Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/icissp/icissp2017.bht:"
@inproceedings{DBLP:conf/icissp/AhmadiS17, author = {Ahmad Ahmadi and Reihaneh Safavi{-}Naini}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Distance-bounding Identification}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {202--212}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006211102020212}, doi = {10.5220/0006211102020212}, timestamp = {Thu, 18 May 2017 14:22:34 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AhmadiS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AldayelA17, author = {Mashael Aldayel and Mohammad Alhussain}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Enhanced Identification of Sensitive User Inputs in Mobile Applications}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {506--515}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006238405060515}, doi = {10.5220/0006238405060515}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AldayelA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlepisP17, author = {Efthimios Alepis and Constantinos Patsakis}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {There's Wally! Location Tracking in Android without Permissions}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {278--284}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006125502780284}, doi = {10.5220/0006125502780284}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlepisP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlruhailyBC17, author = {Nada Alruhaily and Behzad Bordbar and Tom Chothia}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Towards an Understanding of the Misclassification Rates of Machine Learning-based Malware Detection Systems}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {101--112}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006174301010112}, doi = {10.5220/0006174301010112}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlruhailyBC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BannierF17, author = {Arnaud Bannier and Eric Filiol}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Mathematical Backdoors in Symmetric Encryption Systems - Proposal for a Backdoored AES-like Block Cipher}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {622--631}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006244406220631}, doi = {10.5220/0006244406220631}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BannierF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BarghVC17, author = {Mortaza S. Bargh and Marco Vink and Sunil Choenni}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {On Usage Control in Relational Database Management Systems - Obligations and Their Enforcement in Joining Datasets}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {190--201}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006209801900201}, doi = {10.5220/0006209801900201}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BarghVC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BernardeschiNDP17, author = {Cinzia Bernardeschi and Marco Di Natale and Gianluca Dini and Maurizio Palmieri}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Verifying Data Secure Flow in {AUTOSAR} Models by Static Analysis}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {704--713}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006288707040713}, doi = {10.5220/0006288707040713}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BernardeschiNDP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Bertino17, author = {Elisa Bertino}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Security and Privacy in the IoT}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {5}, publisher = {SciTePress}, year = {2017}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Bertino17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BeukemaAS17, author = {Wietze J. B. Beukema and Thomas Attema and Harm A. Schotanus}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Internal Network Monitoring and Anomaly Detection through Host Clustering}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {694--703}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006288606940703}, doi = {10.5220/0006288606940703}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BeukemaAS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BeuranPTCTS17, author = {Razvan Beuran and Cuong Pham and Dat Tang and Ken{-}ichi Chinen and Yasuo Tan and Yoichi Shinoda}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {CyTrONE: An Integrated Cybersecurity Training Framework}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {157--166}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006206401570166}, doi = {10.5220/0006206401570166}, timestamp = {Thu, 29 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BeuranPTCTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BuK17, author = {Lake Bu and Mark G. Karpovsky}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Design of Secure and ReliableWireless Transmission Channel for Implantable Medical Devices}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {233--242}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006270502330242}, doi = {10.5220/0006270502330242}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BuK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Cam-Winget17, author = {Nancy Cam{-}Winget}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Sensor Networks as the new Attack Target}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {7}, publisher = {SciTePress}, year = {2017}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Cam-Winget17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CiminoV17, author = {Mario Giovanni C. A. Cimino and Gigliola Vaglini}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Localization and Inhibition of Malicious Behaviors through a Model Checking based Methodology}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {644--652}, publisher = {SciTePress}, year = {2017}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CiminoV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CimitileMM17, author = {Aniello Cimitile and Fabio Martinelli and Francesco Mercaldo}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Machine Learning Meets iOS Malware: Identifying Malicious Applications on Apple Environment}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {487--492}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006217304870492}, doi = {10.5220/0006217304870492}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CimitileMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CostantinoMMP17, author = {Gianpiero Costantino and Fabio Martinelli and Ilaria Matteucci and Marinella Petrocchi}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Analysis of Data Sharing Agreements}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {167--178}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006207501670178}, doi = {10.5220/0006207501670178}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CostantinoMMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CourtoisM17, author = {Nicolas T. Courtois and Rebekah Mercer}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Stealth Address and Key Management Techniques in Blockchain Systems}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {559--566}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006270005590566}, doi = {10.5220/0006270005590566}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/CourtoisM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CozzaTCK17, author = {Vittoria Cozza and Zisis Tsiatsikas and Mauro Conti and Georgios Kambourakis}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Why