Search dblp for Publications

export results for "ICISSP"

 download as .bib file

@inproceedings{DBLP:conf/icissp/0001UGWM24,
  author       = {Ali Ahmed and
                  Victor Ungureanu and
                  Tarek Gaber and
                  Craig A. Watterson and
                  Fatma Masmoudi},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Smart Home Privacy: {A} Scoping Review},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {635--642},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  timestamp    = {Tue, 02 Apr 2024 14:37:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/0001UGWM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AksoyVMPK24,
  author       = {Ahmet Aksoy and
                  Sundeep Varma and
                  Ganesha Moorthy and
                  Enya Pan and
                  Gorkem Kar},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Comparative Analysis of Feature Selection Algorithms for Automated
                  IoT Device Fingerprinting},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {430--437},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012379100003648},
  doi          = {10.5220/0012379100003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AksoyVMPK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Alcaraz24,
  author       = {Cristina Alcaraz},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Safeguarding Industry 5.0 Ecosystems Through Digital Twins},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {5},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Alcaraz24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AldabjanFCP24,
  author       = {Aseel Aldabjan and
                  Steven Furnell and
                  Xavier Carpent and
                  Maria Papadaki},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Cybersecurity Incident Response Readiness in Organisations},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {262--269},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012487600003648},
  doi          = {10.5220/0012487600003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AldabjanFCP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AlipourjeddiM24,
  author       = {Narges Alipourjeddi and
                  Ali Miri},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Preserving Privacy in High-Dimensional Data Publishing},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {845--852},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012455600003648},
  doi          = {10.5220/0012455600003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AlipourjeddiM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AnderssonS24,
  author       = {Josefin Andersson and
                  Elias Seid},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {The Classification and Impact of Cyber Attacks Targeting Critical
                  Service Providers},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {137--145},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012374500003648},
  doi          = {10.5220/0012374500003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AnderssonS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AurnaHOTKK24,
  author       = {Nahid Ferdous Aurna and
                  Md Delwar Hossain and
                  Hideya Ochiai and
                  Yuzo Taenaka and
                  Latifur Khan and
                  Youki Kadobayashi},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Banking Malware Detection: Leveraging Federated Learning with Conditional
                  Model Updates and Client Data Heterogeneity},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {309--319},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012409700003648},
  doi          = {10.5220/0012409700003648},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AurnaHOTKK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BagheriJD24,
  author       = {Sally Bagheri and
                  Andreas Jacobsson and
                  Paul Davidsson},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Smart Homes as Digital Ecosystems: Exploring Privacy in IoT Contexts},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {869--877},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012458700003648},
  doi          = {10.5220/0012458700003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BagheriJD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BarretoRC024,
  author       = {Jackson Barreto and
                  Paulina Rutecka and
                  Karina Cicha and
                  Pedro Pinto},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {The Status and Management of Web-Related Security at Higher Education
                  Institutions in Poland},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {789--798},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012423000003648},
  doi          = {10.5220/0012423000003648},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BarretoRC024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BozorgiJA24,
  author       = {Arastoo Bozorgi and
                  Mahya Soleimani Jadidi and
                  Jonathan Anderson},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {{UPSS:} {A} Global, Least-Privileged Storage System with Stronger
                  Security and Better Performance},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {660--671},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012306600003648},
  doi          = {10.5220/0012306600003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BozorgiJA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BrodschelmG24,
  author       = {Lukas Brodschelm and
                  Marcus Gelderie},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Using {ILP} to Learn AppArmor Policies},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {766--773},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012379000003648},
  doi          = {10.5220/0012379000003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BrodschelmG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BuchananGU24,
  author       = {William J. Buchanan and
                  Sam Grierson and
                  Daniel Uribe},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear
                  Group Accumulators in Batch Mode},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {226--233},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012454300003648},
  doi          = {10.5220/0012454300003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BuchananGU24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ButtnerG24,
  author       = {Andre B{\"{u}}ttner and
                  Nils Gruschka},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Evaluating the Influence of Multi-Factor Authentication and Recovery
                  Settings on the Security and Accessibility of User Accounts},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {691--700},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012319000003648},
  doi          = {10.5220/0012319000003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ButtnerG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ChakrabortyB24,
  author       = {Olive Chakraborty and
                  Aymen Boudguiga},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {A Decentralized Federated Learning Using Reputation},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {799--806},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012428300003648},
  doi          = {10.5220/0012428300003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ChakrabortyB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ChikulBM24,
  author       = {Pavel Chikul and
                  Hayretdin Bahsi and
                  Olaf Maennel},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {The Design and Implementation of a Semantic Web Framework for the
                  Event-Centric Digital Forensics Analysis},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {570--581},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012437700003648},
  doi          = {10.5220/0012437700003648},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ChikulBM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Conti24,
  author       = {Mauro Conti},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Covert {\&} Side Stories: Threats Evolution in Traditional and
                  Modern Technologies},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {7},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Conti24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DebonoS24,
  author       = {David Debono and
                  Aleandro Sultana},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Desktop Crypto Wallets: {A} Digital Forensic Investigation and Analysis
                  of Remnants and Traces on end-User Machines},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {350--357},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012313000003648},
  doi          = {10.5220/0012313000003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/DebonoS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DeloueeD0K24,
  author       = {Majid Lotfian Delouee and
                  Victoria Degeler and
                  Peter Amthor and
                  Boris Koldehofe},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {{APP-CEP:} Adaptive Pattern-Level Privacy Protection in Complex Event
                  Processing Systems},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {486--497},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012358700003648},
  doi          = {10.5220/0012358700003648},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/DeloueeD0K24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DelvecchioZBS24,
  author       = {Tony Delvecchio and
                  Sander Zeijlemaker and
                  Giancarlo De Bernardis and
                  Michael Siegel},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Revolutionizing Board Cyber-Risk Management Using Collaborative Gaming},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {112--119},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012349400003648},
  doi          = {10.5220/0012349400003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/DelvecchioZBS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DoganB24,
  author       = {Ali Dogan and
                  Kemal Bicakci},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {{KAIME:} Central Bank Digital Currency with Realistic and Modular
                  Privacy},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {672--681},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012308600003648},
  doi          = {10.5220/0012308600003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/DoganB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/EleshinIRI24,
  author       = {Farida Eleshin and
                  Patrick Iradukunda and
                  David Ishimwe Ruberamitwe and
                  Eric Ishimwe},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Your Robot Might Be Inadvertently or Deliberately Spying on You: {A}
                  Critical Analysis of Privacy Practices in the Robotics Industry},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {219--225},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012422200003648},
  doi          = {10.5220/0012422200003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/EleshinIRI24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/FarooqHFR24,
  author       = {Muhammad Ali Farooq and
                  Syed Muhammad Fasih Ul Hassan and
                  Muhammad Umer Farooq and
                  Abid Rafique},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {High Throughput Neural Network for Network Intrusion Detection on
                  FPGAs: An Algorithm-Architecture Interaction},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {423--429},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/FarooqHFR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GazoPH24,
  author       = {Dakouri Gazo and
                  Asma Patel and
                  Mohammad Hasan},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Effectiveness of Malware Incident Management in Security Operations
                  Centres: Trends, Challenges and Research Directions},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {162--169},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012389900003648},
  doi          = {10.5220/0012389900003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/GazoPH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GelderieLB24,
  author       = {Marcus Gelderie and
                  Maximilian Luff and
                  Lukas Brodschelm},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Differential Privacy for Distributed Traffic Monitoring in Smart Cities},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {758--765},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012372700003648},
  doi          = {10.5220/0012372700003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/GelderieLB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GoncalvesM24,
  author       = {Brian Goncalves and
                  Atefeh Mashatan},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Towards Generalized Diffie-Hellman-esque Key Agreement via Generic
                  Split {KEM} Construction},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {594--608},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012454400003648},
  doi          = {10.5220/0012454400003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/GoncalvesM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GuerinC0M24,
  author       = {Sylvain Gu{\'{e}}rin and
                  Jo{\"{e}}l Champeau and
                  Salvador Mart{\'{\i}}nez and
                  Ra{\'{u}}l Mazo},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Security Contracts a Property-Based Approach to Support Security Patterns},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {103--111},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012305600003648},
  doi          = {10.5220/0012305600003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/GuerinC0M24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GuerraMDPF24,
  author       = {Michele Guerra and
                  Roberto Milanese and
                  Michele Deodato and
                  Vittorio Perozzi and
                  Fausto Fasano},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Visual Attention and Privacy Indicators in Android: Insights from
                  Eye Tracking},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {320--329},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012437600003648},
  doi          = {10.5220/0012437600003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/GuerraMDPF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HasegawaHSKFMK24,
  author       = {Kento Hasegawa and
                  Katsutoshi Hanahara and
                  Hiroshi Sugisaki and
                  Minoru Kozu and
                  Kazuhide Fukushima and
                  Yosuke Murakami and
                  Shinsaku Kiyomoto},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Vulnerability Information Sharing Platform for Securing Hardware Supply
                  Chains},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {403--410},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012351800003648},
  doi          = {10.5220/0012351800003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HasegawaHSKFMK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HeinrichWOM24,
  author       = {Tiago Heinrich and
                  Newton Carlos Will and
                  Rafael R. Obelheiro and
                  Carlos Alberto Maziero},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Anywhere on Earth: {A} Look at Regional Characteristics of DRDoS Attacks},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {21--29},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012252700003648},
  doi          = {10.5220/0012252700003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HeinrichWOM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HeinrichWOM24a,
  author       = {Tiago Heinrich and
                  Newton Carlos Will and
                  Rafael R. Obelheiro and
                  Carlos Alberto Maziero},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {A Categorical Data Approach for Anomaly Detection in WebAssembly Applications},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {275--284},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012252800003648},
  doi          = {10.5220/0012252800003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HeinrichWOM24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HintzRS24,
  author       = {Jan Hintz and
                  Jacob R{\"{u}}he and
                  Ingo Siegert},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {AnonEmoFace: Emotion Preserving Facial Anonymization},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {785--788},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012410600003648},
  doi          = {10.5220/0012410600003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HintzRS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HosseinzadehCB24,
  author       = {Arghavan Hosseinzadeh and
                  Jessica Chwalek and
                  Robin Brandst{\"{a}}dter},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Policy-Driven XACML-Based Architecture for Dynamic Enforcement of
                  Multiparty Computation},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {81--89},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012254000003648},
  doi          = {10.5220/0012254000003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HosseinzadehCB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HousselL24,
  author       = {Paul R. B. Houssel and
                  Luis A. Leiva},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {User Re-Authentication via Mouse Movements and Recurrent Neural Networks},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {652--659},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012296600003648},
  doi          = {10.5220/0012296600003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HousselL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HuT24,
  author       = {Wanyu Hu and
                  Vrizlynn L. L. Thing},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {CPE-Identifier: Automated {CPE} Identification and {CVE} Summaries
                  Annotation with Deep Learning and {NLP}},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {67--78},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012403500003648},
  doi          = {10.5220/0012403500003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HuT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/IadarolaMMPS24,
  author       = {Giacomo Iadarola and
                  Fabio Martinelli and
                  Francesco Mercaldo and
                  Luca Petrillo and
                  Antonella Santone},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Cybersecurity-Related Tweet Classification by Explainable Deep Learning},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {438--445},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012411100003648},
  doi          = {10.5220/0012411100003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/IadarolaMMPS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/JakubeitPS24,
  author       = {Philipp Jakubeit and
                  Andreas Peter and
                  Maarten van Steen},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {RoomKey: Extracting a Volatile Key with Information from the Local
                  WiFi Environment Reconstructable Within a Designated Area},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {558--569},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012437500003648},
  doi          = {10.5220/0012437500003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/JakubeitPS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/JawedPKHS24,
  author       = {Mohammed Jawed and
                  Sriram Parameshwaran and
                  Nitesh Kumar and
                  Anand Handa and
                  Sandeep K. Shukla},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {ArkThor: Threat Categorization Based on Malware's {C2} Communication},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {203--210},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012420200003648},
  doi          = {10.5220/0012420200003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/JawedPKHS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KaksonenHLR24,
  author       = {Rauli Kaksonen and
                  Kimmo Halunen and
                  Marko Laakso and
                  Juha R{\"{o}}ning},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Automating IoT Security Standard Testing by Common Security Tools},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {42--53},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012345900003648},
  doi          = {10.5220/0012345900003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KaksonenHLR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KalhorD24,
  author       = {Borna Kalhor and
                  Sanchari Das},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Evaluating the Security and Privacy Risk Postures of Virtual Assistants},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {154--161},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012389500003648},
  doi          = {10.5220/0012389500003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KalhorD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KimL24,
  author       = {Seo{-}Yi Kim and
                  Il{-}Gu Lee},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {{LSTM} Autoencoder-Based Insider Abnormal Behavior Detection Using
                  De-Identified Data},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {609--620},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012458000003648},
  doi          = {10.5220/0012458000003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KimL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KobayashiY24,
  author       = {Ryosuke Kobayashi and
                  Rie Shigetomi Yamaguchi},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Forgery Resistance of User Authentication Methods Using Location,
                  Wi-Fi and Their Correlation},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {709--716},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012323400003648},
  doi          = {10.5220/0012323400003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KobayashiY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KohlerM24,
  author       = {Daniel K{\"{o}}hler and
                  Christoph Meinel},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {The Right Tool for the Job: Contextualization of Cybersecurity Education
                  and Assessment Methods},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {234--241},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012457900003648},
  doi          = {10.5220/0012457900003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KohlerM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Kokolakis24,
  author       = {Spyros Kokolakis},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Security, Privacy and the "Human Factor": Making Sense of the Paradoxes
                  of Security and Privacy Behaviour},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {9--11},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012640600003648},
  doi          = {10.5220/0012640600003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Kokolakis24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KoltaiGA24,
  author       = {Beatrix Koltai and
                  Andr{\'{a}}s Gazdag and
                  Gergely {\'{A}}cs},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Supporting {CAN} Bus Anomaly Detection with Correlation Data},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {285--296},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012360400003648},
  doi          = {10.5220/0012360400003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KoltaiGA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KumarMB24,
  author       = {Vimal Kumar and
                  Juliette Mayo and
                  Khadija Bahiss},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {ADMIn: Attacks on Dataset, Model and Input: {A} Threat Model for {AI}
                  Based Software},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {170--178},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012394100003648},
  doi          = {10.5220/0012394100003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KumarMB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LanzaLO24,
  author       = {Claudia Lanza and
                  Abdelkader Lahmadi and
                  Fabian Osmond},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {An Empirical Study of Ransomware Vulnerabilities Descriptions},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {146--153},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012378700003648},
  doi          = {10.5220/0012378700003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LanzaLO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LevshunV24,
  author       = {Dmitry Levshun and
                  Dmitry Vesnin},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Exploring {BERT} for Predicting Vulnerability Categories in Device
                  Configurations},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {452--461},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012471800003648},
  doi          = {10.5220/0012471800003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LevshunV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LienBK24,
  author       = {Eirik Lien and
                  Karl Magnus Gr{\o}nning Bergh and
                  Sokratis K. Katsikas},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Perceptions of Cyber Security Risk of the Norwegian Advanced Metering
                  Infrastructure},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {187--194},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012414900003648},
  doi          = {10.5220/0012414900003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LienBK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LiuDDS24,
  author       = {Changwei Liu and
                  Louis DiValentin and
                  Aolin Ding and
                  Malek Ben Salem},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Build a Computationally Efficient Strong Defense Against Adversarial
                  Example Attacks},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {358--365},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012315500003648},
  doi          = {10.5220/0012315500003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LiuDDS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LiuG24,
  author       = {Kunlong Liu and
                  Trinabh Gupta},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Federated Learning with Differential Privacy and an Untrusted Aggregator},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {379--389},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012322100003648},
  doi          = {10.5220/0012322100003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LiuG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LuL24,
  author       = {Chun{-}Shien Lu and
                  Chao{-}Hsuan Lin},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Robust Image Deepfake Detection with Perceptual Hashing},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {374--378},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012317800003648},
  doi          = {10.5220/0012317800003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LuL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MaciUC24,
  author       = {Antonio Maci and
                  Giuseppe Urbano and
                  Antonio Coscia},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Deep Q-Networks for Imbalanced Multi-Class Malware Classification},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {342--349},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012303800003648},
  doi          = {10.5220/0012303800003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MaciUC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MackovaBS24,
  author       = {Katerina Mackov{\'{a}} and
                  Dominik Benk and
                  Martin Srot{\'{y}}r},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Enhancing Cybersecurity Through Comparative Analysis of Deep Learning
                  Models for Anomaly Detection},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {682--690},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MackovaBS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MaderL24,
  author       = {Julia Mader and
                  Thomas Lor{\"{u}}nser},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Feasibility of Privacy Preserving Minutiae-Based Fingerprint Matching},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {899--906},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012472300003648},
  doi          = {10.5220/0012472300003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MaderL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MarruccoABM24,
  author       = {Fabrizia Marrucco and
                  Mosabbah Mushir Ahmed and
                  Bechir Bouali and
