ICISSP C

94 papers

YearTitle / Authors
2020A Comparison of Blockchain-based PKI Implementations.
Clemens Brunner, Fabian Knirsch, Andreas Unterweger, Dominik Engel
2020A Curious Exploration of Malicious PDF Documents.
Julian Lindenhofer, Rene Offenthaler, Martin Pirker
2020A Domain-specific Modeling Framework for Attack Surface Modeling.
Tithnara Nicolas Sun, Bastien Drouot, Fahad Rafique Golra, Joël Champeau, Sylvain Guérin, Luka Le Roux, Raúl Mazo, Ciprian Teodorov, Lionel Van Aertryck, Bernard L'Hostis
2020A Formal Approach for the Analysis of the XRP Ledger Consensus Protocol.
Lara Mauri, Stelvio Cimato, Ernesto Damiani
2020A Homomorphic Proxy Re-authenticators based Efficient Multi-client Non-interactive Verifiable Computation Scheme.
Shuaijianni Xu, Liang Feng Zhang
2020A Meta Model for a Comprehensive Description of Network Protocols Improving Security Tests.
Steffen Pfrang, David Meier, Andreas Fleig, Jürgen Beyerer
2020A Practical Approach to Stakeholder-driven Determination of Security Requirements based on the GDPR and Common Criteria.
Sandra Domenique Zinsmaier, Hanno Langweg, Marcel Waldvogel
2020A Quantitative Study of Vulnerabilities in the Internet of Medical Things.
Hervé Debar, Razvan Beuran, Yasuo Tan
2020A Study of Classification of Texts into Categories of Cybersecurity Incident and Attack with Topic Models.
Masahiro Ishii, Satoshi Matsuura, Kento Mori, Masahiko Tomoishi, Yong Jin, Yoshiaki Kitaguchi
2020A Systematic Approach toward Extracting Technically Enforceable Policies from Data Usage Control Requirements.
Arghavan Hosseinzadeh, Andreas Eitel, Christian Jung
2020AMNESIA: A Technical Solution towards GDPR-compliant Machine Learning.
Christoph Stach, Corinna Giebler, Manuela Wagner, Christian Weber, Bernhard Mitschang
2020Accidental Sensitive Data Leaks Prevention via Formal Verification.
Madalina G. Ciobanu, Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
2020Accountant: Protection of Data Integrity and Identification of Malicious Nodes in In-network Data Processing.
David Jost, Mathias Fischer
2020Achieving Privacy, Security, and Interoperability among Biometric Networks using Symmetric Encryption.
Eduardo Magalhães De Lacerda Filho, Vinícius P. Gonçalves
2020Active Directory Kerberoasting Attack: Monitoring and Detection Techniques.
Lukás Kotlaba, Simona Buchovecká, Róbert Lórencz
2020An Analytical Scanning Technique to Detect and Prevent the Transformed SQL Injection and XSS Attacks.
Mohammad Qbea'h, Saed Alrabaee, Djedjiga Mouheb
2020An Approach to Secure Legacy Software Systems.
Stefanie Jasser, Jonas Kelbert
2020Analysis of Security Attacks in Wireless Sensor Networks: From UPPAAL to Castalia.
Cinzia Bernardeschi, Gianluca Dini, Maurizio Palmieri, Francesco Racciatti
2020Android Run-time Permission Exploitation User Awareness by Means of Formal Methods.
Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
2020Anomaly Detection in Communication Networks of Cyber-physical Systems using Cross-over Data Compression.
Hubert Schölnast, Paul Tavolato, Philipp Kreimel
2020Assessing Testing Strategies for Access Control Systems: A Controlled Experiment.
Said Daoudagh, Francesca Lonetti, Eda Marchetti
2020Backdooring Deep Learning Architectures: Threats and (some) Opportunities.
Mauro Barni
2020Bank Credit Risk Management based on Data Mining Techniques.
Fabio Martinelli, Francesco Mercaldo, Domenico Raucci, Antonella Santone
2020Bident Structure for Neural Network Model Protection.
Hsiao-Ying Lin, Chengfang Fang, Jie Shi
2020Building Competitive Advantage from Ubuntu: An African Information Security Awareness Model.
Tapiwa Gundu, Nthabiseng Modiba
2020CCA Secure Unidirectional PRE with Key Pair in the Standard Model without Pairings.
Anass Sbai, Cyril Drocourt, Gilles Dequen
2020CoProtect: Collaborative Management of Cryptographic Keys for Data Security in Cloud Systems.
Lorenzo Bracciale, Pierpaolo Loreti, Emanuele Raso, Maurizio Naldi, Giuseppe Bianchi
2020CoRA: A Scalable Collective Remote Attestation Protocol for Sensor Networks.
Aïda Diop, Maryline Laurent, Jean Leneutre, Jacques Traoré
2020Comparing Machine Learning Techniques for Malware Detection.
