default search action
Search dblp for Publications
export results for "ICISSP"
@inproceedings{DBLP:conf/icissp/0001UGWM24, author = {Ali Ahmed and Victor Ungureanu and Tarek Gaber and Craig A. Watterson and Fatma Masmoudi}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Smart Home Privacy: {A} Scoping Review}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {635--642}, publisher = {{SCITEPRESS}}, year = {2024}, timestamp = {Tue, 02 Apr 2024 14:37:52 +0200}, biburl = {https://dblp.org/rec/conf/icissp/0001UGWM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AksoyVMPK24, author = {Ahmet Aksoy and Sundeep Varma and Ganesha Moorthy and Enya Pan and Gorkem Kar}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Comparative Analysis of Feature Selection Algorithms for Automated IoT Device Fingerprinting}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {430--437}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012379100003648}, doi = {10.5220/0012379100003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AksoyVMPK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Alcaraz24, author = {Cristina Alcaraz}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Safeguarding Industry 5.0 Ecosystems Through Digital Twins}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {5}, publisher = {{SCITEPRESS}}, year = {2024}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Alcaraz24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AldabjanFCP24, author = {Aseel Aldabjan and Steven Furnell and Xavier Carpent and Maria Papadaki}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Cybersecurity Incident Response Readiness in Organisations}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {262--269}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012487600003648}, doi = {10.5220/0012487600003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AldabjanFCP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlipourjeddiM24, author = {Narges Alipourjeddi and Ali Miri}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Preserving Privacy in High-Dimensional Data Publishing}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {845--852}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012455600003648}, doi = {10.5220/0012455600003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlipourjeddiM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AnderssonS24, author = {Josefin Andersson and Elias Seid}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {The Classification and Impact of Cyber Attacks Targeting Critical Service Providers}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {137--145}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012374500003648}, doi = {10.5220/0012374500003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AnderssonS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AurnaHOTKK24, author = {Nahid Ferdous Aurna and Md Delwar Hossain and Hideya Ochiai and Yuzo Taenaka and Latifur Khan and Youki Kadobayashi}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Banking Malware Detection: Leveraging Federated Learning with Conditional Model Updates and Client Data Heterogeneity}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {309--319}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012409700003648}, doi = {10.5220/0012409700003648}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AurnaHOTKK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BagheriJD24, author = {Sally Bagheri and Andreas Jacobsson and Paul Davidsson}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Smart Homes as Digital Ecosystems: Exploring Privacy in IoT Contexts}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {869--877}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012458700003648}, doi = {10.5220/0012458700003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BagheriJD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BarretoRC024, author = {Jackson Barreto and Paulina Rutecka and Karina Cicha and Pedro Pinto}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {The Status and Management of Web-Related Security at Higher Education Institutions in Poland}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {789--798}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012423000003648}, doi = {10.5220/0012423000003648}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BarretoRC024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BozorgiJA24, author = {Arastoo Bozorgi and Mahya Soleimani Jadidi and Jonathan Anderson}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {{UPSS:} {A} Global, Least-Privileged Storage System with Stronger Security and Better Performance}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {660--671}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012306600003648}, doi = {10.5220/0012306600003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BozorgiJA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BrodschelmG24, author = {Lukas Brodschelm and Marcus Gelderie}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Using {ILP} to Learn AppArmor Policies}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {766--773}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012379000003648}, doi = {10.5220/0012379000003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BrodschelmG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BuchananGU24, author = {William J. Buchanan and Sam Grierson and Daniel Uribe}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {226--233}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012454300003648}, doi = {10.5220/0012454300003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BuchananGU24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ButtnerG24, author = {Andre B{\"{u}}ttner and Nils Gruschka}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Evaluating the Influence of Multi-Factor Authentication and Recovery Settings on the Security and Accessibility of User Accounts}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {691--700}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012319000003648}, doi = {10.5220/0012319000003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ButtnerG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ChakrabortyB24, author = {Olive Chakraborty and Aymen Boudguiga}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {A Decentralized Federated Learning Using Reputation}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {799--806}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012428300003648}, doi = {10.5220/0012428300003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ChakrabortyB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ChikulBM24, author = {Pavel Chikul and Hayretdin Bahsi and Olaf Maennel}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {The Design and Implementation of a Semantic Web Framework for the Event-Centric Digital Forensics Analysis}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {570--581}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012437700003648}, doi = {10.5220/0012437700003648}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ChikulBM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Conti24, author = {Mauro Conti}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Covert {\&} Side Stories: Threats Evolution in Traditional and Modern Technologies}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {7}, publisher = {{SCITEPRESS}}, year = {2024}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Conti24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DebonoS24, author = {David Debono and Aleandro Sultana}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Desktop Crypto Wallets: {A} Digital Forensic Investigation and Analysis of Remnants and Traces on end-User Machines}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {350--357}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012313000003648}, doi = {10.5220/0012313000003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DebonoS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DeloueeD0K24, author = {Majid Lotfian Delouee and Victoria Degeler and Peter Amthor and Boris Koldehofe}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {{APP-CEP:} Adaptive Pattern-Level Privacy Protection in Complex Event Processing Systems}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {486--497}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012358700003648}, doi = {10.5220/0012358700003648}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DeloueeD0K24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DelvecchioZBS24, author = {Tony Delvecchio and Sander Zeijlemaker and Giancarlo De Bernardis and Michael Siegel}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Revolutionizing Board Cyber-Risk Management Using Collaborative Gaming}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {112--119}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012349400003648}, doi = {10.5220/0012349400003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DelvecchioZBS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DoganB24, author = {Ali Dogan and Kemal Bicakci}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {{KAIME:} Central Bank Digital Currency with Realistic and Modular Privacy}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {672--681}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012308600003648}, doi = {10.5220/0012308600003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DoganB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/EleshinIRI24, author = {Farida Eleshin and Patrick Iradukunda and David Ishimwe Ruberamitwe and Eric Ishimwe}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Your Robot Might Be Inadvertently or Deliberately Spying on You: {A} Critical Analysis of Privacy Practices in the Robotics Industry}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {219--225}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012422200003648}, doi = {10.5220/0012422200003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/EleshinIRI24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FarooqHFR24, author = {Muhammad Ali Farooq and Syed Muhammad Fasih Ul Hassan and Muhammad Umer Farooq and Abid Rafique}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {High Throughput Neural Network for Network Intrusion Detection on FPGAs: An Algorithm-Architecture Interaction}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {423--429}, publisher = {{SCITEPRESS}}, year = {2024}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FarooqHFR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GazoPH24, author = {Dakouri Gazo and Asma Patel and Mohammad Hasan}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Effectiveness of Malware Incident Management in Security Operations Centres: Trends, Challenges and Research Directions}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {162--169}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012389900003648}, doi = {10.5220/0012389900003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GazoPH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GelderieLB24, author = {Marcus Gelderie and Maximilian Luff and Lukas Brodschelm}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Differential Privacy for Distributed Traffic Monitoring in Smart Cities}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {758--765}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012372700003648}, doi = {10.5220/0012372700003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GelderieLB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GoncalvesM24, author = {Brian Goncalves and Atefeh Mashatan}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Towards Generalized Diffie-Hellman-esque Key Agreement via Generic Split {KEM} Construction}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {594--608}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012454400003648}, doi = {10.5220/0012454400003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GoncalvesM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GuerinC0M24, author = {Sylvain Gu{\'{e}}rin and Jo{\"{e}}l Champeau and Salvador Mart{\'{\i}}nez and Ra{\'{u}}l Mazo}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Security Contracts a Property-Based Approach to Support Security Patterns}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {103--111}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012305600003648}, doi = {10.5220/0012305600003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GuerinC0M24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GuerraMDPF24, author = {Michele Guerra and Roberto Milanese and Michele Deodato and Vittorio Perozzi and Fausto Fasano}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Visual Attention and Privacy Indicators in Android: Insights from Eye Tracking}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {320--329}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012437600003648}, doi = {10.5220/0012437600003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GuerraMDPF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HasegawaHSKFMK24, author = {Kento Hasegawa and Katsutoshi Hanahara and Hiroshi Sugisaki and Minoru Kozu and Kazuhide Fukushima and Yosuke Murakami and Shinsaku Kiyomoto}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Vulnerability Information Sharing Platform for Securing Hardware Supply Chains}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {403--410}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012351800003648}, doi = {10.5220/0012351800003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HasegawaHSKFMK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HeinrichWOM24, author = {Tiago Heinrich and Newton Carlos Will and Rafael R. Obelheiro and Carlos Alberto Maziero}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Anywhere on Earth: {A} Look at Regional Characteristics of DRDoS Attacks}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {21--29}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012252700003648}, doi = {10.5220/0012252700003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HeinrichWOM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HeinrichWOM24a, author = {Tiago Heinrich and Newton Carlos Will and Rafael R. Obelheiro and Carlos Alberto Maziero}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {A Categorical Data Approach for Anomaly Detection in WebAssembly Applications}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {275--284}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012252800003648}, doi = {10.5220/0012252800003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HeinrichWOM24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HintzRS24, author = {Jan Hintz and Jacob R{\"{u}}he and Ingo Siegert}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {AnonEmoFace: Emotion Preserving Facial Anonymization}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {785--788}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012410600003648}, doi = {10.5220/0012410600003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HintzRS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HosseinzadehCB24, author = {Arghavan Hosseinzadeh and Jessica Chwalek and Robin Brandst{\"{a}}dter}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Policy-Driven XACML-Based Architecture for Dynamic Enforcement of Multiparty Computation}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {81--89}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012254000003648}, doi = {10.5220/0012254000003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HosseinzadehCB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HousselL24, author = {Paul R. B. Houssel and Luis A. Leiva}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {User Re-Authentication via Mouse Movements and Recurrent Neural Networks}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {652--659}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012296600003648}, doi = {10.5220/0012296600003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HousselL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HuT24, author = {Wanyu Hu and Vrizlynn L. L. Thing}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {CPE-Identifier: Automated {CPE} Identification and {CVE} Summaries Annotation with Deep Learning and {NLP}}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {67--78}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012403500003648}, doi = {10.5220/0012403500003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HuT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/IadarolaMMPS24, author = {Giacomo Iadarola and Fabio Martinelli and Francesco Mercaldo and Luca Petrillo and Antonella Santone}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Cybersecurity-Related Tweet Classification by Explainable Deep Learning}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {438--445}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012411100003648}, doi = {10.5220/0012411100003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/IadarolaMMPS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/JakubeitPS24, author = {Philipp Jakubeit and Andreas Peter and Maarten van Steen}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {RoomKey: Extracting a Volatile Key with Information from the Local WiFi Environment Reconstructable Within a Designated Area}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {558--569}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012437500003648}, doi = {10.5220/0012437500003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/JakubeitPS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/JawedPKHS24, author = {Mohammed Jawed and Sriram Parameshwaran and Nitesh Kumar and Anand Handa and Sandeep K. Shukla}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {ArkThor: Threat Categorization Based on Malware's {C2} Communication}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {203--210}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012420200003648}, doi = {10.5220/0012420200003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/JawedPKHS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KaksonenHLR24, author = {Rauli Kaksonen and Kimmo Halunen and Marko Laakso and Juha R{\"{o}}ning}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Automating IoT Security Standard Testing by Common Security Tools}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {42--53}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012345900003648}, doi = {10.5220/0012345900003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KaksonenHLR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KalhorD24, author = {Borna Kalhor and Sanchari Das}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Evaluating the Security and Privacy Risk Postures of Virtual Assistants}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {154--161}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012389500003648}, doi = {10.5220/0012389500003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KalhorD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KimL24, author = {Seo{-}Yi Kim and Il{-}Gu Lee}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {{LSTM} Autoencoder-Based Insider Abnormal Behavior Detection Using De-Identified Data}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {609--620}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012458000003648}, doi = {10.5220/0012458000003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KimL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KobayashiY24, author = {Ryosuke Kobayashi and Rie Shigetomi Yamaguchi}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Forgery Resistance of User Authentication Methods Using Location, Wi-Fi and Their Correlation}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {709--716}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012323400003648}, doi = {10.5220/0012323400003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KobayashiY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KohlerM24, author = {Daniel K{\"{o}}hler and Christoph Meinel}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {The Right Tool for the Job: Contextualization of Cybersecurity Education and Assessment Methods}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {234--241}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012457900003648}, doi = {10.5220/0012457900003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KohlerM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Kokolakis24, author = {Spyros Kokolakis}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Security, Privacy and the "Human Factor": Making Sense of the Paradoxes of Security and Privacy Behaviour}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {9--11}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012640600003648}, doi = {10.5220/0012640600003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Kokolakis24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KoltaiGA24, author = {Beatrix Koltai and Andr{\'{a}}s Gazdag and Gergely {\'{A}}cs}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Supporting {CAN} Bus Anomaly Detection with Correlation Data}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {285--296}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012360400003648}, doi = {10.5220/0012360400003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KoltaiGA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KumarMB24, author = {Vimal Kumar and Juliette Mayo and Khadija Bahiss}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {ADMIn: Attacks on Dataset, Model and Input: {A} Threat Model for {AI} Based Software}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {170--178}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012394100003648}, doi = {10.5220/0012394100003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KumarMB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LanzaLO24, author = {Claudia Lanza and Abdelkader Lahmadi and Fabian Osmond}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {An Empirical Study of Ransomware Vulnerabilities Descriptions}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {146--153}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012378700003648}, doi = {10.5220/0012378700003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LanzaLO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LevshunV24, author = {Dmitry Levshun and Dmitry Vesnin}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Exploring {BERT} for Predicting Vulnerability Categories in Device Configurations}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {452--461}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012471800003648}, doi = {10.5220/0012471800003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LevshunV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LienBK24, author = {Eirik Lien and Karl Magnus Gr{\o}nning Bergh and Sokratis K. Katsikas}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Perceptions of Cyber Security Risk of the Norwegian Advanced Metering Infrastructure}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {187--194}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012414900003648}, doi = {10.5220/0012414900003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LienBK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LiuDDS24, author = {Changwei Liu and Louis DiValentin and Aolin Ding and Malek Ben Salem}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Build a Computationally Efficient Strong Defense Against Adversarial Example Attacks}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {358--365}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012315500003648}, doi = {10.5220/0012315500003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LiuDDS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LiuG24, author = {Kunlong Liu and Trinabh Gupta}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Federated Learning with Differential Privacy and an Untrusted Aggregator}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {379--389}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012322100003648}, doi = {10.5220/0012322100003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LiuG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LuL24, author = {Chun{-}Shien Lu and Chao{-}Hsuan Lin}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Robust Image Deepfake Detection with Perceptual Hashing}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {374--378}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012317800003648}, doi = {10.5220/0012317800003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LuL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MaciUC24, author = {Antonio Maci and Giuseppe Urbano and Antonio Coscia}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Deep Q-Networks for Imbalanced Multi-Class Malware Classification}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {342--349}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012303800003648}, doi = {10.5220/0012303800003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MaciUC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MackovaBS24, author = {Katerina Mackov{\'{a}} and Dominik Benk and Martin Srot{\'{y}}r}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Enhancing Cybersecurity Through Comparative Analysis of Deep Learning Models for Anomaly Detection}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {682--690}, publisher = {{SCITEPRESS}}, year = {2024}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MackovaBS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MaderL24, author = {Julia Mader and Thomas Lor{\"{u}}nser}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Feasibility of Privacy Preserving Minutiae-Based Fingerprint Matching}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {899--906}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012472300003648}, doi = {10.5220/0012472300003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MaderL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MarruccoABM24, author = {Fabrizia Marrucco and Mosabbah Mushir Ahmed and Bechir Bouali and Alieeldin Mady}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {EMplifier: Hybrid Electromagnetic Probe for Side Channel and Fault Injection Analysis}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {815--822}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012431800003648}, doi = {10.5220/0012431800003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MarruccoABM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Maugeri24, author = {Marcello Maugeri}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Fuzzing Matter(s): {A} White Paper for Fuzzing the Matter Protocol}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {446--451}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012469200003648}, doi = {10.5220/0012469200003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Maugeri24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/McConnellLSW24, author = {John McConnell and Yair Levy and Marti Snyder and Ling Wang}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {The Role of Heuristics and Biases in Linux Server Administrators' Information Security Policy Compliance at Healthcare Organizations}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {30--41}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012297000003648}, doi = {10.5220/0012297000003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/McConnellLSW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/McWeeneyMV24, author = {Bernard McWeeney and Ilya Mudritskiy and Renaat Verbruggen}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Analysis of Payload Confidentiality for the IoT/ {LPWAN} Technology 'Lora'}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {90--102}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012271400003648}, doi = {10.5220/0012271400003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/McWeeneyMV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MeguroKNHFSH24, author = {Ryo Meguro and Hiroya Kato and Shintaro Narisada and Seira Hidano and Kazuhide Fukushima and Takuo Suganuma and Masahiro Hiji}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Gradient-Based Clean Label Backdoor Attack to Graph Neural Networks}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {510--521}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012369500003648}, doi = {10.5220/0012369500003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MeguroKNHFSH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MiglioreCT24, author = {Andrea Migliore and Stelvio Cimato and Gabriella Trucco}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Efficient Secure Computation of Edit Distance on Genomic Data}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {878--883}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012459400003648}, doi = {10.5220/0012459400003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MiglioreCT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MoralesRBJS24, author = {Gabriel A. Morales and Farhan Tajwar Romit and Adam Bienek{-}Parrish and Patrick Jenkins and Rocky Slavin}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {IoT Device Classification Using Link-Level Features for Traditional Machine Learning and Large Language Models}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {297--308}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012365700003648}, doi = {10.5220/0012365700003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MoralesRBJS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MoustafaNGE24, author = {Mariam Moustafa and Arto Niemi and Philip Ginzboorg and Jan{-}Erik Ekberg}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Attestation with Constrained Relying Party}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {701--708}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012319300003648}, doi = {10.5220/0012319300003648}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MoustafaNGE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NguyenCHFB24, author = {Huynh Phuong Thanh Nguyen and Zhi Chen and Kento Hasegawa and Kazuhide Fukushima and Razvan Beuran}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {PenGym: Pentesting Training Framework for Reinforcement Learning Agents}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {498--509}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012367300003648}, doi = {10.5220/0012367300003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NguyenCHFB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OhLJCL24, author = {Ye{-}Sol Oh and Yeon{-}Ji Lee and Jiwon Jang and Hyunwoo Choi and Il{-}Gu Lee}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Implementation and Analysis of Covert Channel Using iBeacon}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {861--868}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012457800003648}, doi = {10.5220/0012457800003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/OhLJCL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OzgunTS24, author = {Kagan {\"{O}}zg{\"{u}}n and Ayse Tosun and Mehmet Tahir Sandikkaya}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {A Recommender System to Detect Distributed Denial of Service Attacks with Network and Transport Layer Features}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {390--397}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012350100003648}, doi = {10.5220/0012350100003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/OzgunTS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PailletCC24, author = {Justine Paillet and Olive Chakraborty and Marina Checri}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Pure Multi Key {BGV} Implementation}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {807--814}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012429000003648}, doi = {10.5220/0012429000003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PailletCC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PareK24, author = {Anjali Pare and Prasad A. Kulkarni}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Exploring Errors in Binary-Level {CFG} Recovery}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {546--557}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012435400003648}, doi = {10.5220/0012435400003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PareK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PatzeltNDHHS24, author = {Luca Patzelt and Georg Neugebauer and Meik D{\"{o}}ll and Sacha Hack and Tim Hoener and Marko Schuba}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {A Framework for {E2E} Audit Trails in System Architectures of Different Enterprise Classes}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {750--757}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012367000003648}, doi = {10.5220/0012367000003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PatzeltNDHHS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PauwMD24, author = {C{\'{e}}drick De Pauw and Jan Tobias M{\"{u}}hlberg and Jean{-}Michel Dricot}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {An Improved PUF-Based Privacy-Preserving IoT Protocol for Cloud Storage}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {725--732}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012326000003648}, doi = {10.5220/0012326000003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PauwMD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PirkerH24, author = {Martin Pirker and Robert Haas}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {A Brief Reflection on Trusted Platform Module Support}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {890--898}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012466400003648}, doi = {10.5220/0012466400003648}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PirkerH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PohlerSHHN24, author = {Luca P{\"{o}}hler and Marko Schuba and Tim Hoener and Sacha Hack and Georg Neugebauer}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {An Open-Source Approach to {OT} Asset Management in Industrial Environments}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {128--136}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012362200003648}, doi = {10.5220/0012362200003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PohlerSHHN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PrillardBT24, author = {Ophelia Prillard and Costas Boletsis and Shukun Tokas}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Ethical Design for Data Privacy and User Privacy Awareness in the Metaverse}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {333--341}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012296500003648}, doi = {10.5220/0012296500003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PrillardBT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Raciti24, author = {Mario Raciti}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Conceptualising an Anti-Digital Forensics Kill Chain for Smart Homes}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {831--837}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012449700003648}, doi = {10.5220/0012449700003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Raciti24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RahmanHOKSR24, author = {Md. Mahbubur Rahman and Md Delwar Hossain and Hideya Ochiai and Youki Kadobayashi and Tanjim Sakib and Syed Taha Yeasin Ramadan}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Vision Based Malware Classification Using Deep Neural Network with Hybrid Data Augmentation}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {823--830}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012434400003648}, doi = {10.5220/0012434400003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RahmanHOKSR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RajputA24, author = {Amitesh Singh Rajput and Arnav Agrawal}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Blockchain for Privacy-Preserving Data Distribution in Healthcare}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {621--631}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012470500003648}, doi = {10.5220/0012470500003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RajputA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RashidMM24, author = {Fatema Rashid and Ali Miri and Atefeh Mashatan}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {PETRIoT - {A} Privacy Enhancing Technology Recommendation Framework for IoT Computing}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {838--844}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012450900003648}, doi = {10.5220/0012450900003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RashidMM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RibesMGP24, author = {Stefano Ribes and Fabio Malatesta and Grazia Garzo and Alessandro Palumbo}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Machine Learning-Based Classification of Hardware Trojans in FPGAs Implementing {RISC-V} Cores}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {717--724}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012324200003648}, doi = {10.5220/0012324200003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RibesMGP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RuedlingerKLHTV24, author = {Andreas R{\"{u}}edlinger and Rebecca Klauser and Pavlos Lamprakis and Markus Happe and Bernhard Tellenbach and Onur Veyisoglu and Ariane Trammell}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {FeedMeter: Evaluating the Quality of Community-Driven Threat Intelligence}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {54--66}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012357600003648}, doi = {10.5220/0012357600003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RuedlingerKLHTV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ScottL0K24, author = {Jackie Scott and Yair Levy and Wei Li and Ajoy Kumar}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Comparing Phishing Training and Campaign Methods for Mitigating Malicious Emails in Organizations}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {643--651}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012281600003648}, doi = {10.5220/0012281600003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ScottL0K24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SeidPB24, author = {Elias Seid and Oliver Popov and Fredrik Blix}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {An Automated Adaptive Security Framework for Cyber-Physical Systems}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {242--253}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012469100003648}, doi = {10.5220/0012469100003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SeidPB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SinghTG024, author = {Arunab Singh and Maryam Tanha and Yashsvi Girdhar and Aaron Hunter}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Interpretable Android Malware Detection Based on Dynamic Analysis}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {195--202}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012415800003648}, doi = {10.5220/0012415800003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SinghTG024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SpitzL24, author = {Stephan Spitz and Alexander Lawall}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Silicon-Integrated Security Solutions Driving IoT Security}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {398--402}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012350200003648}, doi = {10.5220/0012350200003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SpitzL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/StavrouPV24, author = {Eliana Stavrou and Andriani Piki and Panayiotis Varnava}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Merging Policy and Practice: Crafting Effective Social Engineering Awareness-Raising Policies}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {179--186}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012410300003648}, doi = {10.5220/0012410300003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/StavrouPV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/StevanLLDP24, author = {Antoine Stevan and Thomas Lavaur and J{\'{e}}r{\^{o}}me Lacan and Jonathan Detchart and Tanguy P{\'{e}}rennou}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Performance Evaluation of Polynomial Commitments for Erasure Code Based Information Dispersal}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {522--533}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012377900003648}, doi = {10.5220/0012377900003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/StevanLLDP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Stremlau24, author = {Thorsten P. Stremlau}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Integrating Post-Quantum Cryptography into Trusted Computing Group Standards}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {15}, publisher = {{SCITEPRESS}}, year = {2024}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Stremlau24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TavolatoLEGS24, author = {Paul Tavolato and Robert Luh and Sebastian Eresheim and Simon Gmeiner and Sebastian Schrittwieser}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {211--218}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012421800003648}, doi = {10.5220/0012421800003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TavolatoLEGS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TejapijayaSSK24, author = {Thanawat Tejapijaya and Prarinya Siritanawan and Karin Sumongkayothin and Kazunori Kotani}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Botnet Detection by Integrating Multiple Machine Learning Models}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {366--373}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012317700003648}, doi = {10.5220/0012317700003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TejapijayaSSK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Teseleanu24, author = {George Teseleanu}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Security Analysis of an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {467--473}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012307800003648}, doi = {10.5220/0012307800003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Teseleanu24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Teseleanu24a, author = {George Teseleanu}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Security Analysis of an Image Encryption Scheme Based on a New Secure Variant of Hill Cipher and 1D Chaotic Maps}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {745--749}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012356600003648}, doi = {10.5220/0012356600003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Teseleanu24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Tezcan24, author = {Cihangir Tezcan}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {GPU-Based Brute Force Cryptanalysis of {KLEIN}}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {884--889}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012461900003648}, doi = {10.5220/0012461900003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Tezcan24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TrammellGISZ24, author = {Ariane Trammell and Benjamin Gehring and Marco Isele and Yvo Spielmann and Valentin Zahnd}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Towards Automated Information Security Governance}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {120--127}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012357500003648}, doi = {10.5220/0012357500003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TrammellGISZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/UemuraF24, author = {Shusaku Uemura and Kazuhide Fukushima}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Feasibility of Random Forest with Fully Homomorphic Encryption Applied to Network Data}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {534--545}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012394600003648}, doi = {10.5220/0012394600003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/UemuraF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/UmraniV024, author = {Alia Umrani and Apurva K. Vangujar and Paolo Palmieri}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Anonymous Multi-Receiver Certificateless Hybrid Signcryption for Broadcast Communication}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {733--744}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012353400003648}, doi = {10.5220/0012353400003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/UmraniV024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ValoggiaSRB24, author = {Philippe Valoggia and Anastasia Sergeeva and Arianna Rossi and Marietjie Botes}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Learning from the Dark Side About How (not) to Engineer Privacy: Analysis of Dark Patterns Taxonomies from an {ISO} 29100 Perspective}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {774--784}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012393100003648}, doi = {10.5220/0012393100003648}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ValoggiaSRB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/VaneziKP24, author = {Evangelia Vanezi and Georgia M. Kapitsaki and Anna Philippou}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {What's Your Purpose? An Approach to Incorporating {GDPR} Purposes into Requirements Analysis}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {907--914}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012474400003648}, doi = {10.5220/0012474400003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/VaneziKP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/VijayanFK24, author = {Visakh K. Vijayan and Maria Francis and Kotaro Kataoka}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Off-Chaining Approaches for Cost-Efficiency in Threshold-Based Elliptic Curve Systems over Blockchains}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {411--422}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012361600003648}, doi = {10.5220/0012361600003648}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/VijayanFK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WakabayashiWNW24, author = {Ryousuke Wakabayashi and Lihua Wang and Ryo Nojima and Atsushi Waseda}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Security Evaluation of Decision Tree Meets Data Anonymization}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {853--860}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012456600003648}, doi = {10.5220/0012456600003648}, timestamp = {Wed, 03 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WakabayashiWNW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WillM24, author = {Newton Carlos Will and Carlos Alberto Maziero}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Enclave Management Models for Safe Execution of Software Components}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {474--485}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012322600003648}, doi = {10.5220/0012322600003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WillM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ZaidenbergKME24, author = {Nezer Jacob Zaidenberg and Michael Kiperberg and Eliav Menachi and Asaf Eitani}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Detecting eBPF Rootkits Using Virtualization and Memory Forensics}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {254--261}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012470800003648}, doi = {10.5220/0012470800003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ZaidenbergKME24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ZareiV24, author = {Amir Zarei and Staal Amund Vinterbo}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Secure Multiparty Computation of the Laplace Mechanism}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {582--593}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012453700003648}, doi = {10.5220/0012453700003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ZareiV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2024, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0000184400003648}, doi = {10.5220/0000184400003648}, isbn = {978-989-758-683-5}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/000123, author = {Luca Vigan{\`{o}}}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Cybersecurity, Nicolas Cage and Peppa Pig}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {7}, publisher = {SciTePress}, year = {2023}, timestamp = {Thu, 11 May 2023 10:52:54 +0200}, biburl = {https://dblp.org/rec/conf/icissp/000123.