                  Alieeldin Mady},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {EMplifier: Hybrid Electromagnetic Probe for Side Channel and Fault
                  Injection Analysis},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {815--822},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012431800003648},
  doi          = {10.5220/0012431800003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MarruccoABM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Maugeri24,
  author       = {Marcello Maugeri},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Fuzzing Matter(s): {A} White Paper for Fuzzing the Matter Protocol},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {446--451},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012469200003648},
  doi          = {10.5220/0012469200003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Maugeri24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/McConnellLSW24,
  author       = {John McConnell and
                  Yair Levy and
                  Marti Snyder and
                  Ling Wang},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {The Role of Heuristics and Biases in Linux Server Administrators'
                  Information Security Policy Compliance at Healthcare Organizations},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {30--41},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012297000003648},
  doi          = {10.5220/0012297000003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/McConnellLSW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/McWeeneyMV24,
  author       = {Bernard McWeeney and
                  Ilya Mudritskiy and
                  Renaat Verbruggen},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Analysis of Payload Confidentiality for the IoT/ {LPWAN} Technology
                  'Lora'},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {90--102},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012271400003648},
  doi          = {10.5220/0012271400003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/McWeeneyMV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MeguroKNHFSH24,
  author       = {Ryo Meguro and
                  Hiroya Kato and
                  Shintaro Narisada and
                  Seira Hidano and
                  Kazuhide Fukushima and
                  Takuo Suganuma and
                  Masahiro Hiji},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Gradient-Based Clean Label Backdoor Attack to Graph Neural Networks},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {510--521},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012369500003648},
  doi          = {10.5220/0012369500003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MeguroKNHFSH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MiglioreCT24,
  author       = {Andrea Migliore and
                  Stelvio Cimato and
                  Gabriella Trucco},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Efficient Secure Computation of Edit Distance on Genomic Data},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {878--883},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012459400003648},
  doi          = {10.5220/0012459400003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MiglioreCT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MoralesRBJS24,
  author       = {Gabriel A. Morales and
                  Farhan Tajwar Romit and
                  Adam Bienek{-}Parrish and
                  Patrick Jenkins and
                  Rocky Slavin},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {IoT Device Classification Using Link-Level Features for Traditional
                  Machine Learning and Large Language Models},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {297--308},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012365700003648},
  doi          = {10.5220/0012365700003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MoralesRBJS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MoustafaNGE24,
  author       = {Mariam Moustafa and
                  Arto Niemi and
                  Philip Ginzboorg and
                  Jan{-}Erik Ekberg},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Attestation with Constrained Relying Party},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {701--708},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012319300003648},
  doi          = {10.5220/0012319300003648},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MoustafaNGE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NguyenCHFB24,
  author       = {Huynh Phuong Thanh Nguyen and
                  Zhi Chen and
                  Kento Hasegawa and
                  Kazuhide Fukushima and
                  Razvan Beuran},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {PenGym: Pentesting Training Framework for Reinforcement Learning Agents},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {498--509},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012367300003648},
  doi          = {10.5220/0012367300003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/NguyenCHFB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/OhLJCL24,
  author       = {Ye{-}Sol Oh and
                  Yeon{-}Ji Lee and
                  Jiwon Jang and
                  Hyunwoo Choi and
                  Il{-}Gu Lee},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Implementation and Analysis of Covert Channel Using iBeacon},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {861--868},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012457800003648},
  doi          = {10.5220/0012457800003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/OhLJCL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/OzgunTS24,
  author       = {Kagan {\"{O}}zg{\"{u}}n and
                  Ayse Tosun and
                  Mehmet Tahir Sandikkaya},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {A Recommender System to Detect Distributed Denial of Service Attacks
                  with Network and Transport Layer Features},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {390--397},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012350100003648},
  doi          = {10.5220/0012350100003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/OzgunTS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PailletCC24,
  author       = {Justine Paillet and
                  Olive Chakraborty and
                  Marina Checri},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Pure Multi Key {BGV} Implementation},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {807--814},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012429000003648},
  doi          = {10.5220/0012429000003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/PailletCC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PareK24,
  author       = {Anjali Pare and
                  Prasad A. Kulkarni},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Exploring Errors in Binary-Level {CFG} Recovery},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {546--557},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012435400003648},
  doi          = {10.5220/0012435400003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/PareK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PatzeltNDHHS24,
  author       = {Luca Patzelt and
                  Georg Neugebauer and
                  Meik D{\"{o}}ll and
                  Sacha Hack and
                  Tim Hoener and
                  Marko Schuba},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {A Framework for {E2E} Audit Trails in System Architectures of Different
                  Enterprise Classes},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {750--757},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012367000003648},
  doi          = {10.5220/0012367000003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/PatzeltNDHHS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PauwMD24,
  author       = {C{\'{e}}drick De Pauw and
                  Jan Tobias M{\"{u}}hlberg and
                  Jean{-}Michel Dricot},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {An Improved PUF-Based Privacy-Preserving IoT Protocol for Cloud Storage},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {725--732},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012326000003648},
  doi          = {10.5220/0012326000003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/PauwMD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PirkerH24,
  author       = {Martin Pirker and
                  Robert Haas},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {A Brief Reflection on Trusted Platform Module Support},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {890--898},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012466400003648},
  doi          = {10.5220/0012466400003648},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/PirkerH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PohlerSHHN24,
  author       = {Luca P{\"{o}}hler and
                  Marko Schuba and
                  Tim Hoener and
                  Sacha Hack and
                  Georg Neugebauer},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {An Open-Source Approach to {OT} Asset Management in Industrial Environments},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {128--136},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012362200003648},
  doi          = {10.5220/0012362200003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/PohlerSHHN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PrillardBT24,
  author       = {Ophelia Prillard and
                  Costas Boletsis and
                  Shukun Tokas},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Ethical Design for Data Privacy and User Privacy Awareness in the
                  Metaverse},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {333--341},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012296500003648},
  doi          = {10.5220/0012296500003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/PrillardBT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Raciti24,
  author       = {Mario Raciti},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Conceptualising an Anti-Digital Forensics Kill Chain for Smart Homes},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {831--837},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012449700003648},
  doi          = {10.5220/0012449700003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Raciti24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/RahmanHOKSR24,
  author       = {Md. Mahbubur Rahman and
                  Md Delwar Hossain and
                  Hideya Ochiai and
                  Youki Kadobayashi and
                  Tanjim Sakib and
                  Syed Taha Yeasin Ramadan},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Vision Based Malware Classification Using Deep Neural Network with
                  Hybrid Data Augmentation},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {823--830},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012434400003648},
  doi          = {10.5220/0012434400003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/RahmanHOKSR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/RajputA24,
  author       = {Amitesh Singh Rajput and
                  Arnav Agrawal},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Blockchain for Privacy-Preserving Data Distribution in Healthcare},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {621--631},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012470500003648},
  doi          = {10.5220/0012470500003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/RajputA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/RashidMM24,
  author       = {Fatema Rashid and
                  Ali Miri and
                  Atefeh Mashatan},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {PETRIoT - {A} Privacy Enhancing Technology Recommendation Framework
                  for IoT Computing},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {838--844},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012450900003648},
  doi          = {10.5220/0012450900003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/RashidMM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/RibesMGP24,
  author       = {Stefano Ribes and
                  Fabio Malatesta and
                  Grazia Garzo and
                  Alessandro Palumbo},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Machine Learning-Based Classification of Hardware Trojans in FPGAs
                  Implementing {RISC-V} Cores},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {717--724},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012324200003648},
  doi          = {10.5220/0012324200003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/RibesMGP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/RuedlingerKLHTV24,
  author       = {Andreas R{\"{u}}edlinger and
                  Rebecca Klauser and
                  Pavlos Lamprakis and
                  Markus Happe and
                  Bernhard Tellenbach and
                  Onur Veyisoglu and
                  Ariane Trammell},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {FeedMeter: Evaluating the Quality of Community-Driven Threat Intelligence},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {54--66},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012357600003648},
  doi          = {10.5220/0012357600003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/RuedlingerKLHTV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ScottL0K24,
  author       = {Jackie Scott and
                  Yair Levy and
                  Wei Li and
                  Ajoy Kumar},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Comparing Phishing Training and Campaign Methods for Mitigating Malicious
                  Emails in Organizations},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {643--651},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012281600003648},
  doi          = {10.5220/0012281600003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ScottL0K24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SeidPB24,
  author       = {Elias Seid and
                  Oliver Popov and
                  Fredrik Blix},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {An Automated Adaptive Security Framework for Cyber-Physical Systems},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {242--253},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012469100003648},
  doi          = {10.5220/0012469100003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SeidPB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SinghTG024,
  author       = {Arunab Singh and
                  Maryam Tanha and
                  Yashsvi Girdhar and
                  Aaron Hunter},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Interpretable Android Malware Detection Based on Dynamic Analysis},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {195--202},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012415800003648},
  doi          = {10.5220/0012415800003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SinghTG024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SpitzL24,
  author       = {Stephan Spitz and
                  Alexander Lawall},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Silicon-Integrated Security Solutions Driving IoT Security},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {398--402},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012350200003648},
  doi          = {10.5220/0012350200003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SpitzL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/StavrouPV24,
  author       = {Eliana Stavrou and
                  Andriani Piki and
                  Panayiotis Varnava},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Merging Policy and Practice: Crafting Effective Social Engineering
                  Awareness-Raising Policies},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {179--186},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012410300003648},
  doi          = {10.5220/0012410300003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/StavrouPV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/StevanLLDP24,
  author       = {Antoine Stevan and
                  Thomas Lavaur and
                  J{\'{e}}r{\^{o}}me Lacan and
                  Jonathan Detchart and
                  Tanguy P{\'{e}}rennou},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Performance Evaluation of Polynomial Commitments for Erasure Code
                  Based Information Dispersal},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {522--533},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012377900003648},
  doi          = {10.5220/0012377900003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/StevanLLDP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Stremlau24,
  author       = {Thorsten P. Stremlau},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Integrating Post-Quantum Cryptography into Trusted Computing Group
                  Standards},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {15},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Stremlau24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/TavolatoLEGS24,
  author       = {Paul Tavolato and
                  Robert Luh and
                  Sebastian Eresheim and
                  Simon Gmeiner and
                  Sebastian Schrittwieser},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Comparing the Effectivity of Planned Cyber Defense Controls in Order
                  to Support the Selection Process},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {211--218},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012421800003648},
  doi          = {10.5220/0012421800003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/TavolatoLEGS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/TejapijayaSSK24,
  author       = {Thanawat Tejapijaya and
                  Prarinya Siritanawan and
                  Karin Sumongkayothin and
                  Kazunori Kotani},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Botnet Detection by Integrating Multiple Machine Learning Models},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {366--373},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012317700003648},
  doi          = {10.5220/0012317700003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/TejapijayaSSK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Teseleanu24,
  author       = {George Teseleanu},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Security Analysis of an Image Encryption Based on the Kronecker Xor
                  Product, the Hill Cipher and the Sigmoid Logistic Map},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {467--473},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012307800003648},
  doi          = {10.5220/0012307800003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Teseleanu24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Teseleanu24a,
  author       = {George Teseleanu},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Security Analysis of an Image Encryption Scheme Based on a New Secure
                  Variant of Hill Cipher and 1D Chaotic Maps},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {745--749},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012356600003648},
  doi          = {10.5220/0012356600003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Teseleanu24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Tezcan24,
  author       = {Cihangir Tezcan},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {GPU-Based Brute Force Cryptanalysis of {KLEIN}},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {884--889},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012461900003648},
  doi          = {10.5220/0012461900003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Tezcan24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/TrammellGISZ24,
  author       = {Ariane Trammell and
                  Benjamin Gehring and
                  Marco Isele and
                  Yvo Spielmann and
                  Valentin Zahnd},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Towards Automated Information Security Governance},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {120--127},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012357500003648},
  doi          = {10.5220/0012357500003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/TrammellGISZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/UemuraF24,
  author       = {Shusaku Uemura and
                  Kazuhide Fukushima},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Feasibility of Random Forest with Fully Homomorphic Encryption Applied
                  to Network Data},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {534--545},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012394600003648},
  doi          = {10.5220/0012394600003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/UemuraF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/UmraniV024,
  author       = {Alia Umrani and
                  Apurva K. Vangujar and
                  Paolo Palmieri},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Anonymous Multi-Receiver Certificateless Hybrid Signcryption for Broadcast
                  Communication},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {733--744},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012353400003648},
  doi          = {10.5220/0012353400003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/UmraniV024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ValoggiaSRB24,
  author       = {Philippe Valoggia and
                  Anastasia Sergeeva and
                  Arianna Rossi and
                  Marietjie Botes},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Learning from the Dark Side About How (not) to Engineer Privacy: Analysis
                  of Dark Patterns Taxonomies from an {ISO} 29100 Perspective},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {774--784},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012393100003648},
  doi          = {10.5220/0012393100003648},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ValoggiaSRB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/VaneziKP24,
  author       = {Evangelia Vanezi and
                  Georgia M. Kapitsaki and
                  Anna Philippou},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {What's Your Purpose? An Approach to Incorporating {GDPR} Purposes
                  into Requirements Analysis},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {907--914},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012474400003648},
  doi          = {10.5220/0012474400003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/VaneziKP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/VijayanFK24,
  author       = {Visakh K. Vijayan and
                  Maria Francis and
                  Kotaro Kataoka},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Off-Chaining Approaches for Cost-Efficiency in Threshold-Based Elliptic
                  Curve Systems over Blockchains},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {411--422},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012361600003648},
  doi          = {10.5220/0012361600003648},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/VijayanFK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/WakabayashiWNW24,
  author       = {Ryousuke Wakabayashi and
                  Lihua Wang and
                  Ryo Nojima and
                  Atsushi Waseda},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Security Evaluation of Decision Tree Meets Data Anonymization},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {853--860},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012456600003648},
  doi          = {10.5220/0012456600003648},
  timestamp    = {Wed, 03 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/WakabayashiWNW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/WillM24,
  author       = {Newton Carlos Will and
                  Carlos Alberto Maziero},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Enclave Management Models for Safe Execution of Software Components},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {474--485},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012322600003648},
  doi          = {10.5220/0012322600003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/WillM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ZaidenbergKME24,
  author       = {Nezer Jacob Zaidenberg and
                  Michael Kiperberg and
                  Eliav Menachi and
                  Asaf Eitani},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Detecting eBPF Rootkits Using Virtualization and Memory Forensics},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {254--261},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012470800003648},
  doi          = {10.5220/0012470800003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ZaidenbergKME24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ZareiV24,
  author       = {Amir Zarei and
                  Staal Amund Vinterbo},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Secure Multiparty Computation of the Laplace Mechanism},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {582--593},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012453700003648},
  doi          = {10.5220/0012453700003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ZareiV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icissp/2024,
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0000184400003648},
  doi          = {10.5220/0000184400003648},
  isbn         = {978-989-758-683-5},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/2024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/000123,
  author       = {Luca Vigan{\`{o}}},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Cybersecurity, Nicolas Cage and Peppa Pig},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {7},
  publisher    = {SciTePress},
  year         = {2023},
  timestamp    = {Thu, 11 May 2023 10:52:54 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/000123.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/0001V23,
  author       = {Alexandros Karakasidis and
                  Vassilios Vassalos},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {On the Design of {GDPR} Compliant Workflows for Responsible Neuroimage
                  Data Sharing},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {600--607},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011743000003405},
  doi          = {10.5220/0011743000003405},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/0001V23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AlJuaidLS23,
  author       = {Nouf Al{-}Juaid and
                  Alexei Lisitsa and
                  Sven Schewe},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Secure Joint Querying Over Federated Graph Databases Utilising {SMPC}
                  Protocols},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {210--217},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011798900003405},
  doi          = {10.5220/0011798900003405},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AlJuaidLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AlagarswamyBDLMSTW23,
  author       = {Devi Padmavathi Alagarswamy and
                  Christian Berghoff and
                  Vasilios Danos and
                  Fabian Langer and
                  Thora Markert and
                  Georg Schneider and
                  Arndt von Twickel and
                  Fabian Woitschek},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Towards Audit Requirements for AI-Based Systems in Mobility Applications},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {339--348},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011619500003405},
  doi          = {10.5220/0011619500003405},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AlagarswamyBDLMSTW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AlaniMM23,
  author       = {Mohammed M. Alani and
                  Atefeh Mashatan and
                  Ali Miri},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {XMeDNN: An Explainable Deep Neural Network System for Intrusion Detection
                  in Internet of Medical Things},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {144--151},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011749200003405},
  doi          = {10.5220/0011749200003405},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AlaniMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AlbaneseCCIMMRS23,
  author       = {Daniele Albanese and
                  Rosangela Casolare and
                  Giovanni Ciaramella and
                  Giacomo Iadarola and
                  Fabio Martinelli and
                  Francesco Mercaldo and
                  Marco Russodivito and
                  Antonella Santone},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {StegWare: {A} Novel Malware Model Exploiting Payload Steganography
                  and Dynamic Compilation},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {741--748},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011859000003405},
  doi          = {10.5220/0011859000003405},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AlbaneseCCIMMRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AlghamdiF23,
  author       = {Samiah Alghamdi and
