{\`{e}}s Delahaies and Fr{\'{e}}d{\'{e}}ric Morain{-}Nicolier and Hoai Phuong Nguyen}, title = {Face Spoofing Detection for Smartphones using a 3D Reconstruction and the Motion Sensors}, booktitle = {{ICISSP}}, pages = {286--291}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/NinassiVR18, author = {Alexandre Ninassi and Sylvain Vernois and Christophe Rosenberger}, title = {Privacy Compliant Multi-biometric Authentication on Smartphones}, booktitle = {{ICISSP}}, pages = {173--181}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/PatsakisA18, author = {Constantinos Patsakis and Efthimios Alepis}, title = {Knock-Knock: The Unbearable Lightness of Android Notifications}, booktitle = {{ICISSP}}, pages = {52--61}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/PfrangMFB18, author = {Steffen Pfrang and David Meier and Michael Friedrich and J{\"{u}}rgen Beyerer}, title = {Advancing Protocol Fuzzing for Industrial Automation and Control Systems}, booktitle = {{ICISSP}}, pages = {570--580}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/PonsardG18, author = {Christophe Ponsard and Jeremy Grandclaudon}, title = {Survey and Guidelines for the Design and Deployment of a Cyber Security Label for SMEs}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {240--260}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icissp/PonsardGD18, author = {Christophe Ponsard and Jeremy Grandclaudon and Gautier Dallons}, title = {Towards a Cyber Security Label for SMEs: {A} European Perspective -}, booktitle = {{ICISSP}}, pages = {426--431}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/Rosenberger18, author = {Christophe Rosenberger}, title = {Evaluation of Biometric Template Protection Schemes based on a Transformation}, booktitle = {{ICISSP}}, pages = {216--224}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/SharafaldinLG18, author = {Iman Sharafaldin and Arash Habibi Lashkari and Ali A. Ghorbani}, title = {Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization}, booktitle = {{ICISSP}}, pages = {108--116}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/SharafaldinLG18a, author = {Iman Sharafaldin and Arash Habibi Lashkari and Ali A. Ghorbani}, title = {A Detailed Analysis of the {CICIDS2017} Data Set}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {172--188}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icissp/SheikhalishahiH18, author = {Mina Sheikhalishahi and Mona Hamidi and Fabio Martinelli}, title = {Privacy Preserving Collaborative Agglomerative Hierarchical Clustering Construction}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {261--280}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icissp/SilvaNS18, author = {Marco Silva and Ant{\'{o}}nio Nogueira and Paulo Salvador}, title = {Modular Platform for Customer-Side Detection of {BGP} Redirection Attacks}, booktitle = {{ICISSP}}, pages = {199--206}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/SinghRS18, author = {Dilpreet Singh and Ron Ruhl and Hamman Samuel}, title = {Attack Tree for Modelling Unauthorized {EMV} Card Transactions at {POS} Terminals}, booktitle = {{ICISSP}}, pages = {494--502}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/Stach18, author = {Christoph Stach}, title = {Big Brother is Smart Watching You - Privacy Concerns about Health and Fitness Applications}, booktitle = {{ICISSP}}, pages = {13--23}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/Stach18a, author = {Christoph Stach}, title = {Fine-Grained Privacy Control for Fitness and Health Applications Using the Privacy Management Platform}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {1--25}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icissp/StachM18, author = {Christoph Stach and Bernhard Mitschang}, title = {{ACCESSORS} - {A} Data-Centric Permission Model for the Internet of Things}, booktitle = {{ICISSP}}, pages = {30--40}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/StachM18a, author = {Christoph Stach and Bernhard Mitschang}, title = {Elicitation of Privacy Requirements for the Internet of Things Using {ACCESSORS}}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {40--65}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icissp/ToliP18, author = {Christina{-}Angeliki Toli and Bart Preneel}, title = {Privacy-preserving Biometric Authentication Model for e-Finance Applications}, booktitle = {{ICISSP}}, pages = {353--360}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/TorresS18, author = {Jos{\'{e}} Torres and Sergio de los Santos}, title = {Malicious {PDF} Documents Detection using Machine Learning Techniques - {A} Practical Approach with Cloud Computing Applications}, booktitle = {{ICISSP}}, pages = {337--344}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/VasileiouF18, author = {Ismini Vasileiou and Steven Furnell}, title = {Enhancing Security Education - Recognising Threshold Concepts and Other Influencing Factors}, booktitle = {{ICISSP}}, pages = {398--403}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/VasileiouF18a, author = {Ismini Vasileiou and Steven Furnell}, title = {Personalising Security Education: Factors Influencing Individual Awareness and Compliance}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {189--200}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icissp/VibertCBR18, author = {Beno{\^{\i}}t Vibert and Christophe Charrier and Jean{-}Marie Le Bars and Christophe Rosenberger}, title = {Towards an Optimal Template Reduction for Securing Embedded Fingerprint Devices}, booktitle = {{ICISSP}}, pages = {329--336}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/WaagsnesU18, author = {Henrik Waagsnes and Nils Ulltveit{-}Moe}, title = {Intrusion Detection System Test Framework for {SCADA} Systems}, booktitle = {{ICISSP}}, pages = {275--285}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/WangZL18, author = {Wenbo Wang and Tianning Zang and Yuqing Lan}, title = {The Rapid Extraction of Suspicious Traffic from Passive {DNS}}, booktitle = {{ICISSP}}, pages = {190--198}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/WongH18, author = {Kenneth C. K. Wong and Aaron Hunter}, title = {Managing Cybersecurity Break-ins Using Bluetooth Low Energy Devices to Verify Attackers: {A} Practical Study}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {201--214}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icissp/WurzenbergerSSF18, author = {Markus Wurzenberger and Florian Skopik and Giuseppe Settanni and Roman Fiedler}, title = {{AECID:} {A} Self-learning Anomaly Detection Approach based on Light-weight Log Parser Models}, booktitle = {{ICISSP}}, pages = {386--397}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/YajamanamSTS18, author = {Sravani Yajamanam and Vikash Raja Samuel Selvin and Fabio Di Troia and Mark Stamp}, title = {Deep Learning versus Gist Descriptors for Image-based Malware Classification}, booktitle = {{ICISSP}}, pages = {553--561}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/ZhengW18, author = {Kaiyan Zheng and Peng Wang}, title = {Encryption Schemes based on a Single Permutation: PCBC, POFB, {PCFB} and {PCTR}}, booktitle = {{ICISSP}}, pages = {452--460}, publisher = {SciTePress}, year = {2018} }
@proceedings{DBLP:conf/icissp/2017s, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, publisher = {Springer}, year = {2018} }
