ICISSP C

84 papers

YearTitle / Authors
2019A Comparative Analysis of Android Malware.
Neeraj Chavan, Fabio Di Troia, Mark Stamp
2019A Decentralized Solution for Combinatorial Testing of Access Control Engine.
Said Daoudagh, Francesca Lonetti, Eda Marchetti
2019A Fine-grained General Purpose Secure Storage Facility for Trusted Execution Environment.
Luigi Catuogno, Clemente Galdi
2019A Novel Behaviour Profiling Approach to Continuous Authentication for Mobile Applications.
Saud Alotaibi, Abdulrahman Alruban, Steven Furnell, Nathan L. Clarke
2019A Novel Features Set for Internet Traffic Classification using Burstiness.
Hussein Oudah, Bogdan V. Ghita, Taimur Bakhshi
2019A Secure Framework with Remote Configuration of Intellectual Property.
Nadir Khan, Sven Nitzsche, Jürgen Becker
2019A Systematic Approach to Choose the Data Warehouse Architecture.
Antonello Venditti, Fausto Fasano
2019Accelerate Performance for Elliptic Curve Scalar Multiplication based on NAF by Parallel Computing.
Mohammad Anagreh, Eero Vainikko, Peeter Laud
2019Accomplishing Transparency within the General Data Protection Regulation.
Dayana Spagnuelo, Ana Ferreira, Gabriele Lenzini
2019An Image Forgery Detection Solution based on DCT Coefficient Analysis.
Hoai Phuong Nguyen, Florent Retraint, Frédéric Morain-Nicolier, Agnès Delahaies
2019An Order-specified Aggregate Authority-transfer Signature.
Takuya Ezure, Masaki Inamura
2019Analytical Modelling of Cyber-physical Systems.
Paul Tavolato, Christina Tavolato-Wötzl
2019Are You Ready When It Counts? IT Consulting Firm's Information Security Incident Management.
Maja Nyman, Christine Große
2019Attack and Defence Modelling for Attacks via the Speech Interface.
Mary K. Bispham, Ioannis Agrafiotis, Michael Goldsmith
2019AuthLedger: A Novel Blockchain-based Domain Name Authentication Scheme.
Zhi Guan, Abba Garba, Anran Li, Zhong Chen, Nesrine Kaaniche
2019Automated Incident Response for Industrial Control Systems Leveraging Software-defined Networking.
Florian Patzer, Ankush Meshram, Maximilian Heß
2019Behavioral Biometric Authentication in Android Unlock Patterns through Machine Learning.
José Torres, Sergio de los Santos, Efthimios Alepis, Constantinos Patsakis
2019Building the Future: Tokenization, Blockchain and Citizen-focused Systems.
Bill Buchanan
2019Challenges of GDPR and the NIS Directive.
Gerald Quirchmayr
2019Construction of Secure Internal Networks with Communication Classifying System.
Yuya Sato, Hirokazu Hasegawa, Hiroki Takakura
2019Deep Neural Networks for Android Malware Detection.
Abhilash Hota, Paul Irolla
2019Definition and Efficient Construction of Encrypted k-anonymization Scheme.
Masayuki Yoshino, Takayuki Suzuki, Ken Naganuma, Hisayoshi Sato
2019Design of an Example Network Protocol for Security Tests Targeting Industrial Automation Systems.
Steffen Pfrang, Mark Giraud, Anne Borcherding, David Meier, Jürgen Beyerer
2019Detecting Anomalies by using Self-Organizing Maps in Industrial Environments.
Ricardo Hormann, Eric Fischer
2019Enhancing Business Process Modelling with Data Protection Compliance: An Ontology-based Proposal.
Cesare Bartolini, Antonello Calabrò, Eda Marchetti
2019Evaluating Privacy Policy Summarization: An Experimental Study among Japanese Users.
Vanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay, Shinsaku Kiyomoto
2019Evaluating Security, Privacy and Usability Features of QR Code Readers.
Heider A. M. Wahsheh, Flaminia L. Luccio
2019Experiment on Side-Channel Key-Recovery using a Real LPWA End-device.
Kazuhide Fukushima, Damien Marion, Yuto Nakano, Adrien Facon, Shinsaku Kiyomoto, Sylvain Guilley
2019Extracting Vehicle Sensor Signals from CAN Logs for Driver Re-identification.
