ICISSP C

70 papers

YearTitle / Authors
2018A Comparative Analysis of Current Cryptocurrencies.
Lara Mauri, Stelvio Cimato, Ernesto Damiani
2018A Cyber Safety Model for Schools in Mozambique.
Martina J. Zucule de Barros, Horst Lazarek
2018A Framework for Web Application Integrity.
Pedro Fortuna, Nuno Pereira, Ismail Butun
2018A Risk-aware Access Control Model for Biomedical Research Platforms.
Radja Badji, Fida Kamal Dankar
2018A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System.
Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan, Itzel Vázquez Sandoval
2018A Test of Structured Threat Descriptions for Information Security Risk Assessments.
Henrik Karlzén, Johan E. Bengtsson, Jonas Hallberg
2018ACCESSORS - A Data-Centric Permission Model for the Internet of Things.
Christoph Stach, Bernhard Mitschang
2018AECID: A Self-learning Anomaly Detection Approach based on Light-weight Log Parser Models.
Markus Wurzenberger, Florian Skopik, Giuseppe Settanni, Roman Fiedler
2018APT RPG: Design of a Gamified Attacker/Defender Meta Model.
Robert Luh, Marlies Temper, Simon Tjoa, Sebastian Schrittwieser
2018Acoustic Gait Analysis using Support Vector Machines.
Jasper Huang, Fabio Di Troia, Mark Stamp
2018Advancing Protocol Fuzzing for Industrial Automation and Control Systems.
Steffen Pfrang, David Meier, Michael Friedrich, Jürgen Beyerer
2018Alignment-free Cancellable Template Generation for Fingerprint based Authentication.
Rumana Nazmul, Md. Rafiqul Islam, Ahsan Raja Chowdhury
2018Attack Tree for Modelling Unauthorized EMV Card Transactions at POS Terminals.
Dilpreet Singh, Ron Ruhl, Hamman Samuel
2018Attacks on Industrial Control Systems - Modeling and Anomaly Detection.
Oliver Eigner, Philipp Kreimel, Paul Tavolato
2018Autocorrelation Analysis of Financial Botnet Traffic.
Prathiba Nagarajan, Fabio Di Troia, Thomas H. Austin, Mark Stamp
2018Automated Detection of the Early Stages of Cyber Kill Chain.
Ian Herwono, Fadi Ali El-Moussa
2018Back to the Drawing Board - Bringing Security Constraints in an Architecture-centric Software Development Process.
Stefanie Jasser, Katja Tuma, Riccardo Scandariato, Matthias Riebisch
2018Big Brother is Smart Watching You - Privacy Concerns about Health and Fitness Applications.
Christoph Stach
2018BroncoVote: Secure Voting System using Ethereum's Blockchain.
Gaby G. Dagher, Praneeth Babu Marella, Matea Milojkovic, Jordan Mohler
2018Cluster Analysis for Driver Aggressiveness Identification.
Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Albina Orlando, Antonella Santone
2018Cyber Threat Information Classification and Life Cycle Management using Smart Contracts.
Roman Graf, Ross King
2018Decoy Systems with Low Energy Bluetooth Communication.
Aaron Hunter, Ken Wong
2018Deep Learning versus Gist Descriptors for Image-based Malware Classification.
Sravani Yajamanam, Vikash Raja Samuel Selvin, Fabio Di Troia, Mark Stamp
2018Encryption Schemes based on a Single Permutation: PCBC, POFB, PCFB and PCTR.
Kaiyan Zheng, Peng Wang
2018Enhancing Security Education - Recognising Threshold Concepts and Other Influencing Factors.
Ismini Vasileiou, Steven Furnell
2018Evaluation of Biometric Template Protection Schemes based on a Transformation.
Christophe Rosenberger
2018Face Spoofing Detection for Smartphones using a 3D Reconstruction and the Motion Sensors.
Kim Trong Nguyen, Cathel Zitzmann, Florent Retraint, Agnès Delahaies, Frédéric Morain-Nicolier, Hoai Phuong Nguyen
2018Hacking the Security Industry for Fun and Profit and Humanity.
David Jacoby
2018Hardware-based Cyber Threats.
Thiago Alves, Thomas H. Morris
2018Health State of Google's PlayStore - Finding Malware in Large Sets of Applications from the Android Market.
Alexandre Dey, Loic Beheshti, Marie-Kerguelen Sido
2018How to Break CaptchaStar.
Thomas Gougeon, Patrick Lacharme
2018Identifying Insecure Features in Android Applications using Model Checking.
Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone
2018Identifying Needs for a Holistic Modelling Approach to Privacy Aspects in Enterprise Software Systems.
Sascha Alpers, Roman Pilipchuk, Andreas Oberweis, Ralf H. Reussner
2018Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis.
Alessandro Bacci, Alberto Bartoli, Fabio Martinelli, Eric Medvet, Francesco Mercaldo, Corrado Aaron Visaggio
2018Incoming Call Implicit User Authentication - User Authentication via Hand Movement Pattern.
Aleksandr Eremin, Konstantin Kogos
2018Inferring Smartphone Users' Handwritten Patterns by using Motion Sensors.
