default search action
14th CRiSIS 2019: Hammamet, Tunisia
- Slim Kallel, Frédéric Cuppens, Nora Cuppens-Boulahia, Ahmed Hadj Kacem:
Risks and Security of Internet and Systems, 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29-31, 2019, Proceedings. Lecture Notes in Computer Science 12026, Springer 2020, ISBN 978-3-030-41567-9
Risk Analysis and Management
- Welderufael B. Tesfay, Dimitra Nastouli, Yannis C. Stamatiou, Jetzabel M. Serna:
pQUANT: A User-Centered Privacy Risk Analysis Framework. 3-16 - Aida Omerovic, Hanne Vefsnmo, Oddbjørn Gjerde, Siri T. Ravndal, Are Kvinnesland:
An Industrial Trial of an Approach to Identification and Modelling of Cybersecurity Risks in the Context of Digital Secondary Substations. 17-33 - Carolina Adaros Boye, Paul Kearney, Mark B. Josephs:
Continuous Risk Management for Industrial IoT: A Methodological View. 34-49 - Nazila Gol Mohammadi, Roman Wirtz, Maritta Heisel:
Systematic Asset Identification and Modeling During Requirements Engineering. 50-66
Access Control and Permission
- Adel Jebali, Salma Sassi, Abderrazak Jemai:
Inference Control in Distributed Environment: A Comparison Study. 69-83 - Rajendra Kumar Solanki, Vijay Laxmi, Manoj Singh Gaur:
MAPPER: Mapping Application Description to Permissions. 84-98
Secure Embedded Systems
- Amina Bel Korchi, Nadia El Mrabet:
Delegation of Computation Using FV Cryptosystem. 101-112 - Asma Chaouch, Fangan-Yssouf Dosso, Laurent-Stéphane Didier, Nadia El Mrabet, Bouraoui Ouni, Belgacem Bouallegue:
Hardware Optimization on FPGA for the Modular Multiplication in the AMNS Representation. 113-127 - Yuning Jiang, Yacine Atif, Jianguo Ding, Wei Wang:
A Semantic Framework with Humans in the Loop for Vulnerability-Assessment in Cyber-Physical Production Systems. 128-143
Network and Cloud Security
- Imen Bouabidi, Pr. Mahmoud Abdellaoui:
A Complete and Generic Security Approach for Wireless Sensors Network. 147-163 - Karim Lounis, Mohammad Zulkernine:
WPA3 Connection Deprivation Attacks. 164-176 - Firas Saidi, Zouheir Trabelsi, Henda Ben Ghézela:
An Approach for Thwarting Malicious Secret Channel: The Case of IP Record Route Option Header-Based Covert Channels. 177-192 - Mariem Bouchaala, Cherif Ghazel, Leïla Azouz Saïdane:
Toward Ciphertext Policy Attribute Based Encryption Model: A Revocable Access Control Solution in Cloud Computing. 193-207
Information Security Policy
- Mouna Rhahla, Sahar Allegue, Takoua Abdellatif:
A Framework for GDPR Compliance in Big Data Systems. 211-226 - Saad Altamimi, Karen Renaud, Timothy Storer:
"I do it because they do it": Social-Neutralisation in Information Security Practices of Saudi Medical Interns. 227-243
Data Protection and Machine Learning for Security
- Mario Parreño Centeno, Mohammed Aamir Ali, Yu Guan, Aad van Moorsel:
Unsupervised Machine Learning for Card Payment Fraud Detection. 247-262 - Hela Mliki, Abir Hadj Kaceam, Lamia Chaari:
Intrusion Detection Study and Enhancement Using Machine Learning. 263-278 - Routa Moussaileb, Charles Berti, Guillaume Deboisdeffre, Nora Cuppens, Jean-Louis Lanet:
Watch Out! Doxware on the Way... 279-292 - Anissa Zenati, Wael Ouarda, Adel M. Alimi:
CDISS-BEMOS: A New Color Document Image Steganography System Based on Beta Elliptic Modeling of the Online Signature. 293-307
Distributed Detection System and Blockchain
- Amal Gassara, Ismael Bouassida Rodriguez:
A Graph Based Model for UAVs Group-Wide Collaboration Applied on an Anti-terrorism Scenario. 311-324 - Amal Abid, Saoussen Cheikhrouhou, Mohamed Jmaiel:
Modelling and Executing Time-Aware Processes in Trustless Blockchain Environment. 325-341 - Fatima Ezzahra Ouerfelli, Khaled Barbaria, Belhassen Zouari, Claude Fachkha:
Multi-scale Adaptive Threshold for DDoS Detection. 342-354 - Linus Karlsson, Pegah Nikbakht Bideh, Martin Hell:
A Recommender System for User-Specific Vulnerability Scoring. 355-364 - Fatima Ezzahra Ouerfelli, Khaled Barbaria, Belhassen Zouari, Claude Fachkha:
Distributed Detection System Using Wavelet Decomposition and Chi-Square Test. 365-377
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.