Snoopy Loves Online Services: An Analysis of (Lack of) Privacy in Online Services}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {431--438}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006207204310438}, doi = {10.5220/0006207204310438}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/CozzaTCK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DamT17, author = {Khanh{-}Huu{-}The Dam and Tayssir Touili}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Malware Detection based on Graph Classification}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {455--463}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006209504550463}, doi = {10.5220/0006209504550463}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DamT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DamT17a, author = {Khanh{-}Huu{-}The Dam and Tayssir Touili}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Extracting Android Malicious Behaviors}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {714--723}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006288807140723}, doi = {10.5220/0006288807140723}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DamT17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DuboisF17, author = {Michel Dubois and Eric Filiol}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Hacking of the {AES} with Boolean Functions}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {599--609}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006091305990609}, doi = {10.5220/0006091305990609}, timestamp = {Wed, 08 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/DuboisF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DutaGT17, author = {Cristina{-}Loredana Duta and Laura Gheorghe and Nicolae Tapus}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Real-time {DSP} Implementations of Voice Encryption Algorithms}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {439--446}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006208304390446}, doi = {10.5220/0006208304390446}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/DutaGT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/EbrahimyP17, author = {Razgar Ebrahimy and Zoya Pourmirza}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Cyber-interdependency in Smart Energy Systems}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {529--537}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006262805290537}, doi = {10.5220/0006262805290537}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/EbrahimyP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/EiblFHSBRE17, author = {G{\"{u}}nther Eibl and Cornelia Ferner and Tobias Hildebrandt and Florian Stertz and Sebastian Burkhart and Stefanie Rinderle{-}Ma and Dominik Engel}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Exploration of the Potential of Process Mining for Intrusion Detection in Smart Metering}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {38--46}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006103900380046}, doi = {10.5220/0006103900380046}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/EiblFHSBRE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FukushimaHK17, author = {Kazuhide Fukushima and Seira Hidano and Shinsaku Kiyomoto}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {White-box Implementation of Stream Cipher}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {263--269}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006115202630269}, doi = {10.5220/0006115202630269}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FukushimaHK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GjertsenGBF17, author = {Eyvind Garder B. Gjertsen and Erlend Andreas Gj{\ae}re and Maria Bartnes and Waldo Rocha Flores}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Gamification of Information Security Awareness and Training}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {59--70}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006128500590070}, doi = {10.5220/0006128500590070}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GjertsenGBF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HadadSOPR17, author = {Tal Hadad and Bronislav Sidik and Nir Ofek and Rami Puzis and Lior Rokach}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {User Feedback Analysis for Mobile Malware Detection}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {83--94}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006131200830094}, doi = {10.5220/0006131200830094}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HadadSOPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HamadP17, author = {Mohammad Hamad and Vassilis Prevelakis}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Secure APIs for Applications in Microkernel-based Systems}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {553--558}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006265805530558}, doi = {10.5220/0006265805530558}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HamadP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HatinCSR17, author = {Julien Hatin and Estelle Cherrier and Jean{-}Jacques Schwartzmann and Christophe Rosenberger}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Privacy Preserving Transparent Mobile Authentication}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {354--361}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006186803540361}, doi = {10.5220/0006186803540361}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HatinCSR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HaupertM17, author = {Vincent Haupert and Tilo M{\"{u}}ller}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Rest in Protection - {A} Kernel-level Approach to Mitigate {RIP} Tampering}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {25--37}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006083800250037}, doi = {10.5220/0006083800250037}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HaupertM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HerwonoE17, author = {Ian Herwono and Fadi Ali El{-}Moussa}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Collaborative Tool for Modelling Multi-stage Attacks}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {312--317}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006137103120317}, doi = {10.5220/0006137103120317}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HerwonoE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HuffmeyerHMSW17, author = {Marc H{\"{u}}ffmeyer and Pascal Hirmer and Bernhard Mitschang and Ulf Schreier and Matthias Wieland}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {SitAC - {A} System for Situation-aware Access Control - Controlling Access to Sensor Data}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {113--125}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006186501130125}, doi = {10.5220/0006186501130125}, timestamp = {Fri, 29 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HuffmeyerHMSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HuynenL17, author = {Jean{-}Louis Huynen and Gabriele Lenzini}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {From Situation Awareness to Action: An Information Security Management Toolkit for Socio-technical Security Retrospective and Prospective Analysis}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {213--224}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006211302130224}, doi = {10.5220/0006211302130224}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HuynenL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/IrollaF17, author = {Paul Irolla and Eric Filiol}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Glassbox: Dynamic Analysis Platform for