                  Steven Furnell},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Assessing Security and Privacy Insights for Smart Home Users},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {592--599},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011741800003405},
  doi          = {10.5220/0011741800003405},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AlghamdiF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AntognazzaBPS23,
  author       = {Francesco Antognazza and
                  Alessandro Barenghi and
                  Gerardo Pelosi and
                  Ruggero Susella},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {An Efficient Unified Architecture for Polynomial Multiplications in
                  Lattice-Based Cryptoschemes},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {81--88},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011654200003405},
  doi          = {10.5220/0011654200003405},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AntognazzaBPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BalajiAF23,
  author       = {Kaushik Krishnan Balaji and
                  Dimah Almani and
                  Steven Furnell},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Assessing the Impact of Attacks on Connected and Autonomous Vehicles
                  in Vehicular Ad Hoc Networks},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {774--782},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011894200003405},
  doi          = {10.5220/0011894200003405},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BalajiAF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BartschGKM0PP23,
  author       = {Witali Bartsch and
                  Prosanta Gope and
                  Elif Bilge Kavun and
                  Owen Millwood and
                  Andriy Panchenko and
                  Aryan Mohammadi Pasikhani and
                  Ilia Polian},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Design Rationale for Symbiotically Secure Key Management Systems in
                  IoT and Beyond},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {583--591},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011726900003405},
  doi          = {10.5220/0011726900003405},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BartschGKM0PP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BauspiessVMCKR23,
  author       = {Pia Bauspie{\ss} and
                  Lasse Vad and
                  H{\aa}vard Myrekrok and
                  Anamaria Costache and
                  Jascha Kolberg and
                  Christian Rathgeb},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {On the Feasibility of Fully Homomorphic Encryption of Minutiae-Based
                  Fingerprint Representations},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {462--470},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011657100003405},
  doi          = {10.5220/0011657100003405},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BauspiessVMCKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BelalisSA23,
  author       = {Ilias Belalis and
                  Georgios P. Spathoulas and
                  Ioannis Anagnostopoulos},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Evading Detection During Network Reconnaissance},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {528--534},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011685900003405},
  doi          = {10.5220/0011685900003405},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BelalisSA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BellizziVCH23,
  author       = {Jennifer Bellizzi and
                  Mark Vella and
                  Christian Colombo and
                  Julio C. Hernandez{-}Castro},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Using Infrastructure-Based Agents to Enhance Forensic Logging of Third-Party
                  Applications},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {389--401},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011634700003405},
  doi          = {10.5220/0011634700003405},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BellizziVCH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BodeiCVMM23,
  author       = {Chiara Bodei and
                  Gianpiero Costantino and
                  Marco De Vincenzi and
                  Ilaria Matteucci and
                  Anna Monreale},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Vehicle Data Collection: {A} Privacy Policy Analysis and Comparison},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {626--633},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011779500003405},
  doi          = {10.5220/0011779500003405},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BodeiCVMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BorcherdingPGB23,
  author       = {Anne Borcherding and
                  Nikolay Penkov and
                  Mark Giraud and
                  J{\"{u}}rgen Beyerer},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {SWaTEval: An Evaluation Framework for Stateful Web Application Testing},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {430--441},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011652200003405},
  doi          = {10.5220/0011652200003405},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BorcherdingPGB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Bracamonte0L23,
  author       = {Vanessa Bracamonte and
                  Sebastian Pape and
                  Sascha L{\"{o}}bner},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Comparing the Effect of Privacy and Non-Privacy Social Media Photo
                  Tools on Factors of Privacy Concern},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {669--676},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011784900003405},
  doi          = {10.5220/0011784900003405},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Bracamonte0L23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Bryce23,
  author       = {Ciar{\'{a}}n Bryce},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {An Analysis of Cybersecurity Awareness Efforts for Swiss SMEs},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {381--388},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011631100003405},
  doi          = {10.5220/0011631100003405},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Bryce23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BullockE23,
  author       = {Harrison Bullock and
                  Matthew Edwards},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Temporal Constraints in Online Dating Fraud Classification},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {535--542},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011689000003405},
  doi          = {10.5220/0011689000003405},
  timestamp    = {Fri, 30 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BullockE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BurdiakDTLRKMPFKHMV23,
  author       = {Patrik Burdiak and
                  Emir Dervisevic and
                  Amina Tankovic and
                  Filip Lauterbach and
                  Jan Rozhon and
                  Lukas Kapicak and
                  Libor Michalek and
                  Dzana Pivac and
                  Merima Fehric and
                  Enio Kaljic and
                  Mirza Hamza and
                  Miralem Mehic and
                  Miroslav Vozn{\'{a}}k},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Use-Case Denial of Service Attack on Actual Quantum Key Distribution
                  Nodes},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {89--94},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011672000003405},
  doi          = {10.5220/0011672000003405},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BurdiakDTLRKMPFKHMV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Chabanne23,
  author       = {Herv{\'{e}} Chabanne},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {A Biometric Self Authentication Scheme},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {749--756},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011874400003405},
  doi          = {10.5220/0011874400003405},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Chabanne23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ChenLX23,
  author       = {Shaojie Chen and
                  Bo Lang and
                  Chong Xie},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Fast-Flux Malicious Domain Name Detection Method Based on Domain Resolution
                  Spatial Features},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {240--251},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011872700003405},
  doi          = {10.5220/0011872700003405},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/ChenLX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DantasBKNS23,
  author       = {Yuri Gil Dantas and
                  Simon Barner and
                  Pei Ke and
                  Vivek Nigam and
                  Ulrich Sch{\"{o}}pp},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Automating Vehicle {SOA} Threat Analysis Using a Model-Based Methodology},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {180--191},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011786400003405},
  doi          = {10.5220/0011786400003405},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/DantasBKNS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DantasS23,
  author       = {Yuri Gil Dantas and
                  Ulrich Sch{\"{o}}pp},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {SeCloud: Computer-Aided Support for Selecting Security Measures for
                  Cloud Architectures},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {264--275},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011901900003405},
  doi          = {10.5220/0011901900003405},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/DantasS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DienerB23,
  author       = {Michael Diener and
                  Thomas Bolz},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Cloud Inspector: {A} Tool-Based Approach for Public Administrations
                  to Establish Information Security Processes Towards Public Clouds},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {543--551},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011694900003405},
  doi          = {10.5220/0011694900003405},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/DienerB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DieterichSSSP23,
  author       = {Am{\'{e}}lie Dieterich and
                  Matthias Schopp and
                  Lars Stiemert and
                  Christoph Steininger and
                  Daniela P{\"{o}}hn},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Evaluation of Persistence Methods Used by Malware on Microsoft Windows
                  Systems},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {552--559},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011710200003405},
  doi          = {10.5220/0011710200003405},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/DieterichSSSP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DimaratosP23,
  author       = {Anastasia Dimaratos and
                  Daniela P{\"{o}}hn},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Evaluation Scheme to Analyze Keystroke Dynamics Methods},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {357--365},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011626100003405},
  doi          = {10.5220/0011626100003405},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/DimaratosP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DorafshanianM23,
  author       = {Mahboobeh Dorafshanian and
                  Mohamed Mejri},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Differential Privacy: Toward a Better Tuning of the Privacy Budget
                  ({\(\epsilon\)}) Based on Risk},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {783--792},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011896600003405},
  doi          = {10.5220/0011896600003405},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/DorafshanianM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DrevinSDKA23,
  author       = {G{\"{u}}nther R. Drevin and
                  Dirk P. Snyman and
                  Lynette Drevin and
                  Hennie A. Kruger and
                  Johann Allers},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {The Story of Safety Snail and Her e-Mail: {A} Digital Wellness and
                  Cybersecurity Serious Game for Pre-School Children},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {519--527},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011682200003405},
  doi          = {10.5220/0011682200003405},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/DrevinSDKA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/EipperP23,
  author       = {Andreas Eipper and
                  Daniela P{\"{o}}hn},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {How to Design a Blue Team Scenario for Beginners on the Example of
                  Brute-Force Attacks on Authentications},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {477--484},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011667300003405},
  doi          = {10.5220/0011667300003405},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/EipperP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ElsteC23,
  author       = {James R. Elste and
                  David T. Croasdell},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Cyber Teaching Hospitals: Developing Cyber Workforce Competence},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {643--650},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011783800003405},
  doi          = {10.5220/0011783800003405},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ElsteC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/EmuraY23,
  author       = {Keita Emura and
                  Masato Yoshimi},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {An End-to-End Encrypted Cache System with Time-Dependent Access Control},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {321--328},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011617900003405},
  doi          = {10.5220/0011617900003405},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/EmuraY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ErdoganHBTP23,
  author       = {Gencer Erdogan and
                  Ragnhild Halvorsrud and
                  Costas Boletsis and
                  Simeon Tverdal and
                  John Brian Pickering},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Cybersecurity Awareness and Capacities of SMEs},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {296--304},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011609600003405},
  doi          = {10.5220/0011609600003405},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ErdoganHBTP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/FarhatAMZ23,
  author       = {Saida Farhat and
                  Manel Abdelkader and
                  Amel Meddeb{-}Makhlouf and
                  Faouzi Zarai},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Evaluation of DoS/DDoS Attack Detection with {ML} Techniques on {CIC-IDS2017}
                  Dataset},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {287--295},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011605700003405},
  doi          = {10.5220/0011605700003405},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/FarhatAMZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/FloresGKBV23,
  author       = {C{\'{e}}sar V{\'{a}}squez Flores and
                  Jos{\'{e}} Gonzales and
                  Miranda Kajtazi and
                  Joseph Bugeja and
                  Bahtijar Vogel},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Human Factors for Cybersecurity Awareness in a Remote Work Environment},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {608--616},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011746000003405},
  doi          = {10.5220/0011746000003405},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/FloresGKBV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GalliBJCP23,
  author       = {Filippo Galli and
                  Sayan Biswas and
                  Kangsoo Jung and
                  Tommaso Cucinotta and
                  Catuscia Palamidessi},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Group Privacy for Personalized Federated Learning},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {252--263},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011885000003405},
  doi          = {10.5220/0011885000003405},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/GalliBJCP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GuerraMOF23,
  author       = {Michele Guerra and
                  Roberto Milanese and
                  Rocco Oliveto and
                  Fausto Fasano},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {RPCDroid: Runtime Identification of Permission Usage Contexts in Android
                  Applications},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {714--721},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011797200003405},
  doi          = {10.5220/0011797200003405},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/GuerraMOF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HanTT0ML23,
  author       = {Chansu Han and
                  Akira Tanaka and
                  Jun'ichi Takeuchi and
                  Takeshi Takahashi and
                  Tomohiro Morikawa and
                  Tsung{-}Nan Lin},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Towards Long-Term Continuous Tracing of Internet-Wide Scanning Campaigns
                  Based on Darknet Analysis},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {617--625},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011769300003405},
  doi          = {10.5220/0011769300003405},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HanTT0ML23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HasegawaHF23,
  author       = {Kento Hasegawa and
                  Seira Hidano and
                  Kazuhide Fukushima},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Automating {XSS} Vulnerability Testing Using Reinforcement Learning},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {70--80},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011653600003405},
  doi          = {10.5220/0011653600003405},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HasegawaHF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HeidHRS23,
  author       = {Kris Heid and
                  Jens Heider and
                  Matthias Ritscher and
                  Jan{-}Peter Stotz},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Tracing Cryptographic Agility in Android and iOS Apps},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {38--45},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011620000003405},
  doi          = {10.5220/0011620000003405},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HeidHRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HoferRSM23,
  author       = {Philipp Hofer and
                  Michael Roland and
                  Philipp Schwarz and
                  Ren{\'{e}} Mayrhofer},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Efficient Aggregation of Face Embeddings for Decentralized Face Recognition
                  Deployments},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {279--286},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011599300003405},
  doi          = {10.5220/0011599300003405},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HoferRSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ImanCJBG23,
  author       = {Mohammad Reza Heidari Iman and
                  Pavel Chikul and
                  Gert Jervan and
                  Hayretdin Bahsi and
                  Tara Ghasempouri},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Anomalous File System Activity Detection Through Temporal Association
                  Rule Mining},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {733--740},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011805100003405},
  doi          = {10.5220/0011805100003405},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ImanCJBG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/JulkuK23,
  author       = {Jukka Julku and
                  Markku Kyl{\"{a}}np{\"{a}}{\"{a}}},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Towards a Rust {SDK} for Keystone Enclave Application Development},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {29--37},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011611900003405},
  doi          = {10.5220/0011611900003405},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/JulkuK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KaksonenHR23,
  author       = {Rauli Kaksonen and
                  Kimmo Halunen and
                  Juha R{\"{o}}ning},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Vulnerabilities in IoT Devices, Backends, Applications, and Components},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {659--668},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011784400003405},
  doi          = {10.5220/0011784400003405},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KaksonenHR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KamalI23,
  author       = {Ahmad Akmal Aminuddin Mohd Kamal and
                  Keiichi Iwamura},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {TTP-Aided Searchable Encryption of Documents Using Threshold Secret
                  Sharing},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {442--449},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011653700003405},
  doi          = {10.5220/0011653700003405},
  timestamp    = {Thu, 16 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/KamalI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Khoumsi23,
  author       = {Ahmed Khoumsi},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Automata-Based Study of Dynamic Access Control Policies},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {218--227},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011819700003405},
  doi          = {10.5220/0011819700003405},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Khoumsi23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KiperbergRKZ23,
  author       = {Michael Kiperberg and
                  Aleksei Rozman and
                  Aleksei Kuraev and
                  Nezer Zaidenberg},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {{PDIFT:} {A} Practical Dynamic Information-Flow Tracker},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {192--198},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011786800003405},
  doi          = {10.5220/0011786800003405},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KiperbergRKZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KlineK23,
  author       = {Jace Kline and
                  Prasad Kulkarni},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {A Framework for Assessing Decompiler Inference Accuracy of Source-Level
                  Program Constructs},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {228--239},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011872600003405},
  doi          = {10.5220/0011872600003405},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KlineK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KokesL23,
  author       = {Josef Kokes and
                  R{\'{o}}bert L{\'{o}}rencz},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {On the Use of Multiple Approximations in the Linear Cryptanalysis
                  of Baby Rijndael},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {174--179},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011785400003405},
  doi          = {10.5220/0011785400003405},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KokesL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LauterbachMRBZV23,
  author       = {Filip Lauterbach and
                  Libor Michalek and
                  Piotr Rydlichowski and
                  Patrik Burdiak and
                  Jaroslav Zdralek and
                  Miroslav Vozn{\'{a}}k},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Measurements of Cross-Border Quantum Key Distribution Link},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {418--423},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011647200003405},
  doi          = {10.5220/0011647200003405},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LauterbachMRBZV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LealWMMBM023,
  author       = {Erika A. Leal and
                  Cimone Wright{-}Hamor and
                  Joseph B. Manzano and
                  Nicholas J. Multari and
                  Kevin J. Barker and
                  David O. Manz and
                  Jiang Ming},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Assessing Risk in High Performance Computing Attacks},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {793--803},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011900500003405},
  doi          = {10.5220/0011900500003405},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LealWMMBM023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LeichtH23,
  author       = {Jens Leicht and
                  Maritta Heisel},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {{P2BAC:} Privacy Policy Based Access Control Using {P-LPL}},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {686--697},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011788500003405},
  doi          = {10.5220/0011788500003405},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LeichtH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Leitner23,
  author       = {Maria Leitner},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {A Scenario-Driven Cyber Security Awareness Exercise Utilizing Dynamic
                  Polling: Methodology and Lessons Learned},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {634--642},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011780400003405},
  doi          = {10.5220/0011780400003405},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Leitner23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LiZSZ23,
  author       = {Lu Li and
                  Guanling Zhao and
                  Kai Shi and
                  Fengjun Zhang},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {A Stochastic Game Model for Cloud Platform Security},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {152--162},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011778900003405},
  doi          = {10.5220/0011778900003405},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LiZSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LohmannAM23,
  author       = {Pedro A. Lohmann and
                  Carlos Albuquerque and
                  Raphael Machado},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Systematic Literature Review of Threat Modeling Concepts},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {163--173},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011783000003405},
  doi          = {10.5220/0011783000003405},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LohmannAM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LoumponiasRDTVK23,
  author       = {Kostas Loumponias and
                  Sotiris Raptis and
                  Eleni Darra and
                  Theodora Tsikrika and
                  Stefanos Vrochidis and
                  Ioannis Kompatsiaris},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Forecasting Cyber-Attacks to Destination Ports Using Machine Learning},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {757--764},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011891000003405},
  doi          = {10.5220/0011891000003405},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LoumponiasRDTVK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LuanHB23,
  author       = {Kaiying Luan and
                  Ragnhild Halvorsrud and
                  Costas Boletsis},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Evaluation of a Tool to Increase Cybersecurity Awareness Among Non-experts
                  {(SME} Employees)},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {509--518},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011680500003405},
  doi          = {10.5220/0011680500003405},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LuanHB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MarquesS23,
  author       = {Ant{\'{o}}nio Marques and
                  Bruno Sousa},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {{CHARRA-PM:} An Attestation Approach Relying on the Passport Model},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {349--356},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011623600003405},
  doi          = {10.5220/0011623600003405},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MarquesS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MaugeriDBP23,
  author       = {Marcello Maugeri and
                  Cristian Daniele and
                  Giampaolo Bella and
                  Erik Poll},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Evaluating the Fork-Awareness of Coverage-Guided Fuzzers},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {424--429},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011648600003405},
