ICISSP C

101 papers

YearTitle / Authors
2024A Brief Reflection on Trusted Platform Module Support.
Martin Pirker, Robert Haas
2024A Categorical Data Approach for Anomaly Detection in WebAssembly Applications.
Tiago Heinrich, Newton Carlos Will, Rafael R. Obelheiro, Carlos Alberto Maziero
2024A Decentralized Federated Learning Using Reputation.
Olive Chakraborty, Aymen Boudguiga
2024A Framework for E2E Audit Trails in System Architectures of Different Enterprise Classes.
Luca Patzelt, Georg Neugebauer, Meik Döll, Sacha Hack, Tim Hoener, Marko Schuba
2024A Recommender System to Detect Distributed Denial of Service Attacks with Network and Transport Layer Features.
Kagan Özgün, Ayse Tosun, Mehmet Tahir Sandikkaya
2024ADMIn: Attacks on Dataset, Model and Input: A Threat Model for AI Based Software.
Vimal Kumar, Juliette Mayo, Khadija Bahiss
2024APP-CEP: Adaptive Pattern-Level Privacy Protection in Complex Event Processing Systems.
Majid Lotfian Delouee, Victoria Degeler, Peter Amthor, Boris Koldehofe
2024An Automated Adaptive Security Framework for Cyber-Physical Systems.
Elias Seid, Oliver Popov, Fredrik Blix
2024An Empirical Study of Ransomware Vulnerabilities Descriptions.
Claudia Lanza, Abdelkader Lahmadi, Fabian Osmond
2024An Improved PUF-Based Privacy-Preserving IoT Protocol for Cloud Storage.
Cédrick De Pauw, Jan Tobias Mühlberg, Jean-Michel Dricot
2024An Open-Source Approach to OT Asset Management in Industrial Environments.
Luca Pöhler, Marko Schuba, Tim Hoener, Sacha Hack, Georg Neugebauer
2024Analysis of Payload Confidentiality for the IoT/ LPWAN Technology 'Lora'.
Bernard McWeeney, Ilya Mudritskiy, Renaat Verbruggen
2024AnonEmoFace: Emotion Preserving Facial Anonymization.
Jan Hintz, Jacob Rühe, Ingo Siegert
2024Anonymous Multi-Receiver Certificateless Hybrid Signcryption for Broadcast Communication.
Alia Umrani, Apurva K. Vangujar, Paolo Palmieri
2024Anywhere on Earth: A Look at Regional Characteristics of DRDoS Attacks.
Tiago Heinrich, Newton Carlos Will, Rafael R. Obelheiro, Carlos Alberto Maziero
2024ArkThor: Threat Categorization Based on Malware's C2 Communication.
Mohammed Jawed, Sriram Parameshwaran, Nitesh Kumar, Anand Handa, Sandeep K. Shukla
2024Attestation with Constrained Relying Party.
Mariam Moustafa, Arto Niemi, Philip Ginzboorg, Jan-Erik Ekberg
2024Automating IoT Security Standard Testing by Common Security Tools.
Rauli Kaksonen, Kimmo Halunen, Marko Laakso, Juha Röning
2024Banking Malware Detection: Leveraging Federated Learning with Conditional Model Updates and Client Data Heterogeneity.
Nahid Ferdous Aurna, Md Delwar Hossain, Hideya Ochiai, Yuzo Taenaka, Latifur Khan, Youki Kadobayashi
2024Blockchain for Privacy-Preserving Data Distribution in Healthcare.
Amitesh Singh Rajput, Arnav Agrawal
2024Botnet Detection by Integrating Multiple Machine Learning Models.
Thanawat Tejapijaya, Prarinya Siritanawan, Karin Sumongkayothin, Kazunori Kotani
2024Build a Computationally Efficient Strong Defense Against Adversarial Example Attacks.
Changwei Liu, Louis DiValentin, Aolin Ding, Malek Ben Salem
2024CPE-Identifier: Automated CPE Identification and CVE Summaries Annotation with Deep Learning and NLP.
Wanyu Hu, Vrizlynn L. L. Thing
2024Comparative Analysis of Feature Selection Algorithms for Automated IoT Device Fingerprinting.