Malware Android Applications on Real Devices}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {610--621}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006094006100621}, doi = {10.5220/0006094006100621}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/IrollaF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KapratwarTS17, author = {Ankita Kapratwar and Fabio Di Troia and Mark Stamp}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Static and Dynamic Analysis of Android Malware}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {653--662}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006256706530662}, doi = {10.5220/0006256706530662}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KapratwarTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KarlssonHS17, author = {Linus Karlsson and Martin Hell and Paul Stankovski}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Improved Greedy Nonrandomness Detectors for Stream Ciphers}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {225--232}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006268202250232}, doi = {10.5220/0006268202250232}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KarlssonHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KarlzenBH17, author = {Henrik Karlz{\'{e}}n and Johan E. Bengtsson and Jonas Hallberg}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Assessing Information Security Risks using Pairwise Weighting}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {318--324}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006138203180324}, doi = {10.5220/0006138203180324}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KarlzenBH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KiperbergRAZ17, author = {Michael Kiperberg and Amit Resh and Asaf Algawi and Nezer Jacob Zaidenberg}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {System for Executing Encrypted Java Programs}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {245--252}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006078902450252}, doi = {10.5220/0006078902450252}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KiperbergRAZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KippeP17, author = {J{\"{o}}rg Kippe and Steffen Pfrang}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Network and Topology Models to Support {IDS} Event Processing}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {372--379}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006189403720379}, doi = {10.5220/0006189403720379}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KippeP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KrennLS17, author = {Stephan Krenn and Thomas Lor{\"{u}}nser and Christoph Striecks}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Batch-verifiable Secret Sharing with Unconditional Privacy}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {303--311}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006133003030311}, doi = {10.5220/0006133003030311}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KrennLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KumarL17, author = {Gautam Kumar and Brent Lagesse}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Limited Use Cryptographic Tokens in Securing Ephemeral Cloud Servers}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {447--454}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006208704470454}, doi = {10.5220/0006208704470454}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KumarL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LashkariDMG17, author = {Arash Habibi Lashkari and Gerard Draper{-}Gil and Mohammad Saiful Islam Mamun and Ali A. Ghorbani}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Characterization of Tor Traffic using Time based Features}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {253--262}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006105602530262}, doi = {10.5220/0006105602530262}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LashkariDMG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LeeLJML17, author = {Wei{-}Han Lee and Changchang Liu and Shouling Ji and Prateek Mittal and Ruby B. Lee}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Quantification of De-anonymization Risks in Social Networks}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {126--135}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006192501260135}, doi = {10.5220/0006192501260135}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LeeLJML17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LigierCFS17, author = {Damien Ligier and Sergiu Carpov and Caroline Fontaine and Renaud Sirdey}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Privacy Preserving Data Classification using Inner-product Functional Encryption}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {423--430}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006206704230430}, doi = {10.5220/0006206704230430}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LigierCFS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LopesA17, author = {Arthur Costa Lopes and Diego F. Aranha}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Platform-agnostic Low-intrusion Optical Data Exfiltration}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {474--480}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006211504740480}, doi = {10.5220/0006211504740480}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/LopesA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LuhS0S17, author = {Robert Luh and Gregor Schramm and Markus Wagner and Sebastian Schrittwieser}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Sequitur-based Inference and Analysis Framework for Malicious System Behavior}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {632--643}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006250206320643}, doi = {10.5220/0006250206320643}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/LuhS0S17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LuhSMJ17, author = {Robert Luh and Sebastian Schrittwieser and Stefan Marschalek and Helge Janicke}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Design of an Anomaly-based Threat Detection {\&} Explication System}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {397--402}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006205203970402}, doi = {10.5220/0006205203970402}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LuhSMJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LutasTC17, author = {Andrei Lutas and Daniel Ticle and Octavian Cret}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Hypervisor based Memory Introspection: Challenges, Problems and Limitations}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {285--294}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006125802850294}, doi = {10.5220/0006125802850294}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LutasTC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MartinelliMNSV17, author = {Fabio Martinelli and Francesco Mercaldo and Vittoria Nardone and Antonella Santone and Corrado Aaron Visaggio}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Identifying Mobile Repackaged Applications through Formal Methods}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {673--682}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006287906730682}, doi = {10.5220/0006287906730682}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MartinelliMNSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MartinezEMZ17, author = {V. Gayoso Mart{\'{\i}}nez and Luis Hern{\'{a}}ndez Encinas and Agust{\'{\i}}n Mart{\'{\i}}n Mu{\~{n}}oz and J. Zhang}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Breaking a Hitag2 Protocol with Low Cost Technology}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {579--584}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006271905790584}, doi = {10.5220/0006271905790584}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MartinezEMZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MorenoF17, author = {Carlos Moreno and Sebastian Fischmeister}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {On the Security of Safety-critical Embedded Systems: Who Watches the Watchers? Who Reprograms the Watchers?