@proceedings{DBLP:conf/icissp/2018, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/AhmadiS17, author = {Ahmad Ahmadi and Reihaneh Safavi{-}Naini}, title = {Distance-bounding Identification}, booktitle = {{ICISSP}}, pages = {202--212}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/AhmadiS17a, author = {Ahmad Ahmadi and Reihaneh Safavi{-}Naini}, title = {Directional Distance-Bounding Identification}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {197--221}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/icissp/AldayelA17, author = {Mashael Aldayel and Mohammad Alhussain}, title = {Enhanced Identification of Sensitive User Inputs in Mobile Applications}, booktitle = {{ICISSP}}, pages = {506--515}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/AlepisP17, author = {Efthimios Alepis and Constantinos Patsakis}, title = {There's Wally! Location Tracking in Android without Permissions}, booktitle = {{ICISSP}}, pages = {278--284}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/AlruhailyBC17, author = {Nada Alruhaily and Behzad Bordbar and Tom Chothia}, title = {Towards an Understanding of the Misclassification Rates of Machine Learning-based Malware Detection Systems}, booktitle = {{ICISSP}}, pages = {101--112}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/AlruhailyCB17, author = {Nada Alruhaily and Tom Chothia and Behzad Bordbar}, title = {A Better Understanding of Machine Learning Malware Misclassifcation}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {35--58}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/icissp/BannierF17, author = {Arnaud Bannier and Eric Filiol}, title = {Mathematical Backdoors in Symmetric Encryption Systems - Proposal for a Backdoored AES-like Block Cipher}, booktitle = {{ICISSP}}, pages = {622--631}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/BarghVC17, author = {Mortaza S. Bargh and Marco Vink and Sunil Choenni}, title = {On Usage Control in Relational Database Management Systems - Obligations and Their Enforcement in Joining Datasets}, booktitle = {{ICISSP}}, pages = {190--201}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/BarghVC17a, author = {Mortaza S. Bargh and Marco Vink and Sunil Choenni}, title = {On Using Obligations for Usage Control in Joining of Datasets}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {173--196}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/icissp/BernardeschiNDP17, author = {Cinzia Bernardeschi and Marco Di Natale and Gianluca Dini and Maurizio Palmieri}, title = {Verifying Data Secure Flow in {AUTOSAR} Models by Static Analysis}, booktitle = {{ICISSP}}, pages = {704--713}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/Bertino17, author = {Elisa Bertino}, title = {Security and Privacy in the IoT}, booktitle = {{ICISSP}}, pages = {5}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/BeukemaAS17, author = {Wietze J. B. Beukema and Thomas Attema and Harm A. Schotanus}, title = {Internal Network Monitoring and Anomaly Detection through Host Clustering}, booktitle = {{ICISSP}}, pages = {694--703}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/BeuranPTCTS17, author = {Razvan Beuran and Cuong Pham and Dat Tang and Ken{-}ichi Chinen and Yasuo Tan and Yoichi Shinoda}, title = {CyTrONE: An Integrated Cybersecurity Training Framework}, booktitle = {{ICISSP}}, pages = {157--166}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/BuK17, author = {Lake Bu and Mark G. Karpovsky}, title = {A Design of Secure and ReliableWireless Transmission Channel for Implantable Medical Devices}, booktitle = {{ICISSP}}, pages = {233--242}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/Cam-Winget17, author = {Nancy Cam{-}Winget}, title = {Sensor Networks as the new Attack Target}, booktitle = {{ICISSP}}, pages = {7}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/CiminoV17, author = {Mario Giovanni C. A. Cimino and Gigliola Vaglini}, title = {Localization and Inhibition of Malicious Behaviors through a Model Checking based Methodology}, booktitle = {{ICISSP}}, pages = {644--652}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/CimitileMM17, author = {Aniello Cimitile and Fabio Martinelli and Francesco Mercaldo}, title = {Machine Learning Meets iOS Malware: Identifying Malicious Applications on Apple Environment}, booktitle = {{ICISSP}}, pages = {487--492}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/CostantinoMMP17, author = {Gianpiero Costantino and Fabio Martinelli and Ilaria Matteucci and Marinella Petrocchi}, title = {Analysis of Data Sharing Agreements}, booktitle = {{ICISSP}}, pages = {167--178}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/CostantinoMMP17a, author = {Gianpiero Costantino and Fabio Martinelli and Ilaria Matteucci and Marinella Petrocchi}, title = {Efficient Detection of Conflicts in Data Sharing Agreements}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {148--172}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/icissp/CourtoisM17, author = {Nicolas T. Courtois and Rebekah Mercer}, title = {Stealth Address and Key Management Techniques in Blockchain Systems}, booktitle = {{ICISSP}}, pages = {559--566}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/CozzaTCK17, author = {Vittoria Cozza and Zisis Tsiatsikas and Mauro Conti and Georgios Kambourakis}, title = {Why Snoopy Loves Online Services: An Analysis of (Lack of) Privacy in Online Services}, booktitle = {{ICISSP}}, pages = {431--438}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/DamT17, author = {Khanh{-}Huu{-}The Dam and Tayssir Touili}, title = {Malware Detection based on Graph Classification}, booktitle = {{ICISSP}}, pages = {455--463}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/DamT17a, author = {Khanh{-}Huu{-}The Dam and Tayssir Touili}, title = {Extracting Android Malicious Behaviors}, booktitle = {{ICISSP}}, pages = {714--723}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/DuboisF17, author = {Michel Dubois and Eric Filiol}, title = {Hacking of the {AES} with Boolean Functions}, booktitle = {{ICISSP}}, pages = {599--609}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/DutaGT17, author = {Cristina{-}Loredana Duta and Laura Gheorghe and Nicolae Tapus}, title = {Real-time {DSP} Implementations of Voice Encryption Algorithms}, booktitle = {{ICISSP}}, pages = {439--446}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/EbrahimyP17, author = {Razgar Ebrahimy and Zoya Pourmirza}, title = {Cyber-interdependency in Smart Energy Systems}, booktitle = {{ICISSP}}, pages = {529--537}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/EiblFHSBRE17, author = {G{\"{u}}nther Eibl and Cornelia Ferner and Tobias Hildebrandt and Florian Stertz and Sebastian Burkhart and Stefanie Rinderle{-}Ma and Dominik Engel}, title = {Exploration of the Potential of Process Mining for Intrusion Detection in Smart Metering}, booktitle = {{ICISSP}}, pages = {38--46}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/FukushimaHK17, author = {Kazuhide Fukushima and Seira Hidano and Shinsaku Kiyomoto}, title = {White-box Implementation of Stream Cipher}, booktitle = {{ICISSP}}, pages = {263--269}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/GjertsenGBF17, author = {Eyvind Garder B. Gjertsen and Erlend Andreas Gj{\ae}re and Maria Bartnes and Waldo Rocha Flores}, title = {Gamification of Information Security Awareness and Training}, booktitle = {{ICISSP}}, pages = {59--70}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/HadadPSOR17, author = {Tal Hadad and Rami Puzis and Bronislav Sidik and Nir Ofek and Lior Rokach}, title = {Application Marketplace Malware Detection by User Feedback Analysis}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {1--19}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/icissp/HadadSOPR17, author = {Tal Hadad and Bronislav Sidik and Nir Ofek and Rami Puzis and Lior Rokach}, title = {User Feedback Analysis for Mobile Malware Detection}, booktitle = {{ICISSP}}, pages = {83--94}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/HamadP17, author = {Mohammad Hamad and Vassilis Prevelakis}, title = {Secure APIs for Applications in Microkernel-based Systems}, booktitle = {{ICISSP}}, pages = {553--558}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/HatinCSR17, author = {Julien Hatin and Estelle Cherrier and Jean{-}Jacques Schwartzmann and Christophe Rosenberger}, title = {Privacy Preserving Transparent Mobile Authentication}, booktitle = {{ICISSP}}, pages = {354--361}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/HaupertM17, author = {Vincent Haupert and Tilo M{\"{u}}ller}, title = {Rest in Protection - {A} Kernel-level Approach to Mitigate {RIP} Tampering}, booktitle = {{ICISSP}}, pages = {25--37}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/HerwonoE17, author = {Ian Herwono and Fadi Ali El{-}Moussa}, title = {A Collaborative Tool for Modelling Multi-stage Attacks}, booktitle = {{ICISSP}}, pages = {312--317}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/HerwonoE17a, author = {Ian Herwono and Fadi Ali El{-}Moussa}, title = {A System for Detecting Targeted Cyber-Attacks Using Attack Patterns}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {20--34}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/icissp/HuffmeyerHMSW17, author = {Marc H{\"{u}}ffmeyer and Pascal Hirmer and Bernhard Mitschang and Ulf Schreier and Matthias Wieland}, title = {SitAC - {A} System for Situation-aware Access Control - Controlling Access to Sensor Data}, booktitle = {{ICISSP}}, pages = {113--125}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/HuffmeyerHMSW17a, author = {Marc H{\"{u}}ffmeyer and Pascal Hirmer and Bernhard Mitschang and Ulf Schreier and Matthias Wieland}, title = {Situation-Aware Access