| 2019 | A Comparative Analysis of Android Malware. Neeraj Chavan, Fabio Di Troia, Mark Stamp |
| 2019 | A Decentralized Solution for Combinatorial Testing of Access Control Engine. Said Daoudagh, Francesca Lonetti, Eda Marchetti |
| 2019 | A Fine-grained General Purpose Secure Storage Facility for Trusted Execution Environment. Luigi Catuogno, Clemente Galdi |
| 2019 | A Novel Behaviour Profiling Approach to Continuous Authentication for Mobile Applications. Saud Alotaibi, Abdulrahman Alruban, Steven Furnell, Nathan L. Clarke |
| 2019 | A Novel Features Set for Internet Traffic Classification using Burstiness. Hussein Oudah, Bogdan V. Ghita, Taimur Bakhshi |
| 2019 | A Secure Framework with Remote Configuration of Intellectual Property. Nadir Khan, Sven Nitzsche, Jürgen Becker |
| 2019 | A Systematic Approach to Choose the Data Warehouse Architecture. Antonello Venditti, Fausto Fasano |
| 2019 | Accelerate Performance for Elliptic Curve Scalar Multiplication based on NAF by Parallel Computing. Mohammad Anagreh, Eero Vainikko, Peeter Laud |
| 2019 | Accomplishing Transparency within the General Data Protection Regulation. Dayana Spagnuelo, Ana Ferreira, Gabriele Lenzini |
| 2019 | An Image Forgery Detection Solution based on DCT Coefficient Analysis. Hoai Phuong Nguyen, Florent Retraint, Frédéric Morain-Nicolier, Agnès Delahaies |
| 2019 | An Order-specified Aggregate Authority-transfer Signature. Takuya Ezure, Masaki Inamura |
| 2019 | Analytical Modelling of Cyber-physical Systems. Paul Tavolato, Christina Tavolato-Wötzl |
| 2019 | Are You Ready When It Counts? IT Consulting Firm's Information Security Incident Management. Maja Nyman, Christine Große |
| 2019 | Attack and Defence Modelling for Attacks via the Speech Interface. Mary K. Bispham, Ioannis Agrafiotis, Michael Goldsmith |
| 2019 | AuthLedger: A Novel Blockchain-based Domain Name Authentication Scheme. Zhi Guan, Abba Garba, Anran Li, Zhong Chen, Nesrine Kaaniche |
| 2019 | Automated Incident Response for Industrial Control Systems Leveraging Software-defined Networking. Florian Patzer, Ankush Meshram, Maximilian Heß |
| 2019 | Behavioral Biometric Authentication in Android Unlock Patterns through Machine Learning. José Torres, Sergio de los Santos, Efthimios Alepis, Constantinos Patsakis |
| 2019 | Building the Future: Tokenization, Blockchain and Citizen-focused Systems. Bill Buchanan |
| 2019 | Challenges of GDPR and the NIS Directive. Gerald Quirchmayr |
| 2019 | Construction of Secure Internal Networks with Communication Classifying System. Yuya Sato, Hirokazu Hasegawa, Hiroki Takakura |
| 2019 | Deep Neural Networks for Android Malware Detection. Abhilash Hota, Paul Irolla |
| 2019 | Definition and Efficient Construction of Encrypted k-anonymization Scheme. Masayuki Yoshino, Takayuki Suzuki, Ken Naganuma, Hisayoshi Sato |
| 2019 | Design of an Example Network Protocol for Security Tests Targeting Industrial Automation Systems. Steffen Pfrang, Mark Giraud, Anne Borcherding, David Meier, Jürgen Beyerer |
| 2019 | Detecting Anomalies by using Self-Organizing Maps in Industrial Environments. Ricardo Hormann, Eric Fischer |
| 2019 | Enhancing Business Process Modelling with Data Protection Compliance: An Ontology-based Proposal. Cesare Bartolini, Antonello Calabrò, Eda Marchetti |
| 2019 | Evaluating Privacy Policy Summarization: An Experimental Study among Japanese Users. Vanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay, Shinsaku Kiyomoto |
| 2019 | Evaluating Security, Privacy and Usability Features of QR Code Readers. Heider A. M. Wahsheh, Flaminia L. Luccio |
| 2019 | Experiment on Side-Channel Key-Recovery using a Real LPWA End-device. Kazuhide Fukushima, Damien Marion, Yuto Nakano, Adrien Facon, Shinsaku Kiyomoto, Sylvain Guilley |