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/0001V23, author = {Alexandros Karakasidis and Vassilios Vassalos}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {On the Design of {GDPR} Compliant Workflows for Responsible Neuroimage Data Sharing}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {600--607}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011743000003405}, doi = {10.5220/0011743000003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/0001V23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlJuaidLS23, author = {Nouf Al{-}Juaid and Alexei Lisitsa and Sven Schewe}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Secure Joint Querying Over Federated Graph Databases Utilising {SMPC} Protocols}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {210--217}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011798900003405}, doi = {10.5220/0011798900003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlJuaidLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlagarswamyBDLMSTW23, author = {Devi Padmavathi Alagarswamy and Christian Berghoff and Vasilios Danos and Fabian Langer and Thora Markert and Georg Schneider and Arndt von Twickel and Fabian Woitschek}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Towards Audit Requirements for AI-Based Systems in Mobility Applications}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {339--348}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011619500003405}, doi = {10.5220/0011619500003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlagarswamyBDLMSTW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlaniMM23, author = {Mohammed M. Alani and Atefeh Mashatan and Ali Miri}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {XMeDNN: An Explainable Deep Neural Network System for Intrusion Detection in Internet of Medical Things}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {144--151}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011749200003405}, doi = {10.5220/0011749200003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlaniMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlbaneseCCIMMRS23, author = {Daniele Albanese and Rosangela Casolare and Giovanni Ciaramella and Giacomo Iadarola and Fabio Martinelli and Francesco Mercaldo and Marco Russodivito and Antonella Santone}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {StegWare: {A} Novel Malware Model Exploiting Payload Steganography and Dynamic Compilation}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {741--748}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011859000003405}, doi = {10.5220/0011859000003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlbaneseCCIMMRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlghamdiF23, author = {Samiah Alghamdi and Steven Furnell}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Assessing Security and Privacy Insights for Smart Home Users}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {592--599}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011741800003405}, doi = {10.5220/0011741800003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlghamdiF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AntognazzaBPS23, author = {Francesco Antognazza and Alessandro Barenghi and Gerardo Pelosi and Ruggero Susella}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {81--88}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011654200003405}, doi = {10.5220/0011654200003405}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AntognazzaBPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BalajiAF23, author = {Kaushik Krishnan Balaji and Dimah Almani and Steven Furnell}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Assessing the Impact of Attacks on Connected and Autonomous Vehicles in Vehicular Ad Hoc Networks}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {774--782}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011894200003405}, doi = {10.5220/0011894200003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BalajiAF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BartschGKM0PP23, author = {Witali Bartsch and Prosanta Gope and Elif Bilge Kavun and Owen Millwood and Andriy Panchenko and Aryan Mohammadi Pasikhani and Ilia Polian}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Design Rationale for Symbiotically Secure Key Management Systems in IoT and Beyond}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {583--591}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011726900003405}, doi = {10.5220/0011726900003405}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BartschGKM0PP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BauspiessVMCKR23, author = {Pia Bauspie{\ss} and Lasse Vad and H{\aa}vard Myrekrok and Anamaria Costache and Jascha Kolberg and Christian Rathgeb}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {On the Feasibility of Fully Homomorphic Encryption of Minutiae-Based Fingerprint Representations}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {462--470}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011657100003405}, doi = {10.5220/0011657100003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BauspiessVMCKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BelalisSA23, author = {Ilias Belalis and Georgios P. Spathoulas and Ioannis Anagnostopoulos}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Evading Detection During Network Reconnaissance}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {528--534}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011685900003405}, doi = {10.5220/0011685900003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BelalisSA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BellizziVCH23, author = {Jennifer Bellizzi and Mark Vella and Christian Colombo and Julio C. Hernandez{-}Castro}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Using Infrastructure-Based Agents to Enhance Forensic Logging of Third-Party Applications}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {389--401}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011634700003405}, doi = {10.5220/0011634700003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BellizziVCH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BodeiCVMM23, author = {Chiara Bodei and Gianpiero Costantino and Marco De Vincenzi and Ilaria Matteucci and Anna Monreale}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Vehicle Data Collection: {A} Privacy Policy Analysis and Comparison}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {626--633}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011779500003405}, doi = {10.5220/0011779500003405}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BodeiCVMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BorcherdingPGB23, author = {Anne Borcherding and Nikolay Penkov and Mark Giraud and J{\"{u}}rgen Beyerer}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {SWaTEval: An Evaluation Framework for Stateful Web Application Testing}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {430--441}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011652200003405}, doi = {10.5220/0011652200003405}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BorcherdingPGB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Bracamonte0L23, author = {Vanessa Bracamonte and Sebastian Pape and Sascha L{\"{o}}bner}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Comparing the Effect of Privacy and Non-Privacy Social Media Photo Tools on Factors of Privacy Concern}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {669--676}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011784900003405}, doi = {10.5220/0011784900003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Bracamonte0L23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Bryce23, author = {Ciar{\'{a}}n Bryce}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {An Analysis of Cybersecurity Awareness Efforts for Swiss SMEs}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {381--388}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011631100003405}, doi = {10.5220/0011631100003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Bryce23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BullockE23, author = {Harrison Bullock and Matthew Edwards}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Temporal Constraints in Online Dating Fraud Classification}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {535--542}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011689000003405}, doi = {10.5220/0011689000003405}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BullockE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BurdiakDTLRKMPFKHMV23, author = {Patrik Burdiak and Emir Dervisevic and Amina Tankovic and Filip Lauterbach and Jan Rozhon and Lukas Kapicak and Libor Michalek and Dzana Pivac and Merima Fehric and Enio Kaljic and Mirza Hamza and Miralem Mehic and Miroslav Vozn{\'{a}}k}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Use-Case Denial of Service Attack on Actual Quantum Key Distribution Nodes}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {89--94}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011672000003405}, doi = {10.5220/0011672000003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BurdiakDTLRKMPFKHMV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Chabanne23, author = {Herv{\'{e}} Chabanne}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {A Biometric Self Authentication Scheme}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {749--756}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011874400003405}, doi = {10.5220/0011874400003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Chabanne23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ChenLX23, author = {Shaojie Chen and Bo Lang and Chong Xie}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Fast-Flux Malicious Domain Name Detection Method Based on Domain Resolution Spatial Features}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {240--251}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011872700003405}, doi = {10.5220/0011872700003405}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/ChenLX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DantasBKNS23, author = {Yuri Gil Dantas and Simon Barner and Pei Ke and Vivek Nigam and Ulrich Sch{\"{o}}pp}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Automating Vehicle {SOA} Threat Analysis Using a Model-Based Methodology}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {180--191}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011786400003405}, doi = {10.5220/0011786400003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DantasBKNS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DantasS23, author = {Yuri Gil Dantas and Ulrich Sch{\"{o}}pp}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {SeCloud: Computer-Aided Support for Selecting Security Measures for Cloud Architectures}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {264--275}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011901900003405}, doi = {10.5220/0011901900003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DantasS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DienerB23, author = {Michael Diener and Thomas Bolz}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Cloud Inspector: {A} Tool-Based Approach for Public Administrations to Establish Information Security Processes Towards Public Clouds}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {543--551}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011694900003405}, doi = {10.5220/0011694900003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DienerB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DieterichSSSP23, author = {Am{\'{e}}lie Dieterich and Matthias Schopp and Lars Stiemert and Christoph Steininger and Daniela P{\"{o}}hn}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Evaluation of Persistence Methods Used by Malware on Microsoft Windows Systems}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {552--559}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011710200003405}, doi = {10.5220/0011710200003405}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DieterichSSSP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DimaratosP23, author = {Anastasia Dimaratos and Daniela P{\"{o}}hn}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Evaluation Scheme to Analyze Keystroke Dynamics Methods}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {357--365}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011626100003405}, doi = {10.5220/0011626100003405}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DimaratosP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DorafshanianM23, author = {Mahboobeh Dorafshanian and Mohamed Mejri}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Differential Privacy: Toward a Better Tuning of the Privacy Budget ({\(\epsilon\)}) Based on Risk}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {783--792}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011896600003405}, doi = {10.5220/0011896600003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DorafshanianM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DrevinSDKA23, author = {G{\"{u}}nther R. Drevin and Dirk P. Snyman and Lynette Drevin and Hennie A. Kruger and Johann Allers}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {The Story of Safety Snail and Her e-Mail: {A} Digital Wellness and Cybersecurity Serious Game for Pre-School Children}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {519--527}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011682200003405}, doi = {10.5220/0011682200003405}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DrevinSDKA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/EipperP23, author = {Andreas Eipper and Daniela P{\"{o}}hn}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {How to Design a Blue Team Scenario for Beginners on the Example of Brute-Force Attacks on Authentications}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {477--484}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011667300003405}, doi = {10.5220/0011667300003405}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/EipperP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ElsteC23, author = {James R. Elste and David T. Croasdell}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Cyber Teaching Hospitals: Developing Cyber Workforce Competence}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {643--650}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011783800003405}, doi = {10.5220/0011783800003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ElsteC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/EmuraY23, author = {Keita Emura and Masato Yoshimi}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {An End-to-End Encrypted Cache System with Time-Dependent Access Control}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {321--328}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011617900003405}, doi = {10.5220/0011617900003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/EmuraY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ErdoganHBTP23, author = {Gencer Erdogan and Ragnhild Halvorsrud and Costas Boletsis and Simeon Tverdal and John Brian Pickering}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Cybersecurity Awareness and Capacities of SMEs}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {296--304}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011609600003405}, doi = {10.5220/0011609600003405}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ErdoganHBTP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FarhatAMZ23, author = {Saida Farhat and Manel Abdelkader and Amel Meddeb{-}Makhlouf and Faouzi Zarai}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Evaluation of DoS/DDoS Attack Detection with {ML} Techniques on {CIC-IDS2017} Dataset}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {287--295}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011605700003405}, doi = {10.5220/0011605700003405}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FarhatAMZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FloresGKBV23, author = {C{\'{e}}sar V{\'{a}}squez Flores and Jos{\'{e}} Gonzales and Miranda Kajtazi and Joseph Bugeja and Bahtijar Vogel}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Human Factors for Cybersecurity Awareness in a Remote Work Environment}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {608--616}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011746000003405}, doi = {10.5220/0011746000003405}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FloresGKBV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GalliBJCP23, author = {Filippo Galli and Sayan Biswas and Kangsoo Jung and Tommaso Cucinotta and Catuscia Palamidessi}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Group Privacy for Personalized Federated Learning}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {252--263}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011885000003405}, doi = {10.5220/0011885000003405}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GalliBJCP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GuerraMOF23, author = {Michele Guerra and Roberto Milanese and Rocco Oliveto and Fausto Fasano}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {RPCDroid: Runtime Identification of Permission Usage Contexts in Android Applications}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {714--721}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011797200003405}, doi = {10.5220/0011797200003405}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/GuerraMOF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HanTT0ML23, author = {Chansu Han and Akira Tanaka and Jun'ichi Takeuchi and Takeshi Takahashi and Tomohiro Morikawa and Tsung{-}Nan Lin}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Towards Long-Term Continuous Tracing of Internet-Wide Scanning Campaigns Based on Darknet Analysis}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {617--625}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011769300003405}, doi = {10.5220/0011769300003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HanTT0ML23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HasegawaHF23, author = {Kento Hasegawa and Seira Hidano and Kazuhide Fukushima}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Automating {XSS} Vulnerability Testing Using Reinforcement Learning}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {70--80}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011653600003405}, doi = {10.5220/0011653600003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HasegawaHF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HeidHRS23, author = {Kris Heid and Jens Heider and Matthias Ritscher and Jan{-}Peter Stotz}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Tracing Cryptographic Agility in Android and iOS Apps}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {38--45}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011620000003405}, doi = {10.5220/0011620000003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HeidHRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HoferRSM23, author = {Philipp Hofer and Michael Roland and Philipp Schwarz and Ren{\'{e}} Mayrhofer}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Efficient Aggregation of Face Embeddings for Decentralized Face Recognition Deployments}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {279--286}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011599300003405}, doi = {10.5220/0011599300003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HoferRSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ImanCJBG23, author = {Mohammad Reza Heidari Iman and Pavel Chikul and Gert Jervan and Hayretdin Bahsi and Tara Ghasempouri}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Anomalous File System Activity Detection Through Temporal Association Rule Mining}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {733--740}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011805100003405}, doi = {10.5220/0011805100003405}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ImanCJBG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/JulkuK23, author = {Jukka Julku and Markku Kyl{\"{a}}np{\"{a}}{\"{a}}}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Towards a Rust {SDK} for Keystone Enclave Application Development}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {29--37}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011611900003405}, doi = {10.5220/0011611900003405}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/JulkuK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KaksonenHR23, author = {Rauli Kaksonen and Kimmo Halunen and Juha R{\"{o}}ning}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Vulnerabilities in IoT Devices, Backends, Applications, and Components}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {659--668}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011784400003405}, doi = {10.5220/0011784400003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KaksonenHR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KamalI23, author = {Ahmad Akmal Aminuddin Mohd Kamal and Keiichi Iwamura}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {TTP-Aided Searchable Encryption of Documents Using Threshold Secret Sharing}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {442--449}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011653700003405}, doi = {10.5220/0011653700003405}, timestamp = {Thu, 16 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KamalI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Khoumsi23, author = {Ahmed Khoumsi}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Automata-Based Study of Dynamic Access Control Policies}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {218--227}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011819700003405}, doi = {10.5220/0011819700003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Khoumsi23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KiperbergRKZ23, author = {Michael Kiperberg and Aleksei Rozman and Aleksei Kuraev and Nezer Zaidenberg}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {{PDIFT:} {A} Practical Dynamic Information-Flow Tracker}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {192--198}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011786800003405}, doi = {10.5220/0011786800003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KiperbergRKZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KlineK23, author = {Jace Kline and Prasad Kulkarni}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {A Framework for Assessing Decompiler Inference Accuracy of Source-Level Program Constructs}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {228--239}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011872600003405}, doi = {10.5220/0011872600003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KlineK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KokesL23, author = {Josef Kokes and R{\'{o}}bert L{\'{o}}rencz}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {On the Use of Multiple Approximations in the Linear Cryptanalysis of Baby Rijndael}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {174--179}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011785400003405}, doi = {10.5220/0011785400003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KokesL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LauterbachMRBZV23, author = {Filip Lauterbach and Libor Michalek and Piotr Rydlichowski and Patrik Burdiak and Jaroslav Zdralek and Miroslav Vozn{\'{a}}k}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Measurements of Cross-Border Quantum Key Distribution Link}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {418--423}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011647200003405}, doi = {10.5220/0011647200003405}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LauterbachMRBZV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LealWMMBM023, author = {Erika A. Leal and Cimone Wright{-}Hamor and Joseph B. Manzano and Nicholas J. Multari and Kevin J. Barker and David O. Manz and Jiang Ming}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Assessing Risk in High Performance Computing Attacks}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {793--803}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011900500003405}, doi = {10.5220/0011900500003405}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LealWMMBM023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LeichtH23, author = {Jens Leicht and Maritta Heisel}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {{P2BAC:} Privacy Policy Based Access Control Using {P-LPL}}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {686--697}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011788500003405}, doi = {10.5220/0011788500003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LeichtH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Leitner23, author = {Maria Leitner}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {A Scenario-Driven Cyber Security Awareness Exercise Utilizing Dynamic Polling: Methodology and Lessons Learned}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {634--642}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011780400003405}, doi = {10.5220/0011780400003405}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Leitner23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LiZSZ23, author = {Lu Li and Guanling Zhao and Kai Shi and Fengjun Zhang}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {A Stochastic Game Model for Cloud Platform Security}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {152--162}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011778900003405}, doi = {10.5220/0011778900003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LiZSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LohmannAM23, author = {Pedro A. Lohmann and Carlos Albuquerque and Raphael Machado}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Systematic Literature Review of Threat Modeling Concepts}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {163--173}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011783000003405}, doi = {10.5220/0011783000003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LohmannAM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LoumponiasRDTVK23, author = {Kostas Loumponias and Sotiris Raptis and Eleni Darra and Theodora Tsikrika and Stefanos Vrochidis and Ioannis Kompatsiaris}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Forecasting Cyber-Attacks to Destination Ports Using Machine Learning}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {757--764}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011891000003405}, doi = {10.5220/0011891000003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LoumponiasRDTVK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LuanHB23, author = {Kaiying Luan and Ragnhild Halvorsrud and Costas Boletsis}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Evaluation of a Tool to Increase Cybersecurity Awareness Among Non-experts {(SME} Employees)}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {509--518}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011680500003405}, doi = {10.5220/0011680500003405}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LuanHB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MarquesS23, author = {Ant{\'{o}}nio Marques and Bruno Sousa}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {{CHARRA-PM:} An Attestation Approach Relying on the Passport Model}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {349--356}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011623600003405}, doi = {10.5220/0011623600003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MarquesS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MaugeriDBP23, author = {Marcello Maugeri and Cristian Daniele and Giampaolo Bella and Erik Poll}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Evaluating the Fork-Awareness of Coverage-Guided Fuzzers}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {424--429}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011648600003405}, doi = {10.5220/0011648600003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MaugeriDBP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MercaldoMS23, author = {Francesco Mercaldo and Fabio Martinelli and Antonella Santone}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {An Explainable Convolutional Neural Network for Dynamic Android Malware Detection}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {305--312}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011609800003405}, doi = {10.5220/0011609800003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MercaldoMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NarisadaBFK23, author = {Shintaro Narisada and Shohei Beppu and Kazuhide Fukushima and Shinsaku Kiyomoto}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Concrete Quantum Circuits to Prepare Generalized Dicke States on a Quantum Machine}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {329--338}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011618000003405}, doi = {10.5220/0011618000003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NarisadaBFK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NeupaneS23, author = {Ashish Neupane and Weiqing Sun}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Exploring False Demand Attacks in Power Grids with High {PV} Penetration}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {124--134}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011695800003405}, doi = {10.5220/0011695800003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NeupaneS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NichoS23, author = {Mathew Nicho and Ibrahim Sabry}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Bypassing Multiple Security Layers Using Malicious {USB} Human Interface Device}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {501--508}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011677100003405}, doi = {10.5220/0011677100003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NichoS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OhiraDAF23, author = {Shuji Ohira and Araya Kibrom Desta and Ismail Arai and Kazutoshi Fujikawa}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {{IVNPROTECT:} Isolable and Traceable Lightweight CAN-Bus Kernel-Level Protection for Securing in-Vehicle Communication}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {17--28}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011605300003405}, doi = {10.5220/0011605300003405}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/OhiraDAF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OkadaF23, author = {Hiroki Okada and Kazuhide Fukushima}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Revisiting the {DFT} Test in the {NIST} {SP} 800-22 Randomness Test Suite}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {366--372}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011626300003405}, doi = {10.5220/0011626300003405}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/OkadaF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Pavlov0E23, author = {Vitomir Pavlov and Florian Hahn and Mohammad El{-}Hajj}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Security Aspects of Digital Twins in IoT}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {560--567}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011714500003405}, doi = {10.5220/0011714500003405}, timestamp = {Wed, 13 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Pavlov0E23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RabasBL23, author = {Tom{\'{a}}s Rabas and Jir{\'{\i}} Bucek and R{\'{o}}bert L{\'{o}}rencz}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {{SPA} Attack on {NTRU} Protected Implementation with Sparse Representation of Private Key}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {135--143}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011729200003405}, doi = {10.5220/0011729200003405}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/RabasBL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RaschkeHS23, author = {Philip Raschke and Patrick Herbke and Henry Schwerdtner}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {t.ex-Graph: Automated Web Tracker Detection Using Centrality Metrics and Data Flow Characteristics}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {199--209}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011787300003405}, doi = {10.5220/0011787300003405}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RaschkeHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RetiES23, author = {Daniel Reti and Karina Elzer and Hans Dieter Schotten}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {{SCANTRAP:} Protecting Content Management Systems from Vulnerability Scanners with Cyber Deception and Obfuscation}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {485--492}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011667400003405}, doi = {10.5220/0011667400003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RetiES23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RieraAPR23, author = {Francisco Blas {Izquierdo Riera} and Magnus Almgren and Pablo Picazo{-}Sanchez and Christian Rohner}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Clipaha: {A} Scheme to Perform Password Stretching on the Client}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {58--69}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011653200003405}, doi = {10.5220/0011653200003405}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RieraAPR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RochaAP23, author = {Alexandra Rocha and Rui Alves and Tiago Pedrosa}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Query Log Analysis for {SQL} Injection Detection}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {471--476}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011667200003405}, doi = {10.5220/0011667200003405}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RochaAP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RocklWM23, author = {Jonas R{\"{o}}ckl and Adam Wagenh{\"{a}}user and Tilo M{\"{u}}ller}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Veto: Prohibit Outdated Edge System Software from Booting}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {46--57}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011627700003405}, doi = {10.5220/0011627700003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RocklWM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RuelleGR23, author = {Fr{\'{e}}d{\'{e}}ric Ruell{\'{e}} and Quentin Guella{\"{e}}n and Arnaud Rosay}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {{SHOID:} {A} Secure Herd of IoT Devices Firmware Update Protocol}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {373--380}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011628000003405}, doi = {10.5220/0011628000003405}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RuelleGR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SamirJ23, author = {Areeg Samir and H{\aa}vard Dagenborg Johansen}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {A Self-Configuration Controller To Detect, Identify, and Recover Misconfiguration at IoT Edge Devices and Containerized Cluster System}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {765--773}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011893700003405}, doi = {10.5220/0011893700003405}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SamirJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SeidPB23, author = {Elias Seid and Oliver Popov and Fredrik Blix}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Towards Security Attack Event Monitoring for Cyber Physical-Systems}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {722--732}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011803400003405}, doi = {10.5220/0011803400003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SeidPB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SeitzTGH23, author = {Ludwig Seitz and Marco Tiloca and Martin Gunnarsson and Rikard H{\"{o}}glund}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Secure Software Updates for IoT Based on Industry Requirements}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {698--705}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011790100003405}, doi = {10.5220/0011790100003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SeitzTGH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Stremlau23, author = {Thorsten P. Stremlau}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Protecting IoT Ecosystems and {AI} Leveraging {TCG} Standards}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {11}, publisher = {SciTePress}, year = {2023}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Stremlau23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SugaiSTO23, author = {Risa Sugai and Yuichi Sei and Yasuyuki Tahara and Akihiko Ohsuga}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {A k-Anonymization Method for Social Network Data with Link Prediction}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {493--500}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011676800003405}, doi = {10.5220/0011676800003405}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SugaiSTO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TangOB23, author = {Feiyang Tang and Bjarte M. {\O}stvold and Magiel Bruntink}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Identifying Personal Data Processing for Code Review}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {568--575}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011725700003405}, doi = {10.5220/0011725700003405}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TangOB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TavolatoLE23, author = {Paul Tavolato and Robert Luh and Sebastian Eresheim}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {A Game Theoretic Analysis of Cyber Threats}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {706--713}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011792700003405}, doi = {10.5220/0011792700003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TavolatoLE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Teseleanu23, author = {George Teseleanu}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Security Analysis of a Color Image Encryption Scheme Based on Dynamic Substitution and Diffusion Operations}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {410--417}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011646300003405}, doi = {10.5220/0011646300003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Teseleanu23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TokasES23, author = {Shukun Tokas and Gencer Erdogan and Ketil St{\o}len}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Privacy-Aware IoT: State-of-the-Art and Challenges}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {450--461}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011656400003405}, doi = {10.5220/0011656400003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TokasES23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TranNE23, author = {Thanh Tran and Phu Nguyen and Gencer Erdogan}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {A Systematic Review of Secure IoT Data Sharing}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {95--105}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011674200003405}, doi = {10.5220/0011674200003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TranNE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Volkamer23, author = {Melanie Volkamer}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Usable Security: Security 'Warnings' 2.0}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {5}, publisher = {SciTePress}, year = {2023}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Volkamer23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WalkowP23, author = {Marcus Walkow and Daniela P{\"{o}}hn}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Systematically Searching for Identity-Related Information in the Internet with {OSINT} Tools}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {402--409}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011644200003405}, doi = {10.5220/0011644200003405}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WalkowP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WangAH23, author = {Yichao Wang and Budi Arief and Julio C. Hernandez{-}Castro}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Dark Ending: What Happens when a Dark Web Market Closes down}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {106--117}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011681600003405}, doi = {10.5220/0011681600003405}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WangAH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WatanabeMKU23, author = {Ryu Watanabe and Takashi Matsunaka and Ayumu Kubota and Jumpei Urakawa}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Machine Learning Based Prediction of Vulnerability Information Subject to a Security Alert}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {313--320}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011613700003405}, doi = {10.5220/0011613700003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WatanabeMKU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WolfLT23, author = {Zechariah Wolf and Eric Larson and Mitchell A. Thornton}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Data Leakage in Isolated Virtualized Enterprise Computing Systems}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {118--123}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011691900003405}, doi = {10.5220/0011691900003405}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WolfLT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ZhangWHWZS23, author = {Hanwen Zhang and Wenyong Wang and Lisheng Huang and Junrui Wu and Fengjun Zhang and Kai Shi}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Correlating Intrusion Detection with Attack Graph on Virtual Computer Networkings}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {651--658}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011784100003405}, doi = {10.5220/0011784100003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ZhangWHWZS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Zhong023, author = {Yinzheng Zhong and Alexei Lisitsa}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Online Transition-Based Feature Generation for Anomaly Detection in Concurrent Data Streams}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {576--582}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011726700003405}, doi = {10.5220/0011726700003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Zhong023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ZolotavkinBLMK23, author = {Yevhen Zolotavkin and Yurii Baryshev and Vitalii Lukichov and Jannik M{\"{a}}hn and Stefan K{\"{o}}psell}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Improving Unlinkability in {C-ITS:} {A} Methodology For Optimal Obfuscation}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {677--685}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011786900003405}, doi = {10.5220/0011786900003405}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ZolotavkinBLMK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2022s, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Information Systems Security and Privacy - 7th International Conference, {ICISSP} 2021, Virtual Event, February 11-13, 2021, and 8th International Conference, {ICISSP} 2022, Virtual Event, February 9-11, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1851}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-37807-2}, doi = {10.1007/978-3-031-37807-2}, isbn = {978-3-031-37806-5}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2022s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2023, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0000168400003405}, doi = {10.5220/0000168400003405}, isbn = {978-989-758-624-8}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AarlandG22, author = {Mari Aarland and Terje Gj{\o}s{\ae}ter}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Digital Supply Chain Vulnerabilities in Critical Infrastructure: {A} Systematic Literature Review on Cybersecurity in the Energy Sector}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {326--333}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010803800003120}, doi = {10.5220/0010803800003120}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AarlandG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Al-JuaidLS22, author = {Nouf Al{-}Juaid and Alexei Lisitsa and Sven Schewe}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {{SMPG:} Secure Multi Party Computation on Graph Databases}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {463--471}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010876200003120}, doi = {10.5220/0010876200003120}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Al-JuaidLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlShuhailS22, author = {Asma AlShuhail and Jianhue Shao}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Semantic Attack on Disassociated Transactions}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {60--72}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010780500003120}, doi = {10.5220/0010780500003120}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlShuhailS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlasmariW022, author = {Sultan Alasmari and Weichao Wang and Yu Wang}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Incentivisation of Outsourced Network Testing: View from Platform Perspective}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {499--506}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010897300003120}, doi = {10.5220/0010897300003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/AlasmariW022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlbalawiVC22, author = {Abdullah Albalawi and Vassilios G. Vassilakis and Radu Calinescu}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Protecting Shared Virtualized Environments against Cache Side-channel Attacks}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {507--514}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010897800003120}, doi = {10.5220/0010897800003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/AlbalawiVC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AliHJLST22, author = {Muhammad Ali and Monem Hamid and Jacob Jasser and Joachim Lerman and Samod Shetty and Fabio Di Troia}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Profile Hidden Markov Model Malware Detection and {API} Call Obfuscation}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {688--695}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011005800003120}, doi = {10.5220/0011005800003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/AliHJLST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlmarwaniK022, author = {Maryam Almarwani and Boris Konev and Alexei Lisitsa}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Zero Update Encryption Adjustment on Encrypted Database Queries}, booktitle = {Information Systems Security and Privacy - 7th International Conference, {ICISSP} 2021, Virtual Event, February 11-13, 2021, and 8th International Conference, {ICISSP} 2022, Virtual Event, February 9-11, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1851}, pages = {25--47}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-37807-2\_2}, doi = {10.1007/978-3-031-37807-2\_2}, timestamp = {Wed, 06 Sep 2023 16:33:07 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlmarwaniK022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlmarwaniKL22, author = {Maryam Almarwani and Boris Konev and Alexei Lisitsa}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Efficient and Secure Encryption Adjustment for {JSON} Data}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {307--313}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010791300003120}, doi = {10.5220/0010791300003120}, timestamp = {Fri, 03 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlmarwaniKL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AnagrehLV22, author = {Mohammad Anagreh and Peeter Laud and Eero Vainikko}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Privacy-preserving Parallel Computation of Shortest Path Algorithms with Low Round Complexity}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {37--47}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010775700003120}, doi = {10.5220/0010775700003120}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AnagrehLV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BaksiU22, author = {Rudra Prasad Baksi and Shambhu J. Upadhyaya}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Game Theoretic Analysis of Ransomware: {A} Preliminary Study}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {242--251}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011006600003120}, doi = {10.5220/0011006600003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BaksiU22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BaksiU22a, author = {Rudra Prasad Baksi and Shambhu J. Upadhyaya}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {A Game Theoretic Approach to the Design of Mitigation Strategies for Generic Ransomware}, booktitle = {Information Systems Security and Privacy - 7th International Conference, {ICISSP} 2021, Virtual Event, February 11-13, 2021, and 8th International Conference, {ICISSP} 2022, Virtual Event, February 9-11, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1851}, pages = {104--124}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-37807-2\_6}, doi = {10.1007/978-3-031-37807-2\_6}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BaksiU22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BarberF22, author = {Flora Barber and Steven Furnell}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Benchmarking Consumer Data and Privacy Knowledge in Connected and Autonomous Vehicles}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {426--434}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010862000003120}, doi = {10.5220/0010862000003120}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BarberF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BarberF22a, author = {Flora Barber and Steven Furnell}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Evaluating Consumer Understanding and Awareness of Connected and Autonomous Vehicle Data Privacy}, booktitle = {Information Systems Security and Privacy - 7th International Conference, {ICISSP} 2021, Virtual Event, February 11-13, 2021, and 8th International Conference, {ICISSP} 2022, Virtual Event, February 9-11, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1851}, pages = {48--71}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-37807-2\_3}, doi = {10.1007/978-3-031-37807-2\_3}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BarberF22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BartonBPSA22, author = {Jon Barton and William J. Buchanan and Nikolaos Pitropakis and Sarwar Sayeed and Will Abramson}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Post Quantum Cryptography Analysis of {TLS} Tunneling on a Constrained Device}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {551--561}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010903000003120}, doi = {10.5220/0010903000003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BartonBPSA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BorcherdingFKMB22, author = {Anne Borcherding and Lukas Feldmann and Markus Karch and Ankush Meshram and J{\"{u}}rgen Beyerer}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Towards a Better Understanding of Machine Learning based Network Intrusion Detection Systems in Industrial Networks}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {314--325}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010795900003120}, doi = {10.5220/0010795900003120}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BorcherdingFKMB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BorcherdingTB22, author = {Anne Borcherding and Philipp Takacs and J{\"{u}}rgen Beyerer}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Cluster Crash: Learning from Recent Vulnerabilities in Communication Stacks}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {334--344}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010806300003120}, doi = {10.5220/0010806300003120}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BorcherdingTB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BracamonteI22, author = {Vanessa Bracamonte and Takamasa Isohara}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Comparing Perception of Disclosure of Different Types of Information Related to Automated Tools}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {544--550}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010901200003120}, doi = {10.5220/0010901200003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BracamonteI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CanU22, author = {{\"{O}}zg{\"{u}} Can and Murat Osman {\"{U}}nalir}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Revisiting Ontology Based Access Control: The Case for Ontology Based Data Access}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {515--518}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010898100003120}, doi = {10.5220/0010898100003120}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/CanU22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CanU22a, author = {{\"{O}}zg{\"{u}} Can and Murat Osman {\"{U}}nalir}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Improving Data Security and Privacy for Ontology Based Data Access}, booktitle = {Information Systems Security and Privacy - 7th International Conference, {ICISSP} 2021, Virtual Event, February 11-13, 2021, and 8th International Conference, {ICISSP} 2022, Virtual Event, February 9-11, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1851}, pages = {72--90}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-37807-2\_4}, doi = {10.1007/978-3-031-37807-2\_4}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CanU22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CarrierVTL22, author = {Tristan Carrier and Princy Victor and Ali Tekeoglu and Arash Habibi Lashkari}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Detecting Obfuscated Malware using Memory Feature Engineering}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {177--188}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010908200003120}, doi = {10.5220/0010908200003120}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CarrierVTL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CatuognoG22, author = {Luigi Catuogno and Clemente Galdi}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {On Tracking Ransomware on the File System}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {210--219}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010985000003120}, doi = {10.5220/0010985000003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/CatuognoG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ChenLTH22, author = {Shang{-}Wen Chen and Jian{-}Wei Liao and Chia{-}Wei Tien and Jung{-}Hsin Hsiao}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Impact of Cross-standard Cell Libraries on Machine Learning based Hardware Trojan Detection}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {420--425}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010858800003120}, doi = {10.5220/0010858800003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/ChenLTH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ChoudhuryLN22, author = {Robert Choudhury and Zhiyuan Luo and Khuong An Nguyen}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Malware in Motion}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {595--602}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010976200003120}, doi = {10.5220/0010976200003120}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ChoudhuryLN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CilliMMV22, author = {Claudio Cilli and Giulio Magnanini and Lorenzo Manduca and Fabrizio Venettoni}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {"Fake News Detector": An Automatic System for the Reliability Evaluation of Digital News}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {15--24}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010769700003120}, doi = {10.5220/0010769700003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/CilliMMV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CivekT22, author = {Asl{\'{\i}} Basak Civek and Cihangir Tezcan}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Differential-linear Attacks on Permutation Ciphers Revisited: Experiments on Ascon and DryGASCON}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {202--209}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010982600003120}, doi = {10.5220/0010982600003120}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CivekT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CivekT22a, author = {Asl{\'{\i}} Basak Civek and Cihangir Tezcan}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Experimentally Obtained Differential-Linear Distinguishers for Permutations of {ASCON} and DryGASCON}, booktitle = {Information Systems Security and Privacy - 7th International Conference, {ICISSP} 2021, Virtual Event, February 11-13, 2021, and 8th International Conference, {ICISSP} 2022, Virtual Event, February 9-11, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1851}, pages = {91--103}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-37807-2\_5}, doi = {10.1007/978-3-031-37807-2\_5}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CivekT22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DaoudaghM22, author = {Said Daoudagh and Eda Marchetti}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {The {GDPR} Compliance and Access Control Systems: Challenges and Research Opportunities}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {571--578}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010912300003120}, doi = {10.5220/0010912300003120}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DaoudaghM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DavidianVK22, author = {Matan Davidian and Natalia Vanetik and Michael Kiperberg}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Ransomware Detection with Deep Neural Networks}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {656--663}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011008000003120}, doi = {10.5220/0011008000003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/DavidianVK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DaviesS22, author = {Jack R. Davies and Jianhua Shao}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Utility of Anonymised Data in Decision Tree Derivation}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {273--280}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010778300003120}, doi = {10.5220/0010778300003120}, timestamp = {Fri, 14 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DaviesS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DemetriouBH22, author = {Phil Demetriou and Ingolf Becker and Stephen Hailes}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Who Watches the Watchers: {A} Multi-Task Benchmark for Anomaly Detection}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {579--586}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010915000003120}, doi = {10.5220/0010915000003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/DemetriouBH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Ebad22, author = {Shouki A. Ebad}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {An Exploratory Study of Why UMLsec Is Not Adopted}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {357--364}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010821400003120}, doi = {10.5220/0010821400003120}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Ebad22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ElmiligiS22, author = {Haytham Elmiligi and Sherif Saad}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {iProfile: Collecting and Analyzing Keystroke Dynamics from Android Users}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {621--628}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011002600003120}, doi = {10.5220/0011002600003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/ElmiligiS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FahlanderE0D22, author = {Per Fahlander and Mathias Ekstedt and Preetam Mukherjee and Ashish Kumar Dwivedi}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Containment Strategy Formalism in a Probabilistic Threat Modelling Framework}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {108--120}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010823800003120}, doi = {10.5220/0010823800003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/FahlanderE0D22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GaficTKHQ22, author = {Melisa Gafic and Simon Tjoa and Peter Kieseberg and Otto Hellwig and Gerald Quirchmayr}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Cyber Exercises in Computer Science Education}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {404--411}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010845800003120}, doi = {10.5220/0010845800003120}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GaficTKHQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HallJLS22, author = {Joanne L. Hall and Jomin John and Jessica Liebig and Anju Skariah}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Age Bias in Finger Vein Biometric Research}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {472--477}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010876700003120}, doi = {10.5220/0010876700003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HallJLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HeidTHS22, author = {Kris Heid and Tobias Tefke and Jens Heider and Ralf C. Staudemeyer}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Android Data Storage Locations and What App Developers Do with It from a Security and Privacy Perspective}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {378--387}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010838200003120}, doi = {10.5220/0010838200003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HeidTHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HekkalaHV22, author = {Julius Hekkala and Kimmo Halunen and Visa Antero Vallivaara}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Implementing Post-quantum Cryptography for Developers}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {73--83}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010786200003120}, doi = {10.5220/0010786200003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HekkalaHV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/IssakhaniVTL22, author = {Maryam Issakhani and Princy Victor and Ali Tekeoglu and Arash Habibi Lashkari}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {{PDF} Malware Detection based on Stacking Learning}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {562--570}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010908400003120}, doi = {10.5220/0010908400003120}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/IssakhaniVTL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KanamoriSTN22, author = {Sachiko Kanamori and Hirotsune Sato and Naoya Tabata and Ryo Nojima}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Construction of a Support Tool for User Reading of Privacy Policies and Assessment of its User Impact}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {412--419}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010847500003120}, doi = {10.5220/0010847500003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KanamoriSTN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KarimniaMS22, author = {Rooya Karimnia and Kaie Maennel and Mahtab Shahin}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Culturally-sensitive Cybersecurity Awareness Program Design for Iranian High-school Students}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {121--132}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010824800003120}, doi = {10.5220/0010824800003120}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KarimniaMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KiechleBNB022, author = {Valentin Kiechle and Matthias B{\"{o}}rsig and Sven Nitzsche and Ingmar Baumgart and J{\"{u}}rgen Becker}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {{PREUNN:} Protocol Reverse Engineering using Neural Networks}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {345--356}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010813500003120}, doi = {10.5220/0010813500003120}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KiechleBNB022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KumazakiHYST22, author = {Masahito Kumazaki and Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada and Hiroki Takakura}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Cyber Attack Stage Tracing System based on Attack Scenario Comparison}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {587--594}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010918200003120}, doi = {10.5220/0010918200003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KumazakiHYST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KunduPV22, author = {Rohon Kundu and Alessandro De Piccoli and Andrea Visconti}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Public Key Compression and Fast Polynomial Multiplication for {NTRU} using the Corrected Hybridized NTT-Karatsuba Method}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {145--153}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010881300003120}, doi = {10.5220/0010881300003120}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KunduPV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LangnerSFQ22, author = {Gregor Langner and Florian Skopik and Steven Furnell and Gerald Quirchmayr}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {A Tailored Model for Cyber Security Education Utilizing a Cyber Range}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {365--377}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010834000003120}, doi = {10.5220/0010834000003120}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LangnerSFQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LeePPPT22, author = {Hoseong Asher Lee and Nikhil Prathapani and Rajesh Paturi and Sarp Parmaksiz and Fabio Di Troia}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {NLP-based User Authentication through Mouse Dynamics}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {696--702}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011005900003120}, doi = {10.5220/0011005900003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/LeePPPT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LeeSAS0SLT22, author = {Matthew Lee and Joshua Sylvester and Sunjoli Aggarwal and Aviraj Sinha and Michael A. Taylor and Nathan Srirama and Eric C. Larson and Mitchell A. Thornton}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Side Channel Identification using Granger Time Series Clustering with Applications to Control Systems}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {290--298}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010781600003120}, doi = {10.5220/0010781600003120}, timestamp = {Thu, 16 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/LeeSAS0SLT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LingE22, author = {Engla Rencelj Ling and Mathias Ekstedt}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Estimating the Time-To-Compromise of Exploiting Industrial Control System Vulnerabilities}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {96--107}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010817400003120}, doi = {10.5220/0010817400003120}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LingE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LorunserWK22, author = {Thomas Lor{\"{u}}nser and Florian Wohner and Stephan Krenn}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {A Privacy-Preserving Auction Platform with Public Verifiability for Smart Manufacturing}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {637--647}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011006700003120}, doi = {10.5220/0011006700003120}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LorunserWK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MadiSSG22, author = {Abbass Madi and Oana Stan and Renaud Sirdey and C{\'{e}}dric Gouy{-}Pailler}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {SecTL: Secure and Verifiable Transfer Learning-based inference}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {220--229}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010987700003120}, doi = {10.5220/0010987700003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/MadiSSG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MaurelVR22, author = {H{\'{e}}lo{\"{\i}}se Maurel and Santiago A. Vidal and Tamara Rezk}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Comparing the Detection of {XSS} Vulnerabilities in Node.js and a Multi-tier JavaScript-based Language via Deep Learning}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {189--201}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010980800003120}, doi = {10.5220/0010980800003120}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MaurelVR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MercaldoMS022, author = {Francesco Mercaldo and Fabio Martinelli and Antonella Santone and Vinod P.}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {On the Influence of Image Settings in Deep Learning-based Malware Detection}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {669--676}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010890600003120}, doi = {10.5220/0010890600003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/MercaldoMS022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MohammadianL022, author = {Hesamodin Mohammadian and Arash Habibi Lashkari and Ali A. Ghorbani}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Evaluating Deep Learning-based {NIDS} in Adversarial Settings}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {435--444}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010867900003120}, doi = {10.5220/0010867900003120}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MohammadianL022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NabeelG22, author = {Mohamad Nabeel and Christine Gro{\ss}e}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Classifying {COVID-19} Disinformation on Twitter using a Convolutional Neural Network}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {264--272}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010774800003120}, doi = {10.5220/0010774800003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/NabeelG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NaserediniGSBSC22, author = {Amir Naseredini and Stefan Gast and Martin Schwarzl and Pedro Miguel Sousa Bernardo and Amel Smajic and Claudio Canella and Martin Berger and Daniel Gruss}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {48--59}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010779300003120}, doi = {10.5220/0010779300003120}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NaserediniGSBSC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OttMG22, author = {David Ott and Dennis Moreau and Manish Gaur}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Planning for Cryptographic Readiness in an Era of Quantum Computing Advancement}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {491--498}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010886000003120}, doi = {10.5220/0010886000003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/OttMG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PattiyanonA22, author = {Charnon Pattiyanon and Toshiaki Aoki}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Analysis and Enhancement of Self-sovereign Identity System Properties Compiling Standards and Regulations}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {133--144}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010877300003120}, doi = {10.5220/0010877300003120}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PattiyanonA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Picazo-SanchezA22, author = {Pablo Picazo{-}Sanchez and Maximilian Algehed and Andrei Sabelfeld}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {DeDup.js: Discovering Malicious and Vulnerable Extensions by Detecting Duplication}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {528--535}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010900600003120}, doi = {10.5220/0010900600003120}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Picazo-SanchezA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PonsardM22, author = {Christophe Ponsard and Philippe Massonet}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Survey and Guidelines about Learning Cyber Security Risk Assessment}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {536--543}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010900800003120}, doi = {10.5220/0010900800003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/PonsardM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RahmanMHA22, author = {Md. Rashedur Rahman and Elizabeth Miller and Moinul Hossain and Aisha I. Ali{-}Gombe}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Intent-aware Permission Architecture: {A} Model for Rethinking Informed Consent for Android Apps}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {154--164}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010882900003120}, doi = {10.5220/0010882900003120}, timestamp = {Wed, 30 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RahmanMHA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Rashid22, author = {Awais Rashid}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Why Rigorous Underpinnings for Cyber Security Education and Training Matter? Experiences from CyBOK: The Cyber Security Body of Knowledge}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {5}, publisher = {{SCITEPRESS}}, year = {2022}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Rashid22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RosayCCL22, author = {Arnaud Rosay and Elo{\"{\i}}se Cheval and Florent Carlier and Pascal Leroux}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Network Intrusion Detection: {A} Comprehensive Analysis of {CIC-IDS2017}}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {25--36}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010774000003120}, doi = {10.5220/0010774000003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/RosayCCL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RuckaW22, author = {Agnieszka Rucka and Wojciech Wodo}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {On the {LPSE} Password Meter's Discrepancies among Different Datasets}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {255--263}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010766900003120}, doi = {10.5220/0010766900003120}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RuckaW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Sadeh22, author = {Norman M. Sadeh}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Why Usability Has Become Privacy's Biggest Challenge and What We Can Do About It}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {9}, publisher = {{SCITEPRESS}}, year = {2022}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Sadeh22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Samarati22, author = {Pierangela Samarati}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Data Security and Privacy in Emerging Scenarios}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {7}, publisher = {{SCITEPRESS}}, year = {2022}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Samarati22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SandovalL22, author = {Itzel V{\'{a}}zquez Sandoval and Gabriele Lenzini}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Can We Formally Catch Cheating in E-exams?}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {648--655}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011007900003120}, doi = {10.5220/0011007900003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/SandovalL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SerretLG22, author = {Elsa Serret and Antoine Lesueur and Alban Gabillon}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Linguistic Steganography for Messaging Applications}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {519--527}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010899300003120}, doi = {10.5220/0010899300003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/SerretLG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SertkayaK22, author = {Isa Sertkaya and {\"{O}}znur Kalkar}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Cryptanalysis of Some Electronic Checkbook Schemes}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {603--612}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010981900003120}, doi = {10.5220/0010981900003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/SertkayaK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SnymanK22, author = {Dirk P. Snyman and Hennie A. Kruger}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {The Role of Information Deserts in Information Security Awareness and Behaviour}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {613--620}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010984200003120}, doi = {10.5220/0010984200003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/SnymanK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Soares22, author = {Alberto Magno Muniz Soares}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {WhatsApp Web Client Live Forensics Technique}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {629--636}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011006400003120}, doi = {10.5220/0011006400003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Soares22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TalbiVLFC022, author = {Adam Talbi and Arthur Viens and Louis{-}Cl{\'{e}}ment Leroux and Morgane Fran{\c{c}}ois and Mathias Caillol and Nga Nguyen}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Feature Importance and Deep Learning for Android Malware Detection}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {453--462}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010875500003120}, doi = {10.5220/0010875500003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/TalbiVLFC022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TavolatoLE22, author = {Paul Tavolato and Robert Luh and Sebastian Eresheim}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Formalizing Real-world Threat Scenarios}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {281--289}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010781300003120}, doi = {10.5220/0010781300003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/TavolatoLE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/UljansB22, author = {Austris Uljans and Bernhards Blumbergs}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Industrial and Automation Control System Cyber Range Prototype for Offensive Capability Development}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {478--490}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010879500003120}, doi = {10.5220/0010879500003120}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/UljansB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/VeronesePFL22, author = {Leonardo Veronese and Francesco Palmarini and Riccardo Focardi and Flaminia L. Luccio}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {A Fast and Cost-effective Design for FPGA-based Fuzzy Rainbow Tradeoffs}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {165--176}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010904300003120}, doi = {10.5220/0010904300003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/VeronesePFL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WangB22, author = {Tian Wang and Masooda N. Bashir}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {An Analysis of Cloud Certifications' Performance on Privacy Protections}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {299--306}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010783200003120}, doi = {10.5220/0010783200003120}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WangB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WareusDTH22, author = {Emil W{\aa}reus and Anton Duppils and Magnus Tullberg and Martin Hell}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Security Issue Classification for Vulnerability Management with Semi-supervised Learning}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {84--95}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010813000003120}, doi = {10.5220/0010813000003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/WareusDTH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WenS22, author = {Shengyuan Wen and Weiqing Sun}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {SpamFender: {A} Semi-supervised Incremental Spam Classification System across Social Networks}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {388--395}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010840300003120}, doi = {10.5220/0010840300003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/WenS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WerdenML22, author = {David Werden and Matthew Muccioli and Anyi Liu}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {TEEm: {A} Tangle-based Elastic Emulator for Storing Connected Vehicle Data in a Distributed Ledger Technology}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {230--241}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010990100003120}, doi = {10.5220/0010990100003120}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WerdenML22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WuSZYLZGLH22, author = {Yixiong Wu and Shangru Song and Jianwei Zhuge and Tingting Yin and Tianyi Li and Junmin Zhu and Guannan Guo and Yue Liu and Jianju Hu}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {ICScope: Detecting and Measuring Vulnerable {ICS} Devices Exposed on the Internet}, booktitle = {Information Systems Security and Privacy - 7th International Conference, {ICISSP} 2021, Virtual Event, February 11-13, 2021, and 8th International Conference, {ICISSP} 2022, Virtual Event, February 9-11, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1851}, pages = {1--24}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-37807-2\_1}, doi = {10.1007/978-3-031-37807-2\_1}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WuSZYLZGLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/XiaoNFS22, author = {Junhui Xiao and Ashish Neupane and Hiba F. Fayoumi and Weiqing Sun}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {A Novel Key Exchange Protocol using Logic Algebra for the Factorization Problem}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {396--403}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010843300003120}, doi = {10.5220/0010843300003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/XiaoNFS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/YassinR22, author = {Ghadeer I. Yassin and Lakshmish Ramaswamy}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Effective {\&} Efficient Access Control in Smart Farms: Opportunities, Challenges {\&} Potential Approaches}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {445--452}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010873000003120}, doi = {10.5220/0010873000003120}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/YassinR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/YonamineTK22, author = {Shun Yonamine and Yuzo Taenaka and Youki Kadobayashi}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Tamer: {A} Sandbox for Facilitating and Automating IoT Malware Analysis with Techniques to Elicit Malicious Behavior}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {677--687}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010968300003120}, doi = {10.5220/0010968300003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/YonamineTK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2020s, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Information Systems Security and Privacy - 6th International Conference, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1545}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-94900-6}, doi = {10.1007/978-3-030-94900-6}, isbn = {978-3-030-94899-3}, timestamp = {Mon, 21 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/2020s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2022, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0000157000003120}, doi = {10.5220/0000157000003120}, isbn = {978-989-758-553-1}, timestamp = {Tue, 06 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/0002E0SE21, author = {Clemens Brunner and G{\"{u}}nther Eibl and Peter Fr{\"{o}}hlich and Andreas Sackl and Dominik Engel}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Who Stores the Private Key? An Exploratory Study about User Preferences of Key Management for Blockchain-based Applications}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {23--32}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010173200230032}, doi = {10.5220/0010173200230032}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/0002E0SE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/0018O021, author = {Yan Yan and Elisabeth Oswald and Srinivas Vivek}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {An Analytic Attack against {ARX} Addition Exploiting Standard Side-channel Leakage}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {89--97}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010223600890097}, doi = {10.5220/0010223600890097}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/0018O021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/0046CKLG21, author = {Lu Zhang and Reginald Cushing and Ralph Koning and Cees de Laat and Paola Grosso}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Profiling and Discriminating of Containerized {ML} Applications in Digital Data Marketplaces {(DDM)}}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {508--515}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010254105080515}, doi = {10.5220/0010254105080515}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/0046CKLG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AkandeT21, author = {Alexander O. Akande and Vu N. Tran}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Predicting Security Program Effectiveness in Bring-Your-Own-Device Deployment in Organizations}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {55--65}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010195800550065}, doi = {10.5220/0010195800550065}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AkandeT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Al-MaweeCM21, author = {Wassnaa Al{-}Mawee and Steve Carr and Jean Mayo}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Admonita: {A} Recommendation-based Trust Model for Dynamic Data Integrity}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {273--282}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010150402730282}, doi = {10.5220/0010150402730282}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Al-MaweeCM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlmarwaniKL21, author = {Maryam Almarwani and Boris Konev and Alexei Lisitsa}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Release-aware In-out Encryption Adjustment in MongoDB Query Processing}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {714--722}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010395007140722}, doi = {10.5220/0010395007140722}, timestamp = {Fri, 03 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlmarwaniKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlturkiKKNST21, author = {Musab A. Alturki and Tajana Ban Kirigin and Max I. Kanovich and Vivek Nigam and Andre Scedrov and Carolyn L. Talcott}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {On Security Analysis of Periodic Systems: Expressiveness and Complexity}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {43--54}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010195100430054}, doi = {10.5220/0010195100430054}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/AlturkiKKNST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AmitYKZ21, author = {Guy Amit and Amir Yeshooroon and Michael Kiperberg and Nezer J. Zaidenberg}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {DLP-Visor: {A} Hypervisor-based Data Leakage Prevention System}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {416--423}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010221104160423}, doi = {10.5220/0010221104160423}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/AmitYKZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AnagrehVL21, author = {Mohammad Anagreh and Eero Vainikko and Peeter Laud}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Parallel Privacy-preserving Computation of Minimum Spanning Trees}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {181--190}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010255701810190}, doi = {10.5220/0010255701810190}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/AnagrehVL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AyotteBHS21, author = {Blaine Ayotte and Mahesh K. Banavar and Daqing Hou and Stephanie Schuckers}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Study of Intra- and Inter-user Variance in Password Keystroke Dynamics}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {467--474}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010235504670474}, doi = {10.5220/0010235504670474}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/AyotteBHS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BasuKB21, author = {Srijita Basu and Sandip Karmakar and Debasish Bera}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Blockchain based Secured Virtual Machine Image Monitor}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {432--439}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010228804320439}, doi = {10.5220/0010228804320439}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BasuKB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BhattacharjyaS21, author = {Sairath Bhattacharjya and Hossein Saiedian}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {A Novel Simplified Framework to Secure IoT Communications}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {399--406}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010210003990406}, doi = {10.5220/0010210003990406}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BhattacharjyaS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BohmVP21, author = {Fabian B{\"{o}}hm and Manfred Vielberth and G{\"{u}}nther Pernul}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Bridging Knowledge Gaps in Security Analytics}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {98--108}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010225400980108}, doi = {10.5220/0010225400980108}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BohmVP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BoudguigaSFLC21, author = {Aymen Boudguiga and Oana Stan and Abdessamad Fazzat and Houda Labiod and Pierre{-}Emmanuel Clet}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Privacy Preserving Services for Intelligent Transportation Systems with Homomorphic Encryption}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {684--693}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010349706840693}, doi = {10.5220/0010349706840693}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BoudguigaSFLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BracamonteTK21, author = {Vanessa Bracamonte and Welderufael B. Tesfay and Shinsaku Kiyomoto}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Towards Exploring User Perception of a Privacy Sensitive Information Detection Tool}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {628--634}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010319706280634}, doi = {10.5220/0010319706280634}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BracamonteTK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BryantS21, author = {Blake D. Bryant and Hossein Saiedian}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {A State Saturation Attack against Massively Multiplayer Online Videogames}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {217--225}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010302002170225}, doi = {10.5220/0010302002170225}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BryantS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CadalzoTOMW21, author = {Lucas Cadalzo and Christopher H. Todd and Banjo Obayomi and W. Brad Moore and Anthony C. Wong}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Canopy: {A} Learning-based Approach for Automatic Low-and-Slow DDoS Mitigation}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {356--367}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010192303560367}, doi = {10.5220/0010192303560367}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/CadalzoTOMW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CasolareMMS21, author = {Rosangela Casolare and Fabio Martinelli and Francesco Mercaldo and Antonella Santone}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Colluding Covert Channel for Malicious Information Exfiltration in Android Environment}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {811--818}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010396708110818}, doi = {10.5220/0010396708110818}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/CasolareMMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ChabanneDG21, author = {Herv{\'{e}} Chabanne and Vincent Despiegel and Linda Guiga}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {A Protection against the Extraction of Neural Network Models}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {258--269}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010373302580269}, doi = {10.5220/0010373302580269}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/ChabanneDG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CholterES21, author = {William La Cholter and Matthew Elder and Antonius Stalick}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Windows Malware Binaries in {C/C++} GitHub Repositories: Prevalence and Lessons Learned}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {475--484}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010237904750484}, doi = {10.5220/0010237904750484}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/CholterES21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DahdahLKLDG21, author = {Christian Dahdah and Coline Van Leeuwen and Ziad Kheil and J{\'{e}}r{\^{o}}me Lacan and Jonathan Detchart and Thibault Gateau}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Enabling Monetization of Depreciating Data on Blockchains}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {500--507}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010252105000507}, doi = {10.5220/0010252105000507}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/DahdahLKLDG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DamT21, author = {Khanh{-}Huu{-}The Dam and Tayssir Touili}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {{MADLIRA:} {A} Tool for Android Malware Detection}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {670--675}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010339506700675}, doi = {10.5220/0010339506700675}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/DamT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DangTS21, author = {Dennis Dang and Fabio Di Troia and Mark Stamp}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Malware Classification using Long Short-term Memory Models}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {743--752}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010378007430752}, doi = {10.5220/0010378007430752}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/DangTS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DaoudaghMSBA21, author = {Said Daoudagh and Eda Marchetti and Vincenzo Savarino and Roberto Di Bernardo and Marco Alessi}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {How to Improve the {GDPR} Compliance through Consent Management and Access Control}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {534--541}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010260205340541}, doi = {10.5220/0010260205340541}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DaoudaghMSBA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DavilaLT21, author = {Carlos Ocanto D{\'{a}}vila and Roc{\'{\i}}o Cabrera Lozoya and Slim Trabelsi}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Sociocultural Influences for Password Definition: An AI-based Study}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {542--549}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010269305420549}, doi = {10.5220/0010269305420549}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/DavilaLT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ErdoganRZZBAOPK21, author = {Gencer Erdogan and Antonio {\'{A}}lvarez Romero and Niccol{\`{o}} Zazzeri and Anze Zitnik and Mariano Basile and Giorgio Aprile and Mafalda Os{\'{o}}rio and Claudia Pani and Ioannis Kechaoglou}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Developing Cyber-risk Centric Courses and Training Material for Cyber Ranges: {A} Systematic Approach}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {702--713}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010393107020713}, doi = {10.5220/0010393107020713}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ErdoganRZZBAOPK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Filiol21, author = {Eric Filiol}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Unconventional Attack against Voting Machines Enlarging the Scope of Cybersecurity Risk Analysis}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {763--770}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010417607630770}, doi = {10.5220/0010417607630770}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Filiol21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FloodCC021, author = {Robert Flood and Sheung Shi Chan and Wei Chen and David Aspinall}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Checking Contact Tracing App Implementations}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {133--144}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010237201330144}, doi = {10.5220/0010237201330144}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FloodCC021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Garg21, author = {Vaibhav Garg}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {A Lemon by Any Other Label}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {558--565}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010295205580565}, doi = {10.5220/0010295205580565}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Garg21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Grosse21, author = {Christine Gro{\ss}e}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Enhanced Information Management in Inter-organisational Planning for Critical Infrastructure Protection: Case and Framework}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {319--330}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010186803190330}, doi = {10.5220/0010186803190330}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Grosse21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GuilleyRQ21, author = {Sylvain Guilley and Michel Le Rolland and Damien Quenson}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Implementing Secure Applications Thanks to an Integrated Secure Element}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {566--571}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010298205660571}, doi = {10.5220/0010298205660571}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/GuilleyRQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HaarB21, author = {Christoph Haar and Erik Buchmann}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Securing Orchestrated Containers with {BSI} Module {SYS.1.6}}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {676--683}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010340406760683}, doi = {10.5220/0010340406760683}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HaarB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HaglMP21, author = {Jakob Hagl and Oliver Mann and Martin Pirker}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Securing the Linux Boot Process: From Start to Finish}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {604--610}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010313906040610}, doi = {10.5220/0010313906040610}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HaglMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HasegawaT21, author = {Hirokazu Hasegawa and Hiroki Takakura}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {A Dynamic Access Control System based on Situations of Users}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {653--660}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010327406530660}, doi = {10.5220/0010327406530660}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HasegawaT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HazhirpasandEN21, author = {Mohammadreza Hazhirpasand and Arash Ale Ebrahim and Oscar Nierstrasz}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Stopping {DNS} Rebinding Attacks in the Browser}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {596--603}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010310705960603}, doi = {10.5220/0010310705960603}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HazhirpasandEN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HnainiRCT21, author = {Hiba Hnaini and Luka Le Roux and Jo{\"{e}}l Champeau and Ciprian Teodorov}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Security Property Modeling}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {694--701}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010388206940701}, doi = {10.5220/0010388206940701}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HnainiRCT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HuangTSS21, author = {Elliu Huang and Fabio Di Troia and Mark Stamp and Preethi Sundaravaradhan}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {A New Dataset for Smartphone Gesture-based Authentication}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {771--780}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010425807710780}, doi = {10.5220/0010425807710780}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HuangTSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HutschenreuterC21, author = {Helmar Hutschenreuter and Salva Daneshgadeh {\c{C}}akmak{\c{c}}i and Christian Maeder and Thomas Kemmerich}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Ontology-based Cybersecurity and Resilience Framework}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {458--466}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010233604580466}, doi = {10.5220/0010233604580466}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HutschenreuterC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/IrvanTK0Y21, author = {Mhd Irvan and Tran Phuong Thao and Ryosuke Kobayashi and Toshiyuki Nakata and Rie Shigetomi Yamaguchi}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Learning from Smartphone Location Data as Anomaly Detection for Behavioral Authentication through Deep Neuroevolution}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {723--728}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010395407230728}, doi = {10.5220/0010395407230728}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/IrvanTK0Y21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/JacobQL21, author = {Stephen Jacob and Yuansong Qiao and Brian Lee}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Detecting Cyber Security Attacks against a Microservices Application using Distributed Tracing}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {588--595}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010308905880595}, doi = {10.5220/0010308905880595}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/JacobQL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/JurecekJL21, author = {Martin Jurecek and Olha Jureckov{\'{a}} and R{\'{o}}bert L{\'{o}}rencz}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Improving Classification of Malware Families using Learning a Distance Metric}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {643--652}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010326306430652}, doi = {10.5220/0010326306430652}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/JurecekJL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/JurecekK21, author = {Martin Jurecek and Matous Koz{\'{a}}k}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Representation of {PE} Files using {LSTM} Networks}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {516--525}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010257105160525}, doi = {10.5220/0010257105160525}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/JurecekK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KadenaNR21, author = {Esmeralda Kadena and Huu Phuoc Dai Nguyen and Lourdes Ruiz}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Mobile Robots: An Overview of Data and Security}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {291--299}, publisher = {{SCITEPRESS}}, year = {2021}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KadenaNR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KaleTS21, author = {Aparna Sunil Kale and Fabio Di Troia and Mark Stamp}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Malware Classification with Word Embedding Features}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {733--742}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010377907330742}, doi = {10.5220/0010377907330742}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KaleTS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KallT21, author = {Sabrina Kall and Slim Trabelsi}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {An Asynchronous Federated Learning Approach for a Security Source Code Scanner}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {572--579}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010300305720579}, doi = {10.5220/0010300305720579}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KallT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KamalI21, author = {Ahmad Akmal Aminuddin Mohd Kamal and Keiichi Iwamura}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Improvement of Secure Multi-Party Multiplication of (k, n) Threshold Secret Sharing Using Only {N} = k Servers}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {77--88}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010206400770088}, doi = {10.5220/0010206400770088}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KamalI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KiperbergZ21, author = {Michael Kiperberg and Nezer J. Zaidenberg}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {HyperPass: Secure Password Input Platform}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {580--587}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010301905800587}, doi = {10.5220/0010301905800587}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KiperbergZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KlaudelR21, author = {Witold Klaudel and Artur Rataj}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Towards a Formalisation of Expert's Knowledge for an Automatic Construction of a Vulnerability Model of a Cyberphysical System}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {391--398}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010207003910398}, doi = {10.5220/0010207003910398}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KlaudelR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KokesML21, author = {Josef Kokes and Jonatan Matejka and R{\'{o}}bert L{\'{o}}rencz}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Automatic Detection and Decryption of {AES} by Monitoring S-Box Access}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {172--180}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010255201720180}, doi = {10.5220/0010255201720180}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KokesML21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KotlabaBL21, author = {Luk{\'{a}}s Kotlaba and Simona Buchoveck{\'{a}} and R{\'{o}}bert L{\'{o}}rencz}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Active Directory Kerberoasting Attack: Detection using Machine Learning Techniques}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {376--383}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010202803760383}, doi = {10.5220/0010202803760383}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KotlabaBL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KushnirFREZ21, author = {Malte Kushnir and Olivier Favre and Marc Rennhard and Damiano Esposito and Valentin Zahnd}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Automated Black Box Detection of {HTTP} {GET} Request-based Access Control Vulnerabilities in Web Applications}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {204--216}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010300102040216}, doi = {10.5220/0010300102040216}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KushnirFREZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LouniciRNTO21, author = {Sofiane Lounici and Marco Rosa and Carlo Maria Negri and Slim Trabelsi and Melek {\"{O}}nen}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Optimizing Leak Detection in Open-source Platforms with Machine Learning Techniques}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {145--159}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010238101450159}, doi = {10.5220/0010238101450159}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/LouniciRNTO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Maffei21, author = {Matteo Maffei}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Practical and Provably Sound Static Analysis of Ethereum Smart Contracts}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {7}, publisher = {{SCITEPRESS}}, year = {2021}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Maffei21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MandalM21, author = {Debashis Mandal and Chandan Mazumdar}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Towards an Ontology for Enterprise Level Information Security Policy Analysis}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {492--499}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010248004920499}, doi = {10.5220/0010248004920499}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/MandalM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MartinyBDJM21, author = {Karsten Martiny and Linda Briesemeister and Grit Denker and Mark F. St. John and Ron Moore}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Protecting Privacy during a Pandemic Outbreak}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {308--318}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010186603080318}, doi = {10.5220/0010186603080318}, timestamp = {Mon, 13 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/MartinyBDJM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/McClaryS21, author = {Jack McClary and Sid Stamm}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Understanding How People Weigh the Costs and Benefits of using Facebook}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {526--533}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010258405260533}, doi = {10.5220/0010258405260533}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/McClaryS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NagashimaII21, author = {Nozomi