


default search action
11th CRiSIS 2016: Roscoff, France
- Frédéric Cuppens, Nora Cuppens, Jean-Louis Lanet, Axel Legay:

Risks and Security of Internet and Systems - 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10158, Springer 2017, ISBN 978-3-319-54875-3
Protection of Personal Data
- Esma Aïmeur, Gilles Brassard, Jonathan Rioux:

CLiKC: A Privacy-Mindful Approach When Sharing Data. 3-10 - Aurélien Palisse, Hélène Le Bouder, Jean-Louis Lanet, Colas Le Guernic, Axel Legay:

Ransomware and the Legacy Crypto API. 11-28
Risk and Security Analysis Methodology
- Razika Lounas, Nisrine Jafri, Axel Legay, Mohamed Mezghiche, Jean-Louis Lanet:

A Formal Verification of Safe Update Point Detection in Dynamic Software Updating. 31-45 - Hela Hakim, Asma Sellami, Hanêne Ben-Abdallah

:
Analyzing the Risk of Authenticity Violation Based on the Structural and Functional Sizes of UML Sequence Diagrams. 46-59 - Sravani Teja Bulusu, Romain Laborde, Ahmad Samer Wazan, François Barrère, Abdelmalek Benzekri:

Towards the Weaving of the Characteristics of Good Security Requirements. 60-74
Methodology for Security
- Olga Gadyatskaya, Katsiaryna Labunets, Federica Paci

:
Towards Empirical Evaluation of Automated Risk Assessment Methods. 77-86 - Gustavo Gonzalez Granadillo, Joaquín García-Alfaro

, Hervé Debar
:
An n-Sided Polygonal Model to Calculate the Impact of Cyber Security Events. 87-102
Security and Formal Methods
- Barbara Kordy, Piotr Kordy, Yoann van den Boom:

SPTool - Equivalence Checker for SAND Attack Trees. 105-113 - Frédéric Mangano, Simon Duquennoy, Nikolai Kosmatov

:
Formal Verification of a Memory Allocation Module of Contiki with Frama-C: A Case Study. 114-120
Network Security
- Salaheddine Zerkane

, David Espes
, Philippe Le Parc, Frédéric Cuppens:
A Proactive Stateful Firewall for Software Defined Networking. 123-138 - Julien Duchêne, Colas Le Guernic, Eric Alata, Vincent Nicomette, Mohamed Kaâniche:

Protocol Reverse Engineering: Challenges and Obfuscation. 139-144
Detection and Monitoring
- Muhammad Imran Khan, Simon N. Foley

:
Detecting Anomalous Behavior in DBMS Logs. 147-152 - Younes Abid, Abdessamad Imine, Amedeo Napoli, Chedy Raïssi, Michaël Rusinowitch:

Online Link Disclosure Strategies for Social Networks. 153-168 - Rui Abreu

, César Andrés, Ana R. Cavalli
:
A Framework to Reduce the Cost of Monitoring and Diagnosis Using Game Theory. 169-182
Cryptography
- Amine Mrabet, Nadia El Mrabet, Ronan Lashermes, Jean-Baptiste Rigaud

, Belgacem Bouallegue, Sihem Mesnager, Mohsen Machhout
:
High-Performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication. 185-198 - Damien Jauvart, Jacques J. A. Fournier, Nadia El Mrabet, Louis Goubin:

Improving Side-Channel Attacks Against Pairing-Based Cryptography. 199-213 - Benjamin Lac, Marc Beunardeau, Anne Canteaut, Jacques J. A. Fournier, Renaud Sirdey

:
A First DFA on PRIDE: From Theory to Practice. 214-238

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