Ahmet Aksoy, Sundeep Varma, Ganesha Moorthy, Enya Pan, Gorkem Kar
2024Comparing Phishing Training and Campaign Methods for Mitigating Malicious Emails in Organizations.
Jackie Scott, Yair Levy, Wei Li, Ajoy Kumar
2024Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process.
Paul Tavolato, Robert Luh, Sebastian Eresheim, Simon Gmeiner, Sebastian Schrittwieser
2024Conceptualising an Anti-Digital Forensics Kill Chain for Smart Homes.
Mario Raciti
2024Covert & Side Stories: Threats Evolution in Traditional and Modern Technologies.
Mauro Conti
2024Cybersecurity Incident Response Readiness in Organisations.
Aseel Aldabjan, Steven Furnell, Xavier Carpent, Maria Papadaki
2024Cybersecurity-Related Tweet Classification by Explainable Deep Learning.
Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Luca Petrillo, Antonella Santone
2024Deep Q-Networks for Imbalanced Multi-Class Malware Classification.
Antonio Maci, Giuseppe Urbano, Antonio Coscia
2024Desktop Crypto Wallets: A Digital Forensic Investigation and Analysis of Remnants and Traces on end-User Machines.
David Debono, Aleandro Sultana
2024Detecting eBPF Rootkits Using Virtualization and Memory Forensics.
Nezer Jacob Zaidenberg, Michael Kiperberg, Eliav Menachi, Asaf Eitani
2024Differential Privacy for Distributed Traffic Monitoring in Smart Cities.
Marcus Gelderie, Maximilian Luff, Lukas Brodschelm
2024EMplifier: Hybrid Electromagnetic Probe for Side Channel and Fault Injection Analysis.
Fabrizia Marrucco, Mosabbah Mushir Ahmed, Bechir Bouali, Alieeldin Mady
2024Effectiveness of Malware Incident Management in Security Operations Centres: Trends, Challenges and Research Directions.
Dakouri Gazo, Asma Patel, Mohammad Hasan
2024Efficient Secure Computation of Edit Distance on Genomic Data.
Andrea Migliore, Stelvio Cimato, Gabriella Trucco
2024Enclave Management Models for Safe Execution of Software Components.
Newton Carlos Will, Carlos Alberto Maziero
2024Enhancing Cybersecurity Through Comparative Analysis of Deep Learning Models for Anomaly Detection.
Katerina Macková, Dominik Benk, Martin Srotýr
2024Ethical Design for Data Privacy and User Privacy Awareness in the Metaverse.
Ophelia Prillard, Costas Boletsis, Shukun Tokas
2024Evaluating the Influence of Multi-Factor Authentication and Recovery Settings on the Security and Accessibility of User Accounts.
Andre Büttner, Nils Gruschka
2024Evaluating the Security and Privacy Risk Postures of Virtual Assistants.
Borna Kalhor, Sanchari Das
2024Exploring BERT for Predicting Vulnerability Categories in Device Configurations.
Dmitry Levshun, Dmitry Vesnin
2024Exploring Errors in Binary-Level CFG Recovery.
Anjali Pare, Prasad A. Kulkarni
2024Feasibility of Privacy Preserving Minutiae-Based Fingerprint Matching.
Julia Mader, Thomas Lorünser
2024Feasibility of Random Forest with Fully Homomorphic Encryption Applied to Network Data.
Shusaku Uemura, Kazuhide Fukushima
2024Federated Learning with Differential Privacy and an Untrusted Aggregator.
Kunlong Liu, Trinabh Gupta
2024FeedMeter: Evaluating the Quality of Community-Driven Threat Intelligence.
Andreas Rüedlinger, Rebecca Klauser, Pavlos Lamprakis, Markus Happe, Bernhard Tellenbach, Onur Veyisoglu, Ariane Trammell
2024Forgery Resistance of User Authentication Methods Using Location, Wi-Fi and Their Correlation.
Ryosuke Kobayashi, Rie Shigetomi Yamaguchi
2024Fuzzing Matter(s): A White Paper for Fuzzing the Matter Protocol.
Marcello Maugeri
2024GPU-Based Brute Force Cryptanalysis of KLEIN.
Cihangir Tezcan
2024Gradient-Based Clean Label Backdoor Attack to Graph Neural Networks.
