ICISSP C

76 papers

YearTitle / Authors
2022"Fake News Detector": An Automatic System for the Reliability Evaluation of Digital News.
Claudio Cilli, Giulio Magnanini, Lorenzo Manduca, Fabrizio Venettoni
2022A Fast and Cost-effective Design for FPGA-based Fuzzy Rainbow Tradeoffs.
Leonardo Veronese, Francesco Palmarini, Riccardo Focardi, Flaminia L. Luccio
2022A Novel Key Exchange Protocol using Logic Algebra for the Factorization Problem.
Junhui Xiao, Ashish Neupane, Hiba F. Fayoumi, Weiqing Sun
2022A Privacy-Preserving Auction Platform with Public Verifiability for Smart Manufacturing.
Thomas Lorünser, Florian Wohner, Stephan Krenn
2022A Tailored Model for Cyber Security Education Utilizing a Cyber Range.
Gregor Langner, Florian Skopik, Steven Furnell, Gerald Quirchmayr
2022Age Bias in Finger Vein Biometric Research.
Joanne L. Hall, Jomin John, Jessica Liebig, Anju Skariah
2022An Analysis of Cloud Certifications' Performance on Privacy Protections.
Tian Wang, Masooda N. Bashir
2022An Exploratory Study of Why UMLsec Is Not Adopted.
Shouki A. Ebad
2022Analysis and Enhancement of Self-sovereign Identity System Properties Compiling Standards and Regulations.
Charnon Pattiyanon, Toshiaki Aoki
2022Android Data Storage Locations and What App Developers Do with It from a Security and Privacy Perspective.
Kris Heid, Tobias Tefke, Jens Heider, Ralf C. Staudemeyer
2022Benchmarking Consumer Data and Privacy Knowledge in Connected and Autonomous Vehicles.
Flora Barber, Steven Furnell
2022Can We Formally Catch Cheating in E-exams?
Itzel Vázquez Sandoval, Gabriele Lenzini
2022Classifying COVID-19 Disinformation on Twitter using a Convolutional Neural Network.
Mohamad Nabeel, Christine Große
2022Cluster Crash: Learning from Recent Vulnerabilities in Communication Stacks.
Anne Borcherding, Philipp Takacs, Jürgen Beyerer
2022Comparing Perception of Disclosure of Different Types of Information Related to Automated Tools.
Vanessa Bracamonte, Takamasa Isohara
2022Comparing the Detection of XSS Vulnerabilities in Node.js and a Multi-tier JavaScript-based Language via Deep Learning.
Héloïse Maurel, Santiago A. Vidal, Tamara Rezk
2022Construction of a Support Tool for User Reading of Privacy Policies and Assessment of its User Impact.
Sachiko Kanamori, Hirotsune Sato, Naoya Tabata, Ryo Nojima
2022Containment Strategy Formalism in a Probabilistic Threat Modelling Framework.
Per Fahlander, Mathias Ekstedt, Preetam Mukherjee, Ashish Kumar Dwivedi
2022Cryptanalysis of Some Electronic Checkbook Schemes.
Isa Sertkaya, Öznur Kalkar
2022Culturally-sensitive Cybersecurity Awareness Program Design for Iranian High-school Students.
Rooya Karimnia, Kaie Maennel, Mahtab Shahin
2022Cyber Attack Stage Tracing System based on Attack Scenario Comparison.
Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura
2022Cyber Exercises in Computer Science Education.
Melisa Gafic, Simon Tjoa, Peter Kieseberg, Otto Hellwig, Gerald Quirchmayr
2022Data Security and Privacy in Emerging Scenarios.
Pierangela Samarati
2022DeDup.js: Discovering Malicious and Vulnerable Extensions by Detecting Duplication.
Pablo Picazo-Sanchez, Maximilian Algehed, Andrei Sabelfeld
2022Detecting Obfuscated Malware using Memory Feature Engineering.
Tristan Carrier, Princy Victor, Ali Tekeoglu, Arash Habibi Lashkari
2022Differential-linear Attacks on Permutation Ciphers Revisited: Experiments on Ascon and DryGASCON.