Control for Industrie 4.0}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {59--83}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/icissp/HuynenL17, author = {Jean{-}Louis Huynen and Gabriele Lenzini}, title = {From Situation Awareness to Action: An Information Security Management Toolkit for Socio-technical Security Retrospective and Prospective Analysis}, booktitle = {{ICISSP}}, pages = {213--224}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/HuynenL17a, author = {Jean{-}Louis Huynen and Gabriele Lenzini}, title = {An Information Security Management for Socio-Technical Analysis of System Security}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {222--251}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/icissp/IrollaF17, author = {Paul Irolla and Eric Filiol}, title = {Glassbox: Dynamic Analysis Platform for Malware Android Applications on Real Devices}, booktitle = {{ICISSP}}, pages = {610--621}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/KapratwarTS17, author = {Ankita Kapratwar and Fabio Di Troia and Mark Stamp}, title = {Static and Dynamic Analysis of Android Malware}, booktitle = {{ICISSP}}, pages = {653--662}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/KarlssonHS17, author = {Linus Karlsson and Martin Hell and Paul Stankovski}, title = {Improved Greedy Nonrandomness Detectors for Stream Ciphers}, booktitle = {{ICISSP}}, pages = {225--232}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/KarlssonHS17a, author = {Linus Karlsson and Martin Hell and Paul Stankovski}, title = {Not So Greedy: Enhanced Subset Exploration for Nonrandomness Detectors}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {273--294}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/icissp/KarlzenBH17, author = {Henrik Karlz{\'{e}}n and Johan E. Bengtsson and Jonas Hallberg}, title = {Assessing Information Security Risks using Pairwise Weighting}, booktitle = {{ICISSP}}, pages = {318--324}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/KiperbergRAZ17, author = {Michael Kiperberg and Amit Resh and Asaf Algawi and Nezer Jacob Zaidenberg}, title = {System for Executing Encrypted Java Programs}, booktitle = {{ICISSP}}, pages = {245--252}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/KippeP17, author = {J{\"{o}}rg Kippe and Steffen Pfrang}, title = {Network and Topology Models to Support {IDS} Event Processing}, booktitle = {{ICISSP}}, pages = {372--379}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/KrennLS17, author = {Stephan Krenn and Thomas Lor{\"{u}}nser and Christoph Striecks}, title = {Batch-verifiable Secret Sharing with Unconditional Privacy}, booktitle = {{ICISSP}}, pages = {303--311}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/KumarL17, author = {Gautam Kumar and Brent Lagesse}, title = {Limited Use Cryptographic Tokens in Securing Ephemeral Cloud Servers}, booktitle = {{ICISSP}}, pages = {447--454}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/LashkariDMG17, author = {Arash Habibi Lashkari and Gerard Draper{-}Gil and Mohammad Saiful Islam Mamun and Ali A. Ghorbani}, title = {Characterization of Tor Traffic using Time based Features}, booktitle = {{ICISSP}}, pages = {253--262}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/LeeLJML17, author = {Wei{-}Han Lee and Changchang Liu and Shouling Ji and Prateek Mittal and Ruby B. Lee}, title = {Quantification of De-anonymization Risks in Social Networks}, booktitle = {{ICISSP}}, pages = {126--135}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/LeeLJML17a, author = {Wei{-}Han Lee and Changchang Liu and Shouling Ji and Prateek Mittal and Ruby B. Lee}, title = {How to Quantify Graph De-anonymization Risks}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {84--104}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/icissp/LigierCFS17, author = {Damien Ligier and Sergiu Carpov and Caroline Fontaine and Renaud Sirdey}, title = {Privacy Preserving Data Classification using Inner-product Functional Encryption}, booktitle = {{ICISSP}}, pages = {423--430}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/LopesA17, author = {Arthur Costa Lopes and Diego F. Aranha}, title = {Platform-agnostic Low-intrusion Optical Data Exfiltration}, booktitle = {{ICISSP}}, pages = {474--480}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/LuhS0S17, author = {Robert Luh and Gregor Schramm and Markus Wagner and Sebastian Schrittwieser}, title = {Sequitur-based Inference and Analysis Framework for Malicious System Behavior}, booktitle = {{ICISSP}}, pages = {632--643}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/LuhSMJ17, author = {Robert Luh and Sebastian Schrittwieser and Stefan Marschalek and Helge Janicke}, title = {Design of an Anomaly-based Threat Detection {\&} Explication System}, booktitle = {{ICISSP}}, pages = {397--402}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/LutasTC17, author = {Andrei Lutas and Daniel Ticle and Octavian Cret}, title = {Hypervisor based Memory Introspection: Challenges, Problems and Limitations}, booktitle = {{ICISSP}}, pages = {285--294}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/MartinelliMNSV17, author = {Fabio Martinelli and Francesco Mercaldo and Vittoria Nardone and Antonella Santone and Corrado Aaron Visaggio}, title = {Identifying Mobile Repackaged Applications through Formal Methods}, booktitle = {{ICISSP}}, pages = {673--682}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/MartinezEMZ17, author = {V. Gayoso Mart{\'{\i}}nez and Luis Hern{\'{a}}ndez Encinas and Agust{\'{\i}}n Mart{\'{\i}}n Mu{\~{n}}oz and J. Zhang}, title = {Breaking a Hitag2 Protocol with Low Cost Technology}, booktitle = {{ICISSP}}, pages = {579--584}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/MorenoF17, author = {Carlos Moreno and Sebastian Fischmeister}, title = {On the Security of Safety-critical Embedded Systems: Who Watches the Watchers? Who Reprograms the Watchers?}, booktitle = {{ICISSP}}, pages = {493--498}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/NardoneV17, author = {Vittoria Nardone and Corrado Aaron Visaggio}, title = {"Mirror, Mirror on the Wall, Who is the Fairest One of All?" - Machine Learning versus Model Checking: {A} Comparison between Two Static Techniques for Malware Family Identification}, booktitle = {{ICISSP}}, pages = {663--672}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/OhtakeSZ17, author = {Go Ohtake and Reihaneh Safavi{-}Naini and Liang Feng Zhang}, title = {Outsourcing Scheme of {ABE} Encryption Secure against Malicious Adversary}, booktitle = {{ICISSP}}, pages = {71--82}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/OmerovicNT17, author = {Aida Omerovic and Marit Kj{\o}snes Natvig and Isabelle C. R. Tardy}, title = {Towards a Privacy Scorecard - Initial Design Exemplified on an Intelligent Transport Systems Service}, booktitle = {{ICISSP}}, pages = {585--593}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/OrunsoluS17, author = {Abdul A. Orunsolu and Adesina S. Sodiya}, title = {An Anti-Phishing Kit Scheme for Secure Web Transactions}, booktitle = {{ICISSP}}, pages = {15--24}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/PahiLS17, author = {Timea Pahi and Maria Leitner and Florian Skopik}, title = {Analysis and Assessment of Situational Awareness Models for National Cyber Security Centers}, booktitle = {{ICISSP}}, pages = {334--345}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/PeacockJV17, author = {Matthew Peacock and Michael N. Johnstone and Craig Valli}, title = {Security Issues with BACnet Value Handling}, booktitle = {{ICISSP}}, pages = {546--552}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/PeacockJV17a, author = {Matthew Peacock and Michael N. Johnstone and Craig Valli}, title = {An Exploration of Some Security Issues Within the BACnet Protocol}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {252--272}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/icissp/PereiraA17, author = {Hilder V. L. Pereira and Diego F. Aranha}, title = {Non-interactive Privacy-preserving k-NN Classifier}, booktitle = {{ICISSP}}, pages = {362--371}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/PfrangM17, author = {Steffen Pfrang and David Meier}, title = {On the Detection of Replay Attacks in Industrial Automation Networks Operated with Profinet {IO}}, booktitle = {{ICISSP}}, pages = {683--693}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/PooryousefA17, author = {Shahrooz Pooryousef and Morteza Amini}, title = {Enhancing Accuracy of Android Malware Detection