Szilvia Lestyan, Gergely Ács, Gergely Biczók, Zsolt Szalay
2019Finding Classification Zone Violations with Anonymized Message Flow Analysis.
Michael Meinig, Peter Tröger, Christoph Meinel
2019Flexible Access Control and Confidentiality over Encrypted Data for Document-based Database.
Maryam Almarwani, Boris Konev, Alexei Lisitsa
2019Fuzzy Logic Decision based Collaborative Privacy Management Framework for Online Social Networks.
Gulsum Akkuzu, Benjamin Aziz, Mo Adda
2019Hypervisor-assisted Atomic Memory Acquisition in Modern Systems.
Michael Kiperberg, Roee Leon, Amit Resh, Asaf Algawi, Nezer Zaidenberg
2019Identification and Extraction of Digital Forensic Evidence from Multimedia Data Sources using Multi-algorithmic Fusion.
Shahlaa Mashhadani, Nathan L. Clarke, Fudong Li
2019Identity-based TLS for Cloud of Chips.
Gaurav Sharma, Soultana Ellinidou, Tristan Vanspouwen, Théo Rigas, Jean-Michel Dricot, Olivier Markowitch
2019Improved Forensic Recovery of PKZIP Stream Cipher Passwords.
Sein Coray, Iwen Coisel, Ignacio Sánchez
2019In-depth Feature Selection and Ranking for Automated Detection of Mobile Malware.
Alejandro Guerra-Manzanares, Sven Nõmm, Hayretdin Bahsi
2019Locality-Sensitive Hashing for Efficient Web Application Security Testing.
Ilan Ben-Bassat, Erez Rokah
2019Location Privacy Assured Internet of Things.
Ismail Butun, Mikael Gidlund
2019Machine Learning for All: A More Robust Federated Learning Framework.
Ilias Chamatidis, Georgios P. Spathoulas
2019Maia: A Language for Mandatory Integrity Controls of Structured Data.
Wassnaa Al-Mawee, Paul J. Bonamy, Steve Carr, Jean Mayo
2019Malicious DNS Traffic in Tor: Analysis and Countermeasures.
Michael Sonntag
2019Mathematical Model to Estimate Loss by Cyber Incident in Japan.
Michihiro Yamada, Hiroaki Kikuchi, Naoki Matsuyama, Koji Inui
2019Methodology of a Network Simulation in the Context of an Evaluation: Application to an IDS.
Pierre-Marie Bajan, Christophe Kiennert, Hervé Debar
2019Mobile Devices as Digital Sextants for Zero-Permission Geolocation.
Lorenz Schwittmann, Matthäus Wander, Torben Weis
2019Modeling and Simulation of Attacks on Cyber-physical Systems.
Cinzia Bernardeschi, Andrea Domenici, Maurizio Palmieri
2019Monotonic and Non-monotonic Context Delegation.
Mouiad Al-Wahah, Csilla Farkas
2019Next Generation Information Warfare: Challenges and Research Directions.
Roberto Di Pietro
2019Nonsense Attacks on Google Assistant and Missense Attacks on Amazon Alexa.
Mary K. Bispham, Ioannis Agrafiotis, Michael Goldsmith
2019Permission-based Risk Signals for App Behaviour Characterization in Android Apps.
Oluwafemi Olukoya, Lewis Mackenzie, Inah Omoronyia
2019Phishing Email Detection based on Named Entity Recognition.
Vít Listík, Simon Let, Jan Sedivý, Václav Hlavác
2019Practical Solutions to Save Bitcoins Applied to an Identity System Proposal.
Daniel Augot, Hervé Chabanne, William George
2019Predicting CyberSecurity Incidents using Machine Learning Algorithms: A Case Study of Korean SMEs.
Alaa Mohasseb, Benjamin Aziz, Jeyong Jung, Julak Lee
2019Privacy Preservation of Social Network Users Against Attribute Inference Attacks via Malicious Data Mining.
Khondker Jahid Reza, Md Zahidul Islam, Vladimir Estivill-Castro
2019Probabilistic Graphical Model on Detecting Insiders: Modeling with SGD-HMM.
Ahmed Saaudi, Yan Tong, Csilla Farkas
2019Probabilistic Modeling and Simulation of Vehicular Cyber Attacks: An Application of the Meta Attack Language.
