ICISSP C

89 papers

YearTitle / Authors
2021A Dynamic Access Control System based on Situations of Users.
Hirokazu Hasegawa, Hiroki Takakura
2021A Lemon by Any Other Label.
Vaibhav Garg
2021A New Dataset for Smartphone Gesture-based Authentication.
Elliu Huang, Fabio Di Troia, Mark Stamp, Preethi Sundaravaradhan
2021A Novel Simplified Framework to Secure IoT Communications.
Sairath Bhattacharjya, Hossein Saiedian
2021A Permissioned Blockchain-based System for Collaborative Drug Discovery.
Christoffer Olsson, Mohsen Toorani
2021A Protection against the Extraction of Neural Network Models.
Hervé Chabanne, Vincent Despiegel, Linda Guiga
2021A Secure Network Scanner Architecture for Asset Management in Strongly Segmented ICS Networks.
Matthias Niedermaier, Thomas Hanka, Florian Fischer, Dominik Merli
2021A State Saturation Attack against Massively Multiplayer Online Videogames.
Blake D. Bryant, Hossein Saiedian
2021Accessible Cyber Security: The Next Frontier?
Karen Renaud
2021Active Directory Kerberoasting Attack: Detection using Machine Learning Techniques.
Lukás Kotlaba, Simona Buchovecká, Róbert Lórencz
2021Admonita: A Recommendation-based Trust Model for Dynamic Data Integrity.
Wassnaa Al-Mawee, Steve Carr, Jean Mayo
2021Adversarial Machine Learning: A Comparative Study on Contemporary Intrusion Detection Datasets.
Yulexis Pacheco, Weiqing Sun
2021An Analytic Attack against ARX Addition Exploiting Standard Side-channel Leakage.
Yan Yan, Elisabeth Oswald, Srinivas Vivek
2021An Asynchronous Federated Learning Approach for a Security Source Code Scanner.
Sabrina Kall, Slim Trabelsi
2021An Overview of Cryptographic Accumulators.
Ilker Özçelik, Sai Medury, Justin T. Broaddus, Anthony Skjellum
2021Automated Black Box Detection of HTTP GET Request-based Access Control Vulnerabilities in Web Applications.
Malte Kushnir, Olivier Favre, Marc Rennhard, Damiano Esposito, Valentin Zahnd
2021Automatic Detection and Decryption of AES by Monitoring S-Box Access.
Josef Kokes, Jonatan Matejka, Róbert Lórencz
2021Automatic Detection of Cyber Security Events from Turkish Twitter Stream and Newspaper Data.
Özgür Ural, Cengiz Acartürk
2021Automatically Extracting Business Level Access Control Requirements from BPMN Models to Align RBAC Policies.
Roman Pilipchuk, Robert Heinrich, Ralf H. Reussner
2021Blockchain based Secured Virtual Machine Image Monitor.
Srijita Basu, Sandip Karmakar, Debasish Bera
2021Bridging Knowledge Gaps in Security Analytics.
Fabian Böhm, Manfred Vielberth, Günther Pernul
2021Canopy: A Learning-based Approach for Automatic Low-and-Slow DDoS Mitigation.
Lucas Cadalzo, Christopher H. Todd, Banjo Obayomi, W. Brad Moore, Anthony C. Wong
2021Checking Contact Tracing App Implementations.
Robert Flood, Sheung Shi Chan, Wei Chen, David Aspinall
2021Colluding Covert Channel for Malicious Information Exfiltration in Android Environment.
Rosangela Casolare, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
2021Continuous Authentication based on Hand Micro-movement during Smartphone Form Filling by Seated Human Subjects.
Aratrika Ray, Daqing Hou, Stephanie Schuckers, Abbie Barbir
2021CyExec*: Automatic Generation of Randomized Cyber Range Scenarios.
Ryotaro Nakata, Akira Otsuka
2021DLP-Visor: A Hypervisor-based Data Leakage Prevention System.
Guy Amit, Amir Yeshooroon, Michael Kiperberg, Nezer J. Zaidenberg
2021Detecting Cyber Security Attacks against a Microservices Application using Distributed Tracing.
Stephen Jacob, Yuansong Qiao, Brian Lee
2021Developing Cyber-risk Centric Courses and Training Material for Cyber Ranges: A Systematic Approach.
Gencer Erdogan, Antonio Álvarez Romero, Niccolò Zazzeri, Anze Zitnik, Mariano Basile, Giorgio Aprile, Mafalda Osório, Claudia Pani, Ioannis Kechaoglou
2021Dreaming of Keys: Introducing the Phantom Gradient Attack.
Åvald Åslaugson Sommervoll
2021Efficient Semantic Representation of Network Access Control Configuration for Ontology-based Security Analysis.