| 2019 | Extracting Vehicle Sensor Signals from CAN Logs for Driver Re-identification. Szilvia Lestyan, Gergely Ács, Gergely Biczók, Zsolt Szalay |
| 2019 | Finding Classification Zone Violations with Anonymized Message Flow Analysis. Michael Meinig, Peter Tröger, Christoph Meinel |
| 2019 | Flexible Access Control and Confidentiality over Encrypted Data for Document-based Database. Maryam Almarwani, Boris Konev, Alexei Lisitsa |
| 2019 | Fuzzy Logic Decision based Collaborative Privacy Management Framework for Online Social Networks. Gulsum Akkuzu, Benjamin Aziz, Mo Adda |
| 2019 | Hypervisor-assisted Atomic Memory Acquisition in Modern Systems. Michael Kiperberg, Roee Leon, Amit Resh, Asaf Algawi, Nezer Zaidenberg |
| 2019 | Identification and Extraction of Digital Forensic Evidence from Multimedia Data Sources using Multi-algorithmic Fusion. Shahlaa Mashhadani, Nathan L. Clarke, Fudong Li |
| 2019 | Identity-based TLS for Cloud of Chips. Gaurav Sharma, Soultana Ellinidou, Tristan Vanspouwen, Théo Rigas, Jean-Michel Dricot, Olivier Markowitch |
| 2019 | Improved Forensic Recovery of PKZIP Stream Cipher Passwords. Sein Coray, Iwen Coisel, Ignacio Sánchez |
| 2019 | In-depth Feature Selection and Ranking for Automated Detection of Mobile Malware. Alejandro Guerra-Manzanares, Sven Nõmm, Hayretdin Bahsi |
| 2019 | Locality-Sensitive Hashing for Efficient Web Application Security Testing. Ilan Ben-Bassat, Erez Rokah |
| 2019 | Location Privacy Assured Internet of Things. Ismail Butun, Mikael Gidlund |
| 2019 | Machine Learning for All: A More Robust Federated Learning Framework. Ilias Chamatidis, Georgios P. Spathoulas |
| 2019 | Maia: A Language for Mandatory Integrity Controls of Structured Data. Wassnaa Al-Mawee, Paul J. Bonamy, Steve Carr, Jean Mayo |
| 2019 | Malicious DNS Traffic in Tor: Analysis and Countermeasures. Michael Sonntag |
| 2019 | Mathematical Model to Estimate Loss by Cyber Incident in Japan. Michihiro Yamada, Hiroaki Kikuchi, Naoki Matsuyama, Koji Inui |
| 2019 | Methodology of a Network Simulation in the Context of an Evaluation: Application to an IDS. Pierre-Marie Bajan, Christophe Kiennert, Hervé Debar |
| 2019 | Mobile Devices as Digital Sextants for Zero-Permission Geolocation. Lorenz Schwittmann, Matthäus Wander, Torben Weis |
| 2019 | Modeling and Simulation of Attacks on Cyber-physical Systems. Cinzia Bernardeschi, Andrea Domenici, Maurizio Palmieri |
| 2019 | Monotonic and Non-monotonic Context Delegation. Mouiad Al-Wahah, Csilla Farkas |
| 2019 | Next Generation Information Warfare: Challenges and Research Directions. Roberto Di Pietro |
| 2019 | Nonsense Attacks on Google Assistant and Missense Attacks on Amazon Alexa. Mary K. Bispham, Ioannis Agrafiotis, Michael Goldsmith |
| 2019 | Permission-based Risk Signals for App Behaviour Characterization in Android Apps. Oluwafemi Olukoya, Lewis Mackenzie, Inah Omoronyia |
| 2019 | Phishing Email Detection based on Named Entity Recognition. Vít Listík, Simon Let, Jan Sedivý, Václav Hlavác |
| 2019 | Practical Solutions to Save Bitcoins Applied to an Identity System Proposal. Daniel Augot, Hervé Chabanne, William George |
| 2019 | Predicting CyberSecurity Incidents using Machine Learning Algorithms: A Case Study of Korean SMEs. Alaa Mohasseb, Benjamin Aziz, Jeyong Jung, Julak Lee |
| 2019 | Privacy Preservation of Social Network Users Against Attribute Inference Attacks via Malicious Data Mining. Khondker Jahid Reza, Md Zahidul Islam, Vladimir Estivill-Castro |
| 2019 | Probabilistic Graphical Model on Detecting Insiders: Modeling with SGD-HMM. Ahmed Saaudi, Yan Tong, Csilla Farkas |
| 2019 | Probabilistic Modeling and Simulation of Vehicular Cyber Attacks: An Application of the Meta Attack Language. Sotirios Katsikeas, Pontus Johnson, Simon Hacks, Robert Lagerström |