Ryo Meguro, Hiroya Kato, Shintaro Narisada, Seira Hidano, Kazuhide Fukushima, Takuo Suganuma, Masahiro Hiji
2024High Throughput Neural Network for Network Intrusion Detection on FPGAs: An Algorithm-Architecture Interaction.
Muhammad Ali Farooq, Syed Muhammad Fasih Ul Hassan, Muhammad Umer Farooq, Abid Rafique
2024Implementation and Analysis of Covert Channel Using iBeacon.
Ye-Sol Oh, Yeon-Ji Lee, Jiwon Jang, Hyunwoo Choi, Il-Gu Lee
2024Integrating Post-Quantum Cryptography into Trusted Computing Group Standards.
Thorsten P. Stremlau
2024Interpretable Android Malware Detection Based on Dynamic Analysis.
Arunab Singh, Maryam Tanha, Yashsvi Girdhar, Aaron Hunter
2024IoT Device Classification Using Link-Level Features for Traditional Machine Learning and Large Language Models.
Gabriel A. Morales, Farhan Tajwar Romit, Adam Bienek-Parrish, Patrick Jenkins, Rocky Slavin
2024KAIME: Central Bank Digital Currency with Realistic and Modular Privacy.
Ali Dogan, Kemal Bicakci
2024LSTM Autoencoder-Based Insider Abnormal Behavior Detection Using De-Identified Data.
Seo-Yi Kim, Il-Gu Lee
2024Learning from the Dark Side About How (not) to Engineer Privacy: Analysis of Dark Patterns Taxonomies from an ISO 29100 Perspective.
Philippe Valoggia, Anastasia Sergeeva, Arianna Rossi, Marietjie Botes
2024Machine Learning-Based Classification of Hardware Trojans in FPGAs Implementing RISC-V Cores.
Stefano Ribes, Fabio Malatesta, Grazia Garzo, Alessandro Palumbo
2024Merging Policy and Practice: Crafting Effective Social Engineering Awareness-Raising Policies.
Eliana Stavrou, Andriani Piki, Panayiotis Varnava
2024Off-Chaining Approaches for Cost-Efficiency in Threshold-Based Elliptic Curve Systems over Blockchains.
Visakh K. Vijayan, Maria Francis, Kotaro Kataoka
2024PETRIoT - A Privacy Enhancing Technology Recommendation Framework for IoT Computing.
Fatema Rashid, Ali Miri, Atefeh Mashatan
2024PenGym: Pentesting Training Framework for Reinforcement Learning Agents.
Huynh Phuong Thanh Nguyen, Zhi Chen, Kento Hasegawa, Kazuhide Fukushima, Razvan Beuran
2024Perceptions of Cyber Security Risk of the Norwegian Advanced Metering Infrastructure.
Eirik Lien, Karl Magnus Grønning Bergh, Sokratis K. Katsikas
2024Performance Evaluation of Polynomial Commitments for Erasure Code Based Information Dispersal.
Antoine Stevan, Thomas Lavaur, Jérôme Lacan, Jonathan Detchart, Tanguy Pérennou
2024Policy-Driven XACML-Based Architecture for Dynamic Enforcement of Multiparty Computation.
Arghavan Hosseinzadeh, Jessica Chwalek, Robin Brandstädter
2024Preserving Privacy in High-Dimensional Data Publishing.
Narges Alipourjeddi, Ali Miri
2024Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode.
William J. Buchanan, Sam Grierson, Daniel Uribe
2024Proceedings of the 10th International Conference on Information Systems Security and Privacy, ICISSP 2024, Rome, Italy, February 26-28, 2024.
Gabriele Lenzini, Paolo Mori, Steven Furnell
2024Pure Multi Key BGV Implementation.
Justine Paillet, Olive Chakraborty, Marina Checri
2024Revolutionizing Board Cyber-Risk Management Using Collaborative Gaming.
Tony Delvecchio, Sander Zeijlemaker, Giancarlo De Bernardis, Michael Siegel
2024Robust Image Deepfake Detection with Perceptual Hashing.
Chun-Shien Lu, Chao-Hsuan Lin
2024RoomKey: Extracting a Volatile Key with Information from the Local WiFi Environment Reconstructable Within a Designated Area.
Philipp Jakubeit, Andreas Peter, Maarten van Steen
2024Safeguarding Industry 5.0 Ecosystems Through Digital Twins.