Wei-Han Lee, Jorge Ortiz, Bongjun Ko, Ruby B. Lee
2018Intrusion Detection System Test Framework for SCADA Systems.
Henrik Waagsnes, Nils Ulltveit-Moe
2018Is Bigger Safer? Analyzing Factors Related to Data Breaches using Publicly Available Information.
Ohud Alqahtani, Zhiyuan Chen, Qiong Huang, Karthik Gottipati
2018Knock-Knock: The Unbearable Lightness of Android Notifications.
Constantinos Patsakis, Efthimios Alepis
2018Malicious PDF Documents Detection using Machine Learning Techniques - A Practical Approach with Cloud Computing Applications.
José Torres, Sergio de los Santos
2018Malware Detection based on HTTPS Characteristic via Machine Learning.
Paul Calderon, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada
2018Measuring Identity and Access Management Performance - An Expert Survey on Possible Performance Indicators.
Matthias Hummer, Sebastian Groll, Michael Kunz, Ludwig Fuchs, Günther Pernul
2018Modular Platform for Customer-Side Detection of BGP Redirection Attacks.
Marco Silva, António Nogueira, Paulo Salvador
2018Novel Access Control Approach for Inter-organizational Workflows.
Asmaa El Kandoussi, Hanan El Bakkali
2018On App-based Matrix Code Authentication in Online Banking.
Vincent Haupert, Tilo Müller
2018Phishing Through Time: A Ten Year Story based on Abstracts.
Ana Ferreira, Pedro Manuel Vieira Marques
2018Prerequisite to Measure Information Security - A State of the Art Literature Review.
Rainer Diesch, Matthias Pfaff, Helmut Krcmar
2018Privacy Compliant Multi-biometric Authentication on Smartphones.
Alexandre Ninassi, Sylvain Vernois, Christophe Rosenberger
2018Privacy-preserving Biometric Authentication Model for e-Finance Applications.
Christina-Angeliki Toli, Bart Preneel
2018Probability Preservation Property with Relative Error and Its Applications.
Yuanyuan Gao, Kunpeng Wang
2018Proceedings of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, Funchal, Madeira - Portugal, January 22-24, 2018.
Paolo Mori, Steven Furnell, Olivier Camp
2018Querying Encrypted Graph Databases.
Nahla Aburawi, Alexei Lisitsa, Frans Coenen
2018Relational Database Anonymization - A Model-driven Guiding Approach.
Feten Ben Fredj, Nadira Lammari, Isabelle Comyn-Wattiau
2018SAFEPASS - Presenting a Convenient, Portable and Secure Password Manager.
Onur Hakbilen, Piraveen Perinparajan, Michael Eikeland, Nils Ulltveit-Moe
2018Secure Two-party Agglomerative Hierarchical Clustering Construction.
Mona Hamidi, Mina Sheikhalishahi, Fabio Martinelli
2018Securing the Flow - Data Flow Analysis with Operational Node Structures.
Michael Meinig, Christoph Meinel
2018Spectral Analysis of Keystroke Streams: Towards Effective Real-time Continuous User Authentication.
Abdullah Alshehri, Frans Coenen, Danushka Bollegala
2018Statistical and Combinatorial Analysis of the TOR Routing Protocol - Structural Weaknesses Identified in the TOR Network.
Eric Filiol, J. Nicolas, Maxence Delong
2018Sustainable Security - an Internet of Durable Goods.
Ross Anderson
2018The Rapid Extraction of Suspicious Traffic from Passive DNS.
Wenbo Wang, Tianning Zang, Yuqing Lan
2018Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization.
Iman Sharafaldin, Arash Habibi Lashkari, Ali A. Ghorbani
2018Towards Risk-aware Access Control Framework for Healthcare Information Sharing.
Mohamed Abomhara, Geir M. Køien, Vladimir A. Oleshchuk, Mohamed Hamid
2018Towards a Cyber Security Label for SMEs: A European Perspective -.
Christophe Ponsard, Jeremy Grandclaudon, Gautier Dallons
2018Towards a Personal Identity Code Respecting Privacy.
Denis Migdal, Christophe Rosenberger
2018Towards an Optimal Template Reduction for Securing Embedded Fingerprint Devices.
Benoît Vibert, Christophe Charrier, Jean-Marie Le Bars, Christophe Rosenberger
2018Unsupervised Holiday Detection from Low-resolution Smart Metering Data.
Günther Eibl, Sebastian Burkhart, Dominik Engel
2018Using Application Layer Metrics to Detect Advanced SCADA Attacks.
Peter Maynard, Kieran McLaughlin, Sakir Sezer
2018VisABAC: A Tool for Visualising ABAC Policies.
Charles Morisset, David Sanchez
2018VizMal: A Visualization Tool for Analyzing the Behavior of Android Malware.
Alessandro Bacci, Fabio Martinelli, Eric Medvet, Francesco Mercaldo
2018Who's Driving My Car? A Machine Learning based Approach to Driver Identification.
Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Albina Orlando, Antonella Santone