using Intent Instrumentation}, booktitle = {{ICISSP}}, pages = {380--388}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/Preneel17, author = {Bart Preneel}, title = {The Future of Information Security}, booktitle = {{ICISSP}}, pages = {9}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/RauchbergerLS17, author = {Julian Rauchberger and Robert Luh and Sebastian Schrittwieser}, title = {Longkit - {A} Universal Framework for {BIOS/UEFI} Rootkits in System Management Mode}, booktitle = {{ICISSP}}, pages = {346--353}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/RegainiaS17, author = {Loukmen Regainia and S{\'{e}}bastien Salva}, title = {A Methodology of Security Pattern Classification and of Attack-Defense Tree Generation}, booktitle = {{ICISSP}}, pages = {136--146}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/ReshetovaBA17, author = {Elena Reshetova and Filippo Bonazzi and N. Asokan}, title = {SELint: An SEAndroid Policy Analysis Tool}, booktitle = {{ICISSP}}, pages = {47--58}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/RiemannG17, author = {Robert Riemann and St{\'{e}}phane Grumbach}, title = {Distributed Protocols at the Rescue for Trustworthy Online Voting}, booktitle = {{ICISSP}}, pages = {499--505}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/SalvaR17, author = {S{\'{e}}bastien Salva and Loukmen Regainia}, title = {A Security Pattern Classification Based on Data Integration}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {105--129}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/icissp/SantosT17, author = {Sergio de los Santos and Jos{\'{e}} Torres}, title = {Macro Malware Detection using Machine Learning Techniques - {A} New Approach}, booktitle = {{ICISSP}}, pages = {295--302}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/SedeeqCL17, author = {Iman Sedeeq and Frans Coenen and Alexei Lisitsa}, title = {Attribute Permutation Steganography Detection using Attribute Position Changes Count}, booktitle = {{ICISSP}}, pages = {95--100}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/SinghSACC17, author = {Kalpana Singh and Renaud Sirdey and Fran{\c{c}}ois Artiguenave and David Cohen and Sergiu Carpov}, title = {Towards Confidentiality-strengthened Personalized Genomic Medicine Embedding Homomorphic Cryptography}, booktitle = {{ICISSP}}, pages = {325--333}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/SoaresJ17, author = {Alberto Magno Muniz Soares and Rafael Tim{\'{o}}teo de Sousa J{\'{u}}nior}, title = {Forensic Analysis of Android Runtime {(ART)} Application Heap Objects in Emulated and Real Devices}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {130--147}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/icissp/SoaresS17, author = {Alberto Magno Muniz Soares and Rafael Tim{\'{o}}teo de Sousa Jr.}, title = {A Technique for Extraction and Analysis of Application Heap Objects within Android Runtime {(ART)}}, booktitle = {{ICISSP}}, pages = {147--156}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/SonntagM17, author = {Michael Sonntag and Ren{\'{e}} Mayrhofer}, title = {Traffic Statistics of a High-Bandwidth Tor Exit Node}, booktitle = {{ICISSP}}, pages = {270--277}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/TelikicherlaAC17, author = {Krishna Chaitanya Telikicherla and Akash Agrawall and Venkatesh Choppella}, title = {A Formal Model of Web Security Showing Malicious Cross Origin Requests and Its Mitigation using {CORP}}, booktitle = {{ICISSP}}, pages = {516--523}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/Tezcan17, author = {Cihangir Tezcan}, title = {Brute Force Cryptanalysis of {MIFARE} Classic Cards on {GPU}}, booktitle = {{ICISSP}}, pages = {524--528}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/ThuloE17, author = {Motlatsi i Isaac Thulo and Jan H. P. Eloff}, title = {Towards Optimized Security-aware (O-Sec) {VM} Placement Algorithms}, booktitle = {{ICISSP}}, pages = {411--422}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/UwizeyemunguP17, author = {Sylvestre Uwizeyemungu and Placide Poba{-}Nzaou}, title = {Health Information Exchange and Related IT-security Practices in European Hospitals}, booktitle = {{ICISSP}}, pages = {538--545}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/VellaC17, author = {Mark Vella and Rachel Cilia}, title = {Memory Forensics of Insecure Android Inter-app Communications}, booktitle = {{ICISSP}}, pages = {481--486}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/VibertBRC17, author = {Beno{\^{\i}}t Vibert and Jean{-}Marie Le Bars and Christophe Rosenberger and Christophe Charrier}, title = {Fingerprint Class Recognition for Securing {EMV} Transaction}, booktitle = {{ICISSP}}, pages = {403--410}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/VolleroBSBMT17, author = {Luca Vollero and Daniele Biondo and Roberto Setola and Gianluca Bocci and Rocco Mammoliti and Alessandra Toma}, title = {Improving the Automatic Identification of Malicious Android Apps in Unofficial Stores through Logo Analysis}, booktitle = {{ICISSP}}, pages = {567--572}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/VyasMK17, author = {Tanvi Vyas and Andrea Marchesini and Christoph Kerschbaumer}, title = {Extending the Same Origin Policy with Origin Attributes}, booktitle = {{ICISSP}}, pages = {464--473}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/WaltE17, author = {Est{\'{e}}e van der Walt and Jan H. P. Eloff}, title = {Identity Deception Detection on Social Media Platforms}, booktitle = {{ICISSP}}, pages = {573--578}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/Yesuf17, author = {Ahmed Seid Yesuf}, title = {A Review of Risk Identification Approaches in the Telecommunication Domain}, booktitle = {{ICISSP}}, pages = {389--396}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/ZhiouaRAKS17, author = {Zeineb Zhioua and Yves Roudier and Rab{\'{e}}a Ameur{-}Boulifa and Takoua Kechiche and Stuart Short}, title = {Tracking Dependent Information Flows}, booktitle = {{ICISSP}}, pages = {179--189}, publisher = {SciTePress}, year = {2017} }
@proceedings{DBLP:conf/icissp/2016s, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Information Systems Security and Privacy - Second International Conference, {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {691}, publisher = {Springer}, year = {2017} }
@proceedings{DBLP:conf/icissp/2017, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, publisher = {SciTePress}, year = {2017} }
@inproceedings{DBLP:conf/icissp/AbduL16, author = {Nadia Jemil Abdu and Ulrike Lechner}, title = {A Threat Analysis Model for Identity and Access Management}, booktitle = {{ICISSP}}, pages = {498--502}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/AbuelgasimK16, author = {Ammar Abuelgasim and Anne Kayem}, title = {An Approach to Personalized Privacy Policy Recommendations on Online Social Networks}, booktitle = {{ICISSP}}, pages = {126--137}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/AbuelgasimK16a, author = {Ammar Abuelgasim and Anne V. D. M. Kayem}, title = {A Snow-Ball Algorithm for Automating Privacy Policy Configuration in Social Media}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {691}, pages = {108--129}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/icissp/AlsmadiXC16, author = {Izzat Alsmadi and Dianxiang Xu and Jin{-}Hee Cho}, title = {Interaction-based Reputation Model in Online Social Networks}, booktitle = {{ICISSP}}, pages = {265--272}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/BalushiMS16, author = {Abdullah Al Balushi and Kieran McLaughlin and Sakir Sezer}, title = {Contextual Intrusion Alerts for Scada Networks - An Ontology based Approach for Intrusion Alerts Post Processing}, booktitle = {{ICISSP}}, pages = {457--464}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/BattistaMNSV16, author = {Pasquale Battista and Francesco Mercaldo and Vittoria Nardone and Antonella Santone and Corrado Aaron Visaggio}, title = {Identification of Android Malware Families with Model Checking}, booktitle = {{ICISSP}}, pages = {542--547}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/BhanuDKLLLRRW16, author = {Yogesh Bhanu and Sebastian D{\"{a}}nnart and Henning von Kielpinski and Alexander Laux and Ulrike Lechner and Tobias Lehmann and Andreas Rieb and Martin Riedl and Florian Wolf}, title = {A Cyberthreat Search Process and Service}, booktitle = {{ICISSP}}, pages = {528--535}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/BhattacharjeeSM16, author = {Jaya Bhattacharjee and Anirban