


default search action
11th ICISSP 2025: Porto, Portugal - Volume 2
- Roberto Di Pietro, Karen Renaud, Paolo Mori:
Proceedings of the 11th International Conference on Information Systems Security and Privacy, ICISSP 2025 - Volume 2, Porto, Portugal, February 20-22, 2025. SCITEPRESS 2025, ISBN 978-989-758-735-1
Invited Speakers
- Wenjing Lou:
Rethinking Privacy Protection in Federated Learning in the Face of Model Inversion Attacks. ICISSP 2025: 5 - Awais Rashid:
Securing Ultra-Large Scale Infrastructures: Challenges and Opportunities. ICISSP 2025: 7 - Ahmad-Reza Sadeghi:
Turing's Echo on Deceptive Machines: The Challenge of Distinguishing Human and AI Creations. ICISSP 2025: 9
Applications and Services
- Hari Krishna, Jared Oluoch, Junghwan Kim:
A Hybrid Approach for Detecting SQL-Injection Using Machine Learning Techniques. 15-23 - Khang Mai, Razvan Beuran, Naoya Inoue:
CyLLM-DAP: Cybersecurity Domain-Adaptive Pre-Training Framework of Large Language Models. 24-35 - Roberto Milanese
, Michele Guerra, Michele Daniele, Giovanni Fabbrocino, Fausto Fasano:
Assessing the Effectiveness of an LLM-Based Permission Model for Android. 36-47 - Fabio Büsser, Jan Kressebuch, Martín Ochoa, Valentin Zahnd, Ariane Trammell
:
Scrooge: Detection of Changes in Web Applications to Enhance Security Testing. 48-59 - Henry Hosseini
:
Privacy Policies in Medium-Sized European Town Administrations: A Comparative Analysis of English and German-Speaking Countries. 60-71 - Kimia Tahayori, Sherif Saad, Mohammad Mamun, Saeed Samet:
HybridMTD: Enhancing Robustness Against Adversarial Attacks with Ensemble Neural Networks and Moving Target Defense. 72-83 - Iker Antonio Olarra Maldonado, Erik Meeuwissen, Puck de Haan, Rob van der Mei:
Telosian: Reducing False Positives in Real-Time Cyber Anomaly Detection by Fast Adaptation to Concept Drift. 84-97 - Farzad Nourmohammadzadeh Motlagh, Mehrdad Hajizadeh, Mehryar Majd
, Pejman Najafi, Feng Cheng, Christoph Meinel:
Large Language Models in Cybersecurity: State-of-the-Art. 98-110 - Hervais Simo, Michael Kreutzer:
SGX-PrivInfer: A Secure Collaborative System for Quantifying and Mitigating Attribute Inference Risks in Social Networks. 111-122 - David Debono, Anastasia Sare:
The Dual-Edged Sword: The Impact of Large Language Models in Network Infrastructure Security. 125-132 - Masrur Masqub Utsash, Georgios Kavallieratos, Konstantinos Antonakopoulos, Sokratis K. Katsikas:
Investigating the Effectiveness of Zero-Trust Architecture for Satellite Cybersecurity. 133-140 - Sun-Jin Lee, Hye-Yeon Shim, Jung-Hwa Rye, Il-Gu Lee:
Dynamic-Differential Privacy based on Feature Selection with Improved Usability and Security. 141-149 - Kriti Majumdar, Nitesh Kumar, Anand Handa, Sandeep K. Shukla:
Attackers' Profiling Based on Multi-Attack Patterns in SSH Service. 150-159 - Hung-Lei Lee, Chun-Shien Lu, Jia-Ching Wang:
Defense Against Backdoor Attacks on Image Retrieval Models Through Strategic Manipulations. ICISSP (2) 2025: 160-166 - Bruno Freitas Cruz, Bruno Sousa:
RiVS: Reputation in VoIP Systems. 167-175 - Qingsong Zhao, Urska Cvek, Kevin Zhao:
Cybersecurity Fundamentals Training Among Middle School Students: Building a Strong Foundation. 176-183 - Wenbo Feng, Sanyam Vyas, Tingting Li
:
Autonomous Cyber Defence by Quantum-Inspired Deep Reinforcement Learning. 184-191 - Gustavo Silva Funchal, Tiago Pedrosa, Fernando de la Prieta, Paulo Leitão:
Distributed Machine Learning and Multi-Agent Systems for Enhanced Attack Detection and Resilience in IoT Networks. 192-203 - Khang Mai, Nakul Ghate, Jongmin Lee, Razvan Beuran:
LLM-Based Fine-Grained ABAC Policy Generation. 204-212 - Fatmaelzahraa Eltaher, Rahul Krishna Gajula, Luis Miralles-Pechuán, Christina Thorpe, Susan McKeever:
