| 2018 | A Comparative Analysis of Current Cryptocurrencies. Lara Mauri, Stelvio Cimato, Ernesto Damiani |
| 2018 | A Cyber Safety Model for Schools in Mozambique. Martina J. Zucule de Barros, Horst Lazarek |
| 2018 | A Framework for Web Application Integrity. Pedro Fortuna, Nuno Pereira, Ismail Butun |
| 2018 | A Risk-aware Access Control Model for Biomedical Research Platforms. Radja Badji, Fida Kamal Dankar |
| 2018 | A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System. Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan, Itzel Vázquez Sandoval |
| 2018 | A Test of Structured Threat Descriptions for Information Security Risk Assessments. Henrik Karlzén, Johan E. Bengtsson, Jonas Hallberg |
| 2018 | ACCESSORS - A Data-Centric Permission Model for the Internet of Things. Christoph Stach, Bernhard Mitschang |
| 2018 | AECID: A Self-learning Anomaly Detection Approach based on Light-weight Log Parser Models. Markus Wurzenberger, Florian Skopik, Giuseppe Settanni, Roman Fiedler |
| 2018 | APT RPG: Design of a Gamified Attacker/Defender Meta Model. Robert Luh, Marlies Temper, Simon Tjoa, Sebastian Schrittwieser |
| 2018 | Acoustic Gait Analysis using Support Vector Machines. Jasper Huang, Fabio Di Troia, Mark Stamp |
| 2018 | Advancing Protocol Fuzzing for Industrial Automation and Control Systems. Steffen Pfrang, David Meier, Michael Friedrich, Jürgen Beyerer |
| 2018 | Alignment-free Cancellable Template Generation for Fingerprint based Authentication. Rumana Nazmul, Md. Rafiqul Islam, Ahsan Raja Chowdhury |
| 2018 | Attack Tree for Modelling Unauthorized EMV Card Transactions at POS Terminals. Dilpreet Singh, Ron Ruhl, Hamman Samuel |
| 2018 | Attacks on Industrial Control Systems - Modeling and Anomaly Detection. Oliver Eigner, Philipp Kreimel, Paul Tavolato |
| 2018 | Autocorrelation Analysis of Financial Botnet Traffic. Prathiba Nagarajan, Fabio Di Troia, Thomas H. Austin, Mark Stamp |
| 2018 | Automated Detection of the Early Stages of Cyber Kill Chain. Ian Herwono, Fadi Ali El-Moussa |
| 2018 | Back to the Drawing Board - Bringing Security Constraints in an Architecture-centric Software Development Process. Stefanie Jasser, Katja Tuma, Riccardo Scandariato, Matthias Riebisch |
| 2018 | Big Brother is Smart Watching You - Privacy Concerns about Health and Fitness Applications. Christoph Stach |
| 2018 | BroncoVote: Secure Voting System using Ethereum's Blockchain. Gaby G. Dagher, Praneeth Babu Marella, Matea Milojkovic, Jordan Mohler |
| 2018 | Cluster Analysis for Driver Aggressiveness Identification. Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Albina Orlando, Antonella Santone |
| 2018 | Cyber Threat Information Classification and Life Cycle Management using Smart Contracts. Roman Graf, Ross King |
| 2018 | Decoy Systems with Low Energy Bluetooth Communication. Aaron Hunter, Ken Wong |
| 2018 | Deep Learning versus Gist Descriptors for Image-based Malware Classification. Sravani Yajamanam, Vikash Raja Samuel Selvin, Fabio Di Troia, Mark Stamp |
| 2018 | Encryption Schemes based on a Single Permutation: PCBC, POFB, PCFB and PCTR. Kaiyan Zheng, Peng Wang |
| 2018 | Enhancing Security Education - Recognising Threshold Concepts and Other Influencing Factors. Ismini Vasileiou, Steven Furnell |
| 2018 | Evaluation of Biometric Template Protection Schemes based on a Transformation. Christophe Rosenberger |
| 2018 | Face Spoofing Detection for Smartphones using a 3D Reconstruction and the Motion Sensors. Kim Trong Nguyen, Cathel Zitzmann, Florent Retraint, Agnès Delahaies, Frédéric Morain-Nicolier, Hoai Phuong Nguyen |
| 2018 | Hacking the Security Industry for Fun and Profit and Humanity. David Jacoby |
| 2018 | Hardware-based Cyber Threats. Thiago Alves, Thomas H. Morris |
| 2018 | Health State of Google's PlayStore - Finding Malware in Large Sets of Applications from the Android Market. Alexandre Dey, Loic Beheshti, Marie-Kerguelen Sido |
| 2018 | How to Break CaptchaStar. Thomas Gougeon, Patrick Lacharme |
| 2018 | Identifying Insecure Features in Android Applications using Model Checking. Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone |
| 2018 | Identifying Needs for a Holistic Modelling Approach to Privacy Aspects in Enterprise Software Systems. Sascha Alpers, Roman Pilipchuk, Andreas Oberweis, Ralf H. Reussner |
| 2018 | Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis. Alessandro Bacci, Alberto Bartoli, Fabio Martinelli, Eric Medvet, Francesco Mercaldo, Corrado Aaron Visaggio |
| 2018 | Incoming Call Implicit User Authentication - User Authentication via Hand Movement Pattern. Aleksandr Eremin, Konstantin Kogos |
