ICISSP C

91 papers

YearTitle / Authors
2023A Biometric Self Authentication Scheme.
Hervé Chabanne
2023A Framework for Assessing Decompiler Inference Accuracy of Source-Level Program Constructs.
Jace Kline, Prasad Kulkarni
2023A Game Theoretic Analysis of Cyber Threats.
Paul Tavolato, Robert Luh, Sebastian Eresheim
2023A Scenario-Driven Cyber Security Awareness Exercise Utilizing Dynamic Polling: Methodology and Lessons Learned.
Maria Leitner
2023A Self-Configuration Controller To Detect, Identify, and Recover Misconfiguration at IoT Edge Devices and Containerized Cluster System.
Areeg Samir, Håvard Dagenborg Johansen
2023A Stochastic Game Model for Cloud Platform Security.
Lu Li, Guanling Zhao, Kai Shi, Fengjun Zhang
2023A Systematic Review of Secure IoT Data Sharing.
Thanh Tran, Phu Nguyen, Gencer Erdogan
2023A k-Anonymization Method for Social Network Data with Link Prediction.
Risa Sugai, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga
2023An Analysis of Cybersecurity Awareness Efforts for Swiss SMEs.
Ciarán Bryce
2023An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes.
Francesco Antognazza, Alessandro Barenghi, Gerardo Pelosi, Ruggero Susella
2023An End-to-End Encrypted Cache System with Time-Dependent Access Control.
Keita Emura, Masato Yoshimi
2023An Explainable Convolutional Neural Network for Dynamic Android Malware Detection.
Francesco Mercaldo, Fabio Martinelli, Antonella Santone
2023Anomalous File System Activity Detection Through Temporal Association Rule Mining.
Mohammad Reza Heidari Iman, Pavel Chikul, Gert Jervan, Hayretdin Bahsi, Tara Ghasempouri
2023Assessing Risk in High Performance Computing Attacks.
Erika A. Leal, Cimone Wright-Hamor, Joseph B. Manzano, Nicholas J. Multari, Kevin J. Barker, David O. Manz, Jiang Ming
2023Assessing Security and Privacy Insights for Smart Home Users.
Samiah Alghamdi, Steven Furnell
2023Assessing the Impact of Attacks on Connected and Autonomous Vehicles in Vehicular Ad Hoc Networks.
Kaushik Krishnan Balaji, Dimah Almani, Steven Furnell
2023Automata-Based Study of Dynamic Access Control Policies.
Ahmed Khoumsi
2023Automating Vehicle SOA Threat Analysis Using a Model-Based Methodology.
Yuri Gil Dantas, Simon Barner, Pei Ke, Vivek Nigam, Ulrich Schöpp
2023Automating XSS Vulnerability Testing Using Reinforcement Learning.
Kento Hasegawa, Seira Hidano, Kazuhide Fukushima
2023Bypassing Multiple Security Layers Using Malicious USB Human Interface Device.
Mathew Nicho, Ibrahim Sabry
2023CHARRA-PM: An Attestation Approach Relying on the Passport Model.
António Marques, Bruno Sousa
2023Clipaha: A Scheme to Perform Password Stretching on the Client.
Francisco Blas Izquierdo Riera, Magnus Almgren, Pablo Picazo-Sanchez, Christian Rohner
2023Cloud Inspector: A Tool-Based Approach for Public Administrations to Establish Information Security Processes Towards Public Clouds.
Michael Diener, Thomas Bolz
2023Comparing the Effect of Privacy and Non-Privacy Social Media Photo Tools on Factors of Privacy Concern.
Vanessa Bracamonte, Sebastian Pape, Sascha Löbner
2023Concrete Quantum Circuits to Prepare Generalized Dicke States on a Quantum Machine.
Shintaro Narisada, Shohei Beppu, Kazuhide Fukushima, Shinsaku Kiyomoto
2023Correlating Intrusion Detection with Attack Graph on Virtual Computer Networkings.
Hanwen Zhang, Wenyong Wang, Lisheng Huang, Junrui Wu, Fengjun Zhang, Kai Shi
2023Cyber Teaching Hospitals: Developing Cyber Workforce Competence.
James R. Elste, David T. Croasdell
2023Cybersecurity Awareness and Capacities of SMEs.
Gencer Erdogan, Ragnhild Halvorsrud, Costas Boletsis, Simeon Tverdal, John Brian Pickering
2023Cybersecurity, Nicolas Cage and Peppa Pig.
Luca Viganò
2023Dark Ending: What Happens when a Dark Web Market Closes down.
Yichao Wang, Budi Arief, Julio C. Hernandez-Castro
2023Data Leakage in Isolated Virtualized Enterprise Computing Systems.
Zechariah Wolf, Eric Larson, Mitchell A. Thornton
2023Design Rationale for Symbiotically Secure Key Management Systems in IoT and Beyond.
Witali Bartsch, Prosanta Gope, Elif Bilge Kavun, Owen Millwood, Andriy Panchenko, Aryan Mohammadi Pasikhani, Ilia Polian
2023Differential Privacy: Toward a Better Tuning of the Privacy Budget (ε) Based on Risk.