Aslí Basak Civek, Cihangir Tezcan
2022Digital Supply Chain Vulnerabilities in Critical Infrastructure: A Systematic Literature Review on Cybersecurity in the Energy Sector.
Mari Aarland, Terje Gjøsæter
2022Effective & Efficient Access Control in Smart Farms: Opportunities, Challenges & Potential Approaches.
Ghadeer I. Yassin, Lakshmish Ramaswamy
2022Efficient and Secure Encryption Adjustment for JSON Data.
Maryam Almarwani, Boris Konev, Alexei Lisitsa
2022Estimating the Time-To-Compromise of Exploiting Industrial Control System Vulnerabilities.
Engla Rencelj Ling, Mathias Ekstedt
2022Evaluating Deep Learning-based NIDS in Adversarial Settings.
Hesamodin Mohammadian, Arash Habibi Lashkari, Ali A. Ghorbani
2022Feature Importance and Deep Learning for Android Malware Detection.
Adam Talbi, Arthur Viens, Louis-Clément Leroux, Morgane François, Mathias Caillol, Nga Nguyen
2022Formalizing Real-world Threat Scenarios.
Paul Tavolato, Robert Luh, Sebastian Eresheim
2022Game Theoretic Analysis of Ransomware: A Preliminary Study.
Rudra Prasad Baksi, Shambhu J. Upadhyaya
2022Impact of Cross-standard Cell Libraries on Machine Learning based Hardware Trojan Detection.
Shang-Wen Chen, Jian-Wei Liao, Chia-Wei Tien, Jung-Hsin Hsiao
2022Implementing Post-quantum Cryptography for Developers.
Julius Hekkala, Kimmo Halunen, Visa Antero Vallivaara
2022Incentivisation of Outsourced Network Testing: View from Platform Perspective.
Sultan Alasmari, Weichao Wang, Yu Wang
2022Industrial and Automation Control System Cyber Range Prototype for Offensive Capability Development.
Austris Uljans, Bernhards Blumbergs
2022Intent-aware Permission Architecture: A Model for Rethinking Informed Consent for Android Apps.
Md. Rashedur Rahman, Elizabeth Miller, Moinul Hossain, Aisha I. Ali-Gombe
2022Linguistic Steganography for Messaging Applications.
Elsa Serret, Antoine Lesueur, Alban Gabillon
2022Malware in Motion.
Robert Choudhury, Zhiyuan Luo, Khuong An Nguyen
2022NLP-based User Authentication through Mouse Dynamics.
Hoseong Asher Lee, Nikhil Prathapani, Rajesh Paturi, Sarp Parmaksiz, Fabio Di Troia
2022Network Intrusion Detection: A Comprehensive Analysis of CIC-IDS2017.
Arnaud Rosay, Eloïse Cheval, Florent Carlier, Pascal Leroux
2022On Tracking Ransomware on the File System.
Luigi Catuogno, Clemente Galdi
2022On the Influence of Image Settings in Deep Learning-based Malware Detection.
Francesco Mercaldo, Fabio Martinelli, Antonella Santone, Vinod P.
2022On the LPSE Password Meter's Discrepancies among Different Datasets.
Agnieszka Rucka, Wojciech Wodo
2022PDF Malware Detection based on Stacking Learning.
Maryam Issakhani, Princy Victor, Ali Tekeoglu, Arash Habibi Lashkari
2022PREUNN: Protocol Reverse Engineering using Neural Networks.
Valentin Kiechle, Matthias Börsig, Sven Nitzsche, Ingmar Baumgart, Jürgen Becker
2022Planning for Cryptographic Readiness in an Era of Quantum Computing Advancement.
David Ott, Dennis Moreau, Manish Gaur
2022Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device.
Jon Barton, William J. Buchanan, Nikolaos Pitropakis, Sarwar Sayeed, Will Abramson
2022Privacy-preserving Parallel Computation of Shortest Path Algorithms with Low Round Complexity.
