| 2023 | Risks and Security of Internet and Systems - 17th International Conference, CRiSIS 2022, Sousse, Tunisia, December 7-9, 2022, Revised Selected Papers Slim Kallel, Mohamed Jmaiel, Mohammad Zulkernine, Ahmed Hadj Kacem, Frédéric Cuppens, Nora Cuppens |
| 2022 | A Comparative Study of Attribute Selection Algorithms on Intrusion Detection System in UAVs: A Case Study of UKM-IDS20 Dataset. Ahmed Burhan Mohammed, Lamia Chaari Fourati, Ahmed Fakhrudeen |
| 2022 | An Incentive Mechanism for Managing Obligation Delegation. Liang Chen, Cheng Zeng, Stilianos Vidalis |
| 2022 | Benchmark Performance of the Multivariate Polynomial Public Key Encapsulation Mechanism. Randy Kuang, Maria Perepechaenko, Ryan Toth, Michel Barbeau |
| 2022 | Blockchain Olive Oil Supply Chain. Tarek Frikha, Jalel Ktari, Habib Hamam |
| 2022 | Blockchain Survey for Security and Privacy in the e-Health Ecosystem. Maher Boughdiri, Takoua Abdellatif, Tesnim Abdellatif |
| 2022 | Context Correlation for Automated Dynamic Android App Analysis to Improve Impact Rating of Privacy and Security Flaws. Kris Heid, Jens Heider |
| 2022 | Errors in the CICIDS2017 Dataset and the Significant Differences in Detection Performances It Makes. Maxime Lanvin, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic Mé, Eric Totel |
| 2022 | How IT Infrastructures Break: Better Modeling for Better Risk Management. Benjamin Somers, Fabien Dagnat, Jean-Christophe Bach |
| 2022 | Impact of EIP-1559 on Transactions in the Ethereum Blockchain and Its Rollups. Salah Gontara, Amine Boufaied, Ouajdi Korbaa |
| 2022 | IoT Security Within Small and Medium-Sized Manufacturing Companies. Johannes Beckert, Teo Blazevic, Alexander Dobhan |
| 2022 | Modeling Train Systems: From High-Level Architecture Graphical Models to Formal Specifications. Racem Bougacha, Régine Laleau, Philippe Bon, Simon Collart Dutilleul, Rahma Ben Ayed |
| 2022 | PRIAH: Private Alerts in Healthcare. Abdel Mlak Said, Aymen Yahyaoui, Takoua Abdellatif |
| 2022 | Pseudonym Swapping with Secure Accumulators and Double Diffie-Hellman Rounds in Cooperative Intelligent Transport Systems. Hannes Salin |
| 2022 | Security Analysis: From Model to System Analysis. Bastien Drouot, Valery Monthe, Sylvain Guérin, Joël Champeau |
| 2022 | Tool Paper - SEMA: Symbolic Execution Toolchain for Malware Analysis. Charles-Henry Bertrand Van Ouytsel, Christophe Crochet, Khanh-Huu-The Dam, Axel Legay |
| 2022 | Towards a Dynamic Testing Approach for Checking the Correctness of Ethereum Smart Contracts. Mohamed Amin Hammami, Mariam Lahami, Afef Jmal Maâlej |
| 2022 | Towards a Secure Cross-Blockchain Smart Contract Architecture. Rawya Mars, Saoussen Cheikhrouhou, Slim Kallel, Mohamed Sellami, Ahmed Hadj Kacem |
| 2022 | Virtual Private Network Blockchain-based Dynamic Access Control Solution for Inter-organisational Large Scale IoT Networks. Rahma Trabelsi, Ghofrane Fersi, Mohamed Jmaiel |