  doi          = {10.5220/0011648600003405},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MaugeriDBP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MercaldoMS23,
  author       = {Francesco Mercaldo and
                  Fabio Martinelli and
                  Antonella Santone},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {An Explainable Convolutional Neural Network for Dynamic Android Malware
                  Detection},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {305--312},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011609800003405},
  doi          = {10.5220/0011609800003405},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MercaldoMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NarisadaBFK23,
  author       = {Shintaro Narisada and
                  Shohei Beppu and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Concrete Quantum Circuits to Prepare Generalized Dicke States on a
                  Quantum Machine},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {329--338},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011618000003405},
  doi          = {10.5220/0011618000003405},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/NarisadaBFK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NeupaneS23,
  author       = {Ashish Neupane and
                  Weiqing Sun},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Exploring False Demand Attacks in Power Grids with High {PV} Penetration},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {124--134},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011695800003405},
  doi          = {10.5220/0011695800003405},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/NeupaneS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NichoS23,
  author       = {Mathew Nicho and
                  Ibrahim Sabry},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Bypassing Multiple Security Layers Using Malicious {USB} Human Interface
                  Device},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {501--508},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011677100003405},
  doi          = {10.5220/0011677100003405},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/NichoS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/OhiraDAF23,
  author       = {Shuji Ohira and
                  Araya Kibrom Desta and
                  Ismail Arai and
                  Kazutoshi Fujikawa},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {{IVNPROTECT:} Isolable and Traceable Lightweight CAN-Bus Kernel-Level
                  Protection for Securing in-Vehicle Communication},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {17--28},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011605300003405},
  doi          = {10.5220/0011605300003405},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/OhiraDAF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/OkadaF23,
  author       = {Hiroki Okada and
                  Kazuhide Fukushima},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Revisiting the {DFT} Test in the {NIST} {SP} 800-22 Randomness Test
                  Suite},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {366--372},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011626300003405},
  doi          = {10.5220/0011626300003405},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/OkadaF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Pavlov0E23,
  author       = {Vitomir Pavlov and
                  Florian Hahn and
                  Mohammad El{-}Hajj},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Security Aspects of Digital Twins in IoT},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {560--567},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011714500003405},
  doi          = {10.5220/0011714500003405},
  timestamp    = {Wed, 13 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/Pavlov0E23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/RabasBL23,
  author       = {Tom{\'{a}}s Rabas and
                  Jir{\'{\i}} Bucek and
                  R{\'{o}}bert L{\'{o}}rencz},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {{SPA} Attack on {NTRU} Protected Implementation with Sparse Representation
                  of Private Key},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {135--143},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011729200003405},
  doi          = {10.5220/0011729200003405},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/RabasBL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/RaschkeHS23,
  author       = {Philip Raschke and
                  Patrick Herbke and
                  Henry Schwerdtner},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {t.ex-Graph: Automated Web Tracker Detection Using Centrality Metrics
                  and Data Flow Characteristics},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {199--209},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011787300003405},
  doi          = {10.5220/0011787300003405},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/RaschkeHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/RetiES23,
  author       = {Daniel Reti and
                  Karina Elzer and
                  Hans Dieter Schotten},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {{SCANTRAP:} Protecting Content Management Systems from Vulnerability
                  Scanners with Cyber Deception and Obfuscation},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {485--492},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011667400003405},
  doi          = {10.5220/0011667400003405},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/RetiES23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/RieraAPR23,
  author       = {Francisco Blas {Izquierdo Riera} and
                  Magnus Almgren and
                  Pablo Picazo{-}Sanchez and
                  Christian Rohner},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Clipaha: {A} Scheme to Perform Password Stretching on the Client},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {58--69},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011653200003405},
  doi          = {10.5220/0011653200003405},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/RieraAPR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/RochaAP23,
  author       = {Alexandra Rocha and
                  Rui Alves and
                  Tiago Pedrosa},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Query Log Analysis for {SQL} Injection Detection},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {471--476},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011667200003405},
  doi          = {10.5220/0011667200003405},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/RochaAP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/RocklWM23,
  author       = {Jonas R{\"{o}}ckl and
                  Adam Wagenh{\"{a}}user and
                  Tilo M{\"{u}}ller},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Veto: Prohibit Outdated Edge System Software from Booting},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {46--57},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011627700003405},
  doi          = {10.5220/0011627700003405},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/RocklWM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/RuelleGR23,
  author       = {Fr{\'{e}}d{\'{e}}ric Ruell{\'{e}} and
                  Quentin Guella{\"{e}}n and
                  Arnaud Rosay},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {{SHOID:} {A} Secure Herd of IoT Devices Firmware Update Protocol},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {373--380},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011628000003405},
  doi          = {10.5220/0011628000003405},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/RuelleGR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SamirJ23,
  author       = {Areeg Samir and
                  H{\aa}vard Dagenborg Johansen},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {A Self-Configuration Controller To Detect, Identify, and Recover Misconfiguration
                  at IoT Edge Devices and Containerized Cluster System},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {765--773},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011893700003405},
  doi          = {10.5220/0011893700003405},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SamirJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SeidPB23,
  author       = {Elias Seid and
                  Oliver Popov and
                  Fredrik Blix},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Towards Security Attack Event Monitoring for Cyber Physical-Systems},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {722--732},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011803400003405},
  doi          = {10.5220/0011803400003405},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SeidPB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SeitzTGH23,
  author       = {Ludwig Seitz and
                  Marco Tiloca and
                  Martin Gunnarsson and
                  Rikard H{\"{o}}glund},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Secure Software Updates for IoT Based on Industry Requirements},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {698--705},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011790100003405},
  doi          = {10.5220/0011790100003405},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SeitzTGH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Stremlau23,
  author       = {Thorsten P. Stremlau},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Protecting IoT Ecosystems and {AI} Leveraging {TCG} Standards},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {11},
  publisher    = {SciTePress},
  year         = {2023},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Stremlau23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SugaiSTO23,
  author       = {Risa Sugai and
                  Yuichi Sei and
                  Yasuyuki Tahara and
                  Akihiko Ohsuga},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {A k-Anonymization Method for Social Network Data with Link Prediction},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {493--500},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011676800003405},
  doi          = {10.5220/0011676800003405},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SugaiSTO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/TangOB23,
  author       = {Feiyang Tang and
                  Bjarte M. {\O}stvold and
                  Magiel Bruntink},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Identifying Personal Data Processing for Code Review},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {568--575},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011725700003405},
  doi          = {10.5220/0011725700003405},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/TangOB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/TavolatoLE23,
  author       = {Paul Tavolato and
                  Robert Luh and
                  Sebastian Eresheim},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {A Game Theoretic Analysis of Cyber Threats},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {706--713},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011792700003405},
  doi          = {10.5220/0011792700003405},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/TavolatoLE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Teseleanu23,
  author       = {George Teseleanu},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Security Analysis of a Color Image Encryption Scheme Based on Dynamic
                  Substitution and Diffusion Operations},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {410--417},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011646300003405},
  doi          = {10.5220/0011646300003405},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Teseleanu23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/TokasES23,
  author       = {Shukun Tokas and
                  Gencer Erdogan and
                  Ketil St{\o}len},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Privacy-Aware IoT: State-of-the-Art and Challenges},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {450--461},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011656400003405},
  doi          = {10.5220/0011656400003405},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/TokasES23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/TranNE23,
  author       = {Thanh Tran and
                  Phu Nguyen and
                  Gencer Erdogan},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {A Systematic Review of Secure IoT Data Sharing},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {95--105},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011674200003405},
  doi          = {10.5220/0011674200003405},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/TranNE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Volkamer23,
  author       = {Melanie Volkamer},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Usable Security: Security 'Warnings' 2.0},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {5},
  publisher    = {SciTePress},
  year         = {2023},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Volkamer23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/WalkowP23,
  author       = {Marcus Walkow and
                  Daniela P{\"{o}}hn},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Systematically Searching for Identity-Related Information in the Internet
                  with {OSINT} Tools},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {402--409},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011644200003405},
  doi          = {10.5220/0011644200003405},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/WalkowP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/WangAH23,
  author       = {Yichao Wang and
                  Budi Arief and
                  Julio C. Hernandez{-}Castro},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Dark Ending: What Happens when a Dark Web Market Closes down},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {106--117},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011681600003405},
  doi          = {10.5220/0011681600003405},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/WangAH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/WatanabeMKU23,
  author       = {Ryu Watanabe and
                  Takashi Matsunaka and
                  Ayumu Kubota and
                  Jumpei Urakawa},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Machine Learning Based Prediction of Vulnerability Information Subject
                  to a Security Alert},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {313--320},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011613700003405},
  doi          = {10.5220/0011613700003405},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/WatanabeMKU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/WolfLT23,
  author       = {Zechariah Wolf and
                  Eric Larson and
                  Mitchell A. Thornton},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Data Leakage in Isolated Virtualized Enterprise Computing Systems},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {118--123},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011691900003405},
  doi          = {10.5220/0011691900003405},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/WolfLT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ZhangWHWZS23,
  author       = {Hanwen Zhang and
                  Wenyong Wang and
                  Lisheng Huang and
                  Junrui Wu and
                  Fengjun Zhang and
                  Kai Shi},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Correlating Intrusion Detection with Attack Graph on Virtual Computer
                  Networkings},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {651--658},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011784100003405},
  doi          = {10.5220/0011784100003405},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ZhangWHWZS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Zhong023,
  author       = {Yinzheng Zhong and
                  Alexei Lisitsa},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Online Transition-Based Feature Generation for Anomaly Detection in
                  Concurrent Data Streams},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {576--582},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011726700003405},
  doi          = {10.5220/0011726700003405},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Zhong023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ZolotavkinBLMK23,
  author       = {Yevhen Zolotavkin and
                  Yurii Baryshev and
                  Vitalii Lukichov and
                  Jannik M{\"{a}}hn and
                  Stefan K{\"{o}}psell},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Improving Unlinkability in {C-ITS:} {A} Methodology For Optimal Obfuscation},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {677--685},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011786900003405},
  doi          = {10.5220/0011786900003405},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ZolotavkinBLMK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icissp/2022s,
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Information Systems Security and Privacy - 7th International Conference,
                  {ICISSP} 2021, Virtual Event, February 11-13, 2021, and 8th International
                  Conference, {ICISSP} 2022, Virtual Event, February 9-11, 2022, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1851},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-37807-2},
  doi          = {10.1007/978-3-031-37807-2},
  isbn         = {978-3-031-37806-5},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/2022s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icissp/2023,
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0000168400003405},
  doi          = {10.5220/0000168400003405},
  isbn         = {978-989-758-624-8},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AarlandG22,
  author       = {Mari Aarland and
                  Terje Gj{\o}s{\ae}ter},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Digital Supply Chain Vulnerabilities in Critical Infrastructure: {A}
                  Systematic Literature Review on Cybersecurity in the Energy Sector},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {326--333},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010803800003120},
  doi          = {10.5220/0010803800003120},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AarlandG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Al-JuaidLS22,
  author       = {Nouf Al{-}Juaid and
                  Alexei Lisitsa and
                  Sven Schewe},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {{SMPG:} Secure Multi Party Computation on Graph Databases},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {463--471},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010876200003120},
  doi          = {10.5220/0010876200003120},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/Al-JuaidLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AlShuhailS22,
  author       = {Asma AlShuhail and
                  Jianhue Shao},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Semantic Attack on Disassociated Transactions},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {60--72},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010780500003120},
  doi          = {10.5220/0010780500003120},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AlShuhailS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AlasmariW022,
  author       = {Sultan Alasmari and
                  Weichao Wang and
                  Yu Wang},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Incentivisation of Outsourced Network Testing: View from Platform
                  Perspective},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {499--506},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010897300003120},
  doi          = {10.5220/0010897300003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/AlasmariW022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AlbalawiVC22,
  author       = {Abdullah Albalawi and
                  Vassilios G. Vassilakis and
                  Radu Calinescu},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Protecting Shared Virtualized Environments against Cache Side-channel
                  Attacks},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {507--514},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010897800003120},
  doi          = {10.5220/0010897800003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/AlbalawiVC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AliHJLST22,
  author       = {Muhammad Ali and
                  Monem Hamid and
                  Jacob Jasser and
                  Joachim Lerman and
                  Samod Shetty and
                  Fabio Di Troia},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Profile Hidden Markov Model Malware Detection and {API} Call Obfuscation},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {688--695},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011005800003120},
  doi          = {10.5220/0011005800003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/AliHJLST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AlmarwaniK022,
  author       = {Maryam Almarwani and
                  Boris Konev and
                  Alexei Lisitsa},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Zero Update Encryption Adjustment on Encrypted Database Queries},
  booktitle    = {Information Systems Security and Privacy - 7th International Conference,
                  {ICISSP} 2021, Virtual Event, February 11-13, 2021, and 8th International
                  Conference, {ICISSP} 2022, Virtual Event, February 9-11, 2022, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1851},
  pages        = {25--47},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-37807-2\_2},
  doi          = {10.1007/978-3-031-37807-2\_2},
  timestamp    = {Wed, 06 Sep 2023 16:33:07 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AlmarwaniK022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AlmarwaniKL22,
  author       = {Maryam Almarwani and
                  Boris Konev and
                  Alexei Lisitsa},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Efficient and Secure Encryption Adjustment for {JSON} Data},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {307--313},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010791300003120},
  doi          = {10.5220/0010791300003120},
  timestamp    = {Fri, 03 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AlmarwaniKL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AnagrehLV22,
  author       = {Mohammad Anagreh and
                  Peeter Laud and
                  Eero Vainikko},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Privacy-preserving Parallel Computation of Shortest Path Algorithms
                  with Low Round Complexity},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {37--47},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010775700003120},
  doi          = {10.5220/0010775700003120},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AnagrehLV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BaksiU22,
  author       = {Rudra Prasad Baksi and
                  Shambhu J. Upadhyaya},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Game Theoretic Analysis of Ransomware: {A} Preliminary Study},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {242--251},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011006600003120},
  doi          = {10.5220/0011006600003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/BaksiU22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BaksiU22a,
  author       = {Rudra Prasad Baksi and
                  Shambhu J. Upadhyaya},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {A Game Theoretic Approach to the Design of Mitigation Strategies for
                  Generic Ransomware},
  booktitle    = {Information Systems Security and Privacy - 7th International Conference,
                  {ICISSP} 2021, Virtual Event, February 11-13, 2021, and 8th International
                  Conference, {ICISSP} 2022, Virtual Event, February 9-11, 2022, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1851},
  pages        = {104--124},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-37807-2\_6},
  doi          = {10.1007/978-3-031-37807-2\_6},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BaksiU22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BarberF22,
  author       = {Flora Barber and
                  Steven Furnell},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Benchmarking Consumer Data and Privacy Knowledge in Connected and
                  Autonomous Vehicles},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {426--434},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010862000003120},
  doi          = {10.5220/0010862000003120},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BarberF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BarberF22a,
  author       = {Flora Barber and
                  Steven Furnell},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Evaluating Consumer Understanding and Awareness of Connected and Autonomous
                  Vehicle Data Privacy},
  booktitle    = {Information Systems Security and Privacy - 7th International Conference,
                  {ICISSP} 2021, Virtual Event, February 11-13, 2021, and 8th International
                  Conference, {ICISSP} 2022, Virtual Event, February 9-11, 2022, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1851},
  pages        = {48--71},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-37807-2\_3},
  doi          = {10.1007/978-3-031-37807-2\_3},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BarberF22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BartonBPSA22,
  author       = {Jon Barton and
                  William J. Buchanan and
                  Nikolaos Pitropakis and
                  Sarwar Sayeed and
                  Will Abramson},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Post Quantum Cryptography Analysis of {TLS} Tunneling on a Constrained
                  Device},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {551--561},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010903000003120},
  doi          = {10.5220/0010903000003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/BartonBPSA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BorcherdingFKMB22,
  author       = {Anne Borcherding and
                  Lukas Feldmann and
                  Markus Karch and
                  Ankush Meshram and
                  J{\"{u}}rgen Beyerer},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Towards a Better Understanding of Machine Learning based Network Intrusion
                  Detection Systems in Industrial Networks},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {314--325},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010795900003120},
  doi          = {10.5220/0010795900003120},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BorcherdingFKMB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BorcherdingTB22,
  author       = {Anne Borcherding and
                  Philipp Takacs and
                  J{\"{u}}rgen Beyerer},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Cluster Crash: Learning from Recent Vulnerabilities in Communication
                  Stacks},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {334--344},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010806300003120},
  doi          = {10.5220/0010806300003120},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BorcherdingTB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BracamonteI22,
  author       = {Vanessa Bracamonte and
                  Takamasa Isohara},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Comparing Perception of Disclosure of Different Types of Information
                  Related to Automated Tools},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {544--550},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010901200003120},
  doi          = {10.5220/0010901200003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/BracamonteI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/CanU22,
  author       = {{\"{O}}zg{\"{u}} Can and
                  Murat Osman {\"{U}}nalir},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Revisiting Ontology Based Access Control: The Case for Ontology Based
                  Data Access},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {515--518},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010898100003120},
  doi          = {10.5220/0010898100003120},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/CanU22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/CanU22a,
  author       = {{\"{O}}zg{\"{u}} Can and
                  Murat Osman {\"{U}}nalir},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Improving Data Security and Privacy for Ontology Based Data Access},
  booktitle    = {Information Systems Security and Privacy - 7th International Conference,
                  {ICISSP} 2021, Virtual Event, February 11-13, 2021, and 8th International
                  Conference, {ICISSP} 2022, Virtual Event, February 9-11, 2022, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1851},
  pages        = {72--90},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-37807-2\_4},