}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {493--498}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006228304930498}, doi = {10.5220/0006228304930498}, timestamp = {Tue, 06 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/MorenoF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NardoneV17, author = {Vittoria Nardone and Corrado Aaron Visaggio}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {"Mirror, Mirror on the Wall, Who is the Fairest One of All?" - Machine Learning versus Model Checking: {A} Comparison between Two Static Techniques for Malware Family Identification}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {663--672}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006287506630672}, doi = {10.5220/0006287506630672}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NardoneV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OhtakeSZ17, author = {Go Ohtake and Reihaneh Safavi{-}Naini and Liang Feng Zhang}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Outsourcing Scheme of {ABE} Encryption Secure against Malicious Adversary}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {71--82}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006129600710082}, doi = {10.5220/0006129600710082}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/OhtakeSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OmerovicNT17, author = {Aida Omerovic and Marit Kj{\o}snes Natvig and Isabelle C. R. Tardy}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Towards a Privacy Scorecard - Initial Design Exemplified on an Intelligent Transport Systems Service}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {585--593}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006284405850593}, doi = {10.5220/0006284405850593}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/OmerovicNT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OrunsoluS17, author = {Abdul A. Orunsolu and Adesina S. Sodiya}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {An Anti-Phishing Kit Scheme for Secure Web Transactions}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {15--24}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006074900150024}, doi = {10.5220/0006074900150024}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/OrunsoluS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PahiLS17, author = {Timea Pahi and Maria Leitner and Florian Skopik}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Analysis and Assessment of Situational Awareness Models for National Cyber Security Centers}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {334--345}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006149703340345}, doi = {10.5220/0006149703340345}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PahiLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PeacockJV17, author = {Matthew Peacock and Michael N. Johnstone and Craig Valli}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Security Issues with BACnet Value Handling}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {546--552}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006263405460552}, doi = {10.5220/0006263405460552}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/PeacockJV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PereiraA17, author = {Hilder V. L. Pereira and Diego F. Aranha}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Non-interactive Privacy-preserving k-NN Classifier}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {362--371}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006187703620371}, doi = {10.5220/0006187703620371}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/PereiraA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PfrangM17, author = {Steffen Pfrang and David Meier}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {On the Detection of Replay Attacks in Industrial Automation Networks Operated with Profinet {IO}}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {683--693}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006288106830693}, doi = {10.5220/0006288106830693}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PfrangM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PooryousefA17, author = {Shahrooz Pooryousef and Morteza Amini}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Enhancing Accuracy of Android Malware Detection using Intent Instrumentation}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {380--388}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006195803800388}, doi = {10.5220/0006195803800388}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PooryousefA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Preneel17, author = {Bart Preneel}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {The Future of Information Security}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {9}, publisher = {SciTePress}, year = {2017}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Preneel17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RauchbergerLS17, author = {Julian Rauchberger and Robert Luh and Sebastian Schrittwieser}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Longkit - {A} Universal Framework for {BIOS/UEFI} Rootkits in System Management Mode}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {346--353}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006165603460353}, doi = {10.5220/0006165603460353}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RauchbergerLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RegainiaS17, author = {Loukmen Regainia and S{\'{e}}bastien Salva}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Methodology of Security Pattern Classification and of Attack-Defense Tree Generation}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {136--146}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006198301360146}, doi = {10.5220/0006198301360146}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RegainiaS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ReshetovaBA17, author = {Elena Reshetova and Filippo Bonazzi and N. Asokan}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {SELint: An SEAndroid Policy Analysis Tool}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {47--58}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006126600470058}, doi = {10.5220/0006126600470058}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ReshetovaBA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RiemannG17, author = {Robert Riemann and St{\'{e}}phane Grumbach}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Distributed Protocols at the Rescue for Trustworthy Online Voting}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {499--505}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006228504990505}, doi = {10.5220/0006228504990505}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RiemannG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SantosT17, author = {Sergio de los Santos and Jos{\'{e}} Torres}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Macro Malware Detection using Machine Learning Techniques - {A} New