Sengupta and Chandan Mazumdar}, title = {A Quantitative Methodology for Security Risk Assessment of Enterprise Business Processes}, booktitle = {{ICISSP}}, pages = {388--399}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/BittlR16, author = {Sebastian Bittl and Karsten Roscher}, title = {Efficient Authorization Authority Certificate Distribution in VANETs}, booktitle = {{ICISSP}}, pages = {85--96}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/BittlR16a, author = {Sebastian Bittl and Karsten Roscher}, title = {Efficient Distribution of Certificate Chains in VANETs}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {691}, pages = {86--107}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/icissp/BossiAB16, author = {Simone Bossi and Tea Anselmo and Guido Bertoni}, title = {On {TLS} 1.3 - Early Performance Analysis in the IoT Field}, booktitle = {{ICISSP}}, pages = {117--125}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/BottaAGV16, author = {Alessio Botta and Aniello Avallone and Mauro Garofalo and Giorgio Ventre}, title = {Internet Streaming and Network Neutrality: Comparing the Performance of Video Hosting Services}, booktitle = {{ICISSP}}, pages = {514--521}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/BroennerHS16, author = {Simon Broenner and Hans H{\"{o}}fken and Marko Schuba}, title = {Streamlining Extraction and Analysis of Android {RAM} Images}, booktitle = {{ICISSP}}, pages = {255--264}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/ButtnerH16, author = {Carsten B{\"{u}}ttner and Sorin A. Huss}, title = {An Anonymous Geocast Scheme for {ITS} Applications}, booktitle = {{ICISSP}}, pages = {179--189}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/ButtnerH16a, author = {Carsten B{\"{u}}ttner and Sorin A. Huss}, title = {An Efficient Approach to Anonymous Distribution of {ITS} Messages in Geographic Areas via {LTE} and {IRS} Networks}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {691}, pages = {192--214}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/icissp/ChenSLLYW16, author = {Kang Chen and Qingni Shen and Cong Li and Yang Luo and Yahui Yang and Zhonghai Wu}, title = {Sift - An Efficient Method for Co-residency Detection on Amazon {EC2}}, booktitle = {{ICISSP}}, pages = {423--431}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/Draper-GilLMG16, author = {Gerard Draper{-}Gil and Arash Habibi Lashkari and Mohammad Saiful Islam Mamun and Ali A. Ghorbani}, title = {Characterization of Encrypted and {VPN} Traffic using Time-related Features}, booktitle = {{ICISSP}}, pages = {407--414}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/DutaGT16, author = {Cristina{-}Loredana Duta and Laura Gheorghe and Nicolae Tapus}, title = {Performance Analysis of Real Time Implementations of Voice Encryption Algorithms using Blackfin Processors}, booktitle = {{ICISSP}}, pages = {157--166}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/DutaGT16a, author = {Cristina{-}Loredana Duta and Laura Gheorghe and Nicolae Tapus}, title = {Performance Comparison of Voice Encryption Algorithms Implemented on Blackfin Platform}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {691}, pages = {169--191}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/icissp/ErdoganSA16, author = {Gencer Erdogan and Ketil St{\o}len and Jan {\O}yvind Aagedal}, title = {Evaluation of the {CORAL} Approach for Risk-driven Security Testing based on an Industrial Case Study}, booktitle = {{ICISSP}}, pages = {219--226}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/FerreiraL16, author = {Ana Ferreira and Gabriele Lenzini}, title = {Comparing and Integrating Break-the-Glass and Delegation in Role-based Access Control for Healthcare}, booktitle = {{ICISSP}}, pages = {63--73}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/GeorgescuHOKY16, author = {Marius Georgescu and Hiroaki Hazeyama and Takeshi Okuda and Youki Kadobayashi and S. Yamaguchi}, title = {The {STRIDE} Towards IPv6: {A} Comprehensive Threat Model for IPv6 Transition Technologies}, booktitle = {{ICISSP}}, pages = {243--254}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/GraaCCL16, author = {Mariem Graa and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Jean{-}Louis Lanet}, title = {Tracking Explicit and Control Flows in Java and Native Android Apps Code}, booktitle = {{ICISSP}}, pages = {307--316}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/GrafGRH16, author = {Roman Graf and Sergiu Gordea and Heather M. Ryan and Tibaut Houzanme}, title = {An Expert System for Facilitating an Institutional Risk Profile Definition for Cyber Situational Awareness}, booktitle = {{ICISSP}}, pages = {347--354}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/HappaFNAGC16, author = {Jassim Happa and Graham Fairclough and Jason R. C. Nurse and Ioannis Agrafiotis and Michael Goldsmith and Sadie Creese}, title = {A Pragmatic System-failure Assessment and Response Model}, booktitle = {{ICISSP}}, pages = {503--508}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/HatinCSFR16, author = {Julien Hatin and Estelle Cherrier and Jean{-}Jacques Schwartzmann and Vincent Frey and Christophe Rosenberger}, title = {A Continuous LoA Compliant Trust Evaluation Method}, booktitle = {{ICISSP}}, pages = {355--363}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/HeinS16, author = {Daniel D. Hein and Hossein Saiedian}, title = {Predicting Attack Prone Software Components using Repository Mined Change Metrics}, booktitle = {{ICISSP}}, pages = {554--563}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/Hong16, author = {Jason I. Hong}, title = {Privacy, Ethics and Big Data}, booktitle = {{ICISSP}}, pages = {5}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/HossainSK16, author = {Md. Selim Hossain and Ehsan Saeedi and Yinan Kong}, title = {High-Performance {FPGA} Implementation of Elliptic Curve Cryptography Processor over Binary Field {GF(2163)}}, booktitle = {{ICISSP}}, pages = {415--422}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/HranickyMRV16, author = {Radek Hranicky and Petr Matousek and Ondrej Rysav{\'{y}} and Vladim{\'{\i}}r Vesel{\'{y}}}, title = {Experimental Evaluation of Password Recovery in Encrypted Documents}, booktitle = {{ICISSP}}, pages = {299--306}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/IshiiIF16, author = {Masahiro Ishii and Atsuo Inomata and Kazutoshi Fujikawa}, title = {A Construction of a Twisted Ate Pairing on a Family of Kawazoe-Takahashi Curves at 192-bit Security Level and Its Cost Estimate}, booktitle = {{ICISSP}}, pages = {432--439}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/Izuakor16, author = {Christine Izuakor}, title = {Understanding the Impact of Cyber Security Risks on Safety}, booktitle = {{ICISSP}}, pages = {509--513}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/JollyVR16, author = {Germain Jolly and Sylvain Vernois and Christophe Rosenberger}, title = {An Observe-and-Detect Methodology for the Security and Functional Testing of Smart Card Applications}, booktitle = {{ICISSP}}, pages = {282--289}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/KerschbaumerSB16, author = {Christoph Kerschbaumer and Sid Stamm and Stefan Brunthaler}, title = {Injecting {CSP} for Fun and Security}, booktitle = {{ICISSP}}, pages = {15--25}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/KhanMLS16, author = {Rafiullah Khan and Kieran McLaughlin and David M. Laverty and Sakir Sezer}, title = {{IEEE} {C37.118-2} Synchrophasor Communication Framework - Overview, Cyber Vulnerabilities Analysis and Performance Evaluation}, booktitle = {{ICISSP}}, pages = {167--178}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/LaviG16, author = {Tamir Lavi and Ehud Gudes}, title = {Trust-based Dynamic {RBAC}}, booktitle = {{ICISSP}}, pages = {317--324}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/LaxBNNF16, author = {Gianluca Lax and Francesco Buccafurri and Serena Nicolazzo and Antonino Nocera and Lidia Fotia}, title = {A New Approach for Electronic Signature}, booktitle = {{ICISSP}}, pages = {440--447}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/Lenz16, author = {Hans{-}Joachim Lenz}, title = {Tax Fraud and Investigation Procedures - Everybody, Every Where, Every Time}, booktitle = {{ICISSP}}, pages = {7--8}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/Lenz16a, author = {Hans{-}Joachim Lenz}, title = {Tax Fraud and Investigation: {A} Framework for a Knowledge Based Methodology}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {691}, pages = {3--13}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/icissp/LiSCYW16, author = {Cong Li and Qingni Shen and Kang Chen and Yahui Yang and Zhonghai Wu}, title = {Whispers in the Cloud - {A} Covert Channel using the Result of Creating a Virtual Machine}, booktitle = {{ICISSP}}, pages = {380--387}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/LiSDYW16, author = {Wenting Li and Qingni Shen and Chuntao Dong and Yahui Yang and Zhonghai Wu}, title = {{DDHCS:} Distributed Denial-of-service Threat to {YARN} Clusters based on Health Check Service}, booktitle = {{ICISSP}}, pages = {146--156}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/LiSDYW16a, author = {Wenting Li and Qingni Shen and Chuntao Dong and Yahui Yang and Zhonghai Wu}, title = {{SEYARN:} Enhancing Security of {YARN} Clusters Based on Health Check Service}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {691}, pages = {148--168}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/icissp/MaddarKCY16, author = {Hela Maddar and Wafa Kammoun and Omar Cheikhrouhou and Habib Youssef}, title = {Lightweight Trust Model with High Longevity for Wireless Sensor Networks}, booktitle = {{ICISSP}}, pages = {548--553}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/MarufuKW16, author = {Anesu M. C. Marufu and Anne V. D. M. Kayem and Stephen D. Wolthusen}, title = {Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids}, booktitle = {{ICISSP}}, pages = {448--456}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/MathewsJF16, author = {M. Lisa Mathews and Anupam Joshi and Tim Finin}, title = {Detecting Botnets using a Collaborative Situational-aware {IDPS}}, booktitle = {{ICISSP}}, pages = {290--298}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/MaynardMS16, author = {Peter Maynard and Kieran McLaughlin and Sakir Sezer}, title = {Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction}, booktitle = {{ICISSP}}, pages = {465--472}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/Mzila16, author = {Phiwa Mzila}, title = {Review Analysis of Properties for an Ideal Secure Biometric Template Scheme}, booktitle = {{ICISSP}}, pages = {333--339}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/NakamuraKTS16, author = {Toru Nakamura and Shinsaku Kiyomoto and Welderufael B. Tesfay and Jetzabel M. Serna}, title = {Personalised Privacy by Default Preferences - Experiment and Analysis}, booktitle = {{ICISSP}}, pages = {53--62}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/NakamuraKTS16a, author = {Toru Nakamura and Shinsaku Kiyomoto and Welderufael B. Tesfay and Jetzabel M. Serna}, title = {Easing the Burden of Setting Privacy Preferences: {A} Machine Learning Approach}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {691}, pages = {44--63}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/icissp/PalBM16, author = {Asim K. Pal and Subrata Bose and Arpita Maitra}, title = {Collaborative Information Service - Privacy Algebra for User Defined Security}, booktitle = {{ICISSP}}, pages = {473--481}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/PaudelQI16, author = {Nilakantha Paudel and Marco Querini and Giuseppe F. Italiano}, title = {Handwritten Signature Verification for Mobile Phones}, booktitle = {{ICISSP}}, pages = {46--52}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/PaudelQI16a, author = {Nilakantha Paudel and Marco Querini and Giuseppe F. Italiano}, title = {Online Handwritten Signature Verification for Low-End Devices}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {691}, pages = {25--43}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/icissp/Pohn16, author = {Daniela P{\"{o}}hn}, title = {Risk Management for Dynamic Metadata Exchange via a Trusted Third Party}, booktitle = {{ICISSP}}, pages = {227--234}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/QiaoHS16, author = {Kexin Qiao and Lei Hu and Siwei Sun}, title = {Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques}, booktitle = {{ICISSP}}, pages = {74--84}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/QiaoHS16a, author = {Kexin Qiao and Lei Hu and Siwei Sun}, title = {Differential Analysis on Simeck and {SIMON} with Dynamic Key-Guessing Techniques}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {691}, pages = {64--85}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/icissp/R16, author = {Feno Heriniaina R.}, title = {A Privacy Threat for Internet Users in Internet-censoring Countries}, booktitle = {{ICISSP}}, pages = {372--379}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/RampineN16, author = {Edwin T. L. Rampine and Cynthia H. Ngejane}, title = {A Brief Overview of Hybrid Schemes for Biometric Fingerprint Template Security}, booktitle = {{ICISSP}}, pages = {340--346}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/ReshetovaBNBA16, author = {Elena Reshetova and Filippo Bonazzi and Thomas Nyman and Ravishankar Borgaonkar and N. Asokan}, title = {Characterizing SEAndroid Policies in the Wild}, booktitle = {{ICISSP}}, pages = {482--489}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/SedeeqCL16, author = {Iman Sedeeq and Frans Coenen and Alexei Lisitsa}, title = {A Statistical Approach to the Detection of {HTML} Attribute Permutation Steganography}, booktitle = {{ICISSP}}, pages = {522--527}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/SettanniSSF16, author = {Giuseppe Settanni and Florian Skopik and Yegor Shovgenya and Roman Fiedler}, title = {A Collaborative Analysis System for Cross-organization Cyber Incident Handling}, booktitle = {{ICISSP}}, pages = {105--116}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/ShaoLX16, author = {C. Shao and H. Li and G. Xu}, title = {Quantitative Evaluation of Security on Cryptographic ICs against Fault Injection Attacks}, booktitle = {{ICISSP}}, pages = {97--104}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/ShiHSS16, author = {Danping Shi and Lei Hu and Siwei Sun and Ling Song}, title = {Linear(hull) Cryptanalysis of Round-reduced Versions of {KATAN}}, booktitle = {{ICISSP}}, pages = {364--371}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/StenzelKBR16, author = {Kurt Stenzel and Kuzman Katkalov and Marian Borek and Wolfgang Reif}, title = {Declassification of Information with Complex Filter Functions}, booktitle = {{ICISSP}}, pages = {490--497}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/SugioIKH16, author = {Nobuyuki Sugio and Yasutaka Igarashi and Toshinobu Kaneko and Kenichi Higuchi}, title = {A Practical-time Attack on Reduced-round {MISTY1}}, booktitle = {{ICISSP}}, pages = {235--242}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/SusukiYS16, author = {Hiroya Susuki and Rie Shigetomi Yamaguchi and Shizuo Sakamoto}, title = {Multi-factor Authentication Updating System Evaluation Dynamically for Service Continuity}, booktitle = {{ICISSP}}, pages = {273--281}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/SymeonidisTP16, author = {Iraklis Symeonidis and Pagona Tsormpatzoudi and Bart Preneel}, title = {Collateral Damage of Online Social Network Applications}, booktitle = {{ICISSP}}, pages = {536--541}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/TariqS16, author = {Muhammad Imran Tariq and Vito Santarcangelo}, title = {Analysis of {ISO} 27001: 2013 Controls Effectiveness for Cloud Computing}, booktitle = {{ICISSP}}, pages = {201--208}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/TeubertGM16, author = {Dominik Teubert and Fred Grossmann and Ulrike Meyer}, title = {Anomaly-based Mobile Malware Detection: System Calls as Source for Features}, booktitle = {{ICISSP}}, pages = {26--36}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/Tezcan16, author = {Cihangir Tezcan}, title = {Truncated, Impossible, and Improbable Differential Analysis of {ASCON}}, booktitle = {{ICISSP}}, pages = {325--332}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/TriaLT16, author = {Francesco Di Tria and Ezio Lefons and Filippo Tangorra}, title = {Improving Database Security in Web-based Environments}, booktitle = {{ICISSP}}, pages = {193--200}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/Ulltveit-MoePEN16, author = {Nils Ulltveit{-}Moe and Steffen Pfrang and L{\'{a}}szl{\'{o}} Erd{\"{o}}di and H{\'{e}}ctor Nebot}, title = {Mitigating Local Attacks Against a City Traffic Controller}, booktitle = {{ICISSP}}, pages = {209--218}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/UwizeyemunguP16, author = {Sylvestre Uwizeyemungu and Placide Poba{-}Nzaou}, title = {Security and Privacy Practices