  doi          = {10.1007/978-3-031-37807-2\_4},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/CanU22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/CarrierVTL22,
  author       = {Tristan Carrier and
                  Princy Victor and
                  Ali Tekeoglu and
                  Arash Habibi Lashkari},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Detecting Obfuscated Malware using Memory Feature Engineering},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {177--188},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010908200003120},
  doi          = {10.5220/0010908200003120},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/CarrierVTL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/CatuognoG22,
  author       = {Luigi Catuogno and
                  Clemente Galdi},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {On Tracking Ransomware on the File System},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {210--219},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010985000003120},
  doi          = {10.5220/0010985000003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/CatuognoG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ChenLTH22,
  author       = {Shang{-}Wen Chen and
                  Jian{-}Wei Liao and
                  Chia{-}Wei Tien and
                  Jung{-}Hsin Hsiao},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Impact of Cross-standard Cell Libraries on Machine Learning based
                  Hardware Trojan Detection},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {420--425},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010858800003120},
  doi          = {10.5220/0010858800003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/ChenLTH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ChoudhuryLN22,
  author       = {Robert Choudhury and
                  Zhiyuan Luo and
                  Khuong An Nguyen},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Malware in Motion},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {595--602},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010976200003120},
  doi          = {10.5220/0010976200003120},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ChoudhuryLN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/CilliMMV22,
  author       = {Claudio Cilli and
                  Giulio Magnanini and
                  Lorenzo Manduca and
                  Fabrizio Venettoni},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {"Fake News Detector": An Automatic System for the Reliability Evaluation
                  of Digital News},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {15--24},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010769700003120},
  doi          = {10.5220/0010769700003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/CilliMMV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/CivekT22,
  author       = {Asl{\'{\i}} Basak Civek and
                  Cihangir Tezcan},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Differential-linear Attacks on Permutation Ciphers Revisited: Experiments
                  on Ascon and DryGASCON},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {202--209},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010982600003120},
  doi          = {10.5220/0010982600003120},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/CivekT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/CivekT22a,
  author       = {Asl{\'{\i}} Basak Civek and
                  Cihangir Tezcan},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Experimentally Obtained Differential-Linear Distinguishers for Permutations
                  of {ASCON} and DryGASCON},
  booktitle    = {Information Systems Security and Privacy - 7th International Conference,
                  {ICISSP} 2021, Virtual Event, February 11-13, 2021, and 8th International
                  Conference, {ICISSP} 2022, Virtual Event, February 9-11, 2022, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1851},
  pages        = {91--103},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-37807-2\_5},
  doi          = {10.1007/978-3-031-37807-2\_5},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/CivekT22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DaoudaghM22,
  author       = {Said Daoudagh and
                  Eda Marchetti},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {The {GDPR} Compliance and Access Control Systems: Challenges and Research
                  Opportunities},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {571--578},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010912300003120},
  doi          = {10.5220/0010912300003120},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/DaoudaghM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DavidianVK22,
  author       = {Matan Davidian and
                  Natalia Vanetik and
                  Michael Kiperberg},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Ransomware Detection with Deep Neural Networks},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {656--663},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011008000003120},
  doi          = {10.5220/0011008000003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/DavidianVK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DaviesS22,
  author       = {Jack R. Davies and
                  Jianhua Shao},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Utility of Anonymised Data in Decision Tree Derivation},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {273--280},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010778300003120},
  doi          = {10.5220/0010778300003120},
  timestamp    = {Fri, 14 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/DaviesS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DemetriouBH22,
  author       = {Phil Demetriou and
                  Ingolf Becker and
                  Stephen Hailes},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Who Watches the Watchers: {A} Multi-Task Benchmark for Anomaly Detection},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {579--586},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010915000003120},
  doi          = {10.5220/0010915000003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/DemetriouBH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Ebad22,
  author       = {Shouki A. Ebad},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {An Exploratory Study of Why UMLsec Is Not Adopted},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {357--364},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010821400003120},
  doi          = {10.5220/0010821400003120},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Ebad22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ElmiligiS22,
  author       = {Haytham Elmiligi and
                  Sherif Saad},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {iProfile: Collecting and Analyzing Keystroke Dynamics from Android
                  Users},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {621--628},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011002600003120},
  doi          = {10.5220/0011002600003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/ElmiligiS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/FahlanderE0D22,
  author       = {Per Fahlander and
                  Mathias Ekstedt and
                  Preetam Mukherjee and
                  Ashish Kumar Dwivedi},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Containment Strategy Formalism in a Probabilistic Threat Modelling
                  Framework},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {108--120},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010823800003120},
  doi          = {10.5220/0010823800003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/FahlanderE0D22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GaficTKHQ22,
  author       = {Melisa Gafic and
                  Simon Tjoa and
                  Peter Kieseberg and
                  Otto Hellwig and
                  Gerald Quirchmayr},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Cyber Exercises in Computer Science Education},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {404--411},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010845800003120},
  doi          = {10.5220/0010845800003120},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/GaficTKHQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HallJLS22,
  author       = {Joanne L. Hall and
                  Jomin John and
                  Jessica Liebig and
                  Anju Skariah},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Age Bias in Finger Vein Biometric Research},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {472--477},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010876700003120},
  doi          = {10.5220/0010876700003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/HallJLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HeidTHS22,
  author       = {Kris Heid and
                  Tobias Tefke and
                  Jens Heider and
                  Ralf C. Staudemeyer},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Android Data Storage Locations and What App Developers Do with It
                  from a Security and Privacy Perspective},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {378--387},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010838200003120},
  doi          = {10.5220/0010838200003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/HeidTHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HekkalaHV22,
  author       = {Julius Hekkala and
                  Kimmo Halunen and
                  Visa Antero Vallivaara},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Implementing Post-quantum Cryptography for Developers},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {73--83},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010786200003120},
  doi          = {10.5220/0010786200003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/HekkalaHV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/IssakhaniVTL22,
  author       = {Maryam Issakhani and
                  Princy Victor and
                  Ali Tekeoglu and
                  Arash Habibi Lashkari},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {{PDF} Malware Detection based on Stacking Learning},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {562--570},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010908400003120},
  doi          = {10.5220/0010908400003120},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/IssakhaniVTL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KanamoriSTN22,
  author       = {Sachiko Kanamori and
                  Hirotsune Sato and
                  Naoya Tabata and
                  Ryo Nojima},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Construction of a Support Tool for User Reading of Privacy Policies
                  and Assessment of its User Impact},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {412--419},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010847500003120},
  doi          = {10.5220/0010847500003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/KanamoriSTN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KarimniaMS22,
  author       = {Rooya Karimnia and
                  Kaie Maennel and
                  Mahtab Shahin},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Culturally-sensitive Cybersecurity Awareness Program Design for Iranian
                  High-school Students},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {121--132},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010824800003120},
  doi          = {10.5220/0010824800003120},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/KarimniaMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KiechleBNB022,
  author       = {Valentin Kiechle and
                  Matthias B{\"{o}}rsig and
                  Sven Nitzsche and
                  Ingmar Baumgart and
                  J{\"{u}}rgen Becker},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {{PREUNN:} Protocol Reverse Engineering using Neural Networks},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {345--356},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010813500003120},
  doi          = {10.5220/0010813500003120},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KiechleBNB022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KumazakiHYST22,
  author       = {Masahito Kumazaki and
                  Hirokazu Hasegawa and
                  Yukiko Yamaguchi and
                  Hajime Shimada and
                  Hiroki Takakura},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Cyber Attack Stage Tracing System based on Attack Scenario Comparison},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {587--594},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010918200003120},
  doi          = {10.5220/0010918200003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/KumazakiHYST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KunduPV22,
  author       = {Rohon Kundu and
                  Alessandro De Piccoli and
                  Andrea Visconti},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Public Key Compression and Fast Polynomial Multiplication for {NTRU}
                  using the Corrected Hybridized NTT-Karatsuba Method},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {145--153},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010881300003120},
  doi          = {10.5220/0010881300003120},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KunduPV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LangnerSFQ22,
  author       = {Gregor Langner and
                  Florian Skopik and
                  Steven Furnell and
                  Gerald Quirchmayr},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {A Tailored Model for Cyber Security Education Utilizing a Cyber Range},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {365--377},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010834000003120},
  doi          = {10.5220/0010834000003120},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LangnerSFQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LeePPPT22,
  author       = {Hoseong Asher Lee and
                  Nikhil Prathapani and
                  Rajesh Paturi and
                  Sarp Parmaksiz and
                  Fabio Di Troia},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {NLP-based User Authentication through Mouse Dynamics},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {696--702},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011005900003120},
  doi          = {10.5220/0011005900003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/LeePPPT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LeeSAS0SLT22,
  author       = {Matthew Lee and
                  Joshua Sylvester and
                  Sunjoli Aggarwal and
                  Aviraj Sinha and
                  Michael A. Taylor and
                  Nathan Srirama and
                  Eric C. Larson and
                  Mitchell A. Thornton},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Side Channel Identification using Granger Time Series Clustering with
                  Applications to Control Systems},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {290--298},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010781600003120},
  doi          = {10.5220/0010781600003120},
  timestamp    = {Thu, 16 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/LeeSAS0SLT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LingE22,
  author       = {Engla Rencelj Ling and
                  Mathias Ekstedt},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Estimating the Time-To-Compromise of Exploiting Industrial Control
                  System Vulnerabilities},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {96--107},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010817400003120},
  doi          = {10.5220/0010817400003120},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LingE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LorunserWK22,
  author       = {Thomas Lor{\"{u}}nser and
                  Florian Wohner and
                  Stephan Krenn},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {A Privacy-Preserving Auction Platform with Public Verifiability for
                  Smart Manufacturing},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {637--647},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011006700003120},
  doi          = {10.5220/0011006700003120},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LorunserWK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MadiSSG22,
  author       = {Abbass Madi and
                  Oana Stan and
                  Renaud Sirdey and
                  C{\'{e}}dric Gouy{-}Pailler},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {SecTL: Secure and Verifiable Transfer Learning-based inference},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {220--229},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010987700003120},
  doi          = {10.5220/0010987700003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/MadiSSG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MaurelVR22,
  author       = {H{\'{e}}lo{\"{\i}}se Maurel and
                  Santiago A. Vidal and
                  Tamara Rezk},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Comparing the Detection of {XSS} Vulnerabilities in Node.js and a
                  Multi-tier JavaScript-based Language via Deep Learning},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {189--201},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010980800003120},
  doi          = {10.5220/0010980800003120},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MaurelVR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MercaldoMS022,
  author       = {Francesco Mercaldo and
                  Fabio Martinelli and
                  Antonella Santone and
                  Vinod P.},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {On the Influence of Image Settings in Deep Learning-based Malware
                  Detection},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {669--676},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010890600003120},
  doi          = {10.5220/0010890600003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/MercaldoMS022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MohammadianL022,
  author       = {Hesamodin Mohammadian and
                  Arash Habibi Lashkari and
                  Ali A. Ghorbani},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Evaluating Deep Learning-based {NIDS} in Adversarial Settings},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {435--444},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010867900003120},
  doi          = {10.5220/0010867900003120},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MohammadianL022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NabeelG22,
  author       = {Mohamad Nabeel and
                  Christine Gro{\ss}e},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Classifying {COVID-19} Disinformation on Twitter using a Convolutional
                  Neural Network},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {264--272},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010774800003120},
  doi          = {10.5220/0010774800003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/NabeelG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NaserediniGSBSC22,
  author       = {Amir Naseredini and
                  Stefan Gast and
                  Martin Schwarzl and
                  Pedro Miguel Sousa Bernardo and
                  Amel Smajic and
                  Claudio Canella and
                  Martin Berger and
                  Daniel Gruss},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Systematic Analysis of Programming Languages and Their Execution Environments
                  for Spectre Attacks},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {48--59},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010779300003120},
  doi          = {10.5220/0010779300003120},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/NaserediniGSBSC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/OttMG22,
  author       = {David Ott and
                  Dennis Moreau and
                  Manish Gaur},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Planning for Cryptographic Readiness in an Era of Quantum Computing
                  Advancement},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {491--498},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010886000003120},
  doi          = {10.5220/0010886000003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/OttMG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PattiyanonA22,
  author       = {Charnon Pattiyanon and
                  Toshiaki Aoki},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Analysis and Enhancement of Self-sovereign Identity System Properties
                  Compiling Standards and Regulations},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {133--144},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010877300003120},
  doi          = {10.5220/0010877300003120},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/PattiyanonA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Picazo-SanchezA22,
  author       = {Pablo Picazo{-}Sanchez and
                  Maximilian Algehed and
                  Andrei Sabelfeld},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {DeDup.js: Discovering Malicious and Vulnerable Extensions by Detecting
                  Duplication},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {528--535},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010900600003120},
  doi          = {10.5220/0010900600003120},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Picazo-SanchezA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PonsardM22,
  author       = {Christophe Ponsard and
                  Philippe Massonet},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Survey and Guidelines about Learning Cyber Security Risk Assessment},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {536--543},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010900800003120},
  doi          = {10.5220/0010900800003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/PonsardM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/RahmanMHA22,
  author       = {Md. Rashedur Rahman and
                  Elizabeth Miller and
                  Moinul Hossain and
                  Aisha I. Ali{-}Gombe},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Intent-aware Permission Architecture: {A} Model for Rethinking Informed
                  Consent for Android Apps},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {154--164},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010882900003120},
  doi          = {10.5220/0010882900003120},
  timestamp    = {Wed, 30 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/RahmanMHA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Rashid22,
  author       = {Awais Rashid},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Why Rigorous Underpinnings for Cyber Security Education and Training
                  Matter? Experiences from CyBOK: The Cyber Security Body of Knowledge},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {5},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/Rashid22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/RosayCCL22,
  author       = {Arnaud Rosay and
                  Elo{\"{\i}}se Cheval and
                  Florent Carlier and
                  Pascal Leroux},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Network Intrusion Detection: {A} Comprehensive Analysis of {CIC-IDS2017}},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {25--36},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010774000003120},
  doi          = {10.5220/0010774000003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/RosayCCL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/RuckaW22,
  author       = {Agnieszka Rucka and
                  Wojciech Wodo},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {On the {LPSE} Password Meter's Discrepancies among Different Datasets},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {255--263},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010766900003120},
  doi          = {10.5220/0010766900003120},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/RuckaW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Sadeh22,
  author       = {Norman M. Sadeh},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Why Usability Has Become Privacy's Biggest Challenge and What We Can
                  Do About It},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {9},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/Sadeh22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Samarati22,
  author       = {Pierangela Samarati},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Data Security and Privacy in Emerging Scenarios},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {7},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/Samarati22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SandovalL22,
  author       = {Itzel V{\'{a}}zquez Sandoval and
                  Gabriele Lenzini},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Can We Formally Catch Cheating in E-exams?},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {648--655},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011007900003120},
  doi          = {10.5220/0011007900003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/SandovalL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SerretLG22,
  author       = {Elsa Serret and
                  Antoine Lesueur and
                  Alban Gabillon},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Linguistic Steganography for Messaging Applications},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {519--527},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010899300003120},
  doi          = {10.5220/0010899300003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/SerretLG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SertkayaK22,
  author       = {Isa Sertkaya and
                  {\"{O}}znur Kalkar},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Cryptanalysis of Some Electronic Checkbook Schemes},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {603--612},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010981900003120},
  doi          = {10.5220/0010981900003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/SertkayaK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SnymanK22,
  author       = {Dirk P. Snyman and
                  Hennie A. Kruger},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {The Role of Information Deserts in Information Security Awareness
                  and Behaviour},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {613--620},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010984200003120},
  doi          = {10.5220/0010984200003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/SnymanK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Soares22,
  author       = {Alberto Magno Muniz Soares},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {WhatsApp Web Client Live Forensics Technique},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {629--636},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011006400003120},
  doi          = {10.5220/0011006400003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/Soares22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/TalbiVLFC022,
  author       = {Adam Talbi and
                  Arthur Viens and
                  Louis{-}Cl{\'{e}}ment Leroux and
                  Morgane Fran{\c{c}}ois and
                  Mathias Caillol and
                  Nga Nguyen},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Feature Importance and Deep Learning for Android Malware Detection},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {453--462},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010875500003120},
  doi          = {10.5220/0010875500003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/TalbiVLFC022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/TavolatoLE22,
  author       = {Paul Tavolato and
                  Robert Luh and
                  Sebastian Eresheim},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Formalizing Real-world Threat Scenarios},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {281--289},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010781300003120},
  doi          = {10.5220/0010781300003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/TavolatoLE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/UljansB22,
  author       = {Austris Uljans and
                  Bernhards Blumbergs},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Industrial and Automation Control System Cyber Range Prototype for
                  Offensive Capability Development},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {478--490},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010879500003120},
  doi          = {10.5220/0010879500003120},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/UljansB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/VeronesePFL22,
  author       = {Leonardo Veronese and
                  Francesco Palmarini and
                  Riccardo Focardi and
