default search action
Search dblp for Publications
export results for "toc:db/conf/icissp/icissp2017s.bht:"
@proceedings{DBLP:conf/icissp/2017s, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93354-2}, doi = {10.1007/978-3-319-93354-2}, isbn = {978-3-319-93353-5}, timestamp = {Fri, 24 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2017s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AhmadiS17a, author = {Ahmad Ahmadi and Reihaneh Safavi{-}Naini}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Directional Distance-Bounding Identification}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {197--221}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93354-2\_10}, doi = {10.1007/978-3-319-93354-2\_10}, timestamp = {Fri, 24 Aug 2018 07:46:20 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AhmadiS17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlruhailyCB17, author = {Nada Alruhaily and Tom Chothia and Behzad Bordbar}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Better Understanding of Machine Learning Malware Misclassifcation}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {35--58}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93354-2\_3}, doi = {10.1007/978-3-319-93354-2\_3}, timestamp = {Fri, 24 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlruhailyCB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BarghVC17a, author = {Mortaza S. Bargh and Marco Vink and Sunil Choenni}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {On Using Obligations for Usage Control in Joining of Datasets}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {173--196}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93354-2\_9}, doi = {10.1007/978-3-319-93354-2\_9}, timestamp = {Fri, 24 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BarghVC17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CostantinoMMP17a, author = {Gianpiero Costantino and Fabio Martinelli and Ilaria Matteucci and Marinella Petrocchi}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Efficient Detection of Conflicts in Data Sharing Agreements}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {148--172}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93354-2\_8}, doi = {10.1007/978-3-319-93354-2\_8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CostantinoMMP17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HadadPSOR17, author = {Tal Hadad and Rami Puzis and Bronislav Sidik and Nir Ofek and Lior Rokach}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Application Marketplace Malware Detection by User Feedback Analysis}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {1--19}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93354-2\_1}, doi = {10.1007/978-3-319-93354-2\_1}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HadadPSOR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HerwonoE17a, author = {Ian Herwono and Fadi Ali El{-}Moussa}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A System for Detecting Targeted Cyber-Attacks Using Attack Patterns}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {20--34}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93354-2\_2}, doi = {10.1007/978-3-319-93354-2\_2}, timestamp = {Fri, 24 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HerwonoE17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HuffmeyerHMSW17a, author = {Marc H{\"{u}}ffmeyer and Pascal Hirmer and Bernhard Mitschang and Ulf Schreier and Matthias Wieland}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Situation-Aware Access Control for Industrie 4.0}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {59--83}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93354-2\_4}, doi = {10.1007/978-3-319-93354-2\_4}, timestamp = {Fri, 29 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HuffmeyerHMSW17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HuynenL17a, author = {Jean{-}Louis Huynen and Gabriele Lenzini}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {An Information Security Management for Socio-Technical Analysis of System Security}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {222--251}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93354-2\_11}, doi = {10.1007/978-3-319-93354-2\_11}, timestamp = {Fri, 24 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HuynenL17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KarlssonHS17a, author = {Linus Karlsson and Martin Hell and Paul Stankovski}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Not So Greedy: Enhanced Subset Exploration for Nonrandomness Detectors}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {273--294}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93354-2\_13}, doi = {10.1007/978-3-319-93354-2\_13}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KarlssonHS17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LeeLJML17a, author = {Wei{-}Han Lee and Changchang Liu and Shouling Ji and Prateek Mittal and Ruby B. Lee}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {How to Quantify Graph De-anonymization Risks}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {84--104}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93354-2\_5}, doi = {10.1007/978-3-319-93354-2\_5}, timestamp = {Fri, 24 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LeeLJML17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PeacockJV17a, author = {Matthew Peacock and Michael N. Johnstone and Craig Valli}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {An Exploration of Some Security Issues Within the BACnet Protocol}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {252--272}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93354-2\_12}, doi = {10.1007/978-3-319-93354-2\_12}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/PeacockJV17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SalvaR17, author = {S{\'{e}}bastien Salva and Loukmen Regainia}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Security Pattern Classification Based on Data Integration}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {105--129}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93354-2\_6}, doi = {10.1007/978-3-319-93354-2\_6}, timestamp = {Fri, 24 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SalvaR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SoaresJ17, author = {Alberto Magno Muniz Soares and Rafael Tim{\'{o}}teo de Sousa J{\'{u}}nior}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Forensic Analysis of Android Runtime {(ART)} Application Heap Objects in Emulated and Real Devices}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {130--147}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93354-2\_7}, doi = {10.1007/978-3-319-93354-2\_7}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SoaresJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.