| 2019 | Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers Akka Zemmari, Mohamed Mosbah, Nora Cuppens-Boulahia, Frédéric Cuppens |
| 2018 | A Certificate-Less Key Exchange Protocol for IoT. Ivan Marco Lobe Kome, Nora Cuppens-Boulahia, Frédéric Cuppens, Vincent Frey |
| 2018 | A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control Systems. Lyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens |
| 2018 | A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements. Roman Wirtz, Maritta Heisel |
| 2018 | An Empirical Study on the Comprehensibility of Graphical Security Risk Models Based on Sequence Diagrams. Vetle Volden-Freberg, Gencer Erdogan |
| 2018 | Are Third-Party Libraries Secure? A Software Library Checker for Java. Fabien Patrick Viertel, Fabian Kortum, Leif Wagner, Kurt Schneider |
| 2018 | Authenticated Quality of Service Aware Routing in Software Defined Networks. Samet Aytaç, Orhan Ermis, Mehmet Ufuk Çaglayan, Fatih Alagöz |
| 2018 | Connection Dumping Vulnerability Affecting Bluetooth Availability. Karim Lounis, Mohammad Zulkernine |
| 2018 | DSTC: DNS-Based Strict TLS Configurations. Eman Salem Alashwali, Pawel Szalachowski |
| 2018 | Effectiveness and Impact Measurements of a Diversification Based Moving Target Defense. Manel Smine, Nora Cuppens, Frédéric Cuppens |
| 2018 | Enhancing Collaboration Between Security Analysts in Security Operations Centers. Damien Crémilleux, Christophe Bidan, Frédéric Majorczyk, Nicolas Prigent |
| 2018 | On Consent in Online Social Networks: Privacy Impacts and Research Directions (Short Paper). Sourya Joyee De, Abdessamad Imine |
| 2018 | Optimal Distribution of Privacy Budget in Differential Privacy. Anis Bkakria, Aimilia Tasidou, Nora Cuppens-Boulahia, Frédéric Cuppens, Fatma Bouattour, Feten Ben Fredj |
| 2018 | Outsourcing Signatures of Confidential Documents. Hervé Chabanne, Julien Keuffer, Emmanuel Prouff |
| 2018 | Personalized, Browser-Based Visual Phishing Detection Based on Deep Learning. Alberto Bartoli, Andrea De Lorenzo, Eric Medvet, Fabiano Tarlao |
| 2018 | Practical Security Exploits of the FlexRay In-Vehicle Communication Protocol. Pal-Stefan Murvay, Bogdan Groza |
| 2018 | Privacy Preserving Data Offloading Based on Transformation. Shweta Saharan, Vijay Laxmi, Manoj Singh Gaur, Akka Zemmari |
| 2018 | RIICS: Risk Based IICS Segmentation Method. Khaoula Es-Salhi, David Espes, Nora Cuppens |
| 2018 | Trust Evaluation Model for Attack Detection in Social Internet of Things. Wafa Abdelghani, Corinne Amel Zayani, Ikram Amous, Florence Sèdes |