| 2018 | Inferring Smartphone Users' Handwritten Patterns by using Motion Sensors. Wei-Han Lee, Jorge Ortiz, Bongjun Ko, Ruby B. Lee |
| 2018 | Intrusion Detection System Test Framework for SCADA Systems. Henrik Waagsnes, Nils Ulltveit-Moe |
| 2018 | Is Bigger Safer? Analyzing Factors Related to Data Breaches using Publicly Available Information. Ohud Alqahtani, Zhiyuan Chen, Qiong Huang, Karthik Gottipati |
| 2018 | Knock-Knock: The Unbearable Lightness of Android Notifications. Constantinos Patsakis, Efthimios Alepis |
| 2018 | Malicious PDF Documents Detection using Machine Learning Techniques - A Practical Approach with Cloud Computing Applications. José Torres, Sergio de los Santos |
| 2018 | Malware Detection based on HTTPS Characteristic via Machine Learning. Paul Calderon, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada |
| 2018 | Measuring Identity and Access Management Performance - An Expert Survey on Possible Performance Indicators. Matthias Hummer, Sebastian Groll, Michael Kunz, Ludwig Fuchs, Günther Pernul |
| 2018 | Modular Platform for Customer-Side Detection of BGP Redirection Attacks. Marco Silva, António Nogueira, Paulo Salvador |
| 2018 | Novel Access Control Approach for Inter-organizational Workflows. Asmaa El Kandoussi, Hanan El Bakkali |
| 2018 | On App-based Matrix Code Authentication in Online Banking. Vincent Haupert, Tilo Müller |
| 2018 | Phishing Through Time: A Ten Year Story based on Abstracts. Ana Ferreira, Pedro Manuel Vieira Marques |
| 2018 | Prerequisite to Measure Information Security - A State of the Art Literature Review. Rainer Diesch, Matthias Pfaff, Helmut Krcmar |
| 2018 | Privacy Compliant Multi-biometric Authentication on Smartphones. Alexandre Ninassi, Sylvain Vernois, Christophe Rosenberger |
| 2018 | Privacy-preserving Biometric Authentication Model for e-Finance Applications. Christina-Angeliki Toli, Bart Preneel |
| 2018 | Probability Preservation Property with Relative Error and Its Applications. Yuanyuan Gao, Kunpeng Wang |
| 2018 | Proceedings of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, Funchal, Madeira - Portugal, January 22-24, 2018. Paolo Mori, Steven Furnell, Olivier Camp |
| 2018 | Querying Encrypted Graph Databases. Nahla Aburawi, Alexei Lisitsa, Frans Coenen |
| 2018 | Relational Database Anonymization - A Model-driven Guiding Approach. Feten Ben Fredj, Nadira Lammari, Isabelle Comyn-Wattiau |
| 2018 | SAFEPASS - Presenting a Convenient, Portable and Secure Password Manager. Onur Hakbilen, Piraveen Perinparajan, Michael Eikeland, Nils Ulltveit-Moe |
| 2018 | Secure Two-party Agglomerative Hierarchical Clustering Construction. Mona Hamidi, Mina Sheikhalishahi, Fabio Martinelli |
| 2018 | Securing the Flow - Data Flow Analysis with Operational Node Structures. Michael Meinig, Christoph Meinel |
| 2018 | Spectral Analysis of Keystroke Streams: Towards Effective Real-time Continuous User Authentication. Abdullah Alshehri, Frans Coenen, Danushka Bollegala |
| 2018 | Statistical and Combinatorial Analysis of the TOR Routing Protocol - Structural Weaknesses Identified in the TOR Network. Eric Filiol, J. Nicolas, Maxence Delong |
| 2018 | Sustainable Security - an Internet of Durable Goods. Ross Anderson |
| 2018 | The Rapid Extraction of Suspicious Traffic from Passive DNS. Wenbo Wang, Tianning Zang, Yuqing Lan |
| 2018 | Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. Iman Sharafaldin, Arash Habibi Lashkari, Ali A. Ghorbani |
| 2018 | Towards Risk-aware Access Control Framework for Healthcare Information Sharing. Mohamed Abomhara, Geir M. Køien, Vladimir A. Oleshchuk, Mohamed Hamid |
| 2018 | Towards a Cyber Security Label for SMEs: A European Perspective -. Christophe Ponsard, Jeremy Grandclaudon, Gautier Dallons |
| 2018 | Towards a Personal Identity Code Respecting Privacy. Denis Migdal, Christophe Rosenberger |
| 2018 | Towards an Optimal Template Reduction for Securing Embedded Fingerprint Devices. Benoît Vibert, Christophe Charrier, Jean-Marie Le Bars, Christophe Rosenberger |
| 2018 | Unsupervised Holiday Detection from Low-resolution Smart Metering Data. Günther Eibl, Sebastian Burkhart, Dominik Engel |
| 2018 | Using Application Layer Metrics to Detect Advanced SCADA Attacks. Peter Maynard, Kieran McLaughlin, Sakir Sezer |
| 2018 | VisABAC: A Tool for Visualising ABAC Policies. Charles Morisset, David Sanchez |
| 2018 | VizMal: A Visualization Tool for Analyzing the Behavior of Android Malware. Alessandro Bacci, Fabio Martinelli, Eric Medvet, Francesco Mercaldo |
| 2018 | Who's Driving My Car? A Machine Learning based Approach to Driver Identification. Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Albina Orlando, Antonella Santone |