CRiSIS C

19 papers

YearTitle / Authors
2019Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers
Akka Zemmari, Mohamed Mosbah, Nora Cuppens-Boulahia, Frédéric Cuppens
2018A Certificate-Less Key Exchange Protocol for IoT.
Ivan Marco Lobe Kome, Nora Cuppens-Boulahia, Frédéric Cuppens, Vincent Frey
2018A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control Systems.
Lyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens
2018A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements.
Roman Wirtz, Maritta Heisel
2018An Empirical Study on the Comprehensibility of Graphical Security Risk Models Based on Sequence Diagrams.
Vetle Volden-Freberg, Gencer Erdogan
2018Are Third-Party Libraries Secure? A Software Library Checker for Java.
Fabien Patrick Viertel, Fabian Kortum, Leif Wagner, Kurt Schneider
2018Authenticated Quality of Service Aware Routing in Software Defined Networks.
Samet Aytaç, Orhan Ermis, Mehmet Ufuk Çaglayan, Fatih Alagöz
2018Connection Dumping Vulnerability Affecting Bluetooth Availability.
Karim Lounis, Mohammad Zulkernine
2018DSTC: DNS-Based Strict TLS Configurations.
Eman Salem Alashwali, Pawel Szalachowski
2018Effectiveness and Impact Measurements of a Diversification Based Moving Target Defense.
Manel Smine, Nora Cuppens, Frédéric Cuppens
2018Enhancing Collaboration Between Security Analysts in Security Operations Centers.
Damien Crémilleux, Christophe Bidan, Frédéric Majorczyk, Nicolas Prigent
2018On Consent in Online Social Networks: Privacy Impacts and Research Directions (Short Paper).
Sourya Joyee De, Abdessamad Imine
2018Optimal Distribution of Privacy Budget in Differential Privacy.
Anis Bkakria, Aimilia Tasidou, Nora Cuppens-Boulahia, Frédéric Cuppens, Fatma Bouattour, Feten Ben Fredj
2018Outsourcing Signatures of Confidential Documents.
Hervé Chabanne, Julien Keuffer, Emmanuel Prouff
2018Personalized, Browser-Based Visual Phishing Detection Based on Deep Learning.
Alberto Bartoli, Andrea De Lorenzo, Eric Medvet, Fabiano Tarlao
2018Practical Security Exploits of the FlexRay In-Vehicle Communication Protocol.
Pal-Stefan Murvay, Bogdan Groza
2018Privacy Preserving Data Offloading Based on Transformation.
Shweta Saharan, Vijay Laxmi, Manoj Singh Gaur, Akka Zemmari
2018RIICS: Risk Based IICS Segmentation Method.
Khaoula Es-Salhi, David Espes, Nora Cuppens
2018Trust Evaluation Model for Attack Detection in Social Internet of Things.
Wafa Abdelghani, Corinne Amel Zayani, Ikram Amous, Florence Sèdes