                  Flaminia L. Luccio},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {A Fast and Cost-effective Design for FPGA-based Fuzzy Rainbow Tradeoffs},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {165--176},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010904300003120},
  doi          = {10.5220/0010904300003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/VeronesePFL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/WangB22,
  author       = {Tian Wang and
                  Masooda N. Bashir},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {An Analysis of Cloud Certifications' Performance on Privacy Protections},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {299--306},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010783200003120},
  doi          = {10.5220/0010783200003120},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/WangB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/WareusDTH22,
  author       = {Emil W{\aa}reus and
                  Anton Duppils and
                  Magnus Tullberg and
                  Martin Hell},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Security Issue Classification for Vulnerability Management with Semi-supervised
                  Learning},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {84--95},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010813000003120},
  doi          = {10.5220/0010813000003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/WareusDTH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/WenS22,
  author       = {Shengyuan Wen and
                  Weiqing Sun},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {SpamFender: {A} Semi-supervised Incremental Spam Classification System
                  across Social Networks},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {388--395},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010840300003120},
  doi          = {10.5220/0010840300003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/WenS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/WerdenML22,
  author       = {David Werden and
                  Matthew Muccioli and
                  Anyi Liu},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {TEEm: {A} Tangle-based Elastic Emulator for Storing Connected Vehicle
                  Data in a Distributed Ledger Technology},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {230--241},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010990100003120},
  doi          = {10.5220/0010990100003120},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/WerdenML22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/WuSZYLZGLH22,
  author       = {Yixiong Wu and
                  Shangru Song and
                  Jianwei Zhuge and
                  Tingting Yin and
                  Tianyi Li and
                  Junmin Zhu and
                  Guannan Guo and
                  Yue Liu and
                  Jianju Hu},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {ICScope: Detecting and Measuring Vulnerable {ICS} Devices Exposed
                  on the Internet},
  booktitle    = {Information Systems Security and Privacy - 7th International Conference,
                  {ICISSP} 2021, Virtual Event, February 11-13, 2021, and 8th International
                  Conference, {ICISSP} 2022, Virtual Event, February 9-11, 2022, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1851},
  pages        = {1--24},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-37807-2\_1},
  doi          = {10.1007/978-3-031-37807-2\_1},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/WuSZYLZGLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/XiaoNFS22,
  author       = {Junhui Xiao and
                  Ashish Neupane and
                  Hiba F. Fayoumi and
                  Weiqing Sun},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {A Novel Key Exchange Protocol using Logic Algebra for the Factorization
                  Problem},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {396--403},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010843300003120},
  doi          = {10.5220/0010843300003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/XiaoNFS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/YassinR22,
  author       = {Ghadeer I. Yassin and
                  Lakshmish Ramaswamy},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Effective {\&} Efficient Access Control in Smart Farms: Opportunities,
                  Challenges {\&} Potential Approaches},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {445--452},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010873000003120},
  doi          = {10.5220/0010873000003120},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/YassinR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/YonamineTK22,
  author       = {Shun Yonamine and
                  Yuzo Taenaka and
                  Youki Kadobayashi},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Tamer: {A} Sandbox for Facilitating and Automating IoT Malware Analysis
                  with Techniques to Elicit Malicious Behavior},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {677--687},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010968300003120},
  doi          = {10.5220/0010968300003120},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/YonamineTK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icissp/2020s,
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Information Systems Security and Privacy - 6th International Conference,
                  {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1545},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-94900-6},
  doi          = {10.1007/978-3-030-94900-6},
  isbn         = {978-3-030-94899-3},
  timestamp    = {Mon, 21 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/2020s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icissp/2022,
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0000157000003120},
  doi          = {10.5220/0000157000003120},
  isbn         = {978-989-758-553-1},
  timestamp    = {Tue, 06 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/0002E0SE21,
  author       = {Clemens Brunner and
                  G{\"{u}}nther Eibl and
                  Peter Fr{\"{o}}hlich and
                  Andreas Sackl and
                  Dominik Engel},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Who Stores the Private Key? An Exploratory Study about User Preferences
                  of Key Management for Blockchain-based Applications},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {23--32},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010173200230032},
  doi          = {10.5220/0010173200230032},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/0002E0SE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/0018O021,
  author       = {Yan Yan and
                  Elisabeth Oswald and
                  Srinivas Vivek},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {An Analytic Attack against {ARX} Addition Exploiting Standard Side-channel
                  Leakage},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {89--97},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010223600890097},
  doi          = {10.5220/0010223600890097},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/0018O021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/0046CKLG21,
  author       = {Lu Zhang and
                  Reginald Cushing and
                  Ralph Koning and
                  Cees de Laat and
                  Paola Grosso},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Profiling and Discriminating of Containerized {ML} Applications in
                  Digital Data Marketplaces {(DDM)}},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {508--515},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010254105080515},
  doi          = {10.5220/0010254105080515},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/0046CKLG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AkandeT21,
  author       = {Alexander O. Akande and
                  Vu N. Tran},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Predicting Security Program Effectiveness in Bring-Your-Own-Device
                  Deployment in Organizations},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {55--65},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010195800550065},
  doi          = {10.5220/0010195800550065},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AkandeT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Al-MaweeCM21,
  author       = {Wassnaa Al{-}Mawee and
                  Steve Carr and
                  Jean Mayo},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Admonita: {A} Recommendation-based Trust Model for Dynamic Data Integrity},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {273--282},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010150402730282},
  doi          = {10.5220/0010150402730282},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/Al-MaweeCM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AlmarwaniKL21,
  author       = {Maryam Almarwani and
                  Boris Konev and
                  Alexei Lisitsa},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Release-aware In-out Encryption Adjustment in MongoDB Query Processing},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {714--722},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010395007140722},
  doi          = {10.5220/0010395007140722},
  timestamp    = {Fri, 03 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AlmarwaniKL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AlturkiKKNST21,
  author       = {Musab A. Alturki and
                  Tajana Ban Kirigin and
                  Max I. Kanovich and
                  Vivek Nigam and
                  Andre Scedrov and
                  Carolyn L. Talcott},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {On Security Analysis of Periodic Systems: Expressiveness and Complexity},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {43--54},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010195100430054},
  doi          = {10.5220/0010195100430054},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/AlturkiKKNST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AmitYKZ21,
  author       = {Guy Amit and
                  Amir Yeshooroon and
                  Michael Kiperberg and
                  Nezer J. Zaidenberg},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {DLP-Visor: {A} Hypervisor-based Data Leakage Prevention System},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {416--423},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010221104160423},
  doi          = {10.5220/0010221104160423},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/AmitYKZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AnagrehVL21,
  author       = {Mohammad Anagreh and
                  Eero Vainikko and
                  Peeter Laud},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Parallel Privacy-preserving Computation of Minimum Spanning Trees},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {181--190},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010255701810190},
  doi          = {10.5220/0010255701810190},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/AnagrehVL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AyotteBHS21,
  author       = {Blaine Ayotte and
                  Mahesh K. Banavar and
                  Daqing Hou and
                  Stephanie Schuckers},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Study of Intra- and Inter-user Variance in Password Keystroke Dynamics},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {467--474},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010235504670474},
  doi          = {10.5220/0010235504670474},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/AyotteBHS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BasuKB21,
  author       = {Srijita Basu and
                  Sandip Karmakar and
                  Debasish Bera},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Blockchain based Secured Virtual Machine Image Monitor},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {432--439},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010228804320439},
  doi          = {10.5220/0010228804320439},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/BasuKB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BhattacharjyaS21,
  author       = {Sairath Bhattacharjya and
                  Hossein Saiedian},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {A Novel Simplified Framework to Secure IoT Communications},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {399--406},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010210003990406},
  doi          = {10.5220/0010210003990406},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/BhattacharjyaS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BohmVP21,
  author       = {Fabian B{\"{o}}hm and
                  Manfred Vielberth and
                  G{\"{u}}nther Pernul},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Bridging Knowledge Gaps in Security Analytics},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {98--108},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010225400980108},
  doi          = {10.5220/0010225400980108},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BohmVP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BoudguigaSFLC21,
  author       = {Aymen Boudguiga and
                  Oana Stan and
                  Abdessamad Fazzat and
                  Houda Labiod and
                  Pierre{-}Emmanuel Clet},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Privacy Preserving Services for Intelligent Transportation Systems
                  with Homomorphic Encryption},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {684--693},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010349706840693},
  doi          = {10.5220/0010349706840693},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/BoudguigaSFLC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BracamonteTK21,
  author       = {Vanessa Bracamonte and
                  Welderufael B. Tesfay and
                  Shinsaku Kiyomoto},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Towards Exploring User Perception of a Privacy Sensitive Information
                  Detection Tool},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {628--634},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010319706280634},
  doi          = {10.5220/0010319706280634},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/BracamonteTK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BryantS21,
  author       = {Blake D. Bryant and
                  Hossein Saiedian},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {A State Saturation Attack against Massively Multiplayer Online Videogames},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {217--225},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010302002170225},
  doi          = {10.5220/0010302002170225},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/BryantS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/CadalzoTOMW21,
  author       = {Lucas Cadalzo and
                  Christopher H. Todd and
                  Banjo Obayomi and
                  W. Brad Moore and
                  Anthony C. Wong},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Canopy: {A} Learning-based Approach for Automatic Low-and-Slow DDoS
                  Mitigation},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {356--367},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010192303560367},
  doi          = {10.5220/0010192303560367},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/CadalzoTOMW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/CasolareMMS21,
  author       = {Rosangela Casolare and
                  Fabio Martinelli and
                  Francesco Mercaldo and
                  Antonella Santone},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Colluding Covert Channel for Malicious Information Exfiltration in
                  Android Environment},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {811--818},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010396708110818},
  doi          = {10.5220/0010396708110818},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/CasolareMMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ChabanneDG21,
  author       = {Herv{\'{e}} Chabanne and
                  Vincent Despiegel and
                  Linda Guiga},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {A Protection against the Extraction of Neural Network Models},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {258--269},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010373302580269},
  doi          = {10.5220/0010373302580269},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/ChabanneDG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/CholterES21,
  author       = {William La Cholter and
                  Matthew Elder and
                  Antonius Stalick},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Windows Malware Binaries in {C/C++} GitHub Repositories: Prevalence
                  and Lessons Learned},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {475--484},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010237904750484},
  doi          = {10.5220/0010237904750484},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/CholterES21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DahdahLKLDG21,
  author       = {Christian Dahdah and
                  Coline Van Leeuwen and
                  Ziad Kheil and
                  J{\'{e}}r{\^{o}}me Lacan and
                  Jonathan Detchart and
                  Thibault Gateau},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Enabling Monetization of Depreciating Data on Blockchains},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {500--507},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010252105000507},
  doi          = {10.5220/0010252105000507},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/DahdahLKLDG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DamT21,
  author       = {Khanh{-}Huu{-}The Dam and
                  Tayssir Touili},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {{MADLIRA:} {A} Tool for Android Malware Detection},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {670--675},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010339506700675},
  doi          = {10.5220/0010339506700675},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/DamT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DangTS21,
  author       = {Dennis Dang and
                  Fabio Di Troia and
                  Mark Stamp},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Malware Classification using Long Short-term Memory Models},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {743--752},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010378007430752},
  doi          = {10.5220/0010378007430752},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/DangTS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DaoudaghMSBA21,
  author       = {Said Daoudagh and
                  Eda Marchetti and
                  Vincenzo Savarino and
                  Roberto Di Bernardo and
                  Marco Alessi},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {How to Improve the {GDPR} Compliance through Consent Management and
                  Access Control},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {534--541},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010260205340541},
  doi          = {10.5220/0010260205340541},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/DaoudaghMSBA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DavilaLT21,
  author       = {Carlos Ocanto D{\'{a}}vila and
                  Roc{\'{\i}}o Cabrera Lozoya and
                  Slim Trabelsi},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Sociocultural Influences for Password Definition: An AI-based Study},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {542--549},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010269305420549},
  doi          = {10.5220/0010269305420549},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/DavilaLT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ErdoganRZZBAOPK21,
  author       = {Gencer Erdogan and
                  Antonio {\'{A}}lvarez Romero and
                  Niccol{\`{o}} Zazzeri and
                  Anze Zitnik and
                  Mariano Basile and
                  Giorgio Aprile and
                  Mafalda Os{\'{o}}rio and
                  Claudia Pani and
                  Ioannis Kechaoglou},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Developing Cyber-risk Centric Courses and Training Material for Cyber
                  Ranges: {A} Systematic Approach},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {702--713},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010393107020713},
  doi          = {10.5220/0010393107020713},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ErdoganRZZBAOPK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Filiol21,
  author       = {Eric Filiol},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Unconventional Attack against Voting Machines Enlarging the Scope
                  of Cybersecurity Risk Analysis},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {763--770},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010417607630770},
  doi          = {10.5220/0010417607630770},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/Filiol21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/FloodCC021,
  author       = {Robert Flood and
                  Sheung Shi Chan and
                  Wei Chen and
                  David Aspinall},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Checking Contact Tracing App Implementations},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {133--144},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010237201330144},
  doi          = {10.5220/0010237201330144},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/FloodCC021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Garg21,
  author       = {Vaibhav Garg},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {A Lemon by Any Other Label},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {558--565},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010295205580565},
  doi          = {10.5220/0010295205580565},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/Garg21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Grosse21,
  author       = {Christine Gro{\ss}e},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Enhanced Information Management in Inter-organisational Planning for
                  Critical Infrastructure Protection: Case and Framework},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {319--330},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010186803190330},
  doi          = {10.5220/0010186803190330},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/Grosse21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GuilleyRQ21,
  author       = {Sylvain Guilley and
                  Michel Le Rolland and
                  Damien Quenson},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Implementing Secure Applications Thanks to an Integrated Secure Element},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {566--571},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010298205660571},
  doi          = {10.5220/0010298205660571},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/GuilleyRQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HaarB21,
  author       = {Christoph Haar and
                  Erik Buchmann},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Securing Orchestrated Containers with {BSI} Module {SYS.1.6}},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {676--683},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010340406760683},
  doi          = {10.5220/0010340406760683},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/HaarB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HaglMP21,
  author       = {Jakob Hagl and
                  Oliver Mann and
                  Martin Pirker},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Securing the Linux Boot Process: From Start to Finish},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {604--610},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010313906040610},
  doi          = {10.5220/0010313906040610},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HaglMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HasegawaT21,
  author       = {Hirokazu Hasegawa and
                  Hiroki Takakura},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {A Dynamic Access Control System based on Situations of Users},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {653--660},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010327406530660},
  doi          = {10.5220/0010327406530660},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/HasegawaT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HazhirpasandEN21,
  author       = {Mohammadreza Hazhirpasand and
                  Arash Ale Ebrahim and
                  Oscar Nierstrasz},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Stopping {DNS} Rebinding Attacks in the Browser},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {596--603},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010310705960603},
  doi          = {10.5220/0010310705960603},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/HazhirpasandEN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HnainiRCT21,
  author       = {Hiba Hnaini and
                  Luka Le Roux and
                  Jo{\"{e}}l Champeau and
                  Ciprian Teodorov},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Security Property Modeling},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {694--701},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010388206940701},
  doi          = {10.5220/0010388206940701},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HnainiRCT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HuangTSS21,
  author       = {Elliu Huang and
                  Fabio Di Troia and
                  Mark Stamp and
                  Preethi Sundaravaradhan},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {A New Dataset for Smartphone Gesture-based Authentication},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {771--780},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010425807710780},
  doi          = {10.5220/0010425807710780},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/HuangTSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HutschenreuterC21,
  author       = {Helmar Hutschenreuter and
                  Salva Daneshgadeh {\c{C}}akmak{\c{c}}i and
                  Christian Maeder and
                  Thomas Kemmerich},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Ontology-based Cybersecurity and Resilience Framework},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {458--466},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010233604580466},
  doi          = {10.5220/0010233604580466},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/HutschenreuterC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/IrvanTK0Y21,
  author       = {Mhd Irvan and
                  Tran Phuong Thao and
                  Ryosuke Kobayashi and
                  Toshiyuki Nakata and
                  Rie Shigetomi Yamaguchi},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Learning from Smartphone Location Data as Anomaly Detection for Behavioral
                  Authentication through Deep Neuroevolution},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {723--728},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010395407230728},
  doi          = {10.5220/0010395407230728},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/IrvanTK0Y21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/JacobQL21,
  author       = {Stephen Jacob and
                  Yuansong Qiao and
                  Brian Lee},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Detecting Cyber Security Attacks against a Microservices Application
                  using Distributed Tracing},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {588--595},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010308905880595},
  doi          = {10.5220/0010308905880595},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/JacobQL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/JurecekJL21,
  author       = {Martin Jurecek and
                  Olha Jureckov{\'{a}} and
                  R{\'{o}}bert L{\'{o}}rencz},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Improving Classification of Malware Families using Learning a Distance
                  Metric},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {643--652},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010326306430652},
  doi          = {10.5220/0010326306430652},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/JurecekJL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/JurecekK21,
  author       = {Martin Jurecek and
                  Matous Koz{\'{a}}k},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Representation of {PE} Files using {LSTM} Networks},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {516--525},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010257105160525},
  doi          = {10.5220/0010257105160525},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/JurecekK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KadenaNR21,
  author       = {Esmeralda Kadena and