Nagashima and Masaki Inamura and Keiichi Iwamura}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Implementation of Secondary Available Digital Content Protection Schemes using Identity-based Signatures}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {485--491}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010245504850491}, doi = {10.5220/0010245504850491}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/NagashimaII21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NakataO21, author = {Ryotaro Nakata and Akira Otsuka}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {CyExec*: Automatic Generation of Randomized Cyber Range Scenarios}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {226--236}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010324502260236}, doi = {10.5220/0010324502260236}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/NakataO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NakataO21a, author = {Ryotaro Nakata and Akira Otsuka}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Evaluation of Vulnerability Reproducibility in Container-based Cyber Range}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {635--642}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010324606350642}, doi = {10.5220/0010324606350642}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/NakataO21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NeuschmiedWHSK21, author = {Helmut Neuschmied and Martin Winter and Katharina Hofer{-}Schmitz and Branka Stojanovic and Ulrike Kleb}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Two Stage Anomaly Detection for Network Intrusion Detection}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {450--457}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010233404500457}, doi = {10.5220/0010233404500457}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NeuschmiedWHSK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NguyenTIU21, author = {Hai Ngoc Nguyen and Songpon Teerakanok and Atsuo Inomata and Tetsutaro Uehara}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {The Comparison of Word Embedding Techniques in RNNs for Vulnerability Detection}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {109--120}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010232301090120}, doi = {10.5220/0010232301090120}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NguyenTIU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NguyenTIU21a, author = {Hoang Viet Nguyen and Songpon Teerakanok and Atsuo Inomata and Tetsutaro Uehara}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {The Proposal of Double Agent Architecture using Actor-critic Algorithm for Penetration Testing}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {440--449}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010232504400449}, doi = {10.5220/0010232504400449}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/NguyenTIU21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NiedermaierHFM21, author = {Matthias Niedermaier and Thomas Hanka and Florian Fischer and Dominik Merli}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {A Secure Network Scanner Architecture for Asset Management in Strongly Segmented {ICS} Networks}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {347--355}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010191603470355}, doi = {10.5220/0010191603470355}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/NiedermaierHFM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OlssonT21, author = {Christoffer Olsson and Mohsen Toorani}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {A Permissioned Blockchain-based System for Collaborative Drug Discovery}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {121--132}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010236901210132}, doi = {10.5220/0010236901210132}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/OlssonT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OsliakSMD21, author = {Oleksii Osliak and Andrea Saracino and Fabio Martinelli and Theo Dimitrakos}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Towards Collaborative Cyber Threat Intelligence for Security Management}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {339--346}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010191403390346}, doi = {10.5220/0010191403390346}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/OsliakSMD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OzcelikMBS21, author = {Ilker {\"{O}}z{\c{c}}elik and Sai Medury and Justin T. Broaddus and Anthony Skjellum}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {An Overview of Cryptographic Accumulators}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {661--669}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010337806610669}, doi = {10.5220/0010337806610669}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/OzcelikMBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PachecoS21, author = {Yulexis Pacheco and Weiqing Sun}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Adversarial Machine Learning: {A} Comparative Study on Contemporary Intrusion Detection Datasets}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {160--171}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010253501600171}, doi = {10.5220/0010253501600171}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/PachecoS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PatzerB21, author = {Florian Patzer and J{\"{u}}rgen Beyerer}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Efficient Semantic Representation of Network Access Control Configuration for Ontology-based Security Analysis}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {550--557}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010285305500557}, doi = {10.5220/0010285305500557}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PatzerB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Perrig21, author = {Adrian Perrig}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {New Directions for High-throughput and High-security Communication}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {5}, publisher = {{SCITEPRESS}}, year = {2021}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Perrig21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PhamSSSPH21, author = {Stefanie Pham and Matthias Schopp and Lars Stiemert and Sebastian Seeber and Daniela P{\"{o}}hn and Wolfgang Hommel}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Field Studies on the Impact of Cryptographic Signatures and Encryption on Phishing Emails}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {384--390}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010206003840390}, doi = {10.5220/0010206003840390}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PhamSSSPH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PilipchukHR21, author = {Roman Pilipchuk and Robert Heinrich and Ralf H. Reussner}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Automatically Extracting Business Level Access Control Requirements from {BPMN} Models to Align {RBAC} Policies}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {300--307}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010184403000307}, doi = {10.5220/0010184403000307}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/PilipchukHR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PonsardD21, author = {Christophe Ponsard and Denis Darquennes}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Towards Formal Security Verification of Over-the-Air Update Protocol: Requirements, Survey and UpKit Case Study}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {800--808}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010431408000808}, doi = {10.5220/0010431408000808}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/PonsardD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PretoriusDM21, author = {Morn{\'{e}} Pretorius and Nelisiwe Dlamini and Sthembile Mthethwa}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Towards Academic and Skills Credentialing Standards and Distributed Ledger Technologies}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {249--257}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010340602490257}, doi = {10.5220/0010340602490257}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/PretoriusDM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PuchtaGP21, author = {Alexander Puchta and Sebastian Groll and G{\"{u}}nther Pernul}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Leveraging Dynamic Information for Identity and Access Management: An Extension of Current Enterprise {IAM} Architecture}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {611--618}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010315706110618}, doi = {10.5220/0010315706110618}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/PuchtaGP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Raimondo0021, author = {Mariapia Raimondo and Simona Bernardi and Stefano Marrone}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {On Formalising and Analysing the Tweetchain Protocol}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {781--791}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010427907810791}, doi = {10.5220/0010427907810791}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Raimondo0021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RayHSB21, author = {Aratrika Ray and Daqing Hou and Stephanie Schuckers and Abbie Barbir}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Continuous Authentication based on Hand Micro-movement during Smartphone Form Filling by Seated Human Subjects}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {424--431}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010225804240431}, doi = {10.5220/0010225804240431}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/RayHSB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Renaud21, author = {Karen Renaud}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Accessible Cyber Security: The Next Frontier?}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {9--18}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010419500090018}, doi = {10.5220/0010419500090018}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Renaud21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SchatzRS21, author = {David Schatz and Michael Rossberg and Guenter Schaefer}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Hydra: Practical Metadata Security for Contact Discovery, Messaging, and Dialing}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {191--203}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010262201910203}, doi = {10.5220/0010262201910203}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SchatzRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ShakedR21, author = {Avi Shaked and Yoram Reich}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Model-based Threat and Risk Assessment for Systems Design}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {331--338}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010187203310338}, doi = {10.5220/0010187203310338}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/ShakedR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Sommervoll21, author = {{\AA}vald {\AA}slaugson Sommervoll}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Dreaming of Keys: Introducing the Phantom Gradient Attack}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {619--627}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010317806190627}, doi = {10.5220/0010317806190627}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Sommervoll21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SonntagM21, author = {Michael Sonntag and Ren{\'{e}} Mayrhofer}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Experiences and Recommendations from Operating a Tor Exit Node at a University}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {283--290}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010156802830290}, doi = {10.5220/0010156802830290}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/SonntagM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SvecBH21, author = {Peter Svec and Stefan Balogh and Martin Homola}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Experimental Evaluation of Description Logic Concept Learning Algorithms for Static Malware Detection}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {792--799}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010429707920799}, doi = {10.5220/0010429707920799}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SvecBH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Sy21, author = {Bon Sy}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Linking Biometric Voice Identity with Self-monitoring Health Data as a Temporal-spatial Event Stored in a Mobile Device}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {407--415}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010216104070415}, doi = {10.5220/0010216104070415}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Sy21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/UralA21, author = {{\"{O}}zg{\"{u}}r Ural and Cengiz Acart{\"{u}}rk}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Automatic Detection of Cyber Security Events from Turkish Twitter Stream and Newspaper Data}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {66--76}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010201600660076}, doi = {10.5220/0010201600660076}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/UralA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WagnerHH21, author = {Paul Wagner and Kris Heid and Jens Heider}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Remote WebAuthn: {FIDO2} Authentication for Less Accessible Devices}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {368--375}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010192703680375}, doi = {10.5220/0010192703680375}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/WagnerHH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WahabHSB21, author = {Ahmed Anu Wahab and Daqing Hou and Stephanie Schuckers and Abbie Barbir}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Utilizing Keystroke Dynamics as Additional Security Measure to Protect Account Recovery Mechanism}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {33--42}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010191200330042}, doi = {10.5220/0010191200330042}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WahabHSB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WuZYLZGLH21, author = {Yixiong Wu and Jianwei Zhuge and Tingting Yin and Tianyi Li and Junmin Zhu and Guannan Guo and Yue Liu and Jianju Hu}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {From Exposed to Exploited: Drawing the Picture of Industrial Control Systems Security Status in the Internet Age}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {237--248}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010327902370248}, doi = {10.5220/0010327902370248}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/WuZYLZGLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ZhaoBS21, author = {Jing Zhao and Samanvitha Basole and Mark Stamp}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Malware Classification with {GMM-HMM} Models}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {753--762}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010409907530762}, doi = {10.5220/0010409907530762}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/ZhaoBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2021, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, publisher = {{SCITEPRESS}}, year = {2021}, isbn = {978-989-758-491-6}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/0002MMTJK20, author = {Masahiro Ishii and Satoshi Matsuura and Kento Mori and Masahiko Tomoishi and Yong Jin and Yoshiaki Kitaguchi}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {A Study of Classification of Texts into Categories of Cybersecurity Incident and Attack with Topic Models}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {639--646}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009099606390646}, doi = {10.5220/0009099606390646}, timestamp = {Tue, 14 Apr 2020 10:48:30 +0200}, biburl = {https://dblp.org/rec/conf/icissp/0002MMTJK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AkerlundG20, author = {Agnes {\AA}kerlund and Christine Gro{\ss}e}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Integration of Data Envelopment Analysis in Business Process Models: {A} Novel Approach to Measure Information Security}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {281--288}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008875802810288}, doi = {10.5220/0008875802810288}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AkerlundG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlmeidaV020, author = {Rafael Almeida and Pedro Vieira{-}Marques and Ana Ferreira}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Patients to Mobilize Their Data: Secure and Flexible mHealth Delegation}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {552--560}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008972905520560}, doi = {10.5220/0008972905520560}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlmeidaV020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AnagrehVL20, author = {Mohammad Anagreh and Eero Vainikko and Peeter Laud}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Speeding Up the Computation of Elliptic Curve Scalar Multiplication based on {CRT} and {DRM}}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {176--184}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009129501760184}, doi = {10.5220/0009129501760184}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/AnagrehVL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AriefPCH20, author = {Budi Arief and Andy Periam and Or{\c{c}}un {\c{C}}etin and Julio C. Hernandez{-}Castro}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Using Eyetracker to Find Ways to Mitigate Ransomware}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {448--456}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008956004480456}, doi = {10.5220/0008956004480456}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/AriefPCH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Barni20, author = {Mauro Barni}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Backdooring Deep Learning Architectures: Threats and (some) Opportunities}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {15--16}, publisher = {{SCITEPRESS}}, year = {2020}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Barni20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BernardeschiDPR20, author = {Cinzia Bernardeschi and Gianluca Dini and Maurizio Palmieri and Francesco Racciatti}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Analysis of Security Attacks in Wireless Sensor Networks: From {UPPAAL} to Castalia}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {815--824}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009380508150824}, doi = {10.5220/0009380508150824}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BernardeschiDPR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BoudguigaSSC20, author = {Aymen Boudguiga and Oana Stan and Hichem Sedjelmaci and Sergiu Carpov}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Homomorphic Encryption at Work for Private Analysis of Security Logs}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {515--523}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008969205150523}, doi = {10.5220/0008969205150523}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BoudguigaSSC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BowditchABPH20, author = {William Bowditch and Will Abramson and William J. Buchanan and Nikolaos Pitropakis and Adam J. Hall}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Privacy-preserving Surveillance Methods using Homomorphic Encryption}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {240--248}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008864902400248}, doi = {10.5220/0008864902400248}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BowditchABPH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BracamonteHTK20, author = {Vanessa Bracamonte and Seira Hidano and Welderufael B. Tesfay and Shinsaku Kiyomoto}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Evaluating the Effect of Justification and Confidence Information on User Perception of a Privacy Policy Summarization Tool}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {142--151}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008986101420151}, doi = {10.5220/0008986101420151}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BracamonteHTK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BracamonteHTK20a, author = {Vanessa Bracamonte and Seira Hidano and Welderufael B. Tesfay and Shinsaku Kiyomoto}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Effects of Explanatory Information on Privacy Policy Summarization Tool Perception}, booktitle = {Information Systems Security and Privacy - 6th International Conference, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1545}, pages = {156--177}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-94900-6\_8}, doi = {10.1007/978-3-030-94900-6\_8}, timestamp = {Mon, 21 Mar 2022 16:15:19 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BracamonteHTK20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BraccialeLRN020, author = {Lorenzo Bracciale and Pierpaolo Loreti and Emanuele Raso and Maurizio Naldi and Giuseppe Bianchi}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {CoProtect: Collaborative Management of Cryptographic Keys for Data Security in Cloud Systems}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {361--368}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008921603610368}, doi = {10.5220/0008921603610368}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BraccialeLRN020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BromanderSESB20, author = {Siri Bromander and Morton Swimmer and Martin Eian and Geir Skjotskift and Fredrik Borg}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Modeling Cyber Threat Intelligence}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {273--280}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008875302730280}, doi = {10.5220/0008875302730280}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BromanderSESB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BrunnerKUE20, author = {Clemens Brunner and Fabian Knirsch and Andreas Unterweger and Dominik Engel}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {A Comparison of Blockchain-based {PKI} Implementations}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {333--340}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008914503330340}, doi = {10.5220/0008914503330340}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BrunnerKUE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BuchoveckaLBK20, author = {Simona Buchoveck{\'{a}} and R{\'{o}}bert L{\'{o}}rencz and Jir{\'{\i}} Bucek and Filip Kod{\'{y}}tek}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Lightweight Authentication and Secure Communication Suitable for IoT Devices}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {75--83}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008959600750083}, doi = {10.5220/0008959600750083}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BuchoveckaLBK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BuchoveckaLBK20a, author = {Simona Buchoveck{\'{a}} and R{\'{o}}bert L{\'{o}}rencz and Jir{\'{\i}} Bucek and Filip Kod{\'{y}}tek}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Symmetric and Asymmetric Schemes for Lightweight Secure Communication}, booktitle = {Information Systems Security and Privacy - 6th International Conference, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1545}, pages = {97--114}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-94900-6\_5}, doi = {10.1007/978-3-030-94900-6\_5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BuchoveckaLBK20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ButunLS20, author = {Ismail Butun and Alexios Lekidis and Daniel Ricardo dos Santos}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Security and Privacy in Smart Grids: Challenges, Current Solutions and Future Opportunities}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {733--741}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009187307330741}, doi = {10.5220/0009187307330741}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ButunLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ChristouPPMB20, author = {Orestis Christou and Nikolaos Pitropakis and Pavlos Papadopoulos and Sean McKeown and William J. Buchanan}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Phishing {URL} Detection Through Top-level Domain Analysis: {A} Descriptive Approach}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {289--298}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008902202890298}, doi = {10.5220/0008902202890298}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ChristouPPMB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ChuL20, author = {Ge Chu and Alexei Lisitsa}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Ontology-based Automation of Penetration Testing}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {713--720}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009171007130720}, doi = {10.5220/0009171007130720}, timestamp = {Fri, 03 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ChuL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CiobanuFMMS20, author = {Madalina G. Ciobanu and Fausto Fasano and Fabio Martinelli and Francesco Mercaldo and Antonella Santone}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Accidental Sensitive Data Leaks Prevention via Formal Verification}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {825--834}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009380608250834}, doi = {10.5220/0009380608250834}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CiobanuFMMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ColomboV20, author = {Christian Colombo and Mark Vella}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {765--774}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008851507650774}, doi = {10.5220/0008851507650774}, timestamp = {Sat, 12 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ColomboV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DanielsB20, author = {Jesse Daniels and Sajal Bhatia}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Legislation and the Negative Impact on Cybersecurity in Healthcare}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {691--697}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009157906910697}, doi = {10.5220/0009157906910697}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DanielsB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DaoudaghLM20, author = {Said Daoudagh and Francesca Lonetti and Eda Marchetti}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Assessing Testing Strategies for Access Control Systems: {A} Controlled Experiment}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {107--118}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008974201070118}, doi = {10.5220/0008974201070118}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DaoudaghLM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DebarBT20, author = {Herv{\'{e}} Debar and Razvan Beuran and Yasuo Tan}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {A Quantitative Study of Vulnerabilities in the Internet of Medical Things}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {164--175}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009105801640175}, doi = {10.5220/0009105801640175}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DebarBT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DelongDF20, author = {Maxence Delong and Baptiste David and Eric Filiol}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Detection of Crawler Traps: Formalization and Implementation Defeating Protection on Internet and on the {TOR} Network}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {775--783}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009367207750783}, doi = {10.5220/0009367207750783}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DelongDF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DiopLLT20, author = {A{\"{\i}}da Diop and Maryline Laurent and Jean Leneutre and Jacques Traor{\'{e}}}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {CoRA: {A} Scalable Collective Remote Attestation Protocol for Sensor Networks}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {84--95}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008962700840095}, doi = {10.5220/0008962700840095}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DiopLLT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FacchiniGSD20, author = {Simone Facchini and Giacomo Giorgi and Andrea Saracino and Gianluca Dini}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Multi-level Distributed Intrusion Detection System for an IoT based Smart Home Environment}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {705--712}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009170807050712}, doi = {10.5220/0009170807050712}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FacchiniGSD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FasanoMMS20, author = {Fausto Fasano and Fabio Martinelli and Francesco Mercaldo and Antonella Santone}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Android Run-time Permission Exploitation User Awareness by Means of Formal Methods}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {804--814}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009372308040814}, doi = {10.5220/0009372308040814}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FasanoMMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FilhoG20, author = {Eduardo Magalh{\~{a}}es De Lacerda Filho and Vin{\'{\i}}cius P. Gon{\c{c}}alves}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Achieving Privacy, Security, and Interoperability among Biometric Networks using Symmetric Encryption}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {481--489}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008961504810489}, doi = {10.5220/0008961504810489}, timestamp = {Tue, 25 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FilhoG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FujiiII20, author = {Wataru Fujii and Keiichi Iwamura and Masaki Inamura}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Secure Comparison and Interval Test Protocols based on Three-party {MPC}}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {698--704}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009161406980704}, doi = {10.5220/0009161406980704}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FujiiII20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GencL20, author = {Ziya Alper Gen{\c{c}} and Gabriele Lenzini}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Dual-use Research in Ransomware Attacks: {A} Discussion on Ransomware Defence Intelligence}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {585--592}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009000505850592}, doi = {10.5220/0009000505850592}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GencL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GiorgiSM20, author = {Giacomo Giorgi and Andrea Saracino and Fabio Martinelli}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Email Spoofing Attack Detection through an End to End Authorship Attribution System}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {64--74}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008954600640074}, doi = {10.5220/0008954600640074}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GiorgiSM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GiorgiSM20a, author = {Giacomo Giorgi and Andrea Saracino and Fabio Martinelli}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {End to End Autorship Email Verification Framework for a Secure Communication}, booktitle = {Information Systems Security and Privacy - 6th International Conference, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1545}, pages = {73--96}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-94900-6\_4}, doi = {10.1007/978-3-030-94900-6\_4}, timestamp = {Mon, 21 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/GiorgiSM20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Gladychev20, author = {Nikolai Gladychev}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Computer Viruses: The Abstract Theory Revisited}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {406--414}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008942704060414}, doi = {10.5220/0008942704060414}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Gladychev20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GuarinoMZCR20, author = {Alfonso Guarino and Delfina Malandrino and Rocco Zaccagnino and Federico Cozza and Antonio Rapuano}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {On Analyzing Third-party Tracking via Machine Learning}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {532--539}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008972005320539}, doi = {10.5220/0008972005320539}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GuarinoMZCR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Guerra-Manzanares20, author = {Alejandro Guerra{-}Manzanares and Jorge Medina{-}Galindo and Hayretdin Bahsi and Sven N{\~{o}}mm}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {MedBIoT: Generation of an IoT Botnet Dataset in a Medium-sized IoT Network}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {207--218}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009187802070218}, doi = {10.5220/0009187802070218}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Guerra-Manzanares20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Guerra-Manzanares20a, author = {Alejandro Guerra{-}Manzanares and Jorge Medina{-}Galindo and Hayretdin Bahsi and Sven N{\~{o}}mm}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Using MedBIoT Dataset to Build Effective Machine Learning-Based IoT Botnet Detection Systems}, booktitle = {Information Systems Security and Privacy - 6th International Conference, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1545}, pages = {222--243}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-94900-6\_11}, doi = {10.1007/978-3-030-94900-6\_11}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Guerra-Manzanares20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GuigaR20, author = {Linda Guiga and A. W. Roscoe}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Neural Network Security: Hiding {CNN} Parameters with Guided Grad-CAM}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {611--618}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009061206110618}, doi = {10.5220/0009061206110618}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GuigaR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GunduM20, author = {Tapiwa Gundu and Nthabiseng Modiba}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Building Competitive Advantage from Ubuntu: An African Information Security Awareness Model}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {569--576}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008983305690576}, doi = {10.5220/0008983305690576}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GunduM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GunnarssonG20, author = {Martin Gunnarsson and Christian Gehrmann}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Secure Ownership Transfer for the Internet of Things}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {33--44}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008928300330044}, doi = {10.5220/0008928300330044}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GunnarssonG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GunnarssonG20a, author = {Martin Gunnarsson and Christian Gehrmann}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Secure Ownership Transfer for Resource Constrained IoT Infrastructures}, booktitle = {Information Systems Security and Privacy - 6th International Conference, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1545}, pages = {22--47}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-94900-6\_2}, doi = {10.1007/978-3-030-94900-6\_2}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GunnarssonG20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HavurSK20, author = {Giray Havur and Miel Vander Sande and Sabrina Kirrane}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Greater Control and Transparency in Personal Data Processing}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {655--662}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009143206550662}, doi = {10.5220/0009143206550662}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HavurSK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HegartyH20, author = {Robert Hegarty and John Haggerty}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Presence Metadata in the Internet of Things: Challenges and Opportunities}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {631--638}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009094106310638}, doi = {10.5220/0009094106310638}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HegartyH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HeidingOWL20, author = {Fredrik Heiding and Mohammad{-}Ali Omer and Andreas Wallstr{\"{o}}m and Robert Lagerstr{\"{o}}m}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Securing IoT Devices using Geographic and Continuous Login Blocking: {A} Honeypot Study}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {424--431}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008954704240431}, doi = {10.5220/0008954704240431}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HeidingOWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HidanoK20, author = {Seira Hidano and Shinsaku Kiyomoto}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Recommender Systems Robust to Data Poisoning using Trim Learning}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {721--724}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009180407210724}, doi = {10.5220/0009180407210724}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HidanoK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HosseinzadehEJ20, author = {Arghavan Hosseinzadeh and Andreas Eitel and Christian Jung}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {A Systematic Approach toward Extracting Technically Enforceable Policies from Data Usage Control Requirements}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {397--405}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008936003970405}, doi = {10.5220/0008936003970405}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HosseinzadehEJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HuttelS20, author = {Hans H{\"{u}}ttel and Vilim Staroveski}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Secrecy and Authenticity Properties of the Lightning Network Protocol}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {119--130}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008974801190130}, doi = {10.5220/0008974801190130}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HuttelS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HuttelS20a, author = {Hans H{\"{u}}ttel and Vilim Staroveski}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Key Agreement in the Lightning Network Protocol}, booktitle = {Information Systems Security and Privacy - 6th International Conference, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1545}, pages = {139--155}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-94900-6\_7}, doi = {10.1007/978-3-030-94900-6\_7}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HuttelS20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/JasserK20, author = {Stefanie Jasser and Jonas Kelbert}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {An Approach to Secure Legacy Software Systems}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {299--309}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008902802990309}, doi = {10.5220/0008902802990309}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/JasserK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Jost020, author = {David Jost and Mathias Fischer}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Accountant: Protection of Data Integrity and Identification of Malicious Nodes in In-network Data Processing}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {561--568}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008974405610568}, doi = {10.5220/0008974405610568}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Jost020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/JurecekL20, author = {Martin Jurecek and R{\'{o}}bert L{\'{o}}rencz}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Distance Metric Learning using Particle Swarm Optimization to Improve Static Malware Detection}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {725--732}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009180807250732}, doi = {10.5220/0009180807250732}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/JurecekL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Katsikas20, author = {Sokratis K. Katsikas}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Leveraging Blockchain Technology to Enhance Security and Privacy in the Internet of Things}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {5}, publisher = {{SCITEPRESS}}, year = {2020}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Katsikas20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Kneuper20, author = {Ralf Kneuper}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Translating Data Protection into Software Requirements}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {257--264}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008873902570264}, doi = {10.5220/0008873902570264}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Kneuper20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KnirschUUE20, author = {Fabian Knirsch and Andreas Unterweger and Maximilian Unterrainer and Dominik Engel}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Comparison of the Paillier and ElGamal Cryptosystems for Smart Grid Aggregation Protocols}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {232--239}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008770902320239}, doi = {10.5220/0008770902320239}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KnirschUUE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KotlabaBL20, author = {Luk{\'{a}}s Kotlaba and Simona Buchoveck{\'{a}} and R{\'{o}}bert L{\'{o}}rencz}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Active Directory Kerberoasting Attack: Monitoring and Detection Techniques}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {432--439}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008955004320439}, doi = {10.5220/0008955004320439}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KotlabaBL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KrasnowskiLM20, author = {Piotr Krasnowski and J{\'{e}}r{\^{o}}me Lebrun and Bruno Martin}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Introducing a Verified Authenticated Key Exchange Protocol over Voice Channels for Secure Voice Communication}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {683--690}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009156506830690}, doi = {10.5220/0009156506830690}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KrasnowskiLM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LagerstromXE20, author = {Robert Lagerstr{\"{o}}m and Wenjun Xiong and Mathias Ekstedt}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Threat Modeling and Attack Simulations of Smart Cities: {A} Literature Review and Explorative Study}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {369--376}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008921903690376}, doi = {10.5220/0008921903690376}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LagerstromXE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LandauerSWHR20, author = {Max Landauer and Florian Skopik and Markus Wurzenberger and Wolfgang Hotwagner and Andreas Rauber}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Visualizing Syscalls using Self-organizing Maps for System Intrusion Detection}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {349--360}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008918703490360}, doi = {10.5220/0008918703490360}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LandauerSWHR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LathouwersEH20, author = {Sophie Lathouwers and Maarten H. Everts and Marieke Huisman}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Verifying Sanitizer Correctness through Black-Box Learning: {A} Symbolic Finite Transducer Approach}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {784--795}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009371207840795}, doi = {10.5220/0009371207840795}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LathouwersEH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LefonsPT20, author = {Ezio Lefons and Sebastiano Pizzutilo and Filippo Tangorra}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Host Fingerprinting for Web Servers Authentication}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {45--51}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008942500450051}, doi = {10.5220/0008942500450051}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LefonsPT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LinFS20, author = {Hsiao{-}Ying Lin and Chengfang Fang and Jie Shi}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Bident Structure for Neural Network Model Protection}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {377--384}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008923403770384}, doi = {10.5220/0008923403770384}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LinFS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LindenhoferOP20, author = {Julian Lindenhofer and Rene Offenthaler and Martin Pirker}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {A Curious Exploration of Malicious {PDF} Documents}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {577--584}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008992305770584}, doi = {10.5220/0008992305770584}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LindenhoferOP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ListikSH20, author = {V{\'{\i}}t List{\'{\i}}k and Jan Sediv{\'{y}} and V{\'{a}}clav Hlav{\'{a}}c}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Email Image Spam Classification based on ResNet Convolutional Neural Network}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {457--464}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008956704570464}, doi = {10.5220/0008956704570464}, timestamp = {Wed, 24 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/ListikSH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MaghrebiA20, author = {Houssem Maghrebi and Davide Alessio}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Revisiting Higher-order Computational Attacks against White-box Implementations}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {265--272}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008874602650272}, doi = {10.5220/0008874602650272}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MaghrebiA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MalderleBMW020, author = {Timo Malderle and Felix Boes and Gina Muuss and Matthias W{\"{u}}bbeling and Michael Meier}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Credential Intelligence Agency: {A} Threat Intelligence Approach to Mitigate Identity Theft}, booktitle = {Information Systems Security and Privacy - 6th International Conference, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1545}, pages = {115--138}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-94900-6\_6}, doi = {10.1007/978-3-030-94900-6\_6}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MalderleBMW020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MalderleKLW020, author = {Timo Malderle and Sven Knauer and Martin Lang and Matthias W{\"{u}}bbeling and Michael Meier}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Track Down Identity Leaks using Threat Intelligence}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {96--106}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008963000960106}, doi = {10.5220/0008963000960106}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MalderleKLW020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MartinelliMRS20, author = {Fabio Martinelli and Francesco Mercaldo and Domenico Raucci and Antonella Santone}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Bank Credit Risk Management based on Data Mining Techniques}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {837--843}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009371808370843}, doi = {10.5220/0009371808370843}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MartinelliMRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MauriCD20, author = {Lara Mauri and Stelvio Cimato and Ernesto Damiani}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {A Formal Approach for the Analysis of the {XRP} Ledger Consensus Protocol}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {52--63}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008954200520063}, doi = {10.5220/0008954200520063}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MauriCD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MauriCD20a, author = {Lara Mauri and Stelvio Cimato and Ernesto Damiani}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Untangling the {XRP} Ledger: Insights and Analysis}, booktitle = {Information Systems Security and Privacy - 6th International Conference, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1545}, pages = {48--72}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-94900-6\_3}, doi = {10.1007/978-3-030-94900-6\_3}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MauriCD20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MendsaikhanHYS20, author = {Otgonpurev Mendsaikhan and Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Quantifying the Significance of Cybersecurity Text through Semantic Similarity and Named Entity Recognition}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {325--332}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008913003250332}, doi = {10.5220/0008913003250332}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/MendsaikhanHYS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MoubarakF20, author = {Joanna Moubarak and Tony Feghali}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Comparing Machine Learning Techniques for Malware Detection}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {844--851}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009373708440851}, doi = {10.5220/0009373708440851}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MoubarakF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MoubarakFC20, author = {Joanna Moubarak and Eric Filiol and Maroun Chamoun}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {The Blockchain Potential in Computer Virology}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {796--803}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009371607960803}, doi = {10.5220/0009371607960803}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MoubarakFC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NisslmuellerF0D20, author = {Utz Nisslmueller and Klaus{-}Tycho Foerster and Stefan Schmid and Christian Decker}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Toward Active and Passive Confidentiality Attacks on Cryptocurrency Off-chain Networks}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {7--14}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009429200070014}, doi = {10.5220/0009429200070014}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NisslmuellerF0D20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NisslmuellerF0D20a, author = {Utz Nisslmueller and Klaus{-}Tycho Foerster and Stefan Schmid and Christian Decker}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Inferring Sensitive Information in Cryptocurrency Off-Chain Networks Using Probing and Timing Attacks}, booktitle = {Information Systems Security and Privacy - 6th International Conference, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1545}, pages = {1--21}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-94900-6\_1}, doi = {10.1007/978-3-030-94900-6\_1}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NisslmuellerF0D20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NitschkeRHK20, author = {Mirja Nitschke and Christian Roth and Christian Hoyer and Dogan Kesdogan}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Harmonized Group Mix for {ITS}}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {152--163}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008989101520163}, doi = {10.5220/0008989101520163}, timestamp = {Fri, 01 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NitschkeRHK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NitschkeRHK20a, author = {Mirja Nitschke and Christian Roth and Christian Hoyer and Dogan Kesdogan}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Harmonic Group Mix: {A} Framework for Anonymous and Authenticated Broadcast Messages in Vehicle-to-Vehicle Environments}, booktitle = {Information Systems Security and Privacy - 6th International Conference, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1545}, pages = {178--200}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-94900-6\_9}, doi = {10.1007/978-3-030-94900-6\_9}, timestamp = {Fri, 01 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NitschkeRHK20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NyblomWKO20, author = {Philip Nyblom and Gaute Wangen and Mazaher Kianpour and Grethe {\O}stby}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {The Root Causes of Compromised Accounts at the University}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {540--551}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008972305400551}, doi = {10.5220/0008972305400551}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NyblomWKO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OrenderMZ20, author = {Jason Orender and Ravi Mukkamala and Mohammad Zubair}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Is Ethereum's ProgPoW {ASIC} Resistant?