Mahboobeh Dorafshanian, Mohamed Mejri
2023Efficient Aggregation of Face Embeddings for Decentralized Face Recognition Deployments.
Philipp Hofer, Michael Roland, Philipp Schwarz, René Mayrhofer
2023Evading Detection During Network Reconnaissance.
Ilias Belalis, Georgios P. Spathoulas, Ioannis Anagnostopoulos
2023Evaluating the Fork-Awareness of Coverage-Guided Fuzzers.
Marcello Maugeri, Cristian Daniele, Giampaolo Bella, Erik Poll
2023Evaluation Scheme to Analyze Keystroke Dynamics Methods.
Anastasia Dimaratos, Daniela Pöhn
2023Evaluation of DoS/DDoS Attack Detection with ML Techniques on CIC-IDS2017 Dataset.
Saida Farhat, Manel Abdelkader, Amel Meddeb-Makhlouf, Faouzi Zarai
2023Evaluation of Persistence Methods Used by Malware on Microsoft Windows Systems.
Amélie Dieterich, Matthias Schopp, Lars Stiemert, Christoph Steininger, Daniela Pöhn
2023Evaluation of a Tool to Increase Cybersecurity Awareness Among Non-experts (SME Employees).
Kaiying Luan, Ragnhild Halvorsrud, Costas Boletsis
2023Exploring False Demand Attacks in Power Grids with High PV Penetration.
Ashish Neupane, Weiqing Sun
2023Fast-Flux Malicious Domain Name Detection Method Based on Domain Resolution Spatial Features.
Shaojie Chen, Bo Lang, Chong Xie
2023Forecasting Cyber-Attacks to Destination Ports Using Machine Learning.
Kostas Loumponias, Sotiris Raptis, Eleni Darra, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris
2023Group Privacy for Personalized Federated Learning.
Filippo Galli, Sayan Biswas, Kangsoo Jung, Tommaso Cucinotta, Catuscia Palamidessi
2023How to Design a Blue Team Scenario for Beginners on the Example of Brute-Force Attacks on Authentications.
Andreas Eipper, Daniela Pöhn
2023Human Factors for Cybersecurity Awareness in a Remote Work Environment.
César Vásquez Flores, José Gonzales, Miranda Kajtazi, Joseph Bugeja, Bahtijar Vogel
2023IVNPROTECT: Isolable and Traceable Lightweight CAN-Bus Kernel-Level Protection for Securing in-Vehicle Communication.
Shuji Ohira, Araya Kibrom Desta, Ismail Arai, Kazutoshi Fujikawa
2023Identifying Personal Data Processing for Code Review.
Feiyang Tang, Bjarte M. Østvold, Magiel Bruntink
2023Improving Unlinkability in C-ITS: A Methodology For Optimal Obfuscation.
Yevhen Zolotavkin, Yurii Baryshev, Vitalii Lukichov, Jannik Mähn, Stefan Köpsell
2023Machine Learning Based Prediction of Vulnerability Information Subject to a Security Alert.
Ryu Watanabe, Takashi Matsunaka, Ayumu Kubota, Jumpei Urakawa
2023Measurements of Cross-Border Quantum Key Distribution Link.
Filip Lauterbach, Libor Michalek, Piotr Rydlichowski, Patrik Burdiak, Jaroslav Zdralek, Miroslav Voznák
2023On the Design of GDPR Compliant Workflows for Responsible Neuroimage Data Sharing.
Alexandros Karakasidis, Vassilios Vassalos
2023On the Feasibility of Fully Homomorphic Encryption of Minutiae-Based Fingerprint Representations.
Pia Bauspieß, Lasse Vad, Håvard Myrekrok, Anamaria Costache, Jascha Kolberg, Christian Rathgeb
2023On the Use of Multiple Approximations in the Linear Cryptanalysis of Baby Rijndael.
Josef Kokes, Róbert Lórencz
2023Online Transition-Based Feature Generation for Anomaly Detection in Concurrent Data Streams.
Yinzheng Zhong, Alexei Lisitsa
2023P2BAC: Privacy Policy Based Access Control Using P-LPL.
Jens Leicht, Maritta Heisel
2023PDIFT: A Practical Dynamic Information-Flow Tracker.
Michael Kiperberg, Aleksei Rozman, Aleksei Kuraev, Nezer Zaidenberg
2023Privacy-Aware IoT: State-of-the-Art and Challenges.
Shukun Tokas, Gencer Erdogan, Ketil Stølen
2023Proceedings of the 9th International Conference on Information Systems Security and Privacy, ICISSP 2023, Lisbon, Portugal, February 22-24, 2023
Paolo Mori, Gabriele Lenzini, Steven Furnell
2023Protecting IoT Ecosystems and AI Leveraging TCG Standards.
Thorsten P. Stremlau
2023Query Log Analysis for SQL Injection Detection.
Alexandra Rocha, Rui Alves, Tiago Pedrosa
2023RPCDroid: Runtime Identification of Permission Usage Contexts in Android Applications.