Approach}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {295--302}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006132202950302}, doi = {10.5220/0006132202950302}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SantosT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SedeeqCL17, author = {Iman Sedeeq and Frans Coenen and Alexei Lisitsa}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Attribute Permutation Steganography Detection using Attribute Position Changes Count}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {95--100}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006166400950100}, doi = {10.5220/0006166400950100}, timestamp = {Fri, 03 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SedeeqCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SinghSACC17, author = {Kalpana Singh and Renaud Sirdey and Fran{\c{c}}ois Artiguenave and David Cohen and Sergiu Carpov}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Towards Confidentiality-strengthened Personalized Genomic Medicine Embedding Homomorphic Cryptography}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {325--333}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006148303250333}, doi = {10.5220/0006148303250333}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SinghSACC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SoaresS17, author = {Alberto Magno Muniz Soares and Rafael Tim{\'{o}}teo de Sousa Jr.}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Technique for Extraction and Analysis of Application Heap Objects within Android Runtime {(ART)}}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {147--156}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006204101470156}, doi = {10.5220/0006204101470156}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SoaresS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SonntagM17, author = {Michael Sonntag and Ren{\'{e}} Mayrhofer}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Traffic Statistics of a High-Bandwidth Tor Exit Node}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {270--277}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006124202700277}, doi = {10.5220/0006124202700277}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SonntagM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TelikicherlaAC17, author = {Krishna Chaitanya Telikicherla and Akash Agrawall and Venkatesh Choppella}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Formal Model of Web Security Showing Malicious Cross Origin Requests and Its Mitigation using {CORP}}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {516--523}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006261105160523}, doi = {10.5220/0006261105160523}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TelikicherlaAC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Tezcan17, author = {Cihangir Tezcan}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Brute Force Cryptanalysis of {MIFARE} Classic Cards on {GPU}}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {524--528}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006262705240528}, doi = {10.5220/0006262705240528}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Tezcan17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ThuloE17, author = {Motlatsi i Isaac Thulo and Jan H. P. Eloff}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Towards Optimized Security-aware (O-Sec) {VM} Placement Algorithms}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {411--422}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006206504110422}, doi = {10.5220/0006206504110422}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ThuloE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/UwizeyemunguP17, author = {Sylvestre Uwizeyemungu and Placide Poba{-}Nzaou}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Health Information Exchange and Related IT-security Practices in European Hospitals}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {538--545}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006263305380545}, doi = {10.5220/0006263305380545}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/UwizeyemunguP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/VellaC17, author = {Mark Vella and Rachel Cilia}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Memory Forensics of Insecure Android Inter-app Communications}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {481--486}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006215504810486}, doi = {10.5220/0006215504810486}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/VellaC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/VibertBRC17, author = {Beno{\^{\i}}t Vibert and Jean{-}Marie Le Bars and Christophe Rosenberger and Christophe Charrier}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Fingerprint Class Recognition for Securing {EMV} Transaction}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {403--410}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006205704030410}, doi = {10.5220/0006205704030410}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/VibertBRC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/VolleroBSBMT17, author = {Luca Vollero and Daniele Biondo and Roberto Setola and Gianluca Bocci and Rocco Mammoliti and Alessandra Toma}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Improving the Automatic Identification of Malicious Android Apps in Unofficial Stores through Logo Analysis}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {567--572}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006270305670572}, doi = {10.5220/0006270305670572}, timestamp = {Fri, 18 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/VolleroBSBMT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/VyasMK17, author = {Tanvi Vyas and Andrea Marchesini and Christoph Kerschbaumer}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Extending the Same Origin Policy with Origin Attributes}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {464--473}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006210404640473}, doi = {10.5220/0006210404640473}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/VyasMK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WaltE17, author = {Est{\'{e}}e van der Walt and Jan H. P. Eloff}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Identity Deception Detection on Social Media Platforms}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {573--578}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006271105730578}, doi = {10.5220/0006271105730578}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WaltE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Yesuf17, author = {Ahmed Seid Yesuf}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Review of Risk Identification Approaches in the Telecommunication Domain}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {389--396}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006197603890396}, doi = {10.5220/0006197603890396}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Yesuf17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ZhiouaRAKS17, author = {Zeineb Zhioua and Yves Roudier and Rab{\'{e}}a Ameur{-}Boulifa and Takoua Kechiche and Stuart Short}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Tracking Dependent Information Flows}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {179--189}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006209301790189}, doi = {10.5220/0006209301790189}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ZhiouaRAKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2017, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, publisher = {SciTePress}, year = {2017}, isbn = {978-989-758-209-7}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.