                  Huu Phuoc Dai Nguyen and
                  Lourdes Ruiz},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Mobile Robots: An Overview of Data and Security},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {291--299},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/KadenaNR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KaleTS21,
  author       = {Aparna Sunil Kale and
                  Fabio Di Troia and
                  Mark Stamp},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Malware Classification with Word Embedding Features},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {733--742},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010377907330742},
  doi          = {10.5220/0010377907330742},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/KaleTS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KallT21,
  author       = {Sabrina Kall and
                  Slim Trabelsi},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {An Asynchronous Federated Learning Approach for a Security Source
                  Code Scanner},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {572--579},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010300305720579},
  doi          = {10.5220/0010300305720579},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/KallT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KamalI21,
  author       = {Ahmad Akmal Aminuddin Mohd Kamal and
                  Keiichi Iwamura},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Improvement of Secure Multi-Party Multiplication of (k, n) Threshold
                  Secret Sharing Using Only {N} = k Servers},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {77--88},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010206400770088},
  doi          = {10.5220/0010206400770088},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KamalI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KiperbergZ21,
  author       = {Michael Kiperberg and
                  Nezer J. Zaidenberg},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {HyperPass: Secure Password Input Platform},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {580--587},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010301905800587},
  doi          = {10.5220/0010301905800587},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/KiperbergZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KlaudelR21,
  author       = {Witold Klaudel and
                  Artur Rataj},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Towards a Formalisation of Expert's Knowledge for an Automatic Construction
                  of a Vulnerability Model of a Cyberphysical System},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {391--398},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010207003910398},
  doi          = {10.5220/0010207003910398},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/KlaudelR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KokesML21,
  author       = {Josef Kokes and
                  Jonatan Matejka and
                  R{\'{o}}bert L{\'{o}}rencz},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Automatic Detection and Decryption of {AES} by Monitoring S-Box Access},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {172--180},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010255201720180},
  doi          = {10.5220/0010255201720180},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/KokesML21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KotlabaBL21,
  author       = {Luk{\'{a}}s Kotlaba and
                  Simona Buchoveck{\'{a}} and
                  R{\'{o}}bert L{\'{o}}rencz},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Active Directory Kerberoasting Attack: Detection using Machine Learning
                  Techniques},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {376--383},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010202803760383},
  doi          = {10.5220/0010202803760383},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/KotlabaBL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KushnirFREZ21,
  author       = {Malte Kushnir and
                  Olivier Favre and
                  Marc Rennhard and
                  Damiano Esposito and
                  Valentin Zahnd},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Automated Black Box Detection of {HTTP} {GET} Request-based Access
                  Control Vulnerabilities in Web Applications},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {204--216},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010300102040216},
  doi          = {10.5220/0010300102040216},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/KushnirFREZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LouniciRNTO21,
  author       = {Sofiane Lounici and
                  Marco Rosa and
                  Carlo Maria Negri and
                  Slim Trabelsi and
                  Melek {\"{O}}nen},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Optimizing Leak Detection in Open-source Platforms with Machine Learning
                  Techniques},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {145--159},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010238101450159},
  doi          = {10.5220/0010238101450159},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/LouniciRNTO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Maffei21,
  author       = {Matteo Maffei},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Practical and Provably Sound Static Analysis of Ethereum Smart Contracts},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {7},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/Maffei21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MandalM21,
  author       = {Debashis Mandal and
                  Chandan Mazumdar},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Towards an Ontology for Enterprise Level Information Security Policy
                  Analysis},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {492--499},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010248004920499},
  doi          = {10.5220/0010248004920499},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/MandalM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MartinyBDJM21,
  author       = {Karsten Martiny and
                  Linda Briesemeister and
                  Grit Denker and
                  Mark F. St. John and
                  Ron Moore},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Protecting Privacy during a Pandemic Outbreak},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {308--318},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010186603080318},
  doi          = {10.5220/0010186603080318},
  timestamp    = {Mon, 13 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/MartinyBDJM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/McClaryS21,
  author       = {Jack McClary and
                  Sid Stamm},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Understanding How People Weigh the Costs and Benefits of using Facebook},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {526--533},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010258405260533},
  doi          = {10.5220/0010258405260533},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/McClaryS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NagashimaII21,
  author       = {Nozomi Nagashima and
                  Masaki Inamura and
                  Keiichi Iwamura},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Implementation of Secondary Available Digital Content Protection Schemes
                  using Identity-based Signatures},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {485--491},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010245504850491},
  doi          = {10.5220/0010245504850491},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/NagashimaII21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NakataO21,
  author       = {Ryotaro Nakata and
                  Akira Otsuka},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {CyExec*: Automatic Generation of Randomized Cyber Range Scenarios},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {226--236},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010324502260236},
  doi          = {10.5220/0010324502260236},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/NakataO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NakataO21a,
  author       = {Ryotaro Nakata and
                  Akira Otsuka},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Evaluation of Vulnerability Reproducibility in Container-based Cyber
                  Range},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {635--642},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010324606350642},
  doi          = {10.5220/0010324606350642},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/NakataO21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NeuschmiedWHSK21,
  author       = {Helmut Neuschmied and
                  Martin Winter and
                  Katharina Hofer{-}Schmitz and
                  Branka Stojanovic and
                  Ulrike Kleb},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Two Stage Anomaly Detection for Network Intrusion Detection},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {450--457},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010233404500457},
  doi          = {10.5220/0010233404500457},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/NeuschmiedWHSK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NguyenTIU21,
  author       = {Hai Ngoc Nguyen and
                  Songpon Teerakanok and
                  Atsuo Inomata and
                  Tetsutaro Uehara},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {The Comparison of Word Embedding Techniques in RNNs for Vulnerability
                  Detection},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {109--120},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010232301090120},
  doi          = {10.5220/0010232301090120},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/NguyenTIU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NguyenTIU21a,
  author       = {Hoang Viet Nguyen and
                  Songpon Teerakanok and
                  Atsuo Inomata and
                  Tetsutaro Uehara},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {The Proposal of Double Agent Architecture using Actor-critic Algorithm
                  for Penetration Testing},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {440--449},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010232504400449},
  doi          = {10.5220/0010232504400449},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/NguyenTIU21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NiedermaierHFM21,
  author       = {Matthias Niedermaier and
                  Thomas Hanka and
                  Florian Fischer and
                  Dominik Merli},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {A Secure Network Scanner Architecture for Asset Management in Strongly
                  Segmented {ICS} Networks},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {347--355},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010191603470355},
  doi          = {10.5220/0010191603470355},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/NiedermaierHFM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/OlssonT21,
  author       = {Christoffer Olsson and
                  Mohsen Toorani},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {A Permissioned Blockchain-based System for Collaborative Drug Discovery},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {121--132},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010236901210132},
  doi          = {10.5220/0010236901210132},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/OlssonT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/OsliakSMD21,
  author       = {Oleksii Osliak and
                  Andrea Saracino and
                  Fabio Martinelli and
                  Theo Dimitrakos},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Towards Collaborative Cyber Threat Intelligence for Security Management},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {339--346},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010191403390346},
  doi          = {10.5220/0010191403390346},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/OsliakSMD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/OzcelikMBS21,
  author       = {Ilker {\"{O}}z{\c{c}}elik and
                  Sai Medury and
                  Justin T. Broaddus and
                  Anthony Skjellum},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {An Overview of Cryptographic Accumulators},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {661--669},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010337806610669},
  doi          = {10.5220/0010337806610669},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/OzcelikMBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PachecoS21,
  author       = {Yulexis Pacheco and
                  Weiqing Sun},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Adversarial Machine Learning: {A} Comparative Study on Contemporary
                  Intrusion Detection Datasets},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {160--171},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010253501600171},
  doi          = {10.5220/0010253501600171},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/PachecoS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PatzerB21,
  author       = {Florian Patzer and
                  J{\"{u}}rgen Beyerer},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Efficient Semantic Representation of Network Access Control Configuration
                  for Ontology-based Security Analysis},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {550--557},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010285305500557},
  doi          = {10.5220/0010285305500557},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/PatzerB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Perrig21,
  author       = {Adrian Perrig},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {New Directions for High-throughput and High-security Communication},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {5},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/Perrig21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PhamSSSPH21,
  author       = {Stefanie Pham and
                  Matthias Schopp and
                  Lars Stiemert and
                  Sebastian Seeber and
                  Daniela P{\"{o}}hn and
                  Wolfgang Hommel},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Field Studies on the Impact of Cryptographic Signatures and Encryption
                  on Phishing Emails},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {384--390},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010206003840390},
  doi          = {10.5220/0010206003840390},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/PhamSSSPH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PilipchukHR21,
  author       = {Roman Pilipchuk and
                  Robert Heinrich and
                  Ralf H. Reussner},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Automatically Extracting Business Level Access Control Requirements
                  from {BPMN} Models to Align {RBAC} Policies},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {300--307},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010184403000307},
  doi          = {10.5220/0010184403000307},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/PilipchukHR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PonsardD21,
  author       = {Christophe Ponsard and
                  Denis Darquennes},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Towards Formal Security Verification of Over-the-Air Update Protocol:
                  Requirements, Survey and UpKit Case Study},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {800--808},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010431408000808},
  doi          = {10.5220/0010431408000808},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/PonsardD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PretoriusDM21,
  author       = {Morn{\'{e}} Pretorius and
                  Nelisiwe Dlamini and
                  Sthembile Mthethwa},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Towards Academic and Skills Credentialing Standards and Distributed
                  Ledger Technologies},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {249--257},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010340602490257},
  doi          = {10.5220/0010340602490257},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/PretoriusDM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PuchtaGP21,
  author       = {Alexander Puchta and
                  Sebastian Groll and
                  G{\"{u}}nther Pernul},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Leveraging Dynamic Information for Identity and Access Management:
                  An Extension of Current Enterprise {IAM} Architecture},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {611--618},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010315706110618},
  doi          = {10.5220/0010315706110618},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/PuchtaGP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Raimondo0021,
  author       = {Mariapia Raimondo and
                  Simona Bernardi and
                  Stefano Marrone},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {On Formalising and Analysing the Tweetchain Protocol},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {781--791},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010427907810791},
  doi          = {10.5220/0010427907810791},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/Raimondo0021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/RayHSB21,
  author       = {Aratrika Ray and
                  Daqing Hou and
                  Stephanie Schuckers and
                  Abbie Barbir},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Continuous Authentication based on Hand Micro-movement during Smartphone
                  Form Filling by Seated Human Subjects},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {424--431},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010225804240431},
  doi          = {10.5220/0010225804240431},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/RayHSB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Renaud21,
  author       = {Karen Renaud},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Accessible Cyber Security: The Next Frontier?},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {9--18},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010419500090018},
  doi          = {10.5220/0010419500090018},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/Renaud21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SchatzRS21,
  author       = {David Schatz and
                  Michael Rossberg and
                  Guenter Schaefer},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Hydra: Practical Metadata Security for Contact Discovery, Messaging,
                  and Dialing},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {191--203},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010262201910203},
  doi          = {10.5220/0010262201910203},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SchatzRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ShakedR21,
  author       = {Avi Shaked and
                  Yoram Reich},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Model-based Threat and Risk Assessment for Systems Design},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {331--338},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010187203310338},
  doi          = {10.5220/0010187203310338},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/ShakedR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Sommervoll21,
  author       = {{\AA}vald {\AA}slaugson Sommervoll},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Dreaming of Keys: Introducing the Phantom Gradient Attack},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {619--627},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010317806190627},
  doi          = {10.5220/0010317806190627},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/Sommervoll21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SonntagM21,
  author       = {Michael Sonntag and
                  Ren{\'{e}} Mayrhofer},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Experiences and Recommendations from Operating a Tor Exit Node at
                  a University},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {283--290},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010156802830290},
  doi          = {10.5220/0010156802830290},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/SonntagM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SvecBH21,
  author       = {Peter Svec and
                  Stefan Balogh and
                  Martin Homola},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Experimental Evaluation of Description Logic Concept Learning Algorithms
                  for Static Malware Detection},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {792--799},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010429707920799},
  doi          = {10.5220/0010429707920799},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SvecBH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Sy21,
  author       = {Bon Sy},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Linking Biometric Voice Identity with Self-monitoring Health Data
                  as a Temporal-spatial Event Stored in a Mobile Device},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {407--415},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010216104070415},
  doi          = {10.5220/0010216104070415},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/Sy21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/UralA21,
  author       = {{\"{O}}zg{\"{u}}r Ural and
                  Cengiz Acart{\"{u}}rk},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Automatic Detection of Cyber Security Events from Turkish Twitter
                  Stream and Newspaper Data},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {66--76},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010201600660076},
  doi          = {10.5220/0010201600660076},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/UralA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/WagnerHH21,
  author       = {Paul Wagner and
                  Kris Heid and
                  Jens Heider},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Remote WebAuthn: {FIDO2} Authentication for Less Accessible Devices},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {368--375},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010192703680375},
  doi          = {10.5220/0010192703680375},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/WagnerHH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/WahabHSB21,
  author       = {Ahmed Anu Wahab and
                  Daqing Hou and
                  Stephanie Schuckers and
                  Abbie Barbir},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Utilizing Keystroke Dynamics as Additional Security Measure to Protect
                  Account Recovery Mechanism},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {33--42},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010191200330042},
  doi          = {10.5220/0010191200330042},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/WahabHSB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/WuZYLZGLH21,
  author       = {Yixiong Wu and
                  Jianwei Zhuge and
                  Tingting Yin and
                  Tianyi Li and
                  Junmin Zhu and
                  Guannan Guo and
                  Yue Liu and
                  Jianju Hu},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {From Exposed to Exploited: Drawing the Picture of Industrial Control
                  Systems Security Status in the Internet Age},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {237--248},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010327902370248},
  doi          = {10.5220/0010327902370248},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/WuZYLZGLH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ZhaoBS21,
  author       = {Jing Zhao and
                  Samanvitha Basole and
                  Mark Stamp},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Malware Classification with {GMM-HMM} Models},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {753--762},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010409907530762},
  doi          = {10.5220/0010409907530762},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/ZhaoBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icissp/2021,
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  isbn         = {978-989-758-491-6},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/0002MMTJK20,
  author       = {Masahiro Ishii and
                  Satoshi Matsuura and
                  Kento Mori and
                  Masahiko Tomoishi and
                  Yong Jin and
                  Yoshiaki Kitaguchi},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {A Study of Classification of Texts into Categories of Cybersecurity
                  Incident and Attack with Topic Models},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {639--646},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009099606390646},
  doi          = {10.5220/0009099606390646},
  timestamp    = {Tue, 14 Apr 2020 10:48:30 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/0002MMTJK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AkerlundG20,
  author       = {Agnes {\AA}kerlund and
                  Christine Gro{\ss}e},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Integration of Data Envelopment Analysis in Business Process Models:
                  {A} Novel Approach to Measure Information Security},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {281--288},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008875802810288},
  doi          = {10.5220/0008875802810288},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AkerlundG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AlmeidaV020,
  author       = {Rafael Almeida and
                  Pedro Vieira{-}Marques and
                  Ana Ferreira},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Patients to Mobilize Their Data: Secure and Flexible mHealth Delegation},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {552--560},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008972905520560},
  doi          = {10.5220/0008972905520560},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AlmeidaV020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AnagrehVL20,
  author       = {Mohammad Anagreh and
                  Eero Vainikko and
                  Peeter Laud},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Speeding Up the Computation of Elliptic Curve Scalar Multiplication
                  based on {CRT} and {DRM}},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {176--184},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009129501760184},
  doi          = {10.5220/0009129501760184},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/AnagrehVL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AriefPCH20,
  author       = {Budi Arief and
                  Andy Periam and
                  Or{\c{c}}un {\c{C}}etin and
                  Julio C. Hernandez{-}Castro},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Using Eyetracker to Find Ways to Mitigate Ransomware},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {448--456},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008956004480456},
  doi          = {10.5220/0008956004480456},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/AriefPCH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Barni20,
  author       = {Mauro Barni},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Backdooring Deep Learning Architectures: Threats and (some) Opportunities},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {15--16},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Barni20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BernardeschiDPR20,
  author       = {Cinzia Bernardeschi and
                  Gianluca Dini and
                  Maurizio Palmieri and
                  Francesco Racciatti},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Analysis of Security Attacks in Wireless Sensor Networks: From {UPPAAL}
                  to Castalia},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {815--824},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009380508150824},
  doi          = {10.5220/0009380508150824},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/BernardeschiDPR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BoudguigaSSC20,
  author       = {Aymen Boudguiga and
                  Oana Stan and
                  Hichem Sedjelmaci and
                  Sergiu Carpov},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Homomorphic Encryption at Work for Private Analysis of Security Logs},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {515--523},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008969205150523},
  doi          = {10.5220/0008969205150523},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BoudguigaSSC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BowditchABPH20,