Mohammad Anagreh, Peeter Laud, Eero Vainikko
2022Proceedings of the 8th International Conference on Information Systems Security and Privacy, ICISSP 2022, Online Streaming, February 9-11, 2022.
Paolo Mori, Gabriele Lenzini, Steven Furnell
2022Profile Hidden Markov Model Malware Detection and API Call Obfuscation.
Muhammad Ali, Monem Hamid, Jacob Jasser, Joachim Lerman, Samod Shetty, Fabio Di Troia
2022Protecting Shared Virtualized Environments against Cache Side-channel Attacks.
Abdullah Albalawi, Vassilios G. Vassilakis, Radu Calinescu
2022Public Key Compression and Fast Polynomial Multiplication for NTRU using the Corrected Hybridized NTT-Karatsuba Method.
Rohon Kundu, Alessandro De Piccoli, Andrea Visconti
2022Ransomware Detection with Deep Neural Networks.
Matan Davidian, Natalia Vanetik, Michael Kiperberg
2022Revisiting Ontology Based Access Control: The Case for Ontology Based Data Access.
Özgü Can, Murat Osman Ünalir
2022SMPG: Secure Multi Party Computation on Graph Databases.
Nouf Al-Juaid, Alexei Lisitsa, Sven Schewe
2022SecTL: Secure and Verifiable Transfer Learning-based inference.
Abbass Madi, Oana Stan, Renaud Sirdey, Cédric Gouy-Pailler
2022Security Issue Classification for Vulnerability Management with Semi-supervised Learning.
Emil Wåreus, Anton Duppils, Magnus Tullberg, Martin Hell
2022Semantic Attack on Disassociated Transactions.
Asma Alshuhail, Jianhue Shao
2022Side Channel Identification using Granger Time Series Clustering with Applications to Control Systems.
Matthew Lee, Joshua Sylvester, Sunjoli Aggarwal, Aviraj Sinha, Michael A. Taylor, Nathan Srirama, Eric C. Larson, Mitchell A. Thornton
2022SpamFender: A Semi-supervised Incremental Spam Classification System across Social Networks.
Shengyuan Wen, Weiqing Sun
2022Survey and Guidelines about Learning Cyber Security Risk Assessment.
Christophe Ponsard, Philippe Massonet
2022Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks.
Amir Naseredini, Stefan Gast, Martin Schwarzl, Pedro Miguel Sousa Bernardo, Amel Smajic, Claudio Canella, Martin Berger, Daniel Gruss
2022TEEm: A Tangle-based Elastic Emulator for Storing Connected Vehicle Data in a Distributed Ledger Technology.
David Werden, Matthew Muccioli, Anyi Liu
2022Tamer: A Sandbox for Facilitating and Automating IoT Malware Analysis with Techniques to Elicit Malicious Behavior.
Shun Yonamine, Yuzo Taenaka, Youki Kadobayashi
2022The GDPR Compliance and Access Control Systems: Challenges and Research Opportunities.
Said Daoudagh, Eda Marchetti
2022The Role of Information Deserts in Information Security Awareness and Behaviour.
Dirk P. Snyman, Hennie A. Kruger
2022Towards a Better Understanding of Machine Learning based Network Intrusion Detection Systems in Industrial Networks.
Anne Borcherding, Lukas Feldmann, Markus Karch, Ankush Meshram, Jürgen Beyerer
2022Utility of Anonymised Data in Decision Tree Derivation.
Jack R. Davies, Jianhua Shao
2022WhatsApp Web Client Live Forensics Technique.
Alberto Magno Muniz Soares
2022Who Watches the Watchers: A Multi-Task Benchmark for Anomaly Detection.
Phil Demetriou, Ingolf Becker, Stephen Hailes
2022Why Rigorous Underpinnings for Cyber Security Education and Training Matter? Experiences from CyBOK: The Cyber Security Body of Knowledge.
Awais Rashid
2022Why Usability Has Become Privacy's Biggest Challenge and What We Can Do About It.
Norman M. Sadeh
2022iProfile: Collecting and Analyzing Keystroke Dynamics from Android Users.
Haytham Elmiligi, Sherif Saad