| 2019 | Proceedings of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019. Paolo Mori, Steven Furnell, Olivier Camp |
| 2019 | Remote Exploit Development for Cyber Red Team Computer Network Operations Targeting Industrial Control Systems. Bernhards Blumbergs |
| 2019 | Robust Person Identification based on DTW Distance of Multiple-Joint Gait Pattern. Takafumi Mori, Hiroaki Kikuchi |
| 2019 | SC2Share: Smart Contract for Secure Car Sharing. Akash Madhusudan, Iraklis Symeonidis, Mustafa A. Mustafa, Ren Zhang, Bart Preneel |
| 2019 | SMMDecoy: Detecting GPU Keyloggers using Security by Deception Techniques. Ijlal Loutfi |
| 2019 | SPROOF: A Platform for Issuing and Verifying Documents in a Public Blockchain. Clemens Brunner, Fabian Knirsch, Dominik Engel |
| 2019 | Security Analysis and Efficient Implementation of Code-based Signature Schemes. Partha Sarathi Roy, Kirill Morozov, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi |
| 2019 | Sender Authentication for Automotive In-Vehicle Networks through Dual Analog Measurements to Determine the Location of the Transmitter. Carlos Moreno, Sebastian Fischmeister |
| 2019 | Sensing Danger: Exploiting Sensors to Build Covert Channels. Thomas Ulz, Markus Feldbacher, Thomas Pieber, Christian Steger |
| 2019 | Smart-card Deployment of an Electronic Voting Protocol. Hervé Chabanne, Emmanuelle Dottax, Franck Rondepierre |
| 2019 | Solving a Hard Instance of Suspicious Behaviour Detection with Sparse Binary Vectors Clustering. Eric Filiol, Abhilash Hota |
| 2019 | Spyware Detection using Temporal Logic. Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone |
| 2019 | Survey and Lessons Learned on Raising SME Awareness about Cybersecurity. Christophe Ponsard, Jeremy Grandclaudon, Sébastien Bal |
| 2019 | Systematic Characterization of a Sequence Group. Paul Irolla |
| 2019 | TED: A Container based Tool to Perform Security Risk Assessment for ELF Binaries. Daniele Mucci, Bernhards Blumbergs |
| 2019 | The Common Vulnerability Scoring System vs. Rock Star Vulnerabilities: Why the Discrepancy? Doudou Fall, Youki Kadobayashi |
| 2019 | The Curious Case of Machine Learning in Malware Detection. Sherif Saad, William Briguglio, Haytham Elmiligi |
| 2019 | The HERMENEUT Project: Enterprises Intangible Risk Management via Economic Models based on Simulation of Modern Cyber Attacks. Enrico Frumento, Carlo Dambra |
| 2019 | Theorising on Information Cascades and Sequential Decision-making for Analysing Security Behaviour. Dirk Snyman, Hennie A. Kruger |
| 2019 | Threat Modeling and Attack Simulations of Connected Vehicles: A Research Outlook. Wenjun Xiong, Fredrik Krantz, Robert Lagerström |
| 2019 | Towards Aligning GDPR Compliance with Software Development: A Research Agenda. Meiko Jensen, Sahil Kapila, Nils Gruschka |
| 2019 | Towards Automated Characterization of Malware's High-level Mechanism using Virtual Machine Introspection. Shun Yonamine, Youki Kadobayashi, Daisuke Miyamoto, Yuzo Taenaka |
| 2019 | Towards Automated Comprehensive Feature Engineering for Spam Detection. Fred N. Kiwanuka, Ja'far Alqatawna, Anang Hudaya Muhamad Amin, Sujni Paul, Hossam Faris |
| 2019 | Tracking Data Trajectories in IoT. Chiara Bodei, Letterio Galletta |
| 2019 | Transfer Learning for Image-based Malware Classification. Niket Bhodia, Pratikkumar Prajapati, Fabio Di Troia, Mark Stamp |
| 2019 | Usability of Policy Authoring Tools: A Layered Approach. Stephanie Weinhardt, Olamide Omolola |
| 2019 | Vulnerabilities in IoT Devices for Smart Home Environment. Luís Costa, João Paulo Barros, Miguel Tavares |
| 2019 | Zero-sum Distinguishers for Round-reduced GIMLI Permutation. Jiahao Cai, Zihao Wei, Yingjie Zhang, Siwei Sun, Lei Hu |