Joanna Moubarak, Tony Feghali
2020Comparison of the Paillier and ElGamal Cryptosystems for Smart Grid Aggregation Protocols.
Fabian Knirsch, Andreas Unterweger, Maximilian Unterrainer, Dominik Engel
2020Computer Viruses: The Abstract Theory Revisited.
Nikolai Gladychev
2020Detection of Crawler Traps: Formalization and Implementation Defeating Protection on Internet and on the TOR Network.
Maxence Delong, Baptiste David, Eric Filiol
2020Distance Metric Learning using Particle Swarm Optimization to Improve Static Malware Detection.
Martin Jurecek, Róbert Lórencz
2020Distributed Defence of Service (DiDoS): A Network-layer Reputation-based DDoS Mitigation Architecture.
Andikan Otung, Andrew P. Martin
2020Dual-use Research in Ransomware Attacks: A Discussion on Ransomware Defence Intelligence.
Ziya Alper Genç, Gabriele Lenzini
2020Email Image Spam Classification based on ResNet Convolutional Neural Network.
Vít Listík, Jan Sedivý, Václav Hlavác
2020Email Spoofing Attack Detection through an End to End Authorship Attribution System.
Giacomo Giorgi, Andrea Saracino, Fabio Martinelli
2020Evaluating the Effect of Justification and Confidence Information on User Perception of a Privacy Policy Summarization Tool.
Vanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay, Shinsaku Kiyomoto
2020Evaluation to Classify Ransomware Variants based on Correlations between APIs.
Jiaxing Zhou, Miyuki Hirose, Yoshio Kakizaki, Atsuo Inomata
2020Exploring Vulnerabilities in Solidity Smart Contract.
Phitchayaphong Tantikul, Sudsanguan Ngamsuriyaroj
2020External Contextual Factors in Information Security Behaviour.
Dirk Snyman, Hennie A. Kruger
2020Greater Control and Transparency in Personal Data Processing.
Giray Havur, Miel Vander Sande, Sabrina Kirrane
2020Harmonized Group Mix for ITS.
Mirja Nitschke, Christian Roth, Christian Hoyer, Dogan Kesdogan
2020Homomorphic Encryption at Work for Private Analysis of Security Logs.
Aymen Boudguiga, Oana Stan, Hichem Sedjelmaci, Sergiu Carpov
2020Host Fingerprinting for Web Servers Authentication.
Ezio Lefons, Sebastiano Pizzutilo, Filippo Tangorra
2020Improving Accuracy and Speed of Network-based Intrusion Detection using Gradient Boosting Trees.
Ryosuke Terado, Morihiro Hayashida
2020Integration of Data Envelopment Analysis in Business Process Models: A Novel Approach to Measure Information Security.
Agnes Åkerlund, Christine Große
2020Introducing a Verified Authenticated Key Exchange Protocol over Voice Channels for Secure Voice Communication.
Piotr Krasnowski, Jérôme Lebrun, Bruno Martin
2020Is Ethereum's ProgPoW ASIC Resistant?
Jason Orender, Ravi Mukkamala, Mohammad Zubair
2020Legislation and the Negative Impact on Cybersecurity in Healthcare.
Jesse Daniels, Sajal Bhatia
2020Leveraging Blockchain Technology to Enhance Security and Privacy in the Internet of Things.
Sokratis K. Katsikas
2020Lightweight Authentication and Secure Communication Suitable for IoT Devices.
Simona Buchovecká, Róbert Lórencz, Jirí Bucek, Filip Kodýtek
2020Maturity Modelling to Prepare for Cyber Crisis Escalation and Management.
Grethe Østby, Basel Katt
2020MedBIoT: Generation of an IoT Botnet Dataset in a Medium-sized IoT Network.
Alejandro Guerra-Manzanares, Jorge Medina-Galindo, Hayretdin Bahsi, Sven Nõmm
2020Methodology and Feedback about Systematic Cybersecurity Experts Auditing in Belgium.
Christophe Ponsard, Jeremy Grandclaudon, Nicolas Point
2020Modeling Cyber Threat Intelligence.
Siri Bromander, Morton Swimmer, Martin Eian, Geir Skjøtskift, Fredrik Borg
2020Multi-level Distributed Intrusion Detection System for an IoT based Smart Home Environment.
Simone Facchini, Giacomo Giorgi, Andrea Saracino, Gianluca Dini
2020Neural Network Security: Hiding CNN Parameters with Guided Grad-CAM.
Linda Guiga, A. W. Roscoe
2020New General Secret Sharing Scheme using Hierarchical Threshold Scheme: Improvement of Information Rates for Specified Participants.
Kouya Tochikubo
2020On Analyzing Third-party Tracking via Machine Learning.
Alfonso Guarino, Delfina Malandrino, Rocco Zaccagnino, Federico Cozza, Antonio Rapuano
2020Ontology-based Automation of Penetration Testing.