}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {310--316}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008909203100316}, doi = {10.5220/0008909203100316}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/OrenderMZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OstbyK20, author = {Grethe {\O}stby and Basel Katt}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Maturity Modelling to Prepare for Cyber Crisis Escalation and Management}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {249--256}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008871602490256}, doi = {10.5220/0008871602490256}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/OstbyK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OtungM20, author = {Andikan Otung and Andrew P. Martin}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Distributed Defence of Service (DiDoS): {A} Network-layer Reputation-based DDoS Mitigation Architecture}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {619--630}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009091206190630}, doi = {10.5220/0009091206190630}, timestamp = {Thu, 29 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/OtungM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PabloAI20, author = {{\'{A}}lvaro de Pablo and Oscar Araque and Carlos Angel Iglesias}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Radical Text Detection based on Stylometry}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {524--531}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008971205240531}, doi = {10.5220/0008971205240531}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PabloAI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PfrangMFB20, author = {Steffen Pfrang and David Meier and Andreas Fleig and J{\"{u}}rgen Beyerer}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {A Meta Model for a Comprehensive Description of Network Protocols Improving Security Tests}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {671--682}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009150206710682}, doi = {10.5220/0009150206710682}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PfrangMFB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PlessingO20, author = {Paul Plessing and Olamide Omolola}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Revisiting Privacy-aware Blockchain Public Key Infrastructure}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {415--423}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008947104150423}, doi = {10.5220/0008947104150423}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PlessingO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PonsardGP20, author = {Christophe Ponsard and Jeremy Grandclaudon and Nicolas Point}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Methodology and Feedback about Systematic Cybersecurity Experts Auditing in Belgium}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {754--759}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009190307540759}, doi = {10.5220/0009190307540759}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PonsardGP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/QbeahAM20, author = {Mohammad Qbea'h and Saed Alrabaee and Djedjiga Mouheb}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {An Analytical Scanning Technique to Detect and Prevent the Transformed {SQL} Injection and {XSS} Attacks}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {603--610}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009004006030610}, doi = {10.5220/0009004006030610}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/QbeahAM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SbaiDD20, author = {Anass Sbai and Cyril Drocourt and Gilles Dequen}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {{CCA} Secure Unidirectional {PRE} with Key Pair in the Standard Model without Pairings}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {440--447}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008955704400447}, doi = {10.5220/0008955704400447}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SbaiDD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ScholnastTK20, author = {Hubert Sch{\"{o}}lnast and Paul Tavolato and Philipp Kreimel}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Anomaly Detection in Communication Networks of Cyber-physical Systems using Cross-over Data Compression}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {498--505}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008964104980505}, doi = {10.5220/0008964104980505}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ScholnastTK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SnymanK20, author = {Dirk Snyman and Hennie A. Kruger}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {External Contextual Factors in Information Security Behaviour}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {185--194}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009142201850194}, doi = {10.5220/0009142201850194}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SnymanK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SnymanK20a, author = {Dirk Snyman and Hennie A. Kruger}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Contextual Factors in Information Security Group Behaviour: {A} Comparison of Two Studies}, booktitle = {Information Systems Security and Privacy - 6th International Conference, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1545}, pages = {201--221}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-94900-6\_10}, doi = {10.1007/978-3-030-94900-6\_10}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SnymanK20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/StachGW0M20, author = {Christoph Stach and Corinna Giebler and Manuela Wagner and Christian Weber and Bernhard Mitschang}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {{AMNESIA:} {A} Technical Solution towards GDPR-compliant Machine Learning}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {21--32}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008916700210032}, doi = {10.5220/0008916700210032}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/StachGW0M20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SultanJ20, author = {Shizra Sultan and Christian Damsgaard Jensen}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Privacy-preserving Measures in Smart City Video Surveillance Systems}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {506--514}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008964205060514}, doi = {10.5220/0008964205060514}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/SultanJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SunDGCGRMTAL20, author = {Tithnara Nicolas Sun and Bastien Drouot and Fahad Rafique Golra and Jo{\"{e}}l Champeau and Sylvain Gu{\'{e}}rin and Luka Le Roux and Ra{\'{u}}l Mazo and Ciprian Teodorov and Lionel Van Aertryck and Bernard L'Hostis}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {A Domain-specific Modeling Framework for Attack Surface Modeling}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {341--348}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008916203410348}, doi = {10.5220/0008916203410348}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SunDGCGRMTAL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SundstromLPP20, author = {Andrew Sundstrom and Damas W. Limoge and Vadim Pinskiy and Matthew Putman}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Securing Industrial Production from Sophisticated Cyberattacks}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {663--670}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009148206630670}, doi = {10.5220/0009148206630670}, timestamp = {Wed, 05 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SundstromLPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SymeonidisL20, author = {Iraklis Symeonidis and Gabriele Lenzini}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Systematization of Threats and Requirements for Private Messaging with Untrusted Servers: The Case of e-Mailing and Instant Messaging}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {593--602}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009003805930602}, doi = {10.5220/0009003805930602}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SymeonidisL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TantikulN20, author = {Phitchayaphong Tantikul and Sudsanguan Ngamsuriyaroj}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Exploring Vulnerabilities in Solidity Smart Contract}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {317--324}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008909803170324}, doi = {10.5220/0008909803170324}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TantikulN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TeradoH20, author = {Ryosuke Terado and Morihiro Hayashida}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Improving Accuracy and Speed of Network-based Intrusion Detection using Gradient Boosting Trees}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {490--497}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008963504900497}, doi = {10.5220/0008963504900497}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TeradoH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ThompsonE20, author = {Andreas Thompson and Gencer Erdogan}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Tool Support for Risk-driven Planning of Trustworthy Smart IoT Systems within DevOps}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {742--753}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009189307420753}, doi = {10.5220/0009189307420753}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ThompsonE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Tochikubo20, author = {Kouya Tochikubo}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {New General Secret Sharing Scheme using Hierarchical Threshold Scheme: Improvement of Information Rates for Specified Participants}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {647--654}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009103506470654}, doi = {10.5220/0009103506470654}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Tochikubo20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/UwizeyemunguP20, author = {Sylvestre Uwizeyemungu and Placide Poba{-}Nzaou}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Privacy with Health Information Technologies: What Story Do Data Breaches in {US} Tell Us?}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {131--141}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008977301310141}, doi = {10.5220/0008977301310141}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/UwizeyemunguP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WirtzH20, author = {Roman Wirtz and Maritta Heisel}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Risk Identification: From Requirements to Threat Models}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {385--396}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008935803850396}, doi = {10.5220/0008935803850396}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WirtzH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WodoS20, author = {Wojciech Wodo and Damian Stygar}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Security of Digital Banking Systems in Poland: Users Study 2019}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {221--231}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008555202210231}, doi = {10.5220/0008555202210231}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WodoS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/XuZ20, author = {Shuaijianni Xu and Liang Feng Zhang}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {A Homomorphic Proxy Re-authenticators based Efficient Multi-client Non-interactive Verifiable Computation Scheme}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {195--206}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009158101950206}, doi = {10.5220/0009158101950206}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/XuZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ZhouHKI20, author = {Jiaxing Zhou and Miyuki Hirose and Yoshio Kakizaki and Atsuo Inomata}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Evaluation to Classify Ransomware Variants based on Correlations between APIs}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {465--472}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008959904650472}, doi = {10.5220/0008959904650472}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ZhouHKI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ZinsmaierLW20, author = {Sandra Domenique Zinsmaier and Hanno Langweg and Marcel Waldvogel}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {A Practical Approach to Stakeholder-driven Determination of Security Requirements based on the {GDPR} and Common Criteria}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {473--480}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008960604730480}, doi = {10.5220/0008960604730480}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ZinsmaierLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2019s, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1221}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-49443-8}, doi = {10.1007/978-3-030-49443-8}, isbn = {978-3-030-49442-1}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2019s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2020, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, publisher = {{SCITEPRESS}}, year = {2020}, isbn = {978-989-758-399-5}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/0001MFKT19, author = {Partha Sarathi Roy and Kirill Morozov and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Security Analysis and Efficient Implementation of Code-based Signature Schemes}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {213--220}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007259102130220}, doi = {10.5220/0007259102130220}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/0001MFKT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/0002F19, author = {Carlos Moreno and Sebastian Fischmeister}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Sender Authentication for Automotive In-Vehicle Networks through Dual Analog Measurements to Determine the Location of the Transmitter}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {596--605}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007580105960605}, doi = {10.5220/0007580105960605}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/0002F19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/0006EVRDM19, author = {Gaurav Sharma and Soultana Ellinidou and Tristan Vanspouwen and Th{\'{e}}o Rigas and Jean{-}Michel Dricot and Olivier Markowitch}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Identity-based {TLS} for Cloud of Chips}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {44--54}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007252000440054}, doi = {10.5220/0007252000440054}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/0006EVRDM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AkkuzuAA19, author = {Gulsum Akkuzu and Benjamin Aziz and Mo Adda}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Fuzzy Logic Decision based Collaborative Privacy Management Framework for Online Social Networks}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {674--684}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007702206740684}, doi = {10.5220/0007702206740684}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AkkuzuAA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Al-MaweeBCM19, author = {Wassnaa Al{-}Mawee and Paul J. Bonamy and Steve Carr and Jean Mayo}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Maia: {A} Language for Mandatory Integrity Controls of Structured Data}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {257--265}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007344802570265}, doi = {10.5220/0007344802570265}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Al-MaweeBCM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Al-WahahF19, author = {Mouiad Al{-}Wahah and Csilla Farkas}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Monotonic and Non-monotonic Context Delegation}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {449--460}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007400904490460}, doi = {10.5220/0007400904490460}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Al-WahahF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlmarwaniKL19, author = {Maryam Almarwani and Boris Konev and Alexei Lisitsa}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Flexible Access Control and Confidentiality over Encrypted Data for Document-based Database}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {606--614}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007582506060614}, doi = {10.5220/0007582506060614}, timestamp = {Fri, 03 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlmarwaniKL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlmarwaniKL19a, author = {Maryam Almarwani and Boris Konev and Alexei Lisitsa}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Fine-Grained Access Control for Querying Over Encrypted Document-Oriented Database}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {403--425}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-49443-8\_19}, doi = {10.1007/978-3-030-49443-8\_19}, timestamp = {Fri, 03 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlmarwaniKL19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlotaibiAFC19, author = {Saud Alotaibi and Abdulrahman Alruban and Steven Furnell and Nathan L. Clarke}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Novel Behaviour Profiling Approach to Continuous Authentication for Mobile Applications}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {246--251}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007313302460251}, doi = {10.5220/0007313302460251}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlotaibiAFC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AnagrehVL19, author = {Mohammad Anagreh and Eero Vainikko and Peeter Laud}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Accelerate Performance for Elliptic Curve Scalar Multiplication based on {NAF} by Parallel Computing}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {238--245}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007312702380245}, doi = {10.5220/0007312702380245}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AnagrehVL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AugotCG19, author = {Daniel Augot and Herv{\'{e}} Chabanne and William George}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Practical Solutions to Save Bitcoins Applied to an Identity System Proposal}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {511--518}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007443905110518}, doi = {10.5220/0007443905110518}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AugotCG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BajanKD19, author = {Pierre{-}Marie Bajan and Christophe Kiennert and Herv{\'{e}} Debar}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Methodology of a Network Simulation in the Context of an Evaluation: Application to an {IDS}}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {378--388}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007378603780388}, doi = {10.5220/0007378603780388}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BajanKD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BartoliniCM19, author = {Cesare Bartolini and Antonello Calabr{\`{o}} and Eda Marchetti}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Enhancing Business Process Modelling with Data Protection Compliance: An Ontology-based Proposal}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {421--428}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007392304210428}, doi = {10.5220/0007392304210428}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BartoliniCM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Ben-BassatR19, author = {Ilan Ben{-}Bassat and Erez Rokah}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Locality-Sensitive Hashing for Efficient Web Application Security Testing}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {193--204}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007255301930204}, doi = {10.5220/0007255301930204}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Ben-BassatR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BernardeschiDP19, author = {Cinzia Bernardeschi and Andrea Domenici and Maurizio Palmieri}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Modeling and Simulation of Attacks on Cyber-physical Systems}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {700--708}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007705307000708}, doi = {10.5220/0007705307000708}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BernardeschiDP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BhodiaPTS19, author = {Niket Bhodia and Pratikkumar Prajapati and Fabio Di Troia and Mark Stamp}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Transfer Learning for Image-based Malware Classification}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {719--726}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007701407190726}, doi = {10.5220/0007701407190726}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BhodiaPTS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BisphamAG19, author = {Mary K. Bispham and Ioannis Agrafiotis and Michael Goldsmith}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Nonsense Attacks on Google Assistant and Missense Attacks on Amazon Alexa}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {75--87}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007309500750087}, doi = {10.5220/0007309500750087}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BisphamAG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BisphamAG19a, author = {Mary K. Bispham and Ioannis Agrafiotis and Michael Goldsmith}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Attack and Defence Modelling for Attacks via the Speech Interface}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {519--527}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007469705190527}, doi = {10.5220/0007469705190527}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BisphamAG19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BisphamAG19b, author = {Mary K. Bispham and Ioannis Agrafiotis and Michael Goldsmith}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {The Security of the Speech Interface: {A} Modelling Framework and Proposals for New Defence Mechanisms}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {288--316}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-49443-8\_14}, doi = {10.1007/978-3-030-49443-8\_14}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BisphamAG19b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BisphamRAG19, author = {Mary K. Bispham and Alastair Janse van Rensburg and Ioannis Agrafiotis and Michael Goldsmith}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Black-Box Attacks via the Speech Interface Using Linguistically Crafted Input}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {93--120}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-49443-8\_5}, doi = {10.1007/978-3-030-49443-8\_5}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BisphamRAG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Blumbergs19, author = {Bernhards Blumbergs}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Remote Exploit Development for Cyber Red Team Computer Network Operations Targeting Industrial Control Systems}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {88--99}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007310300880099}, doi = {10.5220/0007310300880099}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Blumbergs19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BodeiG19, author = {Chiara Bodei and Letterio Galletta}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Tracking Data Trajectories in IoT}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {572--579}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007578305720579}, doi = {10.5220/0007578305720579}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BodeiG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BodeiG19a, author = {Chiara Bodei and Letterio Galletta}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Analysing the Provenance of IoT Data}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {358--381}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-49443-8\_17}, doi = {10.1007/978-3-030-49443-8\_17}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BodeiG19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BracamonteHTK19, author = {Vanessa Bracamonte and Seira Hidano and Welderufael B. Tesfay and Shinsaku Kiyomoto}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Evaluating Privacy Policy Summarization: An Experimental Study among Japanese Users}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {370--377}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007378403700377}, doi = {10.5220/0007378403700377}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BracamonteHTK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BracamonteHTK19a, author = {Vanessa Bracamonte and Seira Hidano and Welderufael B. Tesfay and Shinsaku Kiyomoto}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {User Study of the Effectiveness of a Privacy Policy Summarization Tool}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {186--206}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-49443-8\_9}, doi = {10.1007/978-3-030-49443-8\_9}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BracamonteHTK19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BrunnerKE19, author = {Clemens Brunner and Fabian Knirsch and Dominik Engel}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {{SPROOF:} {A} Platform for Issuing and Verifying Documents in a Public Blockchain}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {15--25}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007245600150025}, doi = {10.5220/0007245600150025}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BrunnerKE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BrunnerKE19a, author = {Clemens Brunner and Fabian Knirsch and Dominik Engel}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {{SPROOF:} {A} Decentralized Platform for Attribute-Based Authentication}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {1--23}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-49443-8\_1}, doi = {10.1007/978-3-030-49443-8\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BrunnerKE19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Buchanan19, author = {Bill Buchanan}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Building the Future: Tokenization, Blockchain and Citizen-focused Systems}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {5}, publisher = {SciTePress}, year = {2019}, timestamp = {Thu, 13 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Buchanan19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ButunG19, author = {Ismail Butun and Mikael Gidlund}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Location Privacy Assured Internet of Things}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {623--630}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007587906230630}, doi = {10.5220/0007587906230630}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ButunG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CaiWZSH19, author = {Jiahao Cai and Zihao Wei and Yingjie Zhang and Siwei Sun and Lei Hu}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Zero-sum Distinguishers for Round-reduced {GIMLI} Permutation}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {38--43}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007249000380043}, doi = {10.5220/0007249000380043}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/CaiWZSH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CatuognoG19, author = {Luigi Catuogno and Clemente Galdi}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Fine-grained General Purpose Secure Storage Facility for Trusted Execution Environment}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {588--595}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007578605880595}, doi = {10.5220/0007578605880595}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CatuognoG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CatuognoG19a, author = {Luigi Catuogno and Clemente Galdi}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Improving Interoperability in Multi-domain Enterprise Right Management Applications}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {382--402}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-49443-8\_18}, doi = {10.1007/978-3-030-49443-8\_18}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CatuognoG19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ChabanneDR19, author = {Herv{\'{e}} Chabanne and Emmanuelle Dottax and Franck Rondepierre}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Smart-card Deployment of an Electronic Voting Protocol}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {503--510}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007443805030510}, doi = {10.5220/0007443805030510}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ChabanneDR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ChamatidisS19, author = {Ilias Chamatidis and Georgios P. Spathoulas}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Machine Learning for All: {A} More Robust Federated Learning Framework}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {544--551}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007571705440551}, doi = {10.5220/0007571705440551}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ChamatidisS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ChavanTS19, author = {Neeraj Chavan and Fabio Di Troia and Mark Stamp}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Comparative Analysis of Android Malware}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {664--673}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007701506640673}, doi = {10.5220/0007701506640673}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/ChavanTS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CorayCS19, author = {Sein Coray and Iwen Coisel and Ignacio Sanchez}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Improved Forensic Recovery of {PKZIP} Stream Cipher Passwords}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {328--335}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007360503280335}, doi = {10.5220/0007360503280335}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CorayCS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CostaBT19, author = {Lu{\'{\i}}s Costa and Jo{\~{a}}o Paulo Barros and Miguel Tavares}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Vulnerabilities in IoT Devices for Smart Home Environment}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {615--622}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007583306150622}, doi = {10.5220/0007583306150622}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CostaBT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DaoudaghLM19, author = {Said Daoudagh and Francesca Lonetti and Eda Marchetti}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Decentralized Solution for Combinatorial Testing of Access Control Engine}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {126--135}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007379401260135}, doi = {10.5220/0007379401260135}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DaoudaghLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DaoudaghLM19a, author = {Said Daoudagh and Francesca Lonetti and Eda Marchetti}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A General Framework for Decentralized Combinatorial Testing of Access Control Engine: Examples of Application}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {207--229}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-49443-8\_10}, doi = {10.1007/978-3-030-49443-8\_10}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DaoudaghLM19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/EzureI19, author = {Takuya Ezure and Masaki Inamura}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {An Order-specified Aggregate Authority-transfer Signature}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {309--318}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007359103090318}, doi = {10.5220/0007359103090318}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/EzureI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/EzureI19a, author = {Takuya Ezure and Masaki Inamura}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Proposal and Performance Evaluation of an Order-Specified Aggregate Authority-Transfer Signature}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {121--136}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-49443-8\_6}, doi = {10.1007/978-3-030-49443-8\_6}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/EzureI19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FallK19, author = {Doudou Fall and Youki Kadobayashi}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {The Common Vulnerability Scoring System vs. Rock Star Vulnerabilities: Why the Discrepancy?}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {405--411}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007387704050411}, doi = {10.5220/0007387704050411}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FallK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FasanoMMNS19, author = {Fausto Fasano and Fabio Martinelli and Francesco Mercaldo and Vittoria Nardone and Antonella Santone}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Spyware Detection using Temporal Logic}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {690--699}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007704806900699}, doi = {10.5220/0007704806900699}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FasanoMMNS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FiliolH19, author = {Eric Filiol and Abhilash Hota}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Solving a Hard Instance of Suspicious Behaviour Detection with Sparse Binary Vectors Clustering}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {635--644}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007347206350644}, doi = {10.5220/0007347206350644}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FiliolH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FrumentoD19, author = {Enrico Frumento and Carlo Dambra}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {The {HERMENEUT} Project: Enterprises Intangible Risk Management via Economic Models based on Simulation of Modern Cyber Attacks}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {495--502}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007413504950502}, doi = {10.5220/0007413504950502}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FrumentoD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Fukushima0NFKG19, author = {Kazuhide Fukushima and Damien Marion and Yuto Nakano and Adrien Facon and Shinsaku Kiyomoto and Sylvain Guilley}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Experiment on Side-Channel Key-Recovery using a Real {LPWA} End-device}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {67--74}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007259500670074}, doi = {10.5220/0007259500670074}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Fukushima0NFKG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Fukushima0NFKG19a, author = {Kazuhide Fukushima and Damien Marion and Yuto Nakano and Adrien Facon and Shinsaku Kiyomoto and Sylvain Guilley}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Evaluation of Side-Channel Key-Recovery Attacks on LoRaWAN End-Device}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {74--92}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-49443-8\_4}, doi = {10.1007/978-3-030-49443-8\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Fukushima0NFKG19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GrosseNS19, author = {Christine Gro{\ss}e and Maja Nyman and Leif Sundberg}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Information Technology Consulting Firms' Readiness for Managing Information Security Incidents}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {48--73}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-49443-8\_3}, doi = {10.1007/978-3-030-49443-8\_3}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GrosseNS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GuanGL0K19, author = {Zhi Guan and Abba Garba and Anran Li and Zhong Chen and Nesrine Kaaniche}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {AuthLedger: {A} Novel Blockchain-based Domain Name Authentication Scheme}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {345--352}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007366803450352}, doi = {10.5220/0007366803450352}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GuanGL0K19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Guerra-Manzanares19, author = {Alejandro Guerra{-}Manzanares and Sven N{\~{o}}mm and Hayretdin Bahsi}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {In-depth Feature Selection and Ranking for Automated Detection of Mobile Malware}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {274--283}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007349602740283}, doi = {10.5220/0007349602740283}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Guerra-Manzanares19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HormannF19, author = {Ricardo Hormann and Eric Fischer}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Detecting Anomalies by using Self-Organizing Maps in Industrial Environments}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {336--344}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007364803360344}, doi = {10.5220/0007364803360344}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HormannF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HotaI19, author = {Abhilash Hota and Paul Irolla}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Deep Neural Networks for Android Malware Detection}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {657--663}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007617606570663}, doi = {10.5220/0007617606570663}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HotaI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Irolla19, author = {Paul Irolla}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Systematic Characterization of a Sequence Group}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {645--656}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007349706450656}, doi = {10.5220/0007349706450656}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Irolla19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/JensenKG19, author = {Meiko Jensen and Sahil Kapila and Nils Gruschka}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Towards Aligning {GDPR} Compliance with Software Development: {A} Research Agenda}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {389--396}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007383803890396}, doi = {10.5220/0007383803890396}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/JensenKG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KatsikeasJHL19, author = {Sotirios Katsikeas and Pontus Johnson and Simon Hacks and Robert Lagerstr{\"{o}}m}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Probabilistic Modeling and Simulation of Vehicular Cyber Attacks: An Application of the Meta Attack Language}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {175--182}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007247901750182}, doi = {10.5220/0007247901750182}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KatsikeasJHL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KhanNB19, author = {Nadir Khan and Sven Nitzsche and J{\"{u}}rgen Becker}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Secure Framework with Remote Configuration of Intellectual Property}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {564--571}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007576305640571}, doi = {10.5220/0007576305640571}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KhanNB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KiperbergLRAZ19, author = {Michael Kiperberg and Roee Leon and Amit Resh and Asaf Algawi and Nezer Zaidenberg}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Hypervisor-assisted Atomic Memory Acquisition in Modern Systems}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {155--162}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007566101550162}, doi = {10.5220/0007566101550162}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KiperbergLRAZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KiwanukaAAPF19, author = {Fred N. Kiwanuka and Ja'far Alqatawna and Anang Hudaya Muhamad Amin and Sujni Paul and Hossam Faris}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Towards Automated Comprehensive Feature Engineering for Spam Detection}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {429--437}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007393004290437}, doi = {10.5220/0007393004290437}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KiwanukaAAPF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LestyanABS19, author = {Szilvia Lestyan and Gergely {\'{A}}cs and Gergely Bicz{\'{o}}k and Zsolt Szalay}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Extracting Vehicle Sensor Signals from {CAN} Logs for Driver Re-identification}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {136--145}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007389501360145}, doi = {10.5220/0007389501360145}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LestyanABS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ListikLSH19, author = {V{\'{\i}}t List{\'{\i}}k and Simon Let and Jan Sediv{\'{y}} and V{\'{a}}clav Hlav{\'{a}}c}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Phishing Email Detection based on Named Entity Recognition}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {252--256}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007314202520256}, doi = {10.5220/0007314202520256}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ListikLSH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Loutfi19, author = {Ijlal Loutfi}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {SMMDecoy: Detecting {GPU} Keyloggers using Security by Deception Techniques}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {580--587}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007578505800587}, doi = {10.5220/0007578505800587}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Loutfi19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MadhusudanSMZP19, author = {Akash Madhusudan and Iraklis Symeonidis and Mustafa A. Mustafa and Ren Zhang and Bart Preneel}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {SC2Share: Smart Contract for Secure Car Sharing}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {163--171}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007703601630171}, doi = {10.5220/0007703601630171}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MadhusudanSMZP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MashhadaniCL19, author = {Shahlaa Mashhadani and Nathan L. Clarke and Fudong Li}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Identification and Extraction of Digital Forensic Evidence from Multimedia Data Sources using Multi-algorithmic Fusion}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {438--448}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007399604380448}, doi = {10.5220/0007399604380448}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MashhadaniCL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MeinigTM19, author = {Michael Meinig and Peter Tr{\"{o}}ger and Christoph Meinel}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Finding Classification Zone Violations with Anonymized Message Flow Analysis}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {284--292}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007352602840292}, doi = {10.5220/0007352602840292}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MeinigTM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MohassebAJL19, author = {Alaa Mohasseb and Benjamin Aziz and Jeyong Jung and Julak Lee}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Predicting CyberSecurity Incidents using Machine Learning Algorithms: {A} Case Study of Korean SMEs}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {230--237}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007309302300237}, doi = {10.5220/0007309302300237}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MohassebAJL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MoriK19, author = {Takafumi Mori and Hiroaki Kikuchi}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Robust Person Identification based on {DTW} Distance of Multiple-Joint Gait Pattern}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {221--229}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007307002210229}, doi = {10.5220/0007307002210229}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MoriK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MucciB19, author = {Daniele Mucci and Bernhards Blumbergs}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {{TED:} {A} Container based Tool to Perform Security Risk Assessment for {ELF} Binaries}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {361--369}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007371603610369}, doi = {10.5220/0007371603610369}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MucciB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NguyenRMD19, author = {Hoai Phuong Nguyen and Florent Retraint and Fr{\'{e}}d{\'{e}}ric Morain{-}Nicolier and Agn{\`{e}}s Delahaies}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {An Image Forgery Detection Solution based on {DCT} Coefficient Analysis}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {487--494}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007412804870494}, doi = {10.5220/0007412804870494}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NguyenRMD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NymanG19, author = {Maja Nyman and Christine Gro{\ss}e}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Are You Ready When It Counts? {IT} Consulting Firm's Information Security Incident Management}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {26--37}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007247500260037}, doi = {10.5220/0007247500260037}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NymanG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OlukoyaMO19, author = {Oluwafemi Olukoya and Lewis Mackenzie and Inah Omoronyia}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Permission-based Risk Signals for App Behaviour Characterization in Android Apps}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {183--192}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007248701830192}, doi = {10.5220/0007248701830192}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/OlukoyaMO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OudahGB19, author = {Hussein Oudah and Bogdan V. Ghita and Taimur Bakhshi}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Novel Features Set for Internet Traffic Classification using Burstiness}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {397--404}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007384203970404}, doi = {10.5220/0007384203970404}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/OudahGB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PatzerLMB19, author = {Florian Patzer and Philipp L{\"{u}}dtke and Ankush Meshram and J{\"{u}}rgen Beyerer}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Context-Aware Software-Defined Networking for Automated Incident Response in Industrial Networks}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {137--161}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-49443-8\_7}, doi = {10.1007/978-3-030-49443-8\_7}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PatzerLMB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PatzerMH19, author = {Florian Patzer and Ankush Meshram and Maximilian He{\ss}}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Automated Incident Response for Industrial Control Systems Leveraging Software-defined Networking}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {319--327}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007359503190327}, doi = {10.5220/0007359503190327}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/PatzerMH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PfrangGBMB19, author = {Steffen Pfrang and Mark Giraud and Anne Borcherding and David Meier and J{\"{u}}rgen Beyerer}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Design of an Example Network Protocol for Security Tests Targeting Industrial Automation Systems}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {727--738}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007704907270738}, doi = {10.5220/0007704907270738}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PfrangGBMB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Pietro19, author = {Roberto Di Pietro}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Next Generation Information Warfare: Challenges and Research Directions}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {7--8}, publisher = {SciTePress}, year = {2019}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Pietro19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PietroCR19, author = {Roberto Di Pietro and Maurantonio Caprolu and Simone Raponi}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Next Generation Information Warfare: Rationales, Scenarios, Threats, and Open Issues}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {24--47}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-49443-8\_2}, doi = {10.1007/978-3-030-49443-8\_2}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PietroCR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PonsardG19, author = {Christophe Ponsard and Jeremy Grandclaudon}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Guidelines and Tool Support for Building a Cybersecurity Awareness Program for SMEs}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {335--357}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-49443-8\_16}, doi = {10.1007/978-3-030-49443-8\_16}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PonsardG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PonsardGB19, author = {Christophe Ponsard and Jeremy Grandclaudon and S{\'{e}}bastien Bal}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Survey and Lessons Learned on Raising {SME} Awareness about Cybersecurity}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {558--563}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007574305580563}, doi = {10.5220/0007574305580563}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PonsardGB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Quirchmayr19, author = {Gerald Quirchmayr}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Challenges of {GDPR} and the {NIS} Directive}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {9}, publisher = {SciTePress}, year = {2019}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Quirchmayr19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Reza0E19, author = {Khondker Jahid Reza and Md Zahidul Islam and Vladimir Estivill{-}Castro}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Privacy Preservation of Social Network Users Against Attribute Inference Attacks via Malicious Data Mining}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {412--420}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007390404120420}, doi = {10.5220/0007390404120420}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Reza0E19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Reza0E19a, author = {Khondker Jahid Reza and Md Zahidul Islam and Vladimir Estivill{-}Castro}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Protection of User-Defined Sensitive Attributes on Online Social Networks Against Attribute Inference Attack via Adversarial Data Mining}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {230--249}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-49443-8\_11}, doi = {10.1007/978-3-030-49443-8\_11}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Reza0E19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SaadBE19, author = {Sherif Saad and William Briguglio and Haytham Elmiligi}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {The Curious Case of Machine Learning in Malware Detection}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {528--535}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007470705280535}, doi = {10.5220/0007470705280535}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SaadBE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SaaudiTF19, author = {Ahmed Saaudi and Yan Tong and Csilla Farkas}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Probabilistic Graphical Model on Detecting Insiders: Modeling with {SGD-HMM}}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {461--470}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007404004610470}, doi = {10.5220/0007404004610470}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SaaudiTF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SatoHT19, author = {Yuya Sato and Hirokazu Hasegawa and Hiroki Takakura}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Construction of Secure Internal Networks with Communication Classifying System}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {552--557}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007571905520557}, doi = {10.5220/0007571905520557}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SatoHT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SchwittmannWW19, author = {Lorenz Schwittmann and Matth{\"{a}}us Wander and Torben Weis}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Mobile Devices as Digital Sextants for Zero-Permission Geolocation}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {55--66}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007254000550066}, doi = {10.5220/0007254000550066}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SchwittmannWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SnymanK19, author = {Dirk Snyman and Hennie A. Kruger}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Theorising on Information Cascades and Sequential Decision-making for Analysing Security Behaviour}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {205--212}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007258702050212}, doi = {10.5220/0007258702050212}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SnymanK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Sonntag19, author = {Michael Sonntag}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Malicious {DNS} Traffic in Tor: Analysis and Countermeasures}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {536--543}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007471205360543}, doi = {10.5220/0007471205360543}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Sonntag19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SpagnueloFL19, author = {Dayana Spagnuelo and Ana Ferreira and Gabriele Lenzini}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Accomplishing Transparency within the General Data Protection Regulation}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {114--125}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007366501140125}, doi = {10.5220/0007366501140125}, timestamp = {Mon, 03 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SpagnueloFL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SpagnueloFL19a, author = {Dayana Spagnuelo and Ana Ferreira and Gabriele Lenzini}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Transparency Enhancing Tools and the {GDPR:} Do They Match?