


default search action
CSS 2018: Amalfi, Italy
- Arcangelo Castiglione, Florin Pop, Massimo Ficco, Francesco Palmieri:

Cyberspace Safety and Security - 10th International Symposium, CSS 2018, Amalfi, Italy, October 29-31, 2018, Proceedings. Lecture Notes in Computer Science 11161, Springer 2018, ISBN 978-3-030-01688-3
Cybersecurity
- Chedy Missaoui, Safa Bachouch, Ibrahim Abdelkader, Slim Trabelsi:

Who Is Reusing Stolen Passwords? An Empirical Study on Stolen Passwords and Countermeasures. 3-17 - Hugo Sbai, Michael Goldsmith, Samy Meftali, Jassim Happa:

A Survey of Keylogger and Screenlogger Attacks in the Banking Sector and Countermeasures to Them. 18-32 - Munir Geden, Jassim Happa:

Classification of Malware Families Based on Runtime Behaviour. 33-48 - Ivan Letteri

, Giuseppe Della Penna
, Giovanni De Gasperis
:
Botnet Detection in Software Defined Networks by Deep Learning Techniques. 49-62 - Vincenzo Conti, Simone Sante Ruffo, Alessio Merlo, Mauro Migliardi

, Salvatore Vitabile:
A Bio-inspired Approach to Attack Graphs Analysis. 63-76 - Tony Quertier:

Confidence Curve for Continuous Authentication. 77-84 - Dragos Ionica, Florin Pop, Nirvana Popescu, Decebal Popescu, Ciprian Dobre

:
SCADA Security: Concepts and Recommendations. 85-98 - Thomas Clédel, Simon N. Foley, Nora Cuppens, Frédéric Cuppens, Yvon Kermarrec, Frédéric Dubois, Youssef Laarouchi, Gérard Le Comte:

Towards the Evaluation of End-to-End Resilience Through External Consistency. 99-114 - Ugo Fiore

, Adrian Florea
, Arpad Gellert
, Lucian Vintan
, Paolo Zanetti
:
Optimal Partitioning of LLC in CAT-enabled CPUs to Prevent Side-Channel Attacks. 115-123 - Walter Balzano, Fabio Vitale:

GER-EN - GNSS Error Reduction Using an Elastic Network Based on V2V and LiDAR. 124-131 - Brij B. Gupta

, Megha Quamara
:
A Dynamic Security Policies Generation Model for Access Control in Smart Card Based Applications. 132-143 - Flora Amato

, Giovanni Cozzolino, Antonino Mazzeo, Francesco Moscato:
An Advanced Methodology to Analyse Data Stored on Mobile Devices. 144-154
Cryptography, Data Security and Biometric Techniques
- Paolo D'Arco, Roberto De Prisco

, Alfredo De Santis
:
On the Equivalence of 2-Threshold Secret Sharing Schemes and Prefix Codes. 157-167 - Paolo D'Arco, Roberto De Prisco

, Angel L. Pérez del Pozo:
An Efficient and Reliable Two-Level Lightweight Authentication Protocol. 168-180 - Katarzyna Kapusta, Gérard Memmi:

Selective All-Or-Nothing Transform: Protecting Outsourced Data Against Key Exposure. 181-193 - Jakub Guziur, Michal Pawlak, Aneta Poniszewska-Maranda

, Bartosz Wieczorek:
Light Blockchain Communication Protocol for Secure Data Transfer Integrity. 194-208 - Michal Pawlak, Jakub Guziur, Aneta Poniszewska-Maranda

:
Towards the Blockchain Technology for System Voting Process. 209-223 - Ying Qin, Xiao Yang Shen, Zhen Yue Du:

Privacy-Preserving SAT Solving Based on Projection-Equivalence CNF Obfuscation. 224-239 - Ferdinando Di Martino, Salvatore Sessa:

A Fragile Watermarking and Bilinear Fuzzy Equations. 240-253 - Neyire Deniz Sarier

:
Privacy Preserving Biometric Identification on the Bitcoin Blockchain. 254-269 - Andrea F. Abate, Silvio Barra

, Andrea Casanova, Gianni Fenu, Mirko Marras:
Iris Quality Assessment: A Statistical Approach for Biometric Security Applications. 270-278
Social Security, Ontologies and Smart Applications
- Sunthoshan G. Govender, Marianne Loock, Elmarie Kritzinger

:
Enhancing Information Security Culture to Reduce Information Security Cost: A Proposed Framework. 281-290 - Fabio Clarizia, Francesco Colace, Marco Lombardi, Francesco Pascale, Domenico Santaniello:

Chatbot: An Education Support System for Student. 291-302 - Fabio Clarizia, Francesco Colace, Marco Lombardi, Francesco Pascale, Domenico Santaniello:

A Multilevel Graph Approach for Road Accidents Data Interpretation. 303-316 - Elmarie Kritzinger

, Marianne Loock, E. N. Mwim:
Cyber Safety Awareness and Culture Planning in South Africa. 317-326

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