Florian Patzer, Jürgen Beyerer
2021Enabling Monetization of Depreciating Data on Blockchains.
Christian Dahdah, Coline Van Leeuwen, Ziad Kheil, Jérôme Lacan, Jonathan Detchart, Thibault Gateau
2021Enhanced Information Management in Inter-organisational Planning for Critical Infrastructure Protection: Case and Framework.
Christine Große
2021Evaluation of Vulnerability Reproducibility in Container-based Cyber Range.
Ryotaro Nakata, Akira Otsuka
2021Experiences and Recommendations from Operating a Tor Exit Node at a University.
Michael Sonntag, René Mayrhofer
2021Experimental Evaluation of Description Logic Concept Learning Algorithms for Static Malware Detection.
Peter Svec, Stefan Balogh, Martin Homola
2021Field Studies on the Impact of Cryptographic Signatures and Encryption on Phishing Emails.
Stefanie Pham, Matthias Schopp, Lars Stiemert, Sebastian Seeber, Daniela Pöhn, Wolfgang Hommel
2021From Exposed to Exploited: Drawing the Picture of Industrial Control Systems Security Status in the Internet Age.
Yixiong Wu, Jianwei Zhuge, Tingting Yin, Tianyi Li, Junmin Zhu, Guannan Guo, Yue Liu, Jianju Hu
2021How to Improve the GDPR Compliance through Consent Management and Access Control.
Said Daoudagh, Eda Marchetti, Vincenzo Savarino, Roberto Di Bernardo, Marco Alessi
2021Hydra: Practical Metadata Security for Contact Discovery, Messaging, and Dialing.
David Schatz, Michael Rossberg, Guenter Schaefer
2021HyperPass: Secure Password Input Platform.
Michael Kiperberg, Nezer J. Zaidenberg
2021Implementation of Secondary Available Digital Content Protection Schemes using Identity-based Signatures.
Nozomi Nagashima, Masaki Inamura, Keiichi Iwamura
2021Implementing Secure Applications Thanks to an Integrated Secure Element.
Sylvain Guilley, Michel Le Rolland, Damien Quenson
2021Improvement of Secure Multi-Party Multiplication of (k, n) Threshold Secret Sharing Using Only N = k Servers.
Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura
2021Improving Classification of Malware Families using Learning a Distance Metric.
Martin Jurecek, Olha Jurecková, Róbert Lórencz
2021Learning from Smartphone Location Data as Anomaly Detection for Behavioral Authentication through Deep Neuroevolution.
Mhd Irvan, Tran Phuong Thao, Ryosuke Kobayashi, Toshiyuki Nakata, Rie Shigetomi Yamaguchi
2021Leveraging Dynamic Information for Identity and Access Management: An Extension of Current Enterprise IAM Architecture.
Alexander Puchta, Sebastian Groll, Günther Pernul
2021Linking Biometric Voice Identity with Self-monitoring Health Data as a Temporal-spatial Event Stored in a Mobile Device.
Bon Sy
2021MADLIRA: A Tool for Android Malware Detection.
Khanh-Huu-The Dam, Tayssir Touili
2021Malware Classification using Long Short-term Memory Models.
Dennis Dang, Fabio Di Troia, Mark Stamp
2021Malware Classification with GMM-HMM Models.
Jing Zhao, Samanvitha Basole, Mark Stamp
2021Malware Classification with Word Embedding Features.
Aparna Sunil Kale, Fabio Di Troia, Mark Stamp
2021Mobile Robots: An Overview of Data and Security.
Esmeralda Kadena, Huu Phuoc Dai Nguyen, Lourdes Ruiz
2021Model-based Threat and Risk Assessment for Systems Design.
Avi Shaked, Yoram Reich
2021New Directions for High-throughput and High-security Communication.
Adrian Perrig
2021On Formalising and Analysing the Tweetchain Protocol.
Mariapia Raimondo, Simona Bernardi, Stefano Marrone
2021On Security Analysis of Periodic Systems: Expressiveness and Complexity.
Musab A. Alturki, Tajana Ban Kirigin, Max I. Kanovich, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott
2021Ontology-based Cybersecurity and Resilience Framework.
Helmar Hutschenreuter, Salva Daneshgadeh Çakmakçi, Christian Maeder, Thomas Kemmerich
2021Optimizing Leak Detection in Open-source Platforms with Machine Learning Techniques.
Sofiane Lounici, Marco Rosa, Carlo Maria Negri, Slim Trabelsi, Melek Önen
2021Parallel Privacy-preserving Computation of Minimum Spanning Trees.
Mohammad Anagreh, Eero Vainikko, Peeter Laud
2021Practical and Provably Sound Static Analysis of Ethereum Smart Contracts.