The Digital Loophole: Evaluating the Effectiveness of Child Age Verification Methods on Social Media. 213-222 - Amira Abdelbaky, Sherif Saad, Mohammad Mamun:
Adaptive Ensemble Defense: Mitigating NLP Adversarial Attacks with Data-Augmented Voting Mechanisms. ICISSP (2) 2025: 223-230 - Atul Pandey, Bhawana Rudra:
Hybrid Classical Quantum Learning Model Framework for Detection of Deepfake Audio. 231-239 - Malte Josten
, Matthias Schaffeld, René Lehmann, Torben Weis:
Navigating the Security Challenges of LLMs: Positioning Target-Side Defenses and Identifying Research Gaps. 240-247 - Muaan ur Rehman, Rajesh Kalakoti, Hayretdin Bahsi:
Comprehensive Feature Selection for Machine Learning-Based Intrusion Detection in Healthcare IoMT Networks. 248-259 - Syed Badruddoja, Sasi Kiran Kanduri, Ram Dantu:
Randomizing Forger Selection to Improve Decentralization in Proof of Stake Consensus Protocol. 260-267 - Syed Badruddoja, Bashar Najah Allwza, Ram Dantu:
Evaluating and Defending Backdoor Attacks in Image Recognition Systems. 268-275 - Daniil Legkodymov
, Dmitry Levshun:
Exploring Efficiency of Machine Learning in Profiling of Internet of Things Devices for Malicious Activity Detection. 276-283
Technologies and Foundations
- Daniela Pinto, João Vitorino, Eva Maia, Ivone Amorim, Isabel Praça:
Flow Exporter Impact on Intelligent Intrusion Detection Systems. 289-298 - Ali Hossary
, Stefano Tomasin:
VBSF: A Visual-Based Spam Filtering Technique for Obfuscated Emails. 299-305 - Hiroki Okada, Tsuyoshi Takagi:
Gram Root Decomposition over the Polynomial Ring: Application to Sphericalization of Discrete Gaussian. 306-317 - Luis Del Vasto-Terrientes, Sergio Martínez, David Sánchez:
Privacy- & Utility-Preserving Data Releases over Fragmented Data Using Individual Differential Privacy. 318-329 - Benjamin Aziz, Ukamaka Oragwu, Safa Tharib:
A Deontic Logic Model of Attribute-Based Information Flows in Database-Defined Networks with Application to Healthcare Monitoring. 330-341 - Sara Sumaidaa, Hamda Almenhali, Rajkumar Ramasamy, Oleksii Voronin, Mohammed Alazzani, Kyusuk Han:
Securing the Device Lifecycle Management: A Scalable and Cost-Efficient Public Key Infrastructure Through Microservices. 342-352 - Dorine Chagnon, Axel Durbet, Paul-Marie Grollemund, Kevin Thiry-Atighehchi:
Exploit the Leak: Understanding Risks in Biometric Matchers. 353-362 - Peter Wafik
, Alessio Botta, Luigi Gallo, Gennaro Esposito Mocerino, Cornelia Herbert, Ivan Annicchiarico, Alia El Bolock, Slim Abdennadher:
Enhanced Predictive Clustering of User Profiles: A Model for Classifying Individuals Based on Email Interaction and Behavioral Patterns. 363-374 - Martin Holec, Jan Belohoubek, Pavel Rous, Tomás Pokorný, Róbert Lórencz, Frantisek Steiner:
X-Ray Radiation Effects on SRAM-Based TRNG and PUF. 375-384 - Jens Leicht, Maritta Heisel:
Management of Customized Privacy Policies. 385-396 - Koyel Pramanick, Prasad A. Kulkarni:
Precise Detection of Security Checks in Program Binaries. 397-408 - Thomas Prévost, Bruno Martin, Olivier Alibart:
A Secret Key Spreading Protocol for Extending ETSI Quantum Key Distribution. 411-418 - Stephan Spitz, Alexander Lawall, Michal Andrzejczak:
Quantum-Resilient IoT: Integrating Hardware-Based Post-Quantum Cryptography for Robust Device Security. 419-424 - Michael Schlaubitz
, Onur Veyisoglu, Marc Rennhard:
A2CT: Automated Detection of Function and Object-Level Access Control Vulnerabilities in Web Applications. 425-436 - Diana Maimut, Alexandru Cristian Matei, George Teseleanu:
(Deep) Learning About Elliptic Curve Cryptography. 437-444 - Shusaku Uemura, Kazuhide Fukushima, Shinsaku Kiyomoto:
