


default search action
17th FPS 2024: Montréal, QC, Canada - Part I
- Kamel Adi

, Simon Bourdeau
, Christel Durand, Valérie Viet Triem Tong
, Alina Dulipovici
, Yvon Kermarrec, Joaquín García-Alfaro
:
Foundations and Practice of Security - 17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9-11, 2024, Revised Selected Papers, Part I. Lecture Notes in Computer Science 15532, Springer 2025, ISBN 978-3-031-87498-7
Critical Issues of Protecting Systems Against Digital Threats, Considering Financial, Technological, and Operational Implications
- Brian Nussbaum

, Kimberly A. Cornell
, Li Huang
:
The Perfect Victim? Family Offices as Targets for Cybercriminals. 3-17 - Mohamed El Amine Bekhouche

, Kamel Adi:
Advanced Real-Time Detection of Cyber Threat Information from Tweets. 18-33 - Frederic Schlackl, Alina Dulipovici, Vincent Grégoire:

Mitigating Spillover Effects of Ransomware in Financial Markets: Lessons from the LockBit Attacks. 34-41 - Dane Vanderkooi

, Atefeh Mashatan
, Ozgur Turetken
:
Exploring Smart Speaker Disclosure and Adoption Intentions: A Privacy Adoption Calculus Perspective. 42-57 - Lyes Bayou, Ali Awarkeh, Mohamed-El-Hadi Haouari, Reda Yaich, Marc-Antoine Faillon:

ICoSSiuM: An Integrated Communication Security Simulator for Maritime Operations. 58-73
Automating and Enhancing Security Mechanisms in Software Systems and Data Management
- Carmen Cheh, Nan Shing Kham Shing, Edwin Ching Jitt Ang, Binbin Chen, Desmond Cher, Frank Liauw, Reuben Liang Yi Lim:

Lowering the Barrier: An Automatic Attack Flow Generation Framework for Non-Security Experts. 77-93 - John Breton

, Jason Jaskolka
, George O. M. Yee
:
An Approach to Determine a System's Behavioural Security Posture. 94-110 - Bilel Zaghdoudi, Christine Hennebert, Maria Potop-Butucaru:

Secure Data Traceability for Mobile Data Collectors. 111-127 - Quentin Rouland, Kamel Adi, Omer Nguena Timo, Luigi Logrippo:

Toward Automatic Enforcement of Security Patterns in Software Architecture Using Alloy. 128-145
Cybersecurity and AI When Applied to Emerging Technologies
- Nakul Ghate

, Shohei Mitani
, Hirofumi Ueda
:
Light-SABRE: A Lightweight Encrypted Data Distribution System for Internet of Things. 149-167 - Mohamed El Amine Bekhouche

, Myria Bouhaddi, Wahib Larbi, Kamel Adi:
Evaluating Large Language Models on Cybersecurity Knowledge and Skills: A Comparative Analysis. 168-185 - Zhuo Chen, Issa Traoré, Mohammad Mamun, Sherif Saad:

Drone Anomaly Detection: Dataset and Unsupervised Machine Learning. 186-201 - Dylan Léveillé

, Jason Jaskolka
:
A Tool for Enabling Scalable Automation in Security Control Selection. 202-213
Cybersecurity and Ethics
- George Silva, Norah Ridley, Enrico Branca, Natalia Stakhanova:

A Systematic Evaluation of Non-SDK Interface Restrictions in Android: Bridging the Gap Between Guidelines and Practice. 217-234 - Thang Bui, Elliot Shabram, Anthony Matricia:

An Approach for Handling Missing Attribute Values in Attribute-Based Access Control Policy Mining. 235-248 - Dorsaf Sallami

, Esma Aïmeur:
Does Gender Matter? Examining and Mitigating Gender Bias in Fake News Detection. 249-266 - Mohammad Q. Alnabhan, Paula Branco

:
ProFineLlama: A Prompt and Fine-Tuned Transfer Learning Approach for Multi-domain Fake News Detection. 267-279 - Franck Fotso Kuate

, Florent Avellaneda
, Omer Nguena Timo
:
Parametric Automata for Dynamic Access Control Policies. 280-292
Cybersecurity and Privacy in Connected and Autonomous Systems for IoT, Smart Environments, and Critical Infrastructure
- Abhishek Kumar Mishra, Samuel Pélissier, Mathieu Cunche:

Fingerprinting Connected Wi-Fi Devices Using Per-network MAC Addresses. 295-303 - Khosro Salmani

, Alyssa Landeta, Mohit Gupta, Chidera Uzoka:
Privacy Guard: Empowering Users with Privacy Labels and Intuitive Apps. 304-319 - Shabnam Saderi Oskouei, Oyonika Samazder, Gaurav Vinay Uttarkar, Kalikinkar Mandal

:
Actively Secure Authenticated Data Acquisition Protocols: Advancing Substation Automation Security. 320-335 - Saad Inshi, Rasel Chowdhury

, Mohammad Bany Taha
, Chamseddine Talhi:
Enhancing Autonomy of Context-Aware Self-healing in Fog Native Environments. 336-350 - Valeria Valdés Ríos

, Fatiha Zaïdi
, Ana Rosa Cavalli
:
Detecting Cyber Attacks on Electric Vehicles Charging Stations. 351-362
New Trends in Advanced Cryptographic Protocols
- Shohei Kaneko, Pascal Lafourcade

, Lola-Baie Mallordy, Daiki Miyahara
, Maxime Puys
, Kazuo Sakiyama
:
Secure Voting Protocol Using Balance Scale. 365-376 - Matthieu Amet

, Oussama Ben Moussa, Guillaume Bonfante, Sébastien Duval
:
Monitoring the Execution of Cryptographic Functions. 377-392 - Sumit Kumar Paul

, D. A. Knox:
RouterORAM: An O(1)-Latency and Client-Work ORAM. 393-413

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