Michele Guerra, Roberto Milanese, Rocco Oliveto, Fausto Fasano
2023Revisiting the DFT Test in the NIST SP 800-22 Randomness Test Suite.
Hiroki Okada, Kazuhide Fukushima
2023SCANTRAP: Protecting Content Management Systems from Vulnerability Scanners with Cyber Deception and Obfuscation.
Daniel Reti, Karina Elzer, Hans Dieter Schotten
2023SHOID: A Secure Herd of IoT Devices Firmware Update Protocol.
Frédéric Ruellé, Quentin Guellaën, Arnaud Rosay
2023SPA Attack on NTRU Protected Implementation with Sparse Representation of Private Key.
Tomás Rabas, Jirí Bucek, Róbert Lórencz
2023SWaTEval: An Evaluation Framework for Stateful Web Application Testing.
Anne Borcherding, Nikolay Penkov, Mark Giraud, Jürgen Beyerer
2023SeCloud: Computer-Aided Support for Selecting Security Measures for Cloud Architectures.
Yuri Gil Dantas, Ulrich Schöpp
2023Secure Joint Querying Over Federated Graph Databases Utilising SMPC Protocols.
Nouf Al-Juaid, Alexei Lisitsa, Sven Schewe
2023Secure Software Updates for IoT Based on Industry Requirements.
Ludwig Seitz, Marco Tiloca, Martin Gunnarsson, Rikard Höglund
2023Security Analysis of a Color Image Encryption Scheme Based on Dynamic Substitution and Diffusion Operations.
George Teseleanu
2023Security Aspects of Digital Twins in IoT.
Vitomir Pavlov, Florian Hahn, Mohammad El-Hajj
2023StegWare: A Novel Malware Model Exploiting Payload Steganography and Dynamic Compilation.
Daniele Albanese, Rosangela Casolare, Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Marco Russodivito, Antonella Santone
2023Systematic Literature Review of Threat Modeling Concepts.
Pedro A. Lohmann, Carlos Albuquerque, Raphael Machado
2023Systematically Searching for Identity-Related Information in the Internet with OSINT Tools.
Marcus Walkow, Daniela Pöhn
2023TTP-Aided Searchable Encryption of Documents Using Threshold Secret Sharing.
Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura
2023Temporal Constraints in Online Dating Fraud Classification.
Harrison Bullock, Matthew Edwards
2023The Story of Safety Snail and Her e-Mail: A Digital Wellness and Cybersecurity Serious Game for Pre-School Children.
Günther R. Drevin, Dirk P. Snyman, Lynette Drevin, Hennie A. Kruger, Johann Allers
2023Towards Audit Requirements for AI-Based Systems in Mobility Applications.
Devi Padmavathi Alagarswamy, Christian Berghoff, Vasilios Danos, Fabian Langer, Thora Markert, Georg Schneider, Arndt von Twickel, Fabian Woitschek
2023Towards Long-Term Continuous Tracing of Internet-Wide Scanning Campaigns Based on Darknet Analysis.
Chansu Han, Akira Tanaka, Jun'ichi Takeuchi, Takeshi Takahashi, Tomohiro Morikawa, Tsung-Nan Lin
2023Towards Security Attack Event Monitoring for Cyber Physical-Systems.
Elias Seid, Oliver Popov, Fredrik Blix
2023Towards a Rust SDK for Keystone Enclave Application Development.
Jukka Julku, Markku Kylänpää
2023Tracing Cryptographic Agility in Android and iOS Apps.
Kris Heid, Jens Heider, Matthias Ritscher, Jan-Peter Stotz
2023Usable Security: Security 'Warnings' 2.0.
Melanie Volkamer
2023Use-Case Denial of Service Attack on Actual Quantum Key Distribution Nodes.
Patrik Burdiak, Emir Dervisevic, Amina Tankovic, Filip Lauterbach, Jan Rozhon, Lukas Kapicak, Libor Michalek, Dzana Pivac, Merima Fehric, Enio Kaljic, Mirza Hamza, Miralem Mehic, Miroslav Voznák
2023Using Infrastructure-Based Agents to Enhance Forensic Logging of Third-Party Applications.
Jennifer Bellizzi, Mark Vella, Christian Colombo, Julio C. Hernandez-Castro
2023Vehicle Data Collection: A Privacy Policy Analysis and Comparison.
Chiara Bodei, Gianpiero Costantino, Marco De Vincenzi, Ilaria Matteucci, Anna Monreale
2023Veto: Prohibit Outdated Edge System Software from Booting.
Jonas Röckl, Adam Wagenhäuser, Tilo Müller
2023Vulnerabilities in IoT Devices, Backends, Applications, and Components.
Rauli Kaksonen, Kimmo Halunen, Juha Röning
2023XMeDNN: An Explainable Deep Neural Network System for Intrusion Detection in Internet of Medical Things.
Mohammed M. Alani, Atefeh Mashatan, Ali Miri
2023t.ex-Graph: Automated Web Tracker Detection Using Centrality Metrics and Data Flow Characteristics.
Philip Raschke, Patrick Herbke, Henry Schwerdtner