Approximations of the Sigmoid Function Beyond the Approximation Domains for Privacy-Preserving Neural Networks. 445-454 - Dai Itakura, Taiga Manabe, Yuki Kamata, Ayana Oku, Hiroshi Yamamoto, Yoshihisa Takayama, Toshihiro Ohigashi:
A Targeting Attack by Dynamic Fake QR Code Using Invisible Laser Irradiation. 455-462 - Rupesh Raj Karn, Johann Knechtel, Ozgur Sinanoglu:
Logic Locking for Random Forests: Securing HDL Design and FPGA Accelerator Implementation. 463-473 - Maya Anderson, Guy Amit, Abigail Goldsteen:
Is My Data in Your Retrieval Database? Membership Inference Attacks Against Retrieval Augmented Generation. 474-485 - Nestori Syynimaa
:
Exploring Attack Paths Using Graph Theory: Case - Microsoft Entra ID Pass-Through Authentication. 486-492 - Aditya Sissodiya, Ulf Bodin, Olov Schelén:
Objective- and Utility-Based Negotiation for Access Control. 493-501 - Modjtaba Gharibyar, Clemens Krüger, Dominik Schoop:
Towards Efficient Cloud Data Processing: A Comprehensive Guide to CKKS Parameter Selection. 502-509 - Danai Georgiou, Carlos Franzreb, Tim Polzehl:
On the Effect of Dataset Size and Composition for Privacy Evaluation. 510-517 - Oliver Langthaler, Günther Eibl, Lars-Kevin Klüver, Andreas Unterweger:
Evaluating the Efficacy of LINDDUN GO for Privacy Threat Modeling for Local Renewable Energy Communities. 518-525 - Sudipta Paul, Julián Salas, Vicenç Torra:
Improving Locally Differentially Private Graph Statistics Through Sparseness-Preserving Noise-Graph Addition. 526-533 - Pedro Santos, Tânia Carvalho, Filipe Magalhães, Luís Antunes:
Secure Visual Data Processing via Federated Learning. 534-541 - Mahya Soleimani Jadidi, Jonathan Anderson:
Leash: A Transparent Capability-Based Sandboxing Supervisor for Unix. 542-551 - Hiroya Kato, Ryo Meguro, Seira Hidano, Takuo Suganuma, Masahiro Hiji:
Flexible Noise Based Robustness Certification Against Backdoor Attacks in Graph Neural Networks. 552-563 - George Teseleanu:
Security Analysis of a Color Image Encryption Scheme Based on a Fractional-Order Hyperchaotic System. 564-570 - Hiroki Yamamuro, Shohei Beppu, Kazuhide Fukushima, Shinsaku Kiyomoto:
Security Analysis of Biased Basis for Efficient BB84. 571-574 - Danping Niu, Yuan Ping, Yujian Liu, Fanxi Wei, Wenhong Wu:
EK-Means: Towards Making Ensemble K-Means Work for Image-Based Data Analysis Without Prior Knowledge of K. 575-584 - Mehmet Fide, Emin Anarim:
User Authentication on Remote Connections with Siamese Networks Using Keyboard Usage Behavior and Corresponding Noise Performances. 585-594 - Hamza Aguelal
, Paolo Palmieri:
De-Anonymization of Health Data: A Survey of Practical Attacks, Vulnerabilities and Challenges. 595-606 - Emrullah Fatih Yetkin, Tugçe Balli:
Privacy Preservation for Machine Learning in IIoT Data via Manifold Learning and Elementary Row Operations. 607-614 - Lanlan Pan
, Ruonan Qiu, Minghui Yang:
Using Compact DNSSEC and Self-Signed Certificate to Improve Security and Privacy for Second-Level Domain Resolution. 615-623 - Mohammed Ramadan, Pranit Gadekar, Veit Hagenmeyer, Ghada Elbez:
Analytical Evaluation of Time-Based Cryptography. 624-634 - Taisho Sasada, Bernard Ousmane Sané:
Memory-Saving Oblivious RAM for Trajectory Data via Hierarchical Generation of Dummy Access over Untrusted Cloud Environment. 635-642 - Ali Karimi, Asma Adnane, Iain W. Phillips, Elhadj Benkhelifa:
Connected Vehicles Data Classification and the Influence of a Sustainable Data Governance for Optimal Utilisation of In-Vehicle Data. 643-650 - Andre Büttner, Nils Gruschka:
Device-Bound vs. Synced Credentials: A Comparative Evaluation of Passkey Authentication. 651-659

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.