Ge Chu, Alexei Lisitsa
2020Patients to Mobilize Their Data: Secure and Flexible mHealth Delegation.
Rafael Almeida, Pedro Vieira-Marques, Ana Ferreira
2020Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach.
Orestis Christou, Nikolaos Pitropakis, Pavlos Papadopoulos, Sean McKeown, William J. Buchanan
2020Presence Metadata in the Internet of Things: Challenges and Opportunities.
Robert Hegarty, John Haggerty
2020Privacy with Health Information Technologies: What Story Do Data Breaches in US Tell Us?
Sylvestre Uwizeyemungu, Placide Poba-Nzaou
2020Privacy-preserving Measures in Smart City Video Surveillance Systems.
Shizra Sultan, Christian Damsgaard Jensen
2020Privacy-preserving Surveillance Methods using Homomorphic Encryption.
William Bowditch, Will Abramson, William J. Buchanan, Nikolaos Pitropakis, Adam J. Hall
2020Proceedings of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, Valletta, Malta, February 25-27, 2020.
Steven Furnell, Paolo Mori, Edgar R. Weippl, Olivier Camp
2020Quantifying the Significance of Cybersecurity Text through Semantic Similarity and Named Entity Recognition.
Otgonpurev Mendsaikhan, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada
2020Radical Text Detection based on Stylometry.
Álvaro de Pablo, Oscar Araque, Carlos Angel Iglesias
2020Recommender Systems Robust to Data Poisoning using Trim Learning.
Seira Hidano, Shinsaku Kiyomoto
2020Revisiting Higher-order Computational Attacks against White-box Implementations.
Houssem Maghrebi, Davide Alessio
2020Revisiting Privacy-aware Blockchain Public Key Infrastructure.
Paul Plessing, Olamide Omolola
2020Risk Identification: From Requirements to Threat Models.
Roman Wirtz, Maritta Heisel
2020Secrecy and Authenticity Properties of the Lightning Network Protocol.
Hans Hüttel, Vilim Staroveski
2020Secure Comparison and Interval Test Protocols based on Three-party MPC.
Wataru Fujii, Keiichi Iwamura, Masaki Inamura
2020Secure Ownership Transfer for the Internet of Things.
Martin Gunnarsson, Christian Gehrmann
2020Securing Industrial Production from Sophisticated Cyberattacks.
Andrew Sundstrom, Damas W. Limoge, Vadim Pinskiy, Matthew Putman
2020Securing IoT Devices using Geographic and Continuous Login Blocking: A Honeypot Study.
Fredrik Heiding, Mohammad-Ali Omer, Andreas Wallström, Robert Lagerström
2020Security and Privacy in Smart Grids: Challenges, Current Solutions and Future Opportunities.
Ismail Butun, Alexios Lekidis, Daniel Ricardo dos Santos
2020Security of Digital Banking Systems in Poland: Users Study 2019.
Wojciech Wodo, Damian Stygar
2020Speeding Up the Computation of Elliptic Curve Scalar Multiplication based on CRT and DRM.
Mohammad Anagreh, Eero Vainikko, Peeter Laud
2020Systematization of Threats and Requirements for Private Messaging with Untrusted Servers: The Case of e-Mailing and Instant Messaging.
Iraklis Symeonidis, Gabriele Lenzini
2020The Blockchain Potential in Computer Virology.
Joanna Moubarak, Eric Filiol, Maroun Chamoun
2020The Root Causes of Compromised Accounts at the University.
Philip Nyblom, Gaute Wangen, Mazaher Kianpour, Grethe Østby
2020Threat Modeling and Attack Simulations of Smart Cities: A Literature Review and Explorative Study.
Robert Lagerström, Wenjun Xiong, Mathias Ekstedt
2020Tool Support for Risk-driven Planning of Trustworthy Smart IoT Systems within DevOps.
Andreas Thompson, Gencer Erdogan
2020Toward Active and Passive Confidentiality Attacks on Cryptocurrency Off-chain Networks.
Utz Nisslmueller, Klaus-Tycho Foerster, Stefan Schmid, Christian Decker
2020Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification.
Christian Colombo, Mark Vella
2020Track Down Identity Leaks using Threat Intelligence.
Timo Malderle, Sven Knauer, Martin Lang, Matthias Wübbeling, Michael Meier
2020Translating Data Protection into Software Requirements.
Ralf Kneuper
2020Using Eyetracker to Find Ways to Mitigate Ransomware.
Budi Arief, Andy Periam, Orçun Çetin, Julio C. Hernandez-Castro
2020Verifying Sanitizer Correctness through Black-Box Learning: A Symbolic Finite Transducer Approach.
Sophie Lathouwers, Maarten H. Everts, Marieke Huisman
2020Visualizing Syscalls using Self-organizing Maps for System Intrusion Detection.
Max Landauer, Florian Skopik, Markus Wurzenberger, Wolfgang Hotwagner, Andreas Rauber