Matteo Maffei
2021Predicting Security Program Effectiveness in Bring-Your-Own-Device Deployment in Organizations.
Alexander O. Akande, Vu N. Tran
2021Privacy Preserving Services for Intelligent Transportation Systems with Homomorphic Encryption.
Aymen Boudguiga, Oana Stan, Abdessamad Fazzat, Houda Labiod, Pierre-Emmanuel Clet
2021Proceedings of the 7th International Conference on Information Systems Security and Privacy, ICISSP 2021, Online Streaming, February 11-13, 2021.
Paolo Mori, Gabriele Lenzini, Steven Furnell
2021Profiling and Discriminating of Containerized ML Applications in Digital Data Marketplaces (DDM).
Lu Zhang, Reginald Cushing, Ralph Koning, Cees de Laat, Paola Grosso
2021Protecting Privacy during a Pandemic Outbreak.
Karsten Martiny, Linda Briesemeister, Grit Denker, Mark F. St. John, Ron Moore
2021Release-aware In-out Encryption Adjustment in MongoDB Query Processing.
Maryam Almarwani, Boris Konev, Alexei Lisitsa
2021Remote WebAuthn: FIDO2 Authentication for Less Accessible Devices.
Paul Wagner, Kris Heid, Jens Heider
2021Representation of PE Files using LSTM Networks.
Martin Jurecek, Matous Kozák
2021Securing Orchestrated Containers with BSI Module SYS.1.6.
Christoph Haar, Erik Buchmann
2021Securing the Linux Boot Process: From Start to Finish.
Jakob Hagl, Oliver Mann, Martin Pirker
2021Security Property Modeling.
Hiba Hnaini, Luka Le Roux, Joël Champeau, Ciprian Teodorov
2021Sociocultural Influences for Password Definition: An AI-based Study.
Carlos Ocanto Dávila, Rocío Cabrera Lozoya, Slim Trabelsi
2021Stopping DNS Rebinding Attacks in the Browser.
Mohammadreza Hazhirpasand, Arash Ale Ebrahim, Oscar Nierstrasz
2021Study of Intra- and Inter-user Variance in Password Keystroke Dynamics.
Blaine Ayotte, Mahesh K. Banavar, Daqing Hou, Stephanie Schuckers
2021The Comparison of Word Embedding Techniques in RNNs for Vulnerability Detection.
Hai Ngoc Nguyen, Songpon Teerakanok, Atsuo Inomata, Tetsutaro Uehara
2021The Proposal of Double Agent Architecture using Actor-critic Algorithm for Penetration Testing.
Hoang Viet Nguyen, Songpon Teerakanok, Atsuo Inomata, Tetsutaro Uehara
2021Towards Academic and Skills Credentialing Standards and Distributed Ledger Technologies.
Morné Pretorius, Nelisiwe Dlamini, Sthembile Mthethwa
2021Towards Collaborative Cyber Threat Intelligence for Security Management.
Oleksii Osliak, Andrea Saracino, Fabio Martinelli, Theo Dimitrakos
2021Towards Exploring User Perception of a Privacy Sensitive Information Detection Tool.
Vanessa Bracamonte, Welderufael B. Tesfay, Shinsaku Kiyomoto
2021Towards Formal Security Verification of Over-the-Air Update Protocol: Requirements, Survey and UpKit Case Study.
Christophe Ponsard, Denis Darquennes
2021Towards a Formalisation of Expert's Knowledge for an Automatic Construction of a Vulnerability Model of a Cyberphysical System.
Witold Klaudel, Artur Rataj
2021Towards an Ontology for Enterprise Level Information Security Policy Analysis.
Debashis Mandal, Chandan Mazumdar
2021Two Stage Anomaly Detection for Network Intrusion Detection.
Helmut Neuschmied, Martin Winter, Katharina Hofer-Schmitz, Branka Stojanovic, Ulrike Kleb
2021Unconventional Attack against Voting Machines Enlarging the Scope of Cybersecurity Risk Analysis.
Eric Filiol
2021Understanding How People Weigh the Costs and Benefits of using Facebook.
Jack McClary, Sid Stamm
2021Utilizing Keystroke Dynamics as Additional Security Measure to Protect Account Recovery Mechanism.
Ahmed Anu Wahab, Daqing Hou, Stephanie Schuckers, Abbie Barbir
2021Who Stores the Private Key? An Exploratory Study about User Preferences of Key Management for Blockchain-based Applications.
Clemens Brunner, Günther Eibl, Peter Fröhlich, Andreas Sackl, Dominik Engel
2021Windows Malware Binaries in C/C++ GitHub Repositories: Prevalence and Lessons Learned.
William La Cholter, Matthew Elder, Antonius Q. Stalick