in Healthcare Information Systems: {A} Cluster Analysis of European Hospitals}, booktitle = {{ICISSP}}, pages = {37--45}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/WambachB16, author = {Tim Wambach and Katharina Br{\"{a}}unlich}, title = {Retrospective Study of Third-party Web Tracking}, booktitle = {{ICISSP}}, pages = {138--145}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/WambachB16a, author = {Tim Wambach and Katharina Br{\"{a}}unlich}, title = {The Evolution of Third-Party Web Tracking}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {691}, pages = {130--147}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/icissp/Weippl16, author = {Edgar R. Weippl}, title = {Ethics in Security Research}, booktitle = {{ICISSP}}, pages = {9}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/WeipplSR16, author = {Edgar R. Weippl and Sebastian Schrittwieser and Sylvi Rennert}, title = {Empirical Research and Research Ethics in Information Security}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {691}, pages = {14--22}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/icissp/YangCWC16, author = {Ching{-}Nung Yang and Stelvio Cimato and Jihi{-}Han Wu and Song{-}Ruei Cai}, title = {3-Out-of-n Cheating Prevention Visual Cryptographic Schemes}, booktitle = {{ICISSP}}, pages = {400--406}, publisher = {SciTePress}, year = {2016} }
@proceedings{DBLP:conf/icissp/2016, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, publisher = {SciTePress}, year = {2016} }
@inproceedings{DBLP:conf/icissp/AblizZ15, author = {Mehmud Abliz and Taieb F. Znati}, title = {Defeating DDoS using Productive Puzzles}, booktitle = {{ICISSP}}, pages = {114--123}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/Accorsi15, author = {Rafael Accorsi}, title = {A Posteriori Process Security Control}, booktitle = {{ICISSP}}, pages = {IS--5}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/AlishahiMT15, author = {Mina Sheikh Alishahi and Mohamed Mejri and Nadia Tawbi}, title = {Clustering Spam Emails into Campaigns}, booktitle = {{ICISSP}}, pages = {90--97}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/AnjumRPF15, author = {Bushra Anjum and Manish Rajangam and Harry G. Perros and Wenjuan Fan}, title = {Filtering Unfair Users - {A} Hidden Markov Model Approach}, booktitle = {{ICISSP}}, pages = {147--154}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/ArakalaHDH15, author = {Arathi Arakala and Hao Hao and Stephen A. Davis and Kathy J. Horadam}, title = {The Palm Vein Graph - Feature Extraction and Matching}, booktitle = {{ICISSP}}, pages = {295--303}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/ArakalaHDH15a, author = {Arathi Arakala and Hao Hao and Stephen A. Davis and Kathy J. Horadam}, title = {The Palm Vein Graph for Biometric Authentication}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {199--218}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/icissp/BonneyHPS15, author = {Gregor Bonney and Hans H{\"{o}}fken and Benedikt Paffen and Marko Schuba}, title = {{ICS/SCADA} Security - Analysis of a Beckhoff {CX5020} {PLC}}, booktitle = {{ICISSP}}, pages = {137--142}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/ButtnerH15, author = {Carsten B{\"{u}}ttner and Sorin A. Huss}, title = {A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks}, booktitle = {{ICISSP}}, pages = {259--269}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/ButtnerH15a, author = {Carsten B{\"{u}}ttner and Sorin A. Huss}, title = {An Efficient Anonymous Authenticated Key Agreement Protocol for Vehicular Ad-Hoc Networks Based on Ring Signatures and the Elliptic Curve Integrated Encryption Scheme}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {139--159}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/icissp/CourtoisEW15, author = {Nicolas T. Courtois and Pinar Emirdag and Zhouyixing Wang}, title = {On Detection of Bitcoin Mining Redirection Attacks}, booktitle = {{ICISSP}}, pages = {98--105}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/Desfray15, author = {Philippe Desfray}, title = {Model Repositories at the Enterprises and Systems Scale - The Modelio Constellation Solution}, booktitle = {{ICISSP}}, pages = {IS--17}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/FavrePBC15, author = {M{\'{e}}lanie Favre and Sylvaine Picard and Julien Bringer and Herv{\'{e}} Chabanne}, title = {Balancing is the Key - Performing Finger Vein Template Protection using Fuzzy Commitment}, booktitle = {{ICISSP}}, pages = {304--311}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/Ford15, author = {Bryan Ford}, title = {Hiding in a Panopticon - Grand Challenges in Internet Anonymity}, booktitle = {{ICISSP}}, pages = {IS--9}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/Furnell15, author = {Steven Furnell}, title = {From Passwords to Biometrics - In Pursuit of a Panacea}, booktitle = {{ICISSP}}, pages = {IS--7}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/Furnell15a, author = {Steven M. Furnell}, title = {From Passwords to Biometrics: In Pursuit of a Panacea}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {3--15}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/icissp/HossainZ15, author = {Al Amin Hossain and Weining Zhang}, title = {Privacy and Security Concern of Online Social Networks from User Perspective}, booktitle = {{ICISSP}}, pages = {246--253}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/HusztiK15, author = {Andrea Huszti and Zita Kov{\'{a}}cs}, title = {Bilinear Pairing-based Hybrid Mixnet with Anonymity Revocation}, booktitle = {{ICISSP}}, pages = {238--245}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/Inamura15, author = {Masaki Inamura}, title = {Expansions of {CHAP} - Modificationless on Its Structures of Packet and Data Exchange}, booktitle = {{ICISSP}}, pages = {213--220}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/Jacobs15, author = {Stuart Jacobs}, title = {Optimizing Cryptographically based Security in Wireless Networks}, booktitle = {{ICISSP}}, pages = {39--45}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/KangGK15, author = {Bolam Kang and Sung Cheol Goh and Myungsun Kim}, title = {Private Web Search with Constant Round Efficiency}, booktitle = {{ICISSP}}, pages = {205--212}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/KimHKSPP15, author = {Taegyu Kim and Woomin Hwang and Chulmin Kim and Dong{-}Jae Shin and Ki{-}Woong Park and Kyu Ho Park}, title = {Malfinder: Accelerated Malware Classification System through Filtering on Manycore System}, booktitle = {{ICISSP}}, pages = {17--26}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/KimP15, author = {Taegyu Kim and Ki{-}Woong Park}, title = {MalCore: Toward a Practical Malware Identification System Enhanced with Manycore Technology}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {31--48}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/icissp/KnirschENFP15, author = {Fabian Knirsch and Dominik Engel and Christian Neureiter and Marc Fr{\^{\i}}ncu and Viktor K. Prasanna}, title = {Model-driven Privacy Assessment in the Smart Grid}, booktitle = {{ICISSP}}, pages = {173--181}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/KnirschENFP15a, author = {Fabian Knirsch and Dominik Engel and Christian Neureiter and Marc Fr{\^{\i}}ncu and Viktor K. Prasanna}, title = {Privacy Assessment of Data Flow Graphs for an Advanced Recommender System in the Smart Grid}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {89--106}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/icissp/KoenePCSAORM15, author = {Ansgar R. Koene and Elvira Perez and Christopher James Carter and Ramona Statache and Svenja Adolphs and Claire O'Malley and Tom Rodden and Derek McAuley}, title = {Research Ethics and Public Trust, Preconditions for Continued Growth of Internet Mediated Research - Public Confidence in Internet Mediate Research}, booktitle = {{ICISSP}}, pages = {163--168}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/KrishnamachariN15, author = {Sriram Krishnamachari and Mehrdad Nojoumian and Kemal Akkaya}, title = {Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational vs Unconditional Security}, booktitle = {{ICISSP}}, pages = {106--113}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/KunzFNP15, author = {Michael Kunz and Ludwig Fuchs and Michael Netter and G{\"{u}}nther Pernul}, title = {Analyzing Quality Criteria in Role-based Identity and Access Management}, booktitle = {{ICISSP}}, pages = {64--72}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/KunzFNP15a, author = {Michael Kunz and Ludwig Fuchs and Michael Netter and G{\"{u}}nther Pernul}, title = {How to Discover High-Quality Roles? {A} Survey and Dependency Analysis of Quality Criteria in Role Mining}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {49--67}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/icissp/LeeL15, author = {Wei{-}Han Lee and Ruby B. Lee}, title = {Multi-sensor Authentication to Improve Smartphone Security}, booktitle = {{ICISSP}}, pages = {270--280}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/LeeL15a, author = {Wei{-}Han Lee and Ruby B. Lee}, title = {Implicit Authentication for Smartphone Security}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {160--176}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/icissp/LehnhardtRSC15, author = {Jan Lehnhardt and Tobias Rho and Adrian Spalka and Armin B. Cremers}, title = {Performance-optimized Indexes for Inequality Searches on Encrypted Data in Practice}, booktitle = {{ICISSP}}, pages = {221--229}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/LimYST15, author = {Hyoyoung Lim and Yukiko Yamaguchi and Hajime Shimada and Hiroki Takakura}, title = {Malware Classification Method Based on Sequence of Traffic Flow}, booktitle = {{ICISSP}}, pages = {230--237}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/MaiorcaACG15, author = {Davide Maiorca and Davide Ariu and Igino Corona and Giorgio Giacinto}, title = {A Structural and Content-based Approach for a Precise and Robust Detection of Malicious {PDF} Files}, booktitle = {{ICISSP}}, pages = {27--36}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/MaiorcaACG15a, author = {Davide Maiorca and Davide Ariu and Igino Corona and Giorgio Giacinto}, title = {An Evasion Resilient Approach to the Detection of Malicious {PDF} Files}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {68--85}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/icissp/McDaniel15, author = {Patrick D. McDaniel}, title = {A New Science of Security Decision Making}, booktitle = {{ICISSP}}, pages = {IS--13}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/MoingS15, author = {Josselyn Le Moing and Ingo Stengel}, title = {The Smartphone as a Gait Recognition Device - Impact of Selected Parameters on Gait Recognition}, booktitle = {{ICISSP}}, pages = {322--328}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/MoingS15a, author = {Josselyn Le Moing and Ingo Stengel}, title = {Impact of External Parameters on the Gait Recognition Using a Smartphone}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {219--233}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/icissp/MukherjeeM15, author = {Preetam Mukherjee and Chandan Mazumdar}, title = {A Novel Model of Security Policies and Requirements}, booktitle = {{ICISSP}}, pages = {73--82}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/NarayanaswamySS15, author = {Jayagopal Narayanaswamy and Raghav V. Sampangi and Srinivas Sampalli}, title = {{HIDE:} Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption}, booktitle = {{ICISSP}}, pages = {124--131}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/NergaardUG15, author = {Henrik Nergaard and Nils Ulltveit{-}Moe and Terje Gj{\o}s{\ae}ter}, title = {A Scratch-based Graphical Policy Editor for {XACML}}, booktitle = {{ICISSP}}, pages = {182--190}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/NergaardUG15a, author = {Henrik Nergaard and Nils Ulltveit{-}Moe and Terje Gj{\o}s{\ae}ter}, title = {ViSPE: {A} Graphical Policy Editor for {XACML}}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {107--121}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/icissp/NetterPRR15, author = {Michael Netter and G{\"{u}}nther Pernul and Christian Richthammer and Moritz Riesner}, title = {Privacy in Social Networks: Existing Challenges and Proposals for Solutions}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {16--27}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/icissp/NoorafizaMUKS15, author = {Matrazali Noorafiza and Hiroshi Maeda and Ryuya Uda and Toshiyuki Kinoshita and M. Shiratori}, title = {Vulnerability Analysis using Network Timestamps in Full Virtualization Virtual Machine}, booktitle = {{ICISSP}}, pages = {83--89}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/Pernul15, author = {G{\"{u}}nther Pernul}, title = {Privacy in Social Networks - Existing Challenges and Proposals for Solution}, booktitle = {{ICISSP}}, pages = {IS--11}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/PrevelakisH15, author = {Vassilis Prevelakis and Mohammad Hamad}, title = {A Policy-based Communications Architecture for Vehicles}, booktitle = {{ICISSP}}, pages = {155--162}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/RoyM15, author = {Puloma Roy and Chandan Mazumdar}, title = {Modelling of Enterprise Insider Threats}, booktitle = {{ICISSP}}, pages = {132--136}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/SakpereK15, author = {Aderonke Busayo Sakpere and Anne V. D. M. Kayem}, title = {Adaptive Buffer Resizing for Efficient Anonymization of Streaming Data with Minimal Information Loss}, booktitle = {{ICISSP}}, pages = {191--201}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/SakpereK15a, author = {Aderonke Busayo Sakpere and Anne V. D. M. Kayem}, title = {Supporting Streaming Data Anonymization with Expressions of User Privacy Preferences}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {122--136}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/icissp/ShoufanAB15, author = {Abdulhadi Shoufan and Hassan Alnoon and Joonsang Baek}, title = {On the Power Consumption of Cryptographic Processors in Civil Microdrones}, booktitle = {{ICISSP}}, pages = {283--290}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/ShoufanAB15a, author = {Abdulhadi Shoufan and Hassan Alnoon and Joonsang Baek}, title = {Secure Communication in Civil Drones}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {177--195}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/icissp/TimpanaroCCF15, author = {Juan Pablo Timpanaro and Thibault Cholez and Isabelle Chrisment and Olivier Festor}, title = {Evaluation of the Anonymous {I2P} Network's Design Choices Against Performance and Security}, booktitle = {{ICISSP}}, pages = {46--55}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/TondelLJ15, author = {Inger Anne T{\o}ndel and Maria B. Line and Gorm Johansen}, title = {Assessing Information Security Risks of {AMI} - What Makes it so Difficult?}, booktitle = {{ICISSP}}, pages = {56--63}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/UwizeyemunguP15, author = {Sylvestre Uwizeyemungu and Placide Poba{-}Nzaou}, title = {Understanding Information Technology Security Standards Diffusion - An Institutional Perspective}, booktitle = {{ICISSP}}, pages = {5--16}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/VibertYVBCR15, author = {Beno{\^{\i}}t Vibert and Zhigang Yao and Sylvain Vernois and Jean{-}Marie Le Bars and Christophe Charrier and Christophe Rosenberger}, title = {EvaBio Platform for the Evaluation Biometric System - Application to the Optimization of the Enrollment Process for Fingerprints Devices}, booktitle = {{ICISSP}}, pages = {329--335}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/VibertYVBCR15a, author = {Beno{\^{\i}}t Vibert and Zhigang Yao and Sylvain Vernois and Jean{-}Marie Le Bars and Christophe Charrier and Christophe Rosenberger}, title = {EvaBio a New Modular Platform to Evaluate Biometric System}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {234--250}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/icissp/YaoBCR15, author = {Zhigang Yao and Jean{-}Marie Le Bars and Christophe Charrier and Christophe Rosenberger}, title = {Quality Assessment of Fingerprints with Minutiae Delaunay Triangulation}, booktitle = {{ICISSP}}, pages = {315--321}, publisher = {SciTePress}, year = {2015} }
@inproceedings{DBLP:conf/icissp/YaoBCR15a, author = {Zhigang Yao and Jean{-}Marie Le Bars and Christophe Charrier and Christophe Rosenberger}, title = {Fingerprint Quality Assessment Combining Blind Image Quality, Texture and Minutiae Features}, booktitle = {{ICISSP}}, pages = {336--343}, publisher = {SciTePress}, year = {2015} }
@proceedings{DBLP:conf/icissp/2015, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, publisher = {SciTePress}, year = {2015} }
@proceedings{DBLP:conf/icissp/2015s, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {576}, publisher = {Springer}, year = {2015} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.