Cristina Alcaraz
2024Secure Multiparty Computation of the Laplace Mechanism.
Amir Zarei, Staal Amund Vinterbo
2024Security Analysis of an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map.
George Teseleanu
2024Security Analysis of an Image Encryption Scheme Based on a New Secure Variant of Hill Cipher and 1D Chaotic Maps.
George Teseleanu
2024Security Contracts a Property-Based Approach to Support Security Patterns.
Sylvain Guérin, Joël Champeau, Salvador Martínez, Raúl Mazo
2024Security Evaluation of Decision Tree Meets Data Anonymization.
Ryousuke Wakabayashi, Lihua Wang, Ryo Nojima, Atsushi Waseda
2024Security, Privacy and the "Human Factor": Making Sense of the Paradoxes of Security and Privacy Behaviour.
Spyros Kokolakis
2024Silicon-Integrated Security Solutions Driving IoT Security.
Stephan Spitz, Alexander Lawall
2024Smart Home Privacy: A Scoping Review.
Ali Ahmed, Victor Ungureanu, Tarek Gaber, Craig A. Watterson, Fatma Masmoudi
2024Smart Homes as Digital Ecosystems: Exploring Privacy in IoT Contexts.
Sally Bagheri, Andreas Jacobsson, Paul Davidsson
2024Supporting CAN Bus Anomaly Detection with Correlation Data.
Beatrix Koltai, András Gazdag, Gergely Ács
2024The Classification and Impact of Cyber Attacks Targeting Critical Service Providers.
Josefin Andersson, Elias Seid
2024The Design and Implementation of a Semantic Web Framework for the Event-Centric Digital Forensics Analysis.
Pavel Chikul, Hayretdin Bahsi, Olaf Maennel
2024The Right Tool for the Job: Contextualization of Cybersecurity Education and Assessment Methods.
Daniel Köhler, Christoph Meinel
2024The Role of Heuristics and Biases in Linux Server Administrators' Information Security Policy Compliance at Healthcare Organizations.
John McConnell, Yair Levy, Marti Snyder, Ling Wang
2024The Status and Management of Web-Related Security at Higher Education Institutions in Poland.
Jackson Barreto, Paulina Rutecka, Karina Cicha, Pedro Pinto
2024Towards Automated Information Security Governance.
Ariane Trammell, Benjamin Gehring, Marco Isele, Yvo Spielmann, Valentin Zahnd
2024Towards Generalized Diffie-Hellman-esque Key Agreement via Generic Split KEM Construction.
Brian Goncalves, Atefeh Mashatan
2024UPSS: A Global, Least-Privileged Storage System with Stronger Security and Better Performance.
Arastoo Bozorgi, Mahya Soleimani Jadidi, Jonathan Anderson
2024User Re-Authentication via Mouse Movements and Recurrent Neural Networks.
Paul R. B. Houssel, Luis A. Leiva
2024Using ILP to Learn AppArmor Policies.
Lukas Brodschelm, Marcus Gelderie
2024Vision Based Malware Classification Using Deep Neural Network with Hybrid Data Augmentation.
Md. Mahbubur Rahman, Md Delwar Hossain, Hideya Ochiai, Youki Kadobayashi, Tanjim Sakib, Syed Taha Yeasin Ramadan
2024Visual Attention and Privacy Indicators in Android: Insights from Eye Tracking.
Michele Guerra, Roberto Milanese, Michele Deodato, Vittorio Perozzi, Fausto Fasano
2024Vulnerability Information Sharing Platform for Securing Hardware Supply Chains.
Kento Hasegawa, Katsutoshi Hanahara, Hiroshi Sugisaki, Minoru Kozu, Kazuhide Fukushima, Yosuke Murakami, Shinsaku Kiyomoto
2024What's Your Purpose? An Approach to Incorporating GDPR Purposes into Requirements Analysis.
Evangelia Vanezi, Georgia M. Kapitsaki, Anna Philippou
2024Your Robot Might Be Inadvertently or Deliberately Spying on You: A Critical Analysis of Privacy Practices in the Robotics Industry.
Farida Eleshin, Patrick Iradukunda, David Ishimwe Ruberamitwe, Eric Ishimwe