Sotirios Katsikeas, Pontus Johnson, Simon Hacks, Robert Lagerström
2019Proceedings of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019.
Paolo Mori, Steven Furnell, Olivier Camp
2019Remote Exploit Development for Cyber Red Team Computer Network Operations Targeting Industrial Control Systems.
Bernhards Blumbergs
2019Robust Person Identification based on DTW Distance of Multiple-Joint Gait Pattern.
Takafumi Mori, Hiroaki Kikuchi
2019SC2Share: Smart Contract for Secure Car Sharing.
Akash Madhusudan, Iraklis Symeonidis, Mustafa A. Mustafa, Ren Zhang, Bart Preneel
2019SMMDecoy: Detecting GPU Keyloggers using Security by Deception Techniques.
Ijlal Loutfi
2019SPROOF: A Platform for Issuing and Verifying Documents in a Public Blockchain.
Clemens Brunner, Fabian Knirsch, Dominik Engel
2019Security Analysis and Efficient Implementation of Code-based Signature Schemes.
Partha Sarathi Roy, Kirill Morozov, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi
2019Sender Authentication for Automotive In-Vehicle Networks through Dual Analog Measurements to Determine the Location of the Transmitter.
Carlos Moreno, Sebastian Fischmeister
2019Sensing Danger: Exploiting Sensors to Build Covert Channels.
Thomas Ulz, Markus Feldbacher, Thomas Pieber, Christian Steger
2019Smart-card Deployment of an Electronic Voting Protocol.
Hervé Chabanne, Emmanuelle Dottax, Franck Rondepierre
2019Solving a Hard Instance of Suspicious Behaviour Detection with Sparse Binary Vectors Clustering.
Eric Filiol, Abhilash Hota
2019Spyware Detection using Temporal Logic.
Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone
2019Survey and Lessons Learned on Raising SME Awareness about Cybersecurity.
Christophe Ponsard, Jeremy Grandclaudon, Sébastien Bal
2019Systematic Characterization of a Sequence Group.
Paul Irolla
2019TED: A Container based Tool to Perform Security Risk Assessment for ELF Binaries.
Daniele Mucci, Bernhards Blumbergs
2019The Common Vulnerability Scoring System vs. Rock Star Vulnerabilities: Why the Discrepancy?
Doudou Fall, Youki Kadobayashi
2019The Curious Case of Machine Learning in Malware Detection.
Sherif Saad, William Briguglio, Haytham Elmiligi
2019The HERMENEUT Project: Enterprises Intangible Risk Management via Economic Models based on Simulation of Modern Cyber Attacks.
Enrico Frumento, Carlo Dambra
2019Theorising on Information Cascades and Sequential Decision-making for Analysing Security Behaviour.
Dirk Snyman, Hennie A. Kruger
2019Threat Modeling and Attack Simulations of Connected Vehicles: A Research Outlook.
Wenjun Xiong, Fredrik Krantz, Robert Lagerström
2019Towards Aligning GDPR Compliance with Software Development: A Research Agenda.
Meiko Jensen, Sahil Kapila, Nils Gruschka
2019Towards Automated Characterization of Malware's High-level Mechanism using Virtual Machine Introspection.
Shun Yonamine, Youki Kadobayashi, Daisuke Miyamoto, Yuzo Taenaka
2019Towards Automated Comprehensive Feature Engineering for Spam Detection.
Fred N. Kiwanuka, Ja'far Alqatawna, Anang Hudaya Muhamad Amin, Sujni Paul, Hossam Faris
2019Tracking Data Trajectories in IoT.
Chiara Bodei, Letterio Galletta
2019Transfer Learning for Image-based Malware Classification.
Niket Bhodia, Pratikkumar Prajapati, Fabio Di Troia, Mark Stamp
2019Usability of Policy Authoring Tools: A Layered Approach.
Stephanie Weinhardt, Olamide Omolola
2019Vulnerabilities in IoT Devices for Smart Home Environment.
Luís Costa, João Paulo Barros, Miguel Tavares
2019Zero-sum Distinguishers for Round-reduced GIMLI Permutation.
Jiahao Cai, Zihao Wei, Yingjie Zhang, Siwei Sun, Lei Hu