}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {162--185}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-49443-8\_8}, doi = {10.1007/978-3-030-49443-8\_8}, timestamp = {Mon, 03 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SpagnueloFL19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TavolatoT19, author = {Paul Tavolato and Christina Tavolato{-}W{\"{o}}tzl}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Analytical Modelling of Cyber-physical Systems}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {685--689}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007704706850689}, doi = {10.5220/0007704706850689}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TavolatoT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TorresSAP19, author = {Jos{\'{e}} Torres and Sergio de los Santos and Efthimios Alepis and Constantinos Patsakis}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Behavioral Biometric Authentication in Android Unlock Patterns through Machine Learning}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {146--154}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007394201460154}, doi = {10.5220/0007394201460154}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TorresSAP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TorresSAP19a, author = {Jos{\'{e}} Torres and Sergio de los Santos and Efthimios Alepis and Constantinos Patsakis}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {User Behavioral Biometrics and Machine Learning Towards Improving User Authentication in Smartphones}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {250--271}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-49443-8\_12}, doi = {10.1007/978-3-030-49443-8\_12}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TorresSAP19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/UlzFPS19, author = {Thomas Ulz and Markus Feldbacher and Thomas W. Pieber and Christian Steger}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Sensing Danger: Exploiting Sensors to Build Covert Channels}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {100--113}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007353801000113}, doi = {10.5220/0007353801000113}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/UlzFPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/VendittiF19, author = {Antonello Venditti and Fausto Fasano}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Systematic Approach to Choose the Data Warehouse Architecture}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {711--718}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007700307110718}, doi = {10.5220/0007700307110718}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/VendittiF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WahshehL19, author = {Heider A. M. Wahsheh and Flaminia L. Luccio}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Evaluating Security, Privacy and Usability Features of {QR} Code Readers}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {266--273}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007346202660273}, doi = {10.5220/0007346202660273}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/WahshehL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WeinhardtO19, author = {Stephanie Weinhardt and Olamide Omolola}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Usability of Policy Authoring Tools: {A} Layered Approach}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {301--308}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007355003010308}, doi = {10.5220/0007355003010308}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WeinhardtO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/XiongKL19, author = {Wenjun Xiong and Fredrik Krantz and Robert Lagerstr{\"{o}}m}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Threat Modeling and Attack Simulations of Connected Vehicles: {A} Research Outlook}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {479--486}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007412104790486}, doi = {10.5220/0007412104790486}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/XiongKL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/XiongKL19a, author = {Wenjun Xiong and Fredrik Krantz and Robert Lagerstr{\"{o}}m}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Threat Modeling and Attack Simulations of Connected Vehicles: Proof of Concept}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {272--287}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-49443-8\_13}, doi = {10.1007/978-3-030-49443-8\_13}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/XiongKL19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/YamadaKMI19, author = {Michihiro Yamada and Hiroaki Kikuchi and Naoki Matsuyama and Koji Inui}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Mathematical Model to Estimate Loss by Cyber Incident in Japan}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {353--360}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007368503530360}, doi = {10.5220/0007368503530360}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/YamadaKMI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/YonamineKMT19, author = {Shun Yonamine and Youki Kadobayashi and Daisuke Miyamoto and Yuzo Taenaka}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Towards Automated Characterization of Malware's High-level Mechanism using Virtual Machine Introspection}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {471--478}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007405504710478}, doi = {10.5220/0007405504710478}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/YonamineKMT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/YoshinoSNS19, author = {Masayuki Yoshino and Takayuki Suzuki and Ken Naganuma and Hisayoshi Sato}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Definition and Efficient Construction of Encrypted k-anonymization Scheme}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {293--300}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007354702930300}, doi = {10.5220/0007354702930300}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/YoshinoSNS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ZaidenbergKYLAR19, author = {Nezer Jacob Zaidenberg and Michael Kiperberg and Raz Ben Yehuda and Roee Leon and Asaf Algawi and Amit Resh}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {317--334}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-49443-8\_15}, doi = {10.1007/978-3-030-49443-8\_15}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ZaidenbergKYLAR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2018s, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {977}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-25109-3}, doi = {10.1007/978-3-030-25109-3}, isbn = {978-3-030-25108-6}, timestamp = {Tue, 08 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2018s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2019, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, publisher = {SciTePress}, year = {2019}, isbn = {978-989-758-359-9}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AbomharaKOH18, author = {Mohamed Abomhara and Geir M. K{\o}ien and Vladimir A. Oleshchuk and Mohamed Hamid}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Towards Risk-aware Access Control Framework for Healthcare Information Sharing}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {312--321}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006608103120321}, doi = {10.5220/0006608103120321}, timestamp = {Wed, 11 Apr 2018 15:27:25 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AbomharaKOH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AburawiLC18, author = {Nahla Aburawi and Alexei Lisitsa and Frans Coenen}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Querying Encrypted Graph Databases}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {447--451}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006660004470451}, doi = {10.5220/0006660004470451}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AburawiLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Alepis18, author = {Efthimios Alepis}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Notify This: Exploiting Android Notifications for Fun and Profit}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {86--108}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-25109-3\_5}, doi = {10.1007/978-3-030-25109-3\_5}, timestamp = {Tue, 08 Oct 2019 13:28:02 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Alepis18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlpersPOR18, author = {Sascha Alpers and Roman Pilipchuk and Andreas Oberweis and Ralf H. Reussner}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Identifying Needs for a Holistic Modelling Approach to Privacy Aspects in Enterprise Software Systems}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {74--82}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006606200740082}, doi = {10.5220/0006606200740082}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlpersPOR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlpersPOR18a, author = {Sascha Alpers and Roman Pilipchuk and Andreas Oberweis and Ralf H. Reussner}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {The Current State of the Holistic Privacy and Security Modelling Approach in Business Process and Software Architecture Modelling}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {109--124}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-25109-3\_6}, doi = {10.1007/978-3-030-25109-3\_6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlpersPOR18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlqahtaniCHG18, author = {Ohud Alqahtani and Zhiyuan Chen and Qiong Huang and Karthik Gottipati}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Is Bigger Safer? Analyzing Factors Related to Data Breaches using Publicly Available Information}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {373--378}, publisher = {SciTePress}, year = {2018}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlqahtaniCHG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlshehriCB18, author = {Abdullah Alshehri and Frans Coenen and Danushka Bollegala}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Spectral Analysis of Keystroke Streams: Towards Effective Real-time Continuous User Authentication}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {62--73}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006606100620073}, doi = {10.5220/0006606100620073}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlshehriCB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlvesM18, author = {Thiago Alves and Thomas H. Morris}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Hardware-based Cyber Threats}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {259--266}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006577202590266}, doi = {10.5220/0006577202590266}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/AlvesM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Anderson18, author = {Ross Anderson}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Sustainable Security - an Internet of Durable Goods}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {7}, publisher = {SciTePress}, year = {2018}, timestamp = {Tue, 25 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Anderson18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BacciBMMMV18, author = {Alessandro Bacci and Alberto Bartoli and Fabio Martinelli and Eric Medvet and Francesco Mercaldo and Corrado Aaron Visaggio}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {379--385}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006642503790385}, doi = {10.5220/0006642503790385}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BacciBMMMV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BacciMMM18, author = {Alessandro Bacci and Fabio Martinelli and Eric Medvet and Francesco Mercaldo}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {VizMal: {A} Visualization Tool for Analyzing the Behavior of Android Malware}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {517--525}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006665005170525}, doi = {10.5220/0006665005170525}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BacciMMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BadjiD18, author = {Radja Badji and Fida Kamal Dankar}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Risk-aware Access Control Model for Biomedical Research Platforms}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {322--328}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006608403220328}, doi = {10.5220/0006608403220328}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BadjiD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BarrosL18, author = {Martina J. Zucule de Barros and Horst Lazarek}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Cyber Safety Model for Schools in Mozambique}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {251--258}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006573802510258}, doi = {10.5220/0006573802510258}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BarrosL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CalderonHYS18, author = {Paul Calderon and Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Malware Detection based on {HTTPS} Characteristic via Machine Learning}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {410--417}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006654604100417}, doi = {10.5220/0006654604100417}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CalderonHYS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DagherMMM18, author = {Gaby G. Dagher and Praneeth Babu Marella and Matea Milojkovic and Jordan Mohler}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {BroncoVote: Secure Voting System using Ethereum's Blockchain}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {96--107}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006609700960107}, doi = {10.5220/0006609700960107}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DagherMMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DeyBS18, author = {Alexandre Dey and Loic Beheshti and Marie{-}Kerguelen Sido}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Health State of Google's PlayStore - Finding Malware in Large Sets of Applications from the Android Market}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {538--544}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006727705380544}, doi = {10.5220/0006727705380544}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DeyBS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DieschPK18, author = {Rainer Diesch and Matthias Pfaff and Helmut Krcmar}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Prerequisite to Measure Information Security - {A} State of the Art Literature Review}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {207--215}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006545602070215}, doi = {10.5220/0006545602070215}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/DieschPK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/EiblBE18, author = {G{\"{u}}nther Eibl and Sebastian Burkhart and Dominik Engel}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Unsupervised Holiday Detection from Low-resolution Smart Metering Data}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {477--486}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006719704770486}, doi = {10.5220/0006719704770486}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/EiblBE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/EiblBE18a, author = {G{\"{u}}nther Eibl and Sebastian Burkhart and Dominik Engel}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Insights into Unsupervised Holiday Detection from Low-Resolution Smart Metering Data}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {281--302}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-25109-3\_15}, doi = {10.1007/978-3-030-25109-3\_15}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/EiblBE18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/EignerKT18, author = {Oliver Eigner and Philipp Kreimel and Paul Tavolato}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Attacks on Industrial Control Systems - Modeling and Anomaly Detection}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {581--588}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006755405810588}, doi = {10.5220/0006755405810588}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/EignerKT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/EreminK18, author = {Aleksandr Eremin and Konstantin Kogos}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Incoming Call Implicit User Authentication - User Authentication via Hand Movement Pattern}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {24--29}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006555200240029}, doi = {10.5220/0006555200240029}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/EreminK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/EreminKV18, author = {Aleksandr Eremin and Konstantin Kogos and Yana Valatskayte}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Touch and Move: Incoming Call User Authentication}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {26--39}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-25109-3\_2}, doi = {10.1007/978-3-030-25109-3\_2}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/EreminKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FerreiraM18, author = {Ana Ferreira and Pedro Manuel Vieira Marques}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Phishing Through Time: {A} Ten Year Story based on Abstracts}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {225--232}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006552602250232}, doi = {10.5220/0006552602250232}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FerreiraM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FiliolJD18, author = {Eric Filiol and J. Nicolas and Maxence Delong}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Statistical and Combinatorial Analysis of the {TOR} Routing Protocol - Structural Weaknesses Identified in the {TOR} Network}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {507--516}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006634705070516}, doi = {10.5220/0006634705070516}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/FiliolJD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Fortuna0B18, author = {Pedro Fortuna and Nuno Pereira and Ismail Butun}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Framework for Web Application Integrity}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {487--493}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006720204870493}, doi = {10.5220/0006720204870493}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Fortuna0B18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FredjLC18, author = {Feten Ben Fredj and Nadira Lammari and Isabelle Comyn{-}Wattiau}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Relational Database Anonymization - {A} Model-driven Guiding Approach}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {161--170}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006659201610170}, doi = {10.5220/0006659201610170}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FredjLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GaoW18, author = {Yuanyuan Gao and Kunpeng Wang}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Probability Preservation Property with Relative Error and Its Applications}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {461--468}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006717204610468}, doi = {10.5220/0006717204610468}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GaoW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GencLRS18, author = {Ziya Alper Gen{\c{c}} and Gabriele Lenzini and Peter Y. A. Ryan and Itzel V{\'{a}}zquez Sandoval}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {83--95}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006609100830095}, doi = {10.5220/0006609100830095}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GencLRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GencLRS18a, author = {Ziya Alper Gen{\c{c}} and Gabriele Lenzini and Peter Y. A. Ryan and Itzel V{\'{a}}zquez Sandoval}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {125--151}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-25109-3\_7}, doi = {10.1007/978-3-030-25109-3\_7}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GencLRS18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GougeonL18, author = {Thomas Gougeon and Patrick Lacharme}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {How to Break CaptchaStar}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {41--51}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006577600410051}, doi = {10.5220/0006577600410051}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GougeonL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GougeonL18a, author = {Thomas Gougeon and Patrick Lacharme}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Simple Attack on CaptchaStar}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {66--85}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-25109-3\_4}, doi = {10.1007/978-3-030-25109-3\_4}, timestamp = {Tue, 08 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GougeonL18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GrafK18, author = {Roman Graf and Ross King}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Cyber Threat Information Classification and Life Cycle Management using Smart Contracts}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {304--311}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006605203040311}, doi = {10.5220/0006605203040311}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GrafK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HakbilenPEU18, author = {Onur Hakbilen and Piraveen Perinparajan and Michael Eikeland and Nils Ulltveit{-}Moe}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {{SAFEPASS} - Presenting a Convenient, Portable and Secure Password Manager}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {292--303}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006603102920303}, doi = {10.5220/0006603102920303}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HakbilenPEU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HamidiSM18, author = {Mona Hamidi and Mina Sheikhalishahi and Fabio Martinelli}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Secure Two-party Agglomerative Hierarchical Clustering Construction}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {432--437}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006659704320437}, doi = {10.5220/0006659704320437}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HamidiSM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HaupertM18, author = {Vincent Haupert and Tilo M{\"{u}}ller}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {On App-based Matrix Code Authentication in Online Banking}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {149--160}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006650501490160}, doi = {10.5220/0006650501490160}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HaupertM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HerwonoE18, author = {Ian Herwono and Fadi Ali El{-}Moussa}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Automated Detection of the Early Stages of Cyber Kill Chain}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {182--189}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006543301820189}, doi = {10.5220/0006543301820189}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HerwonoE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HuangTS18, author = {Jasper Huang and Fabio Di Troia and Mark Stamp}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Acoustic Gait Analysis using Support Vector Machines}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {545--552}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006730705450552}, doi = {10.5220/0006730705450552}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HuangTS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HummerGKFP18, author = {Matthias Hummer and Sebastian Groll and Michael Kunz and Ludwig Fuchs and G{\"{u}}nther Pernul}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Measuring Identity and Access Management Performance - An Expert Survey on Possible Performance Indicators}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {233--240}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006557702330240}, doi = {10.5220/0006557702330240}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HummerGKFP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HunterW18, author = {Aaron Hunter and Ken Wong}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Decoy Systems with Low Energy Bluetooth Communication}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {404--409}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006646604040409}, doi = {10.5220/0006646604040409}, timestamp = {Fri, 15 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HunterW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Jacoby18, author = {David Jacoby}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Hacking the Security Industry for Fun and Profit and Humanity}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {5}, publisher = {SciTePress}, year = {2018}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Jacoby18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/JasserTSR18, author = {Stefanie Jasser and Katja Tuma and Riccardo Scandariato and Matthias Riebisch}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Back to the Drawing Board - Bringing Security Constraints in an Architecture-centric Software Development Process}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {438--446}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006659904380446}, doi = {10.5220/0006659904380446}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/JasserTSR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KandoussiB18, author = {Asmaa El Kandoussi and Hanan El Bakkali}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Novel Access Control Approach for Inter-organizational Workflows}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {345--352}, publisher = {SciTePress}, year = {2018}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KandoussiB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KarlzenBH18, author = {Henrik Karlz{\'{e}}n and Johan E. Bengtsson and Jonas Hallberg}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Test of Structured Threat Descriptions for Information Security Risk Assessments}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {469--476}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006719604690476}, doi = {10.5220/0006719604690476}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KarlzenBH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LeeOKL18, author = {Wei{-}Han Lee and Jorge Ortiz and Bongjun Ko and Ruby B. Lee}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Inferring Smartphone Users' Handwritten Patterns by using Motion Sensors}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {139--148}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006650301390148}, doi = {10.5220/0006650301390148}, timestamp = {Fri, 07 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LeeOKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LuhTTS18, author = {Robert Luh and Marlies Temper and Simon Tjoa and Sebastian Schrittwieser}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {{APT} {RPG:} Design of a Gamified Attacker/Defender Meta Model}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {526--537}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006717805260537}, doi = {10.5220/0006717805260537}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/LuhTTS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MarellaMMD18, author = {Praneeth Babu Marella and Matea Milojkovic and Jordan Mohler and Gaby G. Dagher}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {GenVote: Blockchain-Based Customizable and Secure Voting Platform}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {152--171}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-25109-3\_8}, doi = {10.1007/978-3-030-25109-3\_8}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MarellaMMD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MartinelliMN18, author = {Fabio Martinelli and Francesco Mercaldo and Vittoria Nardone}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Identifying Insecure Features in Android Applications using Model Checking}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {589--596}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006758105890596}, doi = {10.5220/0006758105890596}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MartinelliMN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MartinelliMNOS18, author = {Fabio Martinelli and Francesco Mercaldo and Vittoria Nardone and Albina Orlando and Antonella Santone}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Who's Driving My Car? {A} Machine Learning based Approach to Driver Identification}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {367--372}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006633403670372}, doi = {10.5220/0006633403670372}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MartinelliMNOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MartinelliMNOS18a, author = {Fabio Martinelli and Francesco Mercaldo and Vittoria Nardone and Albina Orlando and Antonella Santone}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Cluster Analysis for Driver Aggressiveness Identification}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {562--569}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006755205620569}, doi = {10.5220/0006755205620569}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MartinelliMNOS18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MauriCD18, author = {Lara Mauri and Stelvio Cimato and Ernesto Damiani}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Comparative Analysis of Current Cryptocurrencies}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {127--138}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006648801270138}, doi = {10.5220/0006648801270138}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MauriCD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MaynardMS18, author = {Peter Maynard and Kieran McLaughlin and Sakir Sezer}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Using Application Layer Metrics to Detect Advanced {SCADA} Attacks}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {418--425}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006656204180425}, doi = {10.5220/0006656204180425}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/MaynardMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MeinigM18, author = {Michael Meinig and Christoph Meinel}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Securing the Flow - Data Flow Analysis with Operational Node Structures}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {241--250}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006570302410250}, doi = {10.5220/0006570302410250}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MeinigM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MigdalR18, author = {Denis Migdal and Christophe Rosenberger}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Towards a Personal Identity Code Respecting Privacy}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {267--274}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006578902670274}, doi = {10.5220/0006578902670274}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MigdalR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MorissetS18, author = {Charles Morisset and David Sanchez}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {VisABAC: {A} Tool for Visualising {ABAC} Policies}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {117--126}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006647401170126}, doi = {10.5220/0006647401170126}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MorissetS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MorissetS18a, author = {Charles Morisset and David Sanchez}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {On Building a Visualisation Tool for Access Control Policies}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {215--239}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-25109-3\_12}, doi = {10.1007/978-3-030-25109-3\_12}, timestamp = {Tue, 08 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MorissetS18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NagarajanTAS18, author = {Prathiba Nagarajan and Fabio Di Troia and Thomas H. Austin and Mark Stamp}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Autocorrelation Analysis of Financial Botnet Traffic}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {599--606}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006685705990606}, doi = {10.5220/0006685705990606}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/NagarajanTAS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Nazmul0C18, author = {Rumana Nazmul and Md. Rafiqul Islam and Ahsan Raja Chowdhury}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Alignment-free Cancellable Template Generation for Fingerprint based Authentication}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {361--366}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006614303610366}, doi = {10.5220/0006614303610366}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Nazmul0C18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NguyenZRDMN18, author = {Kim Trong Nguyen and Cathel Zitzmann and Florent Retraint and Agn{\`{e}}s Delahaies and Fr{\'{e}}d{\'{e}}ric Morain{-}Nicolier and Hoai Phuong Nguyen}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Face Spoofing Detection for Smartphones using a 3D Reconstruction and the Motion Sensors}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {286--291}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006602202860291}, doi = {10.5220/0006602202860291}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NguyenZRDMN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NinassiVR18, author = {Alexandre Ninassi and Sylvain Vernois and Christophe Rosenberger}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Privacy Compliant Multi-biometric Authentication on Smartphones}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {173--181}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006534601730181}, doi = {10.5220/0006534601730181}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NinassiVR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PatsakisA18, author = {Constantinos Patsakis and Efthimios Alepis}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Knock-Knock: The Unbearable Lightness of Android Notifications}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {52--61}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006603200520061}, doi = {10.5220/0006603200520061}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PatsakisA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PfrangMFB18, author = {Steffen Pfrang and David Meier and Michael Friedrich and J{\"{u}}rgen Beyerer}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Advancing Protocol Fuzzing for Industrial Automation and Control Systems}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {570--580}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006755305700580}, doi = {10.5220/0006755305700580}, timestamp = {Mon, 11 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/PfrangMFB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PonsardG18, author = {Christophe Ponsard and Jeremy Grandclaudon}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Survey and Guidelines for the Design and Deployment of a Cyber Security Label for SMEs}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {240--260}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-25109-3\_13}, doi = {10.1007/978-3-030-25109-3\_13}, timestamp = {Tue, 08 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PonsardG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PonsardGD18, author = {Christophe Ponsard and Jeremy Grandclaudon and Gautier Dallons}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Towards a Cyber Security Label for SMEs: {A} European Perspective -}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {426--431}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006657604260431}, doi = {10.5220/0006657604260431}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PonsardGD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Rosenberger18, author = {Christophe Rosenberger}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Evaluation of Biometric Template Protection Schemes based on a Transformation}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {216--224}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006550502160224}, doi = {10.5220/0006550502160224}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Rosenberger18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SharafaldinLG18, author = {Iman Sharafaldin and Arash Habibi Lashkari and Ali A. Ghorbani}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {108--116}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006639801080116}, doi = {10.5220/0006639801080116}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SharafaldinLG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SharafaldinLG18a, author = {Iman Sharafaldin and Arash Habibi Lashkari and Ali A. Ghorbani}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Detailed Analysis of the {CICIDS2017} Data Set}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {172--188}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-25109-3\_9}, doi = {10.1007/978-3-030-25109-3\_9}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SharafaldinLG18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SheikhalishahiH18, author = {Mina Sheikhalishahi and Mona Hamidi and Fabio Martinelli}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Privacy Preserving Collaborative Agglomerative Hierarchical Clustering Construction}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {261--280}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-25109-3\_14}, doi = {10.1007/978-3-030-25109-3\_14}, timestamp = {Tue, 08 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SheikhalishahiH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SilvaNS18, author = {Marco Silva and Ant{\'{o}}nio Nogueira and Paulo Salvador}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Modular Platform for Customer-Side Detection of {BGP} Redirection Attacks}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {199--206}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006543601990206}, doi = {10.5220/0006543601990206}, timestamp = {Wed, 16 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SilvaNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SinghRS18, author = {Dilpreet Singh and Ron Ruhl and Hamman Samuel}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Attack Tree for Modelling Unauthorized {EMV} Card Transactions at {POS} Terminals}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {494--502}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006723304940502}, doi = {10.5220/0006723304940502}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SinghRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Stach18, author = {Christoph Stach}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Big Brother is Smart Watching You - Privacy Concerns about Health and Fitness Applications}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {13--23}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006537000130023}, doi = {10.5220/0006537000130023}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Stach18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Stach18a, author = {Christoph Stach}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Fine-Grained Privacy Control for Fitness and Health Applications Using the Privacy Management Platform}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {1--25}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-25109-3\_1}, doi = {10.1007/978-3-030-25109-3\_1}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Stach18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/StachM18, author = {Christoph Stach and Bernhard Mitschang}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {{ACCESSORS} - {A} Data-Centric Permission Model for the Internet of Things}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {30--40}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006572100300040}, doi = {10.5220/0006572100300040}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/StachM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/StachM18a, author = {Christoph Stach and Bernhard Mitschang}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Elicitation of Privacy Requirements for the Internet of Things Using {ACCESSORS}}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {40--65}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-25109-3\_3}, doi = {10.1007/978-3-030-25109-3\_3}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/StachM18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ToliP18, author = {Christina{-}Angeliki Toli and Bart Preneel}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Privacy-preserving Biometric Authentication Model for e-Finance Applications}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {353--360}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006611303530360}, doi = {10.5220/0006611303530360}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ToliP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TorresS18, author = {Jos{\'{e}} Torres and Sergio de los Santos}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Malicious {PDF} Documents Detection using Machine Learning Techniques - {A} Practical Approach with Cloud Computing Applications}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {337--344}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006609503370344}, doi = {10.5220/0006609503370344}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TorresS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/VasileiouF18, author = {Ismini Vasileiou and Steven Furnell}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Enhancing Security Education - Recognising Threshold Concepts and Other Influencing Factors}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {398--403}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006646203980403}, doi = {10.5220/0006646203980403}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/VasileiouF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/VasileiouF18a, author = {Ismini Vasileiou and Steven Furnell}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Personalising Security Education: Factors Influencing Individual Awareness and Compliance}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {189--200}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-25109-3\_10}, doi = {10.1007/978-3-030-25109-3\_10}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/VasileiouF18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/VibertCBR18, author = {Beno{\^{\i}}t Vibert and Christophe Charrier and Jean{-}Marie Le Bars and Christophe Rosenberger}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Towards an Optimal Template Reduction for Securing Embedded Fingerprint Devices}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {329--336}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006608903290336}, doi = {10.5220/0006608903290336}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/VibertCBR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WaagsnesU18, author = {Henrik Waagsnes and Nils Ulltveit{-}Moe}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Intrusion Detection System Test Framework for {SCADA} Systems}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {275--285}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006588202750285}, doi = {10.5220/0006588202750285}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WaagsnesU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WangZL18, author = {Wenbo Wang and Tianning Zang and Yuqing Lan}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {The Rapid Extraction of Suspicious Traffic from Passive {DNS}}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {190--198}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006543401900198}, doi = {10.5220/0006543401900198}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WangZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WongH18, author = {Kenneth C. K. Wong and Aaron Hunter}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Managing Cybersecurity Break-ins Using Bluetooth Low Energy Devices to Verify Attackers: {A} Practical Study}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {201--214}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-25109-3\_11}, doi = {10.1007/978-3-030-25109-3\_11}, timestamp = {Fri, 15 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WongH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WurzenbergerSSF18, author = {Markus Wurzenberger and Florian Skopik and Giuseppe Settanni and Roman Fiedler}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {{AECID:} {A} Self-learning Anomaly Detection Approach based on Light-weight Log Parser Models}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {386--397}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006643003860397}, doi = {10.5220/0006643003860397}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WurzenbergerSSF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/YajamanamSTS18, author = {Sravani Yajamanam and Vikash Raja Samuel Selvin and Fabio Di Troia and Mark Stamp}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Deep Learning versus Gist Descriptors for Image-based Malware Classification}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {553--561}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006685805530561}, doi = {10.5220/0006685805530561}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/YajamanamSTS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ZhengW18, author = {Kaiyan Zheng and Peng Wang}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Encryption Schemes based on a Single Permutation: PCBC, POFB, {PCFB} and {PCTR}}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {452--460}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006713804520460}, doi = {10.5220/0006713804520460}, timestamp = {Tue, 17 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/ZhengW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2017s, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93354-2}, doi = {10.1007/978-3-319-93354-2}, isbn = {978-3-319-93353-5}, timestamp = {Fri, 24 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2017s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2018, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, publisher = {SciTePress}, year = {2018}, isbn = {978-989-758-282-0}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AhmadiS17, author = {Ahmad Ahmadi and Reihaneh Safavi{-}Naini}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Distance-bounding Identification}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {202--212}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006211102020212}, doi = {10.5220/0006211102020212}, timestamp = {Thu, 18 May 2017 14:22:34 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AhmadiS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AhmadiS17a, author = {Ahmad Ahmadi and Reihaneh Safavi{-}Naini}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Directional Distance-Bounding Identification}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {197--221}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93354-2\_10}, doi = {10.1007/978-3-319-93354-2\_10}, timestamp = {Fri, 24 Aug 2018 07:46:20 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AhmadiS17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AldayelA17, author = {Mashael Aldayel and Mohammad Alhussain}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Enhanced Identification of Sensitive User Inputs in Mobile Applications}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {506--515}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006238405060515}, doi = {10.5220/0006238405060515}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AldayelA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlepisP17, author = {Efthimios Alepis and Constantinos Patsakis}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {There's Wally! Location Tracking in Android without Permissions}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {278--284}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006125502780284}, doi = {10.5220/0006125502780284}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlepisP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlruhailyBC17, author = {Nada Alruhaily and Behzad Bordbar and Tom Chothia}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Towards an Understanding of the Misclassification Rates of Machine Learning-based Malware Detection Systems}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {101--112}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006174301010112}, doi = {10.5220/0006174301010112}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlruhailyBC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlruhailyCB17, author = {Nada Alruhaily and Tom Chothia and Behzad Bordbar}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Better Understanding of Machine Learning Malware Misclassifcation}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {35--58}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93354-2\_3}, doi = {10.1007/978-3-319-93354-2\_3}, timestamp = {Fri, 24 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlruhailyCB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BannierF17, author = {Arnaud Bannier and Eric Filiol}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Mathematical Backdoors in Symmetric Encryption Systems - Proposal for a Backdoored AES-like Block Cipher}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {622--631}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006244406220631}, doi = {10.5220/0006244406220631}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BannierF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BarghVC17, author = {Mortaza S. Bargh and Marco Vink and Sunil Choenni}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {On Usage Control in Relational Database Management Systems - Obligations and Their Enforcement in Joining Datasets}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {190--201}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006209801900201}, doi = {10.5220/0006209801900201}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BarghVC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BarghVC17a, author = {Mortaza S. Bargh and Marco Vink and Sunil Choenni}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {On Using Obligations for Usage Control in Joining of Datasets}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {173--196}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93354-2\_9}, doi = {10.1007/978-3-319-93354-2\_9}, timestamp = {Fri, 24 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BarghVC17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BernardeschiNDP17, author = {Cinzia Bernardeschi and Marco Di Natale and Gianluca Dini and Maurizio Palmieri}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Verifying Data Secure Flow in {AUTOSAR} Models by Static Analysis}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {704--713}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006288707040713}, doi = {10.5220/0006288707040713}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BernardeschiNDP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Bertino17, author = {Elisa Bertino}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Security and Privacy in the IoT}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {5}, publisher = {SciTePress}, year = {2017}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Bertino17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BeukemaAS17, author = {Wietze J. B. Beukema and Thomas Attema and Harm A. Schotanus}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Internal Network Monitoring and Anomaly Detection through Host Clustering}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {694--703}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006288606940703}, doi = {10.5220/0006288606940703}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BeukemaAS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BeuranPTCTS17, author = {Razvan Beuran and Cuong Pham and Dat Tang and Ken{-}ichi Chinen and Yasuo Tan and Yoichi Shinoda}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {CyTrONE: An Integrated Cybersecurity Training Framework}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {157--166}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006206401570166}, doi = {10.5220/0006206401570166}, timestamp = {Thu, 29 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BeuranPTCTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BuK17, author = {Lake Bu and Mark G. Karpovsky}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Design of Secure and ReliableWireless Transmission Channel for Implantable Medical Devices}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {233--242}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006270502330242}, doi = {10.5220/0006270502330242}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BuK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Cam-Winget17, author = {Nancy Cam{-}Winget}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Sensor Networks as the new Attack Target}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {7}, publisher = {SciTePress}, year = {2017}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Cam-Winget17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CiminoV17, author = {Mario Giovanni C. A. Cimino and Gigliola Vaglini}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Localization and Inhibition of Malicious Behaviors through a Model Checking based Methodology}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {644--652}, publisher = {SciTePress}, year = {2017}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CiminoV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CimitileMM17, author = {Aniello Cimitile and Fabio Martinelli and Francesco Mercaldo}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Machine Learning Meets iOS Malware: Identifying Malicious Applications on Apple Environment}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {487--492}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006217304870492}, doi = {10.5220/0006217304870492}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CimitileMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CostantinoMMP17, author = {Gianpiero Costantino and Fabio Martinelli and Ilaria Matteucci and Marinella Petrocchi}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Analysis of Data Sharing Agreements}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {167--178}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006207501670178}, doi = {10.5220/0006207501670178}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CostantinoMMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CostantinoMMP17a, author = {Gianpiero Costantino and Fabio Martinelli and Ilaria Matteucci and Marinella Petrocchi}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Efficient Detection of Conflicts in Data Sharing Agreements}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {148--172}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93354-2\_8}, doi = {10.1007/978-3-319-93354-2\_8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CostantinoMMP17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CourtoisM17, author = {Nicolas T. Courtois and Rebekah Mercer}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Stealth Address and Key Management Techniques in Blockchain Systems}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {559--566}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006270005590566}, doi = {10.5220/0006270005590566}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/CourtoisM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CozzaTCK17, author = {Vittoria Cozza and Zisis Tsiatsikas and Mauro Conti and Georgios Kambourakis}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Why Snoopy Loves Online Services: An Analysis of (Lack of) Privacy in Online Services}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {431--438}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006207204310438}, doi = {10.5220/0006207204310438}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/CozzaTCK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DamT17, author = {Khanh{-}Huu{-}The Dam and Tayssir Touili}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Malware Detection based on Graph Classification}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {455--463}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006209504550463}, doi = {10.5220/0006209504550463}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DamT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DamT17a, author = {Khanh{-}Huu{-}The Dam and Tayssir Touili}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Extracting Android Malicious Behaviors}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {714--723}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006288807140723}, doi = {10.5220/0006288807140723}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DamT17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DuboisF17, author = {Michel Dubois and Eric Filiol}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Hacking of the {AES} with Boolean Functions}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {599--609}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006091305990609}, doi = {10.5220/0006091305990609}, timestamp = {Wed, 08 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/DuboisF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DutaGT17, author = {Cristina{-}Loredana Duta and Laura Gheorghe and Nicolae Tapus}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Real-time {DSP} Implementations of Voice Encryption Algorithms}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {439--446}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006208304390446}, doi = {10.5220/0006208304390446}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/DutaGT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/EbrahimyP17, author = {Razgar Ebrahimy and Zoya Pourmirza}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Cyber-interdependency in Smart Energy Systems}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {529--537}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006262805290537}, doi = {10.5220/0006262805290537}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/EbrahimyP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/EiblFHSBRE17, author = {G{\"{u}}nther Eibl and Cornelia Ferner and Tobias Hildebrandt and Florian Stertz and Sebastian Burkhart and Stefanie Rinderle{-}Ma and Dominik Engel}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Exploration of the Potential of Process Mining for Intrusion Detection in Smart Metering}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {38--46}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006103900380046}, doi = {10.5220/0006103900380046}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/EiblFHSBRE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FukushimaHK17, author = {Kazuhide Fukushima and Seira Hidano and Shinsaku Kiyomoto}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {White-box Implementation of Stream Cipher}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {263--269}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006115202630269}, doi = {10.5220/0006115202630269}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FukushimaHK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GjertsenGBF17, author = {Eyvind Garder B. Gjertsen and Erlend Andreas Gj{\ae}re and Maria Bartnes and Waldo Rocha Flores}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Gamification of Information Security Awareness and Training}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {59--70}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006128500590070}, doi = {10.5220/0006128500590070}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GjertsenGBF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HadadPSOR17, author = {Tal Hadad and Rami Puzis and Bronislav Sidik and Nir Ofek and Lior Rokach}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Application Marketplace Malware Detection by User Feedback Analysis}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {1--19}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93354-2\_1}, doi = {10.1007/978-3-319-93354-2\_1}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HadadPSOR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HadadSOPR17, author = {Tal Hadad and Bronislav Sidik and Nir Ofek and Rami Puzis and Lior Rokach}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {User Feedback Analysis for Mobile Malware Detection}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {83--94}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006131200830094}, doi = {10.5220/0006131200830094}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HadadSOPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HamadP17, author = {Mohammad Hamad and Vassilis Prevelakis}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Secure APIs for Applications in Microkernel-based Systems}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {553--558}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006265805530558}, doi = {10.5220/0006265805530558}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HamadP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HatinCSR17, author = {Julien Hatin and Estelle Cherrier and Jean{-}Jacques Schwartzmann and Christophe Rosenberger}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Privacy Preserving Transparent Mobile Authentication}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {354--361}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006186803540361}, doi = {10.5220/0006186803540361}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HatinCSR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HaupertM17, author = {Vincent Haupert and Tilo M{\"{u}}ller}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Rest in Protection - {A} Kernel-level Approach to Mitigate {RIP} Tampering}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {25--37}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006083800250037}, doi = {10.5220/0006083800250037}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HaupertM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HerwonoE17, author = {Ian Herwono and Fadi Ali El{-}Moussa}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Collaborative Tool for Modelling Multi-stage Attacks}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {312--317}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006137103120317}, doi = {10.5220/0006137103120317}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HerwonoE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HerwonoE17a, author = {Ian Herwono and Fadi Ali El{-}Moussa}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A System for Detecting Targeted Cyber-Attacks Using Attack Patterns}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {20--34}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93354-2\_2}, doi = {10.1007/978-3-319-93354-2\_2}, timestamp = {Fri, 24 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HerwonoE17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HuffmeyerHMSW17, author = {Marc H{\"{u}}ffmeyer and Pascal Hirmer and Bernhard Mitschang and Ulf Schreier and Matthias Wieland}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {SitAC - {A} System for Situation-aware Access Control - Controlling Access to Sensor Data}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {113--125}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006186501130125}, doi = {10.5220/0006186501130125}, timestamp = {Fri, 29 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HuffmeyerHMSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HuffmeyerHMSW17a, author = {Marc H{\"{u}}ffmeyer and Pascal Hirmer and Bernhard Mitschang and Ulf Schreier and Matthias Wieland}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Situation-Aware Access Control for Industrie 4.0}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {59--83}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93354-2\_4}, doi = {10.1007/978-3-319-93354-2\_4}, timestamp = {Fri, 29 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HuffmeyerHMSW17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HuynenL17, author = {Jean{-}Louis Huynen and Gabriele Lenzini}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {From Situation Awareness to Action: An Information Security Management Toolkit for Socio-technical Security Retrospective and Prospective Analysis}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {213--224}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006211302130224}, doi = {10.5220/0006211302130224}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HuynenL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HuynenL17a, author = {Jean{-}Louis Huynen and Gabriele Lenzini}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {An Information Security Management for Socio-Technical Analysis of System Security}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {222--251}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93354-2\_11}, doi = {10.1007/978-3-319-93354-2\_11}, timestamp = {Fri, 24 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HuynenL17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/IrollaF17, author = {Paul Irolla and Eric Filiol}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Glassbox: Dynamic Analysis Platform for Malware Android Applications on Real Devices}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {610--621}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006094006100621}, doi = {10.5220/0006094006100621}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/IrollaF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KapratwarTS17, author = {Ankita Kapratwar and Fabio Di Troia and Mark Stamp}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Static and Dynamic Analysis of Android Malware}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {653--662}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006256706530662}, doi = {10.5220/0006256706530662}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KapratwarTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KarlssonHS17, author = {Linus Karlsson and Martin Hell and Paul Stankovski}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Improved Greedy Nonrandomness Detectors for Stream Ciphers}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {225--232}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006268202250232}, doi = {10.5220/0006268202250232}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KarlssonHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KarlssonHS17a, author = {Linus Karlsson and Martin Hell and Paul Stankovski}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Not So Greedy: Enhanced Subset Exploration for Nonrandomness Detectors}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {273--294}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93354-2\_13}, doi = {10.1007/978-3-319-93354-2\_13}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KarlssonHS17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KarlzenBH17, author = {Henrik Karlz{\'{e}}n and Johan E. Bengtsson and Jonas Hallberg}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Assessing Information Security Risks using Pairwise Weighting}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {318--324}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006138203180324}, doi = {10.5220/0006138203180324}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KarlzenBH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KiperbergRAZ17, author = {Michael Kiperberg and Amit Resh and Asaf Algawi and Nezer Jacob Zaidenberg}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {System for Executing Encrypted Java Programs}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {245--252}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006078902450252}, doi = {10.5220/0006078902450252}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KiperbergRAZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KippeP17, author = {J{\"{o}}rg Kippe and Steffen Pfrang}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Network and Topology Models to Support {IDS} Event Processing}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {372--379}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006189403720379}, doi = {10.5220/0006189403720379}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KippeP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KrennLS17, author = {Stephan Krenn and Thomas Lor{\"{u}}nser and Christoph Striecks}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Batch-verifiable Secret Sharing with Unconditional Privacy}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {303--311}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006133003030311}, doi = {10.5220/0006133003030311}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KrennLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KumarL17, author = {Gautam Kumar and Brent Lagesse}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Limited Use Cryptographic Tokens in Securing Ephemeral Cloud Servers}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {447--454}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006208704470454}, doi = {10.5220/0006208704470454}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KumarL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LashkariDMG17, author = {Arash Habibi Lashkari and Gerard Draper{-}Gil and Mohammad Saiful Islam Mamun and Ali A. Ghorbani}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Characterization of Tor Traffic using Time based Features}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {253--262}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006105602530262}, doi = {10.5220/0006105602530262}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LashkariDMG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LeeLJML17, author = {Wei{-}Han Lee and Changchang Liu and Shouling Ji and Prateek Mittal and Ruby B. Lee}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Quantification of De-anonymization Risks in Social Networks}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {126--135}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006192501260135}, doi = {10.5220/0006192501260135}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LeeLJML17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LeeLJML17a, author = {Wei{-}Han Lee and Changchang Liu and Shouling Ji and Prateek Mittal and Ruby B. Lee}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {How to Quantify Graph De-anonymization Risks}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {84--104}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93354-2\_5}, doi = {10.1007/978-3-319-93354-2\_5}, timestamp = {Fri, 24 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LeeLJML17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LigierCFS17, author = {Damien Ligier and Sergiu Carpov and Caroline Fontaine and Renaud Sirdey}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Privacy Preserving Data Classification using Inner-product Functional Encryption}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {423--430}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006206704230430}, doi = {10.5220/0006206704230430}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LigierCFS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LopesA17, author = {Arthur Costa Lopes and Diego F. Aranha}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Platform-agnostic Low-intrusion Optical Data Exfiltration}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {474--480}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006211504740480}, doi = {10.5220/0006211504740480}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/LopesA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LuhS0S17, author = {Robert Luh and Gregor Schramm and Markus Wagner and Sebastian Schrittwieser}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Sequitur-based Inference and Analysis Framework for Malicious System Behavior}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {632--643}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006250206320643}, doi = {10.5220/0006250206320643}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/LuhS0S17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LuhSMJ17, author = {Robert Luh and Sebastian Schrittwieser and Stefan Marschalek and Helge Janicke}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Design of an Anomaly-based Threat Detection {\&} Explication System}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {397--402}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006205203970402}, doi = {10.5220/0006205203970402}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LuhSMJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LutasTC17, author = {Andrei Lutas and Daniel Ticle and Octavian Cret}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Hypervisor based Memory Introspection: Challenges, Problems and Limitations}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {285--294}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006125802850294}, doi = {10.5220/0006125802850294}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LutasTC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MartinelliMNSV17, author = {Fabio Martinelli and Francesco Mercaldo and Vittoria Nardone and Antonella Santone and Corrado Aaron Visaggio}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Identifying Mobile Repackaged Applications through Formal Methods}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {673--682}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006287906730682}, doi = {10.5220/0006287906730682}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MartinelliMNSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MartinezEMZ17, author = {V. Gayoso Mart{\'{\i}}nez and Luis Hern{\'{a}}ndez Encinas and Agust{\'{\i}}n Mart{\'{\i}}n Mu{\~{n}}oz and J. Zhang}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Breaking a Hitag2 Protocol with Low Cost Technology}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {579--584}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006271905790584}, doi = {10.5220/0006271905790584}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MartinezEMZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MorenoF17, author = {Carlos Moreno and Sebastian Fischmeister}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {On the Security of Safety-critical Embedded Systems: Who Watches the Watchers? Who Reprograms the Watchers?}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {493--498}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006228304930498}, doi = {10.5220/0006228304930498}, timestamp = {Tue, 06 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/MorenoF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NardoneV17, author = {Vittoria Nardone and Corrado Aaron Visaggio}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {"Mirror, Mirror on the Wall, Who is the Fairest One of All?" - Machine Learning versus Model Checking: {A} Comparison between Two Static Techniques for Malware Family Identification}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {663--672}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006287506630672}, doi = {10.5220/0006287506630672}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NardoneV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OhtakeSZ17, author = {Go Ohtake and Reihaneh Safavi{-}Naini and Liang Feng Zhang}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Outsourcing Scheme of {ABE} Encryption Secure against Malicious Adversary}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {71--82}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006129600710082}, doi = {10.5220/0006129600710082}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/OhtakeSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OmerovicNT17, author = {Aida Omerovic and Marit Kj{\o}snes Natvig and Isabelle C. R. Tardy}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Towards a Privacy Scorecard - Initial Design Exemplified on an Intelligent Transport Systems Service}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {585--593}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006284405850593}, doi = {10.5220/0006284405850593}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/OmerovicNT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OrunsoluS17, author = {Abdul A. Orunsolu and Adesina S. Sodiya}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {An Anti-Phishing Kit Scheme for Secure Web Transactions}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {15--24}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006074900150024}, doi = {10.5220/0006074900150024}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/OrunsoluS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PahiLS17, author = {Timea Pahi and Maria Leitner and Florian Skopik}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Analysis and Assessment of Situational Awareness Models for National Cyber Security Centers}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {334--345}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006149703340345}, doi = {10.5220/0006149703340345}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PahiLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PeacockJV17, author = {Matthew Peacock and Michael N. Johnstone and Craig Valli}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Security Issues with BACnet Value Handling}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {546--552}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006263405460552}, doi = {10.5220/0006263405460552}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/PeacockJV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PeacockJV17a, author = {Matthew Peacock and Michael N. Johnstone and Craig Valli}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {An Exploration of Some Security Issues Within the BACnet Protocol}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {252--272}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93354-2\_12}, doi = {10.1007/978-3-319-93354-2\_12}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/PeacockJV17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PereiraA17, author = {Hilder V. L. Pereira and Diego F. Aranha}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Non-interactive Privacy-preserving k-NN Classifier}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {362--371}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006187703620371}, doi = {10.5220/0006187703620371}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/PereiraA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PfrangM17, author = {Steffen Pfrang and David Meier}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {On the Detection of Replay Attacks in Industrial Automation Networks Operated with Profinet {IO}}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {683--693}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006288106830693}, doi = {10.5220/0006288106830693}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PfrangM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PooryousefA17, author = {Shahrooz Pooryousef and Morteza Amini}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Enhancing Accuracy of Android Malware Detection using Intent Instrumentation}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {380--388}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006195803800388}, doi = {10.5220/0006195803800388}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PooryousefA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Preneel17, author = {Bart Preneel}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {The Future of Information Security}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {9}, publisher = {SciTePress}, year = {2017}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Preneel17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RauchbergerLS17, author = {Julian Rauchberger and Robert Luh and Sebastian Schrittwieser}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Longkit - {A} Universal Framework for {BIOS/UEFI} Rootkits in System Management Mode}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {346--353}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006165603460353}, doi = {10.5220/0006165603460353}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RauchbergerLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RegainiaS17, author = {Loukmen Regainia and S{\'{e}}bastien Salva}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Methodology of Security Pattern Classification and of Attack-Defense Tree Generation}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {136--146}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006198301360146}, doi = {10.5220/0006198301360146}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RegainiaS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ReshetovaBA17, author = {Elena Reshetova and Filippo Bonazzi and N. Asokan}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {SELint: An SEAndroid Policy Analysis Tool}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {47--58}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006126600470058}, doi = {10.5220/0006126600470058}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ReshetovaBA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RiemannG17, author = {Robert Riemann and St{\'{e}}phane Grumbach}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Distributed Protocols at the Rescue for Trustworthy Online Voting}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {499--505}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006228504990505}, doi = {10.5220/0006228504990505}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RiemannG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SalvaR17, author = {S{\'{e}}bastien Salva and Loukmen Regainia}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Security Pattern Classification Based on Data Integration}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {105--129}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93354-2\_6}, doi = {10.1007/978-3-319-93354-2\_6}, timestamp = {Fri, 24 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SalvaR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SantosT17, author = {Sergio de los Santos and Jos{\'{e}} Torres}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Macro Malware Detection using Machine Learning Techniques - {A} New Approach}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {295--302}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006132202950302}, doi = {10.5220/0006132202950302}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SantosT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SedeeqCL17, author = {Iman Sedeeq and Frans Coenen and Alexei Lisitsa}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Attribute Permutation Steganography Detection using Attribute Position Changes Count}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {95--100}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006166400950100}, doi = {10.5220/0006166400950100}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SedeeqCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SinghSACC17, author = {Kalpana Singh and Renaud Sirdey and Fran{\c{c}}ois Artiguenave and David Cohen and Sergiu Carpov}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Towards Confidentiality-strengthened Personalized Genomic Medicine Embedding Homomorphic Cryptography}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {325--333}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006148303250333}, doi = {10.5220/0006148303250333}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SinghSACC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SoaresJ17, author = {Alberto Magno Muniz Soares and Rafael Tim{\'{o}}teo de Sousa J{\'{u}}nior}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Forensic Analysis of Android Runtime {(ART)} Application Heap Objects in Emulated and Real Devices}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {130--147}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93354-2\_7}, doi = {10.1007/978-3-319-93354-2\_7}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SoaresJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SoaresS17, author = {Alberto Magno Muniz Soares and Rafael Tim{\'{o}}teo de Sousa Jr.}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Technique for Extraction and Analysis of Application Heap Objects within Android Runtime {(ART)}}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {147--156}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006204101470156}, doi = {10.5220/0006204101470156}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SoaresS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SonntagM17, author = {Michael Sonntag and Ren{\'{e}} Mayrhofer}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Traffic Statistics of a High-Bandwidth Tor Exit Node}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {270--277}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006124202700277}, doi = {10.5220/0006124202700277}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SonntagM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TelikicherlaAC17, author = {Krishna Chaitanya Telikicherla and Akash Agrawall and Venkatesh Choppella}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Formal Model of Web Security Showing Malicious Cross Origin Requests and Its Mitigation using {CORP}}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {516--523}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006261105160523}, doi = {10.5220/0006261105160523}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TelikicherlaAC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Tezcan17, author = {Cihangir Tezcan}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Brute Force Cryptanalysis of {MIFARE} Classic Cards on {GPU}}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {524--528}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006262705240528}, doi = {10.5220/0006262705240528}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Tezcan17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ThuloE17, author = {Motlatsi i Isaac Thulo and Jan H. P. Eloff}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Towards Optimized Security-aware (O-Sec) {VM} Placement Algorithms}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {411--422}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006206504110422}, doi = {10.5220/0006206504110422}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ThuloE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/UwizeyemunguP17, author = {Sylvestre Uwizeyemungu and Placide Poba{-}Nzaou}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Health Information Exchange and Related IT-security Practices in European Hospitals}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {538--545}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006263305380545}, doi = {10.5220/0006263305380545}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/UwizeyemunguP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/VellaC17, author = {Mark Vella and Rachel Cilia}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Memory Forensics of Insecure Android Inter-app Communications}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {481--486}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006215504810486}, doi = {10.5220/0006215504810486}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/VellaC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/VibertBRC17, author = {Beno{\^{\i}}t Vibert and Jean{-}Marie Le Bars and Christophe Rosenberger and Christophe Charrier}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Fingerprint Class Recognition for Securing {EMV} Transaction}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {403--410}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006205704030410}, doi = {10.5220/0006205704030410}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/VibertBRC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/VolleroBSBMT17, author = {Luca Vollero and Daniele Biondo and Roberto Setola and Gianluca Bocci and Rocco Mammoliti and Alessandra Toma}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Improving the Automatic Identification of Malicious Android Apps in Unofficial Stores through Logo Analysis}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {567--572}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006270305670572}, doi = {10.5220/0006270305670572}, timestamp = {Fri, 18 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/VolleroBSBMT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/VyasMK17, author = {Tanvi Vyas and Andrea Marchesini and Christoph Kerschbaumer}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Extending the Same Origin Policy with Origin Attributes}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {464--473}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006210404640473}, doi = {10.5220/0006210404640473}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/VyasMK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WaltE17, author = {Est{\'{e}}e van der Walt and Jan H. P. Eloff}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Identity Deception Detection on Social Media Platforms}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {573--578}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006271105730578}, doi = {10.5220/0006271105730578}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WaltE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Yesuf17, author = {Ahmed Seid Yesuf}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {A Review of Risk Identification Approaches in the Telecommunication Domain}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {389--396}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006197603890396}, doi = {10.5220/0006197603890396}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Yesuf17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ZhiouaRAKS17, author = {Zeineb Zhioua and Yves Roudier and Rab{\'{e}}a Ameur{-}Boulifa and Takoua Kechiche and Stuart Short}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Tracking Dependent Information Flows}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {179--189}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006209301790189}, doi = {10.5220/0006209301790189}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ZhiouaRAKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2016s, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Information Systems Security and Privacy - Second International Conference, {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {691}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-54433-5}, doi = {10.1007/978-3-319-54433-5}, isbn = {978-3-319-54432-8}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2016s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2017, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, publisher = {SciTePress}, year = {2017}, isbn = {978-989-758-209-7}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AbduL16, author = {Nadia Jemil Abdu and Ulrike Lechner}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {A Threat Analysis Model for Identity and Access Management}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {498--502}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005790304980502}, doi = {10.5220/0005790304980502}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AbduL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AbuelgasimK16, author = {Ammar Abuelgasim and Anne Kayem}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {An Approach to Personalized Privacy Policy Recommendations on Online Social Networks}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {126--137}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005689701260137}, doi = {10.5220/0005689701260137}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AbuelgasimK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AbuelgasimK16a, author = {Ammar Abuelgasim and Anne V. D. M. Kayem}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {A Snow-Ball Algorithm for Automating Privacy Policy Configuration in Social Media}, booktitle = {Information Systems Security and Privacy - Second International Conference, {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {691}, pages = {108--129}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54433-5\_7}, doi = {10.1007/978-3-319-54433-5\_7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AbuelgasimK16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlsmadiXC16, author = {Izzat Alsmadi and Dianxiang Xu and Jin{-}Hee Cho}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Interaction-based Reputation Model in Online Social Networks}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {265--272}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005668302650272}, doi = {10.5220/0005668302650272}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlsmadiXC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BalushiMS16, author = {Abdullah Al Balushi and Kieran McLaughlin and Sakir Sezer}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Contextual Intrusion Alerts for Scada Networks - An Ontology based Approach for Intrusion Alerts Post Processing}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {457--464}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005745504570464}, doi = {10.5220/0005745504570464}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BalushiMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BattistaMNSV16, author = {Pasquale Battista and Francesco Mercaldo and Vittoria Nardone and Antonella Santone and Corrado Aaron Visaggio}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Identification of Android Malware Families with Model Checking}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {542--547}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005809205420547}, doi = {10.5220/0005809205420547}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BattistaMNSV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BhanuDKLLLRRW16, author = {Yogesh Bhanu and Sebastian D{\"{a}}nnart and Henning von Kielpinski and Alexander Laux and Ulrike Lechner and Tobias Lehmann and Andreas Rieb and Martin Riedl and Florian Wolf}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {A Cyberthreat Search Process and Service}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {528--535}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005806605280535}, doi = {10.5220/0005806605280535}, timestamp = {Tue, 24 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BhanuDKLLLRRW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BhattacharjeeSM16, author = {Jaya Bhattacharjee and Anirban Sengupta and Chandan Mazumdar}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {A Quantitative Methodology for Security Risk Assessment of Enterprise Business Processes}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {388--399}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005739703880399}, doi = {10.5220/0005739703880399}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BhattacharjeeSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BittlR16, author = {Sebastian Bittl and Karsten Roscher}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Efficient Authorization Authority Certificate Distribution in VANETs}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {85--96}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005685600850096}, doi = {10.5220/0005685600850096}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BittlR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BittlR16a, author = {Sebastian Bittl and Karsten Roscher}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Efficient Distribution of Certificate Chains in VANETs}, booktitle = {Information Systems Security and Privacy - Second International Conference, {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {691}, pages = {86--107}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54433-5\_6}, doi = {10.1007/978-3-319-54433-5\_6}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BittlR16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BossiAB16, author = {Simone Bossi and Tea Anselmo and Guido Bertoni}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {On {TLS} 1.3 - Early Performance Analysis in the IoT Field}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {117--125}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005688901170125}, doi = {10.5220/0005688901170125}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BossiAB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BottaAGV16, author = {Alessio Botta and Aniello Avallone and Mauro Garofalo and Giorgio Ventre}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Internet Streaming and Network Neutrality: Comparing the Performance of Video Hosting Services}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {514--521}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005798705140521}, doi = {10.5220/0005798705140521}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BottaAGV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BroennerHS16, author = {Simon Broenner and Hans H{\"{o}}fken and Marko Schuba}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Streamlining Extraction and Analysis of Android {RAM} Images}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {255--264}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005652802550264}, doi = {10.5220/0005652802550264}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BroennerHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ButtnerH16, author = {Carsten B{\"{u}}ttner and Sorin A. Huss}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {An Anonymous Geocast Scheme for {ITS} Applications}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {179--189}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005797501790189}, doi = {10.5220/0005797501790189}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ButtnerH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ButtnerH16a, author = {Carsten B{\"{u}}ttner and Sorin A. Huss}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {An Efficient Approach to Anonymous Distribution of {ITS} Messages in Geographic Areas via {LTE} and {IRS} Networks}, booktitle = {Information Systems Security and Privacy - Second International Conference, {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {691}, pages = {192--214}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54433-5\_11}, doi = {10.1007/978-3-319-54433-5\_11}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ButtnerH16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ChenSLLYW16, author = {Kang Chen and Qingni Shen and Cong Li and Yang Luo and Yahui Yang and Zhonghai Wu}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Sift - An Efficient Method for Co-residency Detection on Amazon {EC2}}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {423--431}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005742004230431}, doi = {10.5220/0005742004230431}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ChenSLLYW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Draper-GilLMG16, author = {Gerard Draper{-}Gil and Arash Habibi Lashkari and Mohammad Saiful Islam Mamun and Ali A. Ghorbani}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Characterization of Encrypted and {VPN} Traffic using Time-related Features}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {407--414}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005740704070414}, doi = {10.5220/0005740704070414}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Draper-GilLMG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DutaGT16, author = {Cristina{-}Loredana Duta and Laura Gheorghe and Nicolae Tapus}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Performance Analysis of Real Time Implementations of Voice Encryption Algorithms using Blackfin Processors}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {157--166}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005744601570166}, doi = {10.5220/0005744601570166}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DutaGT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DutaGT16a, author = {Cristina{-}Loredana Duta and Laura Gheorghe and Nicolae Tapus}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Performance Comparison of Voice Encryption Algorithms Implemented on Blackfin Platform}, booktitle = {Information Systems Security and Privacy - Second International Conference, {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {691}, pages = {169--191}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54433-5\_10}, doi = {10.1007/978-3-319-54433-5\_10}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DutaGT16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ErdoganSA16, author = {Gencer Erdogan and Ketil St{\o}len and Jan {\O}yvind Aagedal}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Evaluation of the {CORAL} Approach for Risk-driven Security Testing based on an Industrial Case Study}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {219--226}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005650902190226}, doi = {10.5220/0005650902190226}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ErdoganSA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FerreiraL16, author = {Ana Ferreira and Gabriele Lenzini}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Comparing and Integrating Break-the-Glass and Delegation in Role-based Access Control for Healthcare}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {63--73}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005683600630073}, doi = {10.5220/0005683600630073}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FerreiraL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GeorgescuHOKY16, author = {Marius Georgescu and Hiroaki Hazeyama and Takeshi Okuda and Youki Kadobayashi and Suguru Yamaguchi}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {The {STRIDE} Towards IPv6: {A} Comprehensive Threat Model for IPv6 Transition Technologies}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {243--254}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005652402430254}, doi = {10.5220/0005652402430254}, timestamp = {Wed, 28 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GeorgescuHOKY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GraaCCL16, author = {Mariem Graa and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Jean{-}Louis Lanet}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Tracking Explicit and Control Flows in Java and Native Android Apps Code}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {307--316}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005686603070316}, doi = {10.5220/0005686603070316}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GraaCCL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GrafGRH16, author = {Roman Graf and Sergiu Gordea and Heather M. Ryan and Tibaut Houzanme}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {An Expert System for Facilitating an Institutional Risk Profile Definition for Cyber Situational Awareness}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {347--354}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005738303470354}, doi = {10.5220/0005738303470354}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GrafGRH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HappaFNAGC16, author = {Jassim Happa and Graham Fairclough and Jason R. C. Nurse and Ioannis Agrafiotis and Michael Goldsmith and Sadie Creese}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {A Pragmatic System-failure Assessment and Response Model}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {503--508}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005795105030508}, doi = {10.5220/0005795105030508}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HappaFNAGC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HatinCSFR16, author = {Julien Hatin and Estelle Cherrier and Jean{-}Jacques Schwartzmann and Vincent Frey and Christophe Rosenberger}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {A Continuous LoA Compliant Trust Evaluation Method}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {355--363}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005738403550363}, doi = {10.5220/0005738403550363}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HatinCSFR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HeinS16, author = {Daniel D. Hein and Hossein Saiedian}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Predicting Attack Prone Software Components using Repository Mined Change Metrics}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {554--563}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005812905540563}, doi = {10.5220/0005812905540563}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HeinS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Hong16, author = {Jason I. Hong}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Privacy, Ethics and Big Data}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {5}, publisher = {SciTePress}, year = {2016}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Hong16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HossainSK16, author = {Md. Selim Hossain and Ehsan Saeedi and Yinan Kong}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {High-Performance {FPGA} Implementation of Elliptic Curve Cryptography Processor over Binary Field {GF(2163)}}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {415--422}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005741604150422}, doi = {10.5220/0005741604150422}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HossainSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HranickyMRV16, author = {Radek Hranicky and Petr Matousek and Ondrej Rysav{\'{y}} and Vladim{\'{\i}}r Vesel{\'{y}}}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Experimental Evaluation of Password Recovery in Encrypted Documents}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {299--306}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005685802990306}, doi = {10.5220/0005685802990306}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HranickyMRV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/IshiiIF16, author = {Masahiro Ishii and Atsuo Inomata and Kazutoshi Fujikawa}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {A Construction of a Twisted Ate Pairing on a Family of Kawazoe-Takahashi Curves at 192-bit Security Level and Its Cost Estimate}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {432--439}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005742304320439}, doi = {10.5220/0005742304320439}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/IshiiIF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Izuakor16, author = {Christine Izuakor}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Understanding the Impact of Cyber Security Risks on Safety}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {509--513}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005796805090513}, doi = {10.5220/0005796805090513}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Izuakor16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/JollyVR16, author = {Germain Jolly and Sylvain Vernois and Christophe Rosenberger}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {An Observe-and-Detect Methodology for the Security and Functional Testing of Smart Card Applications}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {282--289}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005682202820289}, doi = {10.5220/0005682202820289}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/JollyVR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KerschbaumerSB16, author = {Christoph Kerschbaumer and Sid Stamm and Stefan Brunthaler}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Injecting {CSP} for Fun and Security}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {15--25}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005650100150025}, doi = {10.5220/0005650100150025}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KerschbaumerSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KhanMLS16, author = {Rafiullah Khan and Kieran McLaughlin and David M. Laverty and Sakir Sezer}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {{IEEE} {C37.118-2} Synchrophasor Communication Framework - Overview, Cyber Vulnerabilities Analysis and Performance Evaluation}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {167--178}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005745001670178}, doi = {10.5220/0005745001670178}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KhanMLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LaviG16, author = {Tamir Lavi and Ehud Gudes}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Trust-based Dynamic {RBAC}}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {317--324}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005687503170324}, doi = {10.5220/0005687503170324}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LaviG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LaxBNNF16, author = {Gianluca Lax and Francesco Buccafurri and Serena Nicolazzo and Antonino Nocera and Lidia Fotia}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {A New Approach for Electronic Signature}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {440--447}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005743404400447}, doi = {10.5220/0005743404400447}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LaxBNNF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Lenz16, author = {Hans{-}Joachim Lenz}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Tax Fraud and Investigation Procedures - Everybody, Every Where, Every Time}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {7--8}, publisher = {SciTePress}, year = {2016}, timestamp = {Fri, 22 Jul 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Lenz16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Lenz16a, author = {Hans{-}Joachim Lenz}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Tax Fraud and Investigation: {A} Framework for a Knowledge Based Methodology}, booktitle = {Information Systems Security and Privacy - Second International Conference, {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {691}, pages = {3--13}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54433-5\_1}, doi = {10.1007/978-3-319-54433-5\_1}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Lenz16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LiSCYW16, author = {Cong Li and Qingni Shen and Kang Chen and Yahui Yang and Zhonghai Wu}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Whispers in the Cloud - {A} Covert Channel using the Result of Creating a Virtual Machine}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {380--387}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005739403800387}, doi = {10.5220/0005739403800387}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LiSCYW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LiSDYW16, author = {Wenting Li and Qingni Shen and Chuntao Dong and Yahui Yang and Zhonghai Wu}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {{DDHCS:} Distributed Denial-of-service Threat to {YARN} Clusters based on Health Check Service}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {146--156}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005741801460156}, doi = {10.5220/0005741801460156}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LiSDYW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LiSDYW16a, author = {Wenting Li and Qingni Shen and Chuntao Dong and Yahui Yang and Zhonghai Wu}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {{SEYARN:} Enhancing Security of {YARN} Clusters Based on Health Check Service}, booktitle = {Information Systems Security and Privacy - Second International Conference, {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {691}, pages = {148--168}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54433-5\_9}, doi = {10.1007/978-3-319-54433-5\_9}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LiSDYW16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MaddarKCY16, author = {Hela Maddar and Wafa Kammoun and Omar Cheikhrouhou and Habib Youssef}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Lightweight Trust Model with High Longevity for Wireless Sensor Networks}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {548--553}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005811005480553}, doi = {10.5220/0005811005480553}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MaddarKCY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MarufuKW16, author = {Anesu M. C. Marufu and Anne V. D. M. Kayem and Stephen D. Wolthusen}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {448--456}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005744304480456}, doi = {10.5220/0005744304480456}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MarufuKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MathewsJF16, author = {M. Lisa Mathews and Anupam Joshi and Tim Finin}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Detecting Botnets using a Collaborative Situational-aware {IDPS}}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {290--298}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005684902900298}, doi = {10.5220/0005684902900298}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MathewsJF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MaynardMS16, author = {Peter Maynard and Kieran McLaughlin and Sakir Sezer}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {465--472}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005745704650472}, doi = {10.5220/0005745704650472}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/MaynardMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Mzila16, author = {Phiwa Mzila}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Review Analysis of Properties for an Ideal Secure Biometric Template Scheme}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {333--339}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005727303330339}, doi = {10.5220/0005727303330339}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Mzila16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NakamuraKTS16, author = {Toru Nakamura and Shinsaku Kiyomoto and Welderufael B. Tesfay and Jetzabel M. Serna}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Personalised Privacy by Default Preferences - Experiment and Analysis}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {53--62}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005681100530062}, doi = {10.5220/0005681100530062}, timestamp = {Mon, 30 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/NakamuraKTS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NakamuraKTS16a, author = {Toru Nakamura and Shinsaku Kiyomoto and Welderufael B. Tesfay and Jetzabel M. Serna}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Easing the Burden of Setting Privacy Preferences: {A} Machine Learning Approach}, booktitle = {Information Systems Security and Privacy - Second International Conference, {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {691}, pages = {44--63}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54433-5\_4}, doi = {10.1007/978-3-319-54433-5\_4}, timestamp = {Mon, 30 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/NakamuraKTS16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PalBM16, author = {Asim K. Pal and Subrata Bose and Arpita Maitra}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Collaborative Information Service - Privacy Algebra for User Defined Security}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {473--481}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005746304730481}, doi = {10.5220/0005746304730481}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PalBM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PaudelQI16, author = {Nilakantha Paudel and Marco Querini and Giuseppe F. Italiano}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Handwritten Signature Verification for Mobile Phones}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {46--52}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005675200460052}, doi = {10.5220/0005675200460052}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PaudelQI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PaudelQI16a, author = {Nilakantha Paudel and Marco Querini and Giuseppe F. Italiano}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Online Handwritten Signature Verification for Low-End Devices}, booktitle = {Information Systems Security and Privacy - Second International Conference, {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {691}, pages = {25--43}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54433-5\_3}, doi = {10.1007/978-3-319-54433-5\_3}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PaudelQI16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Pohn16, author = {Daniela P{\"{o}}hn}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Risk Management for Dynamic Metadata Exchange via a Trusted Third Party}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {227--234}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005651702270234}, doi = {10.5220/0005651702270234}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Pohn16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/QiaoHS16, author = {Kexin Qiao and Lei Hu and Siwei Sun}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {74--84}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005684400740084}, doi = {10.5220/0005684400740084}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/QiaoHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/QiaoHS16a, author = {Kexin Qiao and Lei Hu and Siwei Sun}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Differential Analysis on Simeck and {SIMON} with Dynamic Key-Guessing Techniques}, booktitle = {Information Systems Security and Privacy - Second International Conference, {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {691}, pages = {64--85}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54433-5\_5}, doi = {10.1007/978-3-319-54433-5\_5}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/QiaoHS16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/R16, author = {Feno Heriniaina R.}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {A Privacy Threat for Internet Users in Internet-censoring Countries}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {372--379}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005739203720379}, doi = {10.5220/0005739203720379}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/R16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RampineN16, author = {Edwin T. L. Rampine and Cynthia H. Ngejane}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {A Brief Overview of Hybrid Schemes for Biometric Fingerprint Template Security}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {340--346}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005730503400346}, doi = {10.5220/0005730503400346}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RampineN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ReshetovaBNBA16, author = {Elena Reshetova and Filippo Bonazzi and Thomas Nyman and Ravishankar Borgaonkar and N. Asokan}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Characterizing SEAndroid Policies in the Wild}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {482--489}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005759204820489}, doi = {10.5220/0005759204820489}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ReshetovaBNBA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SedeeqCL16, author = {Iman Sedeeq and Frans Coenen and Alexei Lisitsa}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {A Statistical Approach to the Detection of {HTML} Attribute Permutation Steganography}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {522--527}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005801705220527}, doi = {10.5220/0005801705220527}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SedeeqCL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SettanniSSF16, author = {Giuseppe Settanni and Florian Skopik and Yegor Shovgenya and Roman Fiedler}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {A Collaborative Analysis System for Cross-organization Cyber Incident Handling}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {105--116}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005688301050116}, doi = {10.5220/0005688301050116}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SettanniSSF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ShaoLX16, author = {C. Shao and H. Li and G. Xu}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Quantitative Evaluation of Security on Cryptographic ICs against Fault Injection Attacks}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {97--104}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005686300970104}, doi = {10.5220/0005686300970104}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ShaoLX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ShiHSS16, author = {Danping Shi and Lei Hu and Siwei Sun and Ling Song}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Linear(hull) Cryptanalysis of Round-reduced Versions of {KATAN}}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {364--371}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005739103640371}, doi = {10.5220/0005739103640371}, timestamp = {Sun, 18 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/ShiHSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/StenzelKBR16, author = {Kurt Stenzel and Kuzman Katkalov and Marian Borek and Wolfgang Reif}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Declassification of Information with Complex Filter Functions}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {490--497}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005782904900497}, doi = {10.5220/0005782904900497}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/StenzelKBR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SugioIKH16, author = {Nobuyuki Sugio and Yasutaka Igarashi and Toshinobu Kaneko and Kenichi Higuchi}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {A Practical-time Attack on Reduced-round {MISTY1}}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {235--242}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005652202350242}, doi = {10.5220/0005652202350242}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SugioIKH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SusukiYS16, author = {Hiroya Susuki and Rie Shigetomi Yamaguchi and Shizuo Sakamoto}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Multi-factor Authentication Updating System Evaluation Dynamically for Service Continuity}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {273--281}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005681802730281}, doi = {10.5220/0005681802730281}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SusukiYS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SymeonidisTP16, author = {Iraklis Symeonidis and Pagona Tsormpatzoudi and Bart Preneel}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Collateral Damage of Online Social Network Applications}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {536--541}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005806705360541}, doi = {10.5220/0005806705360541}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SymeonidisTP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TariqS16, author = {Muhammad Imran Tariq and Vito Santarcangelo}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Analysis of {ISO} 27001: 2013 Controls Effectiveness for Cloud Computing}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {201--208}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005648702010208}, doi = {10.5220/0005648702010208}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/TariqS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TeubertGM16, author = {Dominik Teubert and Fred Grossmann and Ulrike Meyer}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Anomaly-based Mobile Malware Detection: System Calls as Source for Features}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {26--36}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005652900260036}, doi = {10.5220/0005652900260036}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TeubertGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Tezcan16, author = {Cihangir Tezcan}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Truncated, Impossible, and Improbable Differential Analysis of {ASCON}}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {325--332}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005689903250332}, doi = {10.5220/0005689903250332}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Tezcan16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TriaLT16, author = {Francesco Di Tria and Ezio Lefons and Filippo Tangorra}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Improving Database Security in Web-based Environments}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {193--200}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005646901930200}, doi = {10.5220/0005646901930200}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TriaLT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Ulltveit-MoePEN16, author = {Nils Ulltveit{-}Moe and Steffen Pfrang and L{\'{a}}szl{\'{o}} Erd{\"{o}}di and H{\'{e}}ctor Nebot}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Mitigating Local Attacks Against a City Traffic Controller}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {209--218}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005649802090218}, doi = {10.5220/0005649802090218}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Ulltveit-MoePEN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/UwizeyemunguP16, author = {Sylvestre Uwizeyemungu and Placide Poba{-}Nzaou}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Security and Privacy Practices in Healthcare Information Systems: {A} Cluster Analysis of European Hospitals}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {37--45}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005654800370045}, doi = {10.5220/0005654800370045}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/UwizeyemunguP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WambachB16, author = {Tim Wambach and Katharina Br{\"{a}}unlich}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Retrospective Study of Third-party Web Tracking}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {138--145}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005741301380145}, doi = {10.5220/0005741301380145}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WambachB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WambachB16a, author = {Tim Wambach and Katharina Br{\"{a}}unlich}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {The Evolution of Third-Party Web Tracking}, booktitle = {Information Systems Security and Privacy - Second International Conference, {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {691}, pages = {130--147}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54433-5\_8}, doi = {10.1007/978-3-319-54433-5\_8}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WambachB16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Weippl16, author = {Edgar R. Weippl}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Ethics in Security Research}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {9}, publisher = {SciTePress}, year = {2016}, timestamp = {Fri, 22 Jul 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Weippl16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WeipplSR16, author = {Edgar R. Weippl and Sebastian Schrittwieser and Sylvi Rennert}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Empirical Research and Research Ethics in Information Security}, booktitle = {Information Systems Security and Privacy - Second International Conference, {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {691}, pages = {14--22}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54433-5\_2}, doi = {10.1007/978-3-319-54433-5\_2}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WeipplSR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/YangCWC16, author = {Ching{-}Nung Yang and Stelvio Cimato and Jihi{-}Han Wu and Song{-}Ruei Cai}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {3-Out-of-n Cheating Prevention Visual Cryptographic Schemes}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {400--406}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005740504000406}, doi = {10.5220/0005740504000406}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/YangCWC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2016, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, publisher = {SciTePress}, year = {2016}, isbn = {978-989-758-167-0}, timestamp = {Wed, 22 Mar 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AblizZ15, author = {Mehmud Abliz and Taieb F. Znati}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Defeating DDoS using Productive Puzzles}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {114--123}, publisher = {SciTePress}, year = {2015}, url = {https://ieeexplore.ieee.org/document/7509937/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AblizZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Accorsi15, author = {Rafael Accorsi}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {A Posteriori Process Security Control}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {IS--5}, publisher = {SciTePress}, year = {2015}, url = {https://ieeexplore.ieee.org/document/7509905/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Accorsi15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlishahiMT15, author = {Mina Sheikh Alishahi and Mohamed Mejri and Nadia Tawbi}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Clustering Spam Emails into Campaigns}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {90--97}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005244500900097}, doi = {10.5220/0005244500900097}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlishahiMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AnjumRPF15, author = {Bushra Anjum and Manish Rajangam and Harry G. Perros and Wenjuan Fan}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Filtering Unfair Users - {A} Hidden Markov Model Approach}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {147--154}, publisher = {SciTePress}, year = {2015}, url = {https://ieeexplore.ieee.org/document/7509945/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AnjumRPF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ArakalaHDH15, author = {Arathi Arakala and Hao Hao and Stephen A. Davis and Kathy J. Horadam}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {The Palm Vein Graph - Feature Extraction and Matching}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {295--303}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005239102950303}, doi = {10.5220/0005239102950303}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ArakalaHDH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ArakalaHDH15a, author = {Arathi Arakala and Hao Hao and Stephen A. Davis and Kathy J. Horadam}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {The Palm Vein Graph for Biometric Authentication}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {199--218}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27668-7\_12}, doi = {10.1007/978-3-319-27668-7\_12}, timestamp = {Fri, 20 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/ArakalaHDH15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BonneyHPS15, author = {Gregor Bonney and Hans H{\"{o}}fken and Benedikt Paffen and Marko Schuba}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {{ICS/SCADA} Security - Analysis of a Beckhoff {CX5020} {PLC}}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {137--142}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005330101370142}, doi = {10.5220/0005330101370142}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BonneyHPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ButtnerH15, author = {Carsten B{\"{u}}ttner and Sorin A. Huss}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {259--269}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005238902590269}, doi = {10.5220/0005238902590269}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ButtnerH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ButtnerH15a, author = {Carsten B{\"{u}}ttner and Sorin A. Huss}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {An Efficient Anonymous Authenticated Key Agreement Protocol for Vehicular Ad-Hoc Networks Based on Ring Signatures and the Elliptic Curve Integrated Encryption Scheme}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {139--159}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27668-7\_9}, doi = {10.1007/978-3-319-27668-7\_9}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ButtnerH15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CourtoisEW15, author = {Nicolas T. Courtois and Pinar Emirdag and Zhouyixing Wang}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {On Detection of Bitcoin Mining Redirection Attacks}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {98--105}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005245600980105}, doi = {10.5220/0005245600980105}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CourtoisEW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Desfray15, author = {Philippe Desfray}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Model Repositories at the Enterprises and Systems Scale - The Modelio Constellation Solution}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {IS--17}, publisher = {SciTePress}, year = {2015}, url = {https://ieeexplore.ieee.org/document/7509917/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Desfray15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FavrePBC15, author = {M{\'{e}}lanie Favre and Sylvaine Picard and Julien Bringer and Herv{\'{e}} Chabanne}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Balancing is the Key - Performing Finger Vein Template Protection using Fuzzy Commitment}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {304--311}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005241403040311}, doi = {10.5220/0005241403040311}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FavrePBC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Ford15, author = {Bryan Ford}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Hiding in a Panopticon - Grand Challenges in Internet Anonymity}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {IS--9}, publisher = {SciTePress}, year = {2015}, url = {https://ieeexplore.ieee.org/document/7509909/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Ford15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Furnell15, author = {Steven Furnell}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {From Passwords to Biometrics - In Pursuit of a Panacea}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {IS--7}, publisher = {SciTePress}, year = {2015}, url = {https://ieeexplore.ieee.org/document/7509907/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Furnell15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Furnell15a, author = {Steven M. Furnell}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {From Passwords to Biometrics: In Pursuit of a Panacea}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {3--15}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27668-7\_1}, doi = {10.1007/978-3-319-27668-7\_1}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Furnell15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HossainZ15, author = {Al Amin Hossain and Weining Zhang}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Privacy and Security Concern of Online Social Networks from User Perspective}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {246--253}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005318202460253}, doi = {10.5220/0005318202460253}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HossainZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HusztiK15, author = {Andrea Huszti and Zita Kov{\'{a}}cs}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Bilinear Pairing-based Hybrid Mixnet with Anonymity Revocation}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {238--245}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005273002380245}, doi = {10.5220/0005273002380245}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HusztiK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Inamura15, author = {Masaki Inamura}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Expansions of {CHAP} - Modificationless on Its Structures of Packet and Data Exchange}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {213--220}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005228002130220}, doi = {10.5220/0005228002130220}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Inamura15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Jacobs15, author = {Stuart Jacobs}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Optimizing Cryptographically based Security in Wireless Networks}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {39--45}, publisher = {SciTePress}, year = {2015}, url = {https://ieeexplore.ieee.org/document/7509928/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Jacobs15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KangGK15, author = {Bolam Kang and Sung Cheol Goh and Myungsun Kim}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Private Web Search with Constant Round Efficiency}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {205--212}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005225602050212}, doi = {10.5220/0005225602050212}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KangGK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KimHKSPP15, author = {Taegyu Kim and Woomin Hwang and Chulmin Kim and Dong{-}Jae Shin and Ki{-}Woong Park and Kyu Ho Park}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Malfinder: Accelerated Malware Classification System through Filtering on Manycore System}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {17--26}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005227500170026}, doi = {10.5220/0005227500170026}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KimHKSPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KimP15, author = {Taegyu Kim and Ki{-}Woong Park}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {MalCore: Toward a Practical Malware Identification System Enhanced with Manycore Technology}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {31--48}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27668-7\_3}, doi = {10.1007/978-3-319-27668-7\_3}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KimP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KnirschENFP15, author = {Fabian Knirsch and Dominik Engel and Christian Neureiter and Marc Fr{\^{\i}}ncu and Viktor K. Prasanna}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Model-driven Privacy Assessment in the Smart Grid}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {173--181}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005229601730181}, doi = {10.5220/0005229601730181}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KnirschENFP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KnirschENFP15a, author = {Fabian Knirsch and Dominik Engel and Christian Neureiter and Marc Fr{\^{\i}}ncu and Viktor K. Prasanna}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Privacy Assessment of Data Flow Graphs for an Advanced Recommender System in the Smart Grid}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {89--106}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27668-7\_6}, doi = {10.1007/978-3-319-27668-7\_6}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KnirschENFP15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KoenePCSAORM15, author = {Ansgar R. Koene and Elvira Perez and Christopher James Carter and Ramona Statache and Svenja Adolphs and Claire O'Malley and Tom Rodden and Derek McAuley}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Research Ethics and Public Trust, Preconditions for Continued Growth of Internet Mediated Research - Public Confidence in Internet Mediate Research}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {163--168}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005331501630168}, doi = {10.5220/0005331501630168}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KoenePCSAORM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KrishnamachariN15, author = {Sriram Krishnamachari and Mehrdad Nojoumian and Kemal Akkaya}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational vs Unconditional Security}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {106--113}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005258501060113}, doi = {10.5220/0005258501060113}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KrishnamachariN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KunzFNP15, author = {Michael Kunz and Ludwig Fuchs and Michael Netter and G{\"{u}}nther Pernul}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Analyzing Quality Criteria in Role-based Identity and Access Management}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {64--72}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005232100640072}, doi = {10.5220/0005232100640072}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KunzFNP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KunzFNP15a, author = {Michael Kunz and Ludwig Fuchs and Michael Netter and G{\"{u}}nther Pernul}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {How to Discover High-Quality Roles? {A} Survey and Dependency Analysis of Quality Criteria in Role Mining}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {49--67}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27668-7\_4}, doi = {10.1007/978-3-319-27668-7\_4}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KunzFNP15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LeeL15, author = {Wei{-}Han Lee and Ruby B. Lee}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Multi-sensor Authentication to Improve Smartphone Security}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {270--280}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005239802700280}, doi = {10.5220/0005239802700280}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LeeL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LeeL15a, author = {Wei{-}Han Lee and Ruby B. Lee}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Implicit Authentication for Smartphone Security}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {160--176}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27668-7\_10}, doi = {10.1007/978-3-319-27668-7\_10}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LeeL15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LehnhardtRSC15, author = {Jan Lehnhardt and Tobias Rho and Adrian Spalka and Armin B. Cremers}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Performance-optimized Indexes for Inequality Searches on Encrypted Data in Practice}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {221--229}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005231702210229}, doi = {10.5220/0005231702210229}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LehnhardtRSC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LimYST15, author = {Hyoyoung Lim and Yukiko Yamaguchi and Hajime Shimada and Hiroki Takakura}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Malware Classification Method Based on Sequence of Traffic Flow}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {230--237}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005235002300237}, doi = {10.5220/0005235002300237}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LimYST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MaiorcaACG15, author = {Davide Maiorca and Davide Ariu and Igino Corona and Giorgio Giacinto}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {A Structural and Content-based Approach for a Precise and Robust Detection of Malicious {PDF} Files}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {27--36}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005264400270036}, doi = {10.5220/0005264400270036}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MaiorcaACG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MaiorcaACG15a, author = {Davide Maiorca and Davide Ariu and Igino Corona and Giorgio Giacinto}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {An Evasion Resilient Approach to the Detection of Malicious {PDF} Files}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {68--85}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27668-7\_5}, doi = {10.1007/978-3-319-27668-7\_5}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MaiorcaACG15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/McDaniel15, author = {Patrick D. McDaniel}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {A New Science of Security Decision Making}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {IS--13}, publisher = {SciTePress}, year = {2015}, url = {https://ieeexplore.ieee.org/document/7509913/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/McDaniel15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MoingS15, author = {Josselyn Le Moing and Ingo Stengel}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {The Smartphone as a Gait Recognition Device - Impact of Selected Parameters on Gait Recognition}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {322--328}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005243003220328}, doi = {10.5220/0005243003220328}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MoingS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MoingS15a, author = {Josselyn Le Moing and Ingo Stengel}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Impact of External Parameters on the Gait Recognition Using a Smartphone}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {219--233}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27668-7\_13}, doi = {10.1007/978-3-319-27668-7\_13}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MoingS15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MukherjeeM15, author = {Preetam Mukherjee and Chandan Mazumdar}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {A Novel Model of Security Policies and Requirements}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {73--82}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005239400730082}, doi = {10.5220/0005239400730082}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MukherjeeM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NarayanaswamySS15, author = {Jayagopal Narayanaswamy and Raghav V. Sampangi and Srinivas Sampalli}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {{HIDE:} Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {124--131}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005273901240131}, doi = {10.5220/0005273901240131}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NarayanaswamySS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NergaardUG15, author = {Henrik Nergaard and Nils Ulltveit{-}Moe and Terje Gj{\o}s{\ae}ter}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {A Scratch-based Graphical Policy Editor for {XACML}}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {182--190}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005240101820190}, doi = {10.5220/0005240101820190}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NergaardUG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NergaardUG15a, author = {Henrik Nergaard and Nils Ulltveit{-}Moe and Terje Gj{\o}s{\ae}ter}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {ViSPE: {A} Graphical Policy Editor for {XACML}}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {107--121}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27668-7\_7}, doi = {10.1007/978-3-319-27668-7\_7}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NergaardUG15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NetterPRR15, author = {Michael Netter and G{\"{u}}nther Pernul and Christian Richthammer and Moritz Riesner}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Privacy in Social Networks: Existing Challenges and Proposals for Solutions}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {16--27}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27668-7\_2}, doi = {10.1007/978-3-319-27668-7\_2}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NetterPRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NoorafizaMUKS15, author = {Matrazali Noorafiza and Hiroshi Maeda and Ryuya Uda and Toshiyuki Kinoshita and M. Shiratori}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Vulnerability Analysis using Network Timestamps in Full Virtualization Virtual Machine}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {83--89}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005242000830089}, doi = {10.5220/0005242000830089}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NoorafizaMUKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Pernul15, author = {G{\"{u}}nther Pernul}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Privacy in Social Networks - Existing Challenges and Proposals for Solution}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {IS--11}, publisher = {SciTePress}, year = {2015}, url = {https://ieeexplore.ieee.org/document/7509911/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Pernul15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PrevelakisH15, author = {Vassilis Prevelakis and Mohammad Hamad}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {A Policy-based Communications Architecture for Vehicles}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {155--162}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005325001550162}, doi = {10.5220/0005325001550162}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PrevelakisH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RoyM15, author = {Puloma Roy and Chandan Mazumdar}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Modelling of Enterprise Insider Threats}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {132--136}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005327901320136}, doi = {10.5220/0005327901320136}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RoyM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SakpereK15, author = {Aderonke Busayo Sakpere and Anne V. D. M. Kayem}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Adaptive Buffer Resizing for Efficient Anonymization of Streaming Data with Minimal Information Loss}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {191--201}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005288901910201}, doi = {10.5220/0005288901910201}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SakpereK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SakpereK15a, author = {Aderonke Busayo Sakpere and Anne V. D. M. Kayem}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Supporting Streaming Data Anonymization with Expressions of User Privacy Preferences}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {122--136}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27668-7\_8}, doi = {10.1007/978-3-319-27668-7\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SakpereK15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ShoufanAB15, author = {Abdulhadi Shoufan and Hassan Alnoon and Joonsang Baek}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {On the Power Consumption of Cryptographic Processors in Civil Microdrones}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {283--290}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005273402830290}, doi = {10.5220/0005273402830290}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ShoufanAB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ShoufanAB15a, author = {Abdulhadi Shoufan and Hassan Alnoon and Joonsang Baek}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Secure Communication in Civil Drones}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {177--195}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27668-7\_11}, doi = {10.1007/978-3-319-27668-7\_11}, timestamp = {Wed, 29 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ShoufanAB15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TimpanaroCCF15, author = {Juan Pablo Timpanaro and Thibault Cholez and Isabelle Chrisment and Olivier Festor}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Evaluation of the Anonymous {I2P} Network's Design Choices Against Performance and Security}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {46--55}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005226600460055}, doi = {10.5220/0005226600460055}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TimpanaroCCF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TondelLJ15, author = {Inger Anne T{\o}ndel and Maria B. Line and Gorm Johansen}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Assessing Information Security Risks of {AMI} - What Makes it so Difficult?}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {56--63}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005228900560063}, doi = {10.5220/0005228900560063}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TondelLJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/UwizeyemunguP15, author = {Sylvestre Uwizeyemungu and Placide Poba{-}Nzaou}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Understanding Information Technology Security Standards Diffusion - An Institutional Perspective}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {5--16}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005227200050016}, doi = {10.5220/0005227200050016}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/UwizeyemunguP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/VibertYVBCR15, author = {Beno{\^{\i}}t Vibert and Zhigang Yao and Sylvain Vernois and Jean{-}Marie Le Bars and Christophe Charrier and Christophe Rosenberger}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {EvaBio Platform for the Evaluation Biometric System - Application to the Optimization of the Enrollment Process for Fingerprints Devices}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {329--335}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005244203290335}, doi = {10.5220/0005244203290335}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/VibertYVBCR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/VibertYVBCR15a, author = {Beno{\^{\i}}t Vibert and Zhigang Yao and Sylvain Vernois and Jean{-}Marie Le Bars and Christophe Charrier and Christophe Rosenberger}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {EvaBio a New Modular Platform to Evaluate Biometric System}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {234--250}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27668-7\_14}, doi = {10.1007/978-3-319-27668-7\_14}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/VibertYVBCR15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/YaoBCR15, author = {Zhigang Yao and Jean{-}Marie Le Bars and Christophe Charrier and Christophe Rosenberger}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Quality Assessment of Fingerprints with Minutiae Delaunay Triangulation}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {315--321}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005235603150321}, doi = {10.5220/0005235603150321}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/YaoBCR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/YaoBCR15a, author = {Zhigang Yao and Jean{-}Marie Le Bars and Christophe Charrier and Christophe Rosenberger}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Fingerprint Quality Assessment Combining Blind Image Quality, Texture and Minutiae Features}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {336--343}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005268403360343}, doi = {10.5220/0005268403360343}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/YaoBCR15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2015, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, publisher = {SciTePress}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7504796/proceeding}, isbn = {978-989-758-081-9}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2015s, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {576}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27668-7}, doi = {10.1007/978-3-319-27668-7}, isbn = {978-3-319-27667-0}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2015s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.