  author       = {William Bowditch and
                  Will Abramson and
                  William J. Buchanan and
                  Nikolaos Pitropakis and
                  Adam J. Hall},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Privacy-preserving Surveillance Methods using Homomorphic Encryption},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {240--248},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008864902400248},
  doi          = {10.5220/0008864902400248},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BowditchABPH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BracamonteHTK20,
  author       = {Vanessa Bracamonte and
                  Seira Hidano and
                  Welderufael B. Tesfay and
                  Shinsaku Kiyomoto},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Evaluating the Effect of Justification and Confidence Information
                  on User Perception of a Privacy Policy Summarization Tool},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {142--151},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008986101420151},
  doi          = {10.5220/0008986101420151},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BracamonteHTK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BracamonteHTK20a,
  author       = {Vanessa Bracamonte and
                  Seira Hidano and
                  Welderufael B. Tesfay and
                  Shinsaku Kiyomoto},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Effects of Explanatory Information on Privacy Policy Summarization
                  Tool Perception},
  booktitle    = {Information Systems Security and Privacy - 6th International Conference,
                  {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1545},
  pages        = {156--177},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-94900-6\_8},
  doi          = {10.1007/978-3-030-94900-6\_8},
  timestamp    = {Mon, 21 Mar 2022 16:15:19 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/BracamonteHTK20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BraccialeLRN020,
  author       = {Lorenzo Bracciale and
                  Pierpaolo Loreti and
                  Emanuele Raso and
                  Maurizio Naldi and
                  Giuseppe Bianchi},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {CoProtect: Collaborative Management of Cryptographic Keys for Data
                  Security in Cloud Systems},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {361--368},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008921603610368},
  doi          = {10.5220/0008921603610368},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BraccialeLRN020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BromanderSESB20,
  author       = {Siri Bromander and
                  Morton Swimmer and
                  Martin Eian and
                  Geir Skjotskift and
                  Fredrik Borg},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Modeling Cyber Threat Intelligence},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {273--280},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008875302730280},
  doi          = {10.5220/0008875302730280},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BromanderSESB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BrunnerKUE20,
  author       = {Clemens Brunner and
                  Fabian Knirsch and
                  Andreas Unterweger and
                  Dominik Engel},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {A Comparison of Blockchain-based {PKI} Implementations},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {333--340},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008914503330340},
  doi          = {10.5220/0008914503330340},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BrunnerKUE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BuchoveckaLBK20,
  author       = {Simona Buchoveck{\'{a}} and
                  R{\'{o}}bert L{\'{o}}rencz and
                  Jir{\'{\i}} Bucek and
                  Filip Kod{\'{y}}tek},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Lightweight Authentication and Secure Communication Suitable for IoT
                  Devices},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {75--83},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008959600750083},
  doi          = {10.5220/0008959600750083},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/BuchoveckaLBK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BuchoveckaLBK20a,
  author       = {Simona Buchoveck{\'{a}} and
                  R{\'{o}}bert L{\'{o}}rencz and
                  Jir{\'{\i}} Bucek and
                  Filip Kod{\'{y}}tek},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Symmetric and Asymmetric Schemes for Lightweight Secure Communication},
  booktitle    = {Information Systems Security and Privacy - 6th International Conference,
                  {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1545},
  pages        = {97--114},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-94900-6\_5},
  doi          = {10.1007/978-3-030-94900-6\_5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/BuchoveckaLBK20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ButunLS20,
  author       = {Ismail Butun and
                  Alexios Lekidis and
                  Daniel Ricardo dos Santos},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Security and Privacy in Smart Grids: Challenges, Current Solutions
                  and Future Opportunities},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {733--741},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009187307330741},
  doi          = {10.5220/0009187307330741},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ButunLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ChristouPPMB20,
  author       = {Orestis Christou and
                  Nikolaos Pitropakis and
                  Pavlos Papadopoulos and
                  Sean McKeown and
                  William J. Buchanan},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Phishing {URL} Detection Through Top-level Domain Analysis: {A} Descriptive
                  Approach},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {289--298},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008902202890298},
  doi          = {10.5220/0008902202890298},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ChristouPPMB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ChuL20,
  author       = {Ge Chu and
                  Alexei Lisitsa},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Ontology-based Automation of Penetration Testing},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {713--720},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009171007130720},
  doi          = {10.5220/0009171007130720},
  timestamp    = {Fri, 03 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ChuL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/CiobanuFMMS20,
  author       = {Madalina G. Ciobanu and
                  Fausto Fasano and
                  Fabio Martinelli and
                  Francesco Mercaldo and
                  Antonella Santone},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Accidental Sensitive Data Leaks Prevention via Formal Verification},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {825--834},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009380608250834},
  doi          = {10.5220/0009380608250834},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/CiobanuFMMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ColomboV20,
  author       = {Christian Colombo and
                  Mark Vella},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Towards a Comprehensive Solution for Secure Cryptographic Protocol
                  Execution based on Runtime Verification},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {765--774},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008851507650774},
  doi          = {10.5220/0008851507650774},
  timestamp    = {Sat, 12 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ColomboV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DanielsB20,
  author       = {Jesse Daniels and
                  Sajal Bhatia},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Legislation and the Negative Impact on Cybersecurity in Healthcare},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {691--697},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009157906910697},
  doi          = {10.5220/0009157906910697},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/DanielsB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DaoudaghLM20,
  author       = {Said Daoudagh and
                  Francesca Lonetti and
                  Eda Marchetti},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Assessing Testing Strategies for Access Control Systems: {A} Controlled
                  Experiment},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {107--118},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008974201070118},
  doi          = {10.5220/0008974201070118},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/DaoudaghLM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DebarBT20,
  author       = {Herv{\'{e}} Debar and
                  Razvan Beuran and
                  Yasuo Tan},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {A Quantitative Study of Vulnerabilities in the Internet of Medical
                  Things},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {164--175},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009105801640175},
  doi          = {10.5220/0009105801640175},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/DebarBT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DelongDF20,
  author       = {Maxence Delong and
                  Baptiste David and
                  Eric Filiol},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Detection of Crawler Traps: Formalization and Implementation Defeating
                  Protection on Internet and on the {TOR} Network},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {775--783},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009367207750783},
  doi          = {10.5220/0009367207750783},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/DelongDF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DiopLLT20,
  author       = {A{\"{\i}}da Diop and
                  Maryline Laurent and
                  Jean Leneutre and
                  Jacques Traor{\'{e}}},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {CoRA: {A} Scalable Collective Remote Attestation Protocol for Sensor
                  Networks},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {84--95},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008962700840095},
  doi          = {10.5220/0008962700840095},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/DiopLLT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/FacchiniGSD20,
  author       = {Simone Facchini and
                  Giacomo Giorgi and
                  Andrea Saracino and
                  Gianluca Dini},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Multi-level Distributed Intrusion Detection System for an IoT based
                  Smart Home Environment},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {705--712},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009170807050712},
  doi          = {10.5220/0009170807050712},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/FacchiniGSD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/FasanoMMS20,
  author       = {Fausto Fasano and
                  Fabio Martinelli and
                  Francesco Mercaldo and
                  Antonella Santone},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Android Run-time Permission Exploitation User Awareness by Means of
                  Formal Methods},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {804--814},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009372308040814},
  doi          = {10.5220/0009372308040814},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/FasanoMMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/FilhoG20,
  author       = {Eduardo Magalh{\~{a}}es De Lacerda Filho and
                  Vin{\'{\i}}cius P. Gon{\c{c}}alves},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Achieving Privacy, Security, and Interoperability among Biometric
                  Networks using Symmetric Encryption},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {481--489},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008961504810489},
  doi          = {10.5220/0008961504810489},
  timestamp    = {Tue, 25 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/FilhoG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/FujiiII20,
  author       = {Wataru Fujii and
                  Keiichi Iwamura and
                  Masaki Inamura},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Secure Comparison and Interval Test Protocols based on Three-party
                  {MPC}},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {698--704},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009161406980704},
  doi          = {10.5220/0009161406980704},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/FujiiII20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GencL20,
  author       = {Ziya Alper Gen{\c{c}} and
                  Gabriele Lenzini},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Dual-use Research in Ransomware Attacks: {A} Discussion on Ransomware
                  Defence Intelligence},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {585--592},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009000505850592},
  doi          = {10.5220/0009000505850592},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/GencL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GiorgiSM20,
  author       = {Giacomo Giorgi and
                  Andrea Saracino and
                  Fabio Martinelli},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Email Spoofing Attack Detection through an End to End Authorship Attribution
                  System},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {64--74},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008954600640074},
  doi          = {10.5220/0008954600640074},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/GiorgiSM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GiorgiSM20a,
  author       = {Giacomo Giorgi and
                  Andrea Saracino and
                  Fabio Martinelli},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {End to End Autorship Email Verification Framework for a Secure Communication},
  booktitle    = {Information Systems Security and Privacy - 6th International Conference,
                  {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1545},
  pages        = {73--96},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-94900-6\_4},
  doi          = {10.1007/978-3-030-94900-6\_4},
  timestamp    = {Mon, 21 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/GiorgiSM20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Gladychev20,
  author       = {Nikolai Gladychev},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Computer Viruses: The Abstract Theory Revisited},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {406--414},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008942704060414},
  doi          = {10.5220/0008942704060414},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Gladychev20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GuarinoMZCR20,
  author       = {Alfonso Guarino and
                  Delfina Malandrino and
                  Rocco Zaccagnino and
                  Federico Cozza and
                  Antonio Rapuano},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {On Analyzing Third-party Tracking via Machine Learning},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {532--539},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008972005320539},
  doi          = {10.5220/0008972005320539},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/GuarinoMZCR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Guerra-Manzanares20,
  author       = {Alejandro Guerra{-}Manzanares and
                  Jorge Medina{-}Galindo and
                  Hayretdin Bahsi and
                  Sven N{\~{o}}mm},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {MedBIoT: Generation of an IoT Botnet Dataset in a Medium-sized IoT
                  Network},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {207--218},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009187802070218},
  doi          = {10.5220/0009187802070218},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Guerra-Manzanares20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Guerra-Manzanares20a,
  author       = {Alejandro Guerra{-}Manzanares and
                  Jorge Medina{-}Galindo and
                  Hayretdin Bahsi and
                  Sven N{\~{o}}mm},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Using MedBIoT Dataset to Build Effective Machine Learning-Based IoT
                  Botnet Detection Systems},
  booktitle    = {Information Systems Security and Privacy - 6th International Conference,
                  {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1545},
  pages        = {222--243},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-94900-6\_11},
  doi          = {10.1007/978-3-030-94900-6\_11},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Guerra-Manzanares20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GuigaR20,
  author       = {Linda Guiga and
                  A. W. Roscoe},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Neural Network Security: Hiding {CNN} Parameters with Guided Grad-CAM},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {611--618},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009061206110618},
  doi          = {10.5220/0009061206110618},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/GuigaR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GunduM20,
  author       = {Tapiwa Gundu and
                  Nthabiseng Modiba},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Building Competitive Advantage from Ubuntu: An African Information
                  Security Awareness Model},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {569--576},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008983305690576},
  doi          = {10.5220/0008983305690576},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/GunduM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GunnarssonG20,
  author       = {Martin Gunnarsson and
                  Christian Gehrmann},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Secure Ownership Transfer for the Internet of Things},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {33--44},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008928300330044},
  doi          = {10.5220/0008928300330044},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/GunnarssonG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GunnarssonG20a,
  author       = {Martin Gunnarsson and
                  Christian Gehrmann},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Secure Ownership Transfer for Resource Constrained IoT Infrastructures},
  booktitle    = {Information Systems Security and Privacy - 6th International Conference,
                  {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1545},
  pages        = {22--47},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-94900-6\_2},
  doi          = {10.1007/978-3-030-94900-6\_2},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/GunnarssonG20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HavurSK20,
  author       = {Giray Havur and
                  Miel Vander Sande and
                  Sabrina Kirrane},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Greater Control and Transparency in Personal Data Processing},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {655--662},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009143206550662},
  doi          = {10.5220/0009143206550662},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HavurSK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HegartyH20,
  author       = {Robert Hegarty and
                  John Haggerty},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Presence Metadata in the Internet of Things: Challenges and Opportunities},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {631--638},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009094106310638},
  doi          = {10.5220/0009094106310638},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HegartyH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HeidingOWL20,
  author       = {Fredrik Heiding and
                  Mohammad{-}Ali Omer and
                  Andreas Wallstr{\"{o}}m and
                  Robert Lagerstr{\"{o}}m},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Securing IoT Devices using Geographic and Continuous Login Blocking:
                  {A} Honeypot Study},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {424--431},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008954704240431},
  doi          = {10.5220/0008954704240431},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HeidingOWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HidanoK20,
  author       = {Seira Hidano and
                  Shinsaku Kiyomoto},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Recommender Systems Robust to Data Poisoning using Trim Learning},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {721--724},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009180407210724},
  doi          = {10.5220/0009180407210724},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HidanoK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HosseinzadehEJ20,
  author       = {Arghavan Hosseinzadeh and
                  Andreas Eitel and
                  Christian Jung},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {A Systematic Approach toward Extracting Technically Enforceable Policies
                  from Data Usage Control Requirements},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {397--405},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008936003970405},
  doi          = {10.5220/0008936003970405},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HosseinzadehEJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HuttelS20,
  author       = {Hans H{\"{u}}ttel and
                  Vilim Staroveski},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Secrecy and Authenticity Properties of the Lightning Network Protocol},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {119--130},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008974801190130},
  doi          = {10.5220/0008974801190130},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/HuttelS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HuttelS20a,
  author       = {Hans H{\"{u}}ttel and
                  Vilim Staroveski},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Key Agreement in the Lightning Network Protocol},
  booktitle    = {Information Systems Security and Privacy - 6th International Conference,
                  {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1545},
  pages        = {139--155},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-94900-6\_7},
  doi          = {10.1007/978-3-030-94900-6\_7},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HuttelS20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/JasserK20,
  author       = {Stefanie Jasser and
                  Jonas Kelbert},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {An Approach to Secure Legacy Software Systems},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {299--309},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008902802990309},
  doi          = {10.5220/0008902802990309},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/JasserK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Jost020,
  author       = {David Jost and
                  Mathias Fischer},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Accountant: Protection of Data Integrity and Identification of Malicious
                  Nodes in In-network Data Processing},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {561--568},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008974405610568},
  doi          = {10.5220/0008974405610568},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Jost020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/JurecekL20,
  author       = {Martin Jurecek and
                  R{\'{o}}bert L{\'{o}}rencz},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Distance Metric Learning using Particle Swarm Optimization to Improve
                  Static Malware Detection},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {725--732},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009180807250732},
  doi          = {10.5220/0009180807250732},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/JurecekL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Katsikas20,
  author       = {Sokratis K. Katsikas},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Leveraging Blockchain Technology to Enhance Security and Privacy in
                  the Internet of Things},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {5},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Katsikas20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Kneuper20,
  author       = {Ralf Kneuper},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Translating Data Protection into Software Requirements},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {257--264},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008873902570264},
  doi          = {10.5220/0008873902570264},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Kneuper20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KnirschUUE20,
  author       = {Fabian Knirsch and
                  Andreas Unterweger and
                  Maximilian Unterrainer and
                  Dominik Engel},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Comparison of the Paillier and ElGamal Cryptosystems for Smart Grid
                  Aggregation Protocols},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {232--239},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008770902320239},
  doi          = {10.5220/0008770902320239},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KnirschUUE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KotlabaBL20,
  author       = {Luk{\'{a}}s Kotlaba and
                  Simona Buchoveck{\'{a}} and
                  R{\'{o}}bert L{\'{o}}rencz},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Active Directory Kerberoasting Attack: Monitoring and Detection Techniques},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {432--439},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008955004320439},
  doi          = {10.5220/0008955004320439},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KotlabaBL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KrasnowskiLM20,
  author       = {Piotr Krasnowski and
                  J{\'{e}}r{\^{o}}me Lebrun and
                  Bruno Martin},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Introducing a Verified Authenticated Key Exchange Protocol over Voice
                  Channels for Secure Voice Communication},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {683--690},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009156506830690},
  doi          = {10.5220/0009156506830690},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KrasnowskiLM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LagerstromXE20,
  author       = {Robert Lagerstr{\"{o}}m and
                  Wenjun Xiong and
                  Mathias Ekstedt},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Threat Modeling and Attack Simulations of Smart Cities: {A} Literature
                  Review and Explorative Study},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {369--376},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008921903690376},
  doi          = {10.5220/0008921903690376},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LagerstromXE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LandauerSWHR20,
  author       = {Max Landauer and
                  Florian Skopik and
                  Markus Wurzenberger and
                  Wolfgang Hotwagner and
                  Andreas Rauber},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Visualizing Syscalls using Self-organizing Maps for System Intrusion
                  Detection},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {349--360},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008918703490360},
  doi          = {10.5220/0008918703490360},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LandauerSWHR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LathouwersEH20,
  author       = {Sophie Lathouwers and
                  Maarten H. Everts and
                  Marieke Huisman},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Verifying Sanitizer Correctness through Black-Box Learning: {A} Symbolic
                  Finite Transducer Approach},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {784--795},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009371207840795},
  doi          = {10.5220/0009371207840795},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LathouwersEH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LefonsPT20,
  author       = {Ezio Lefons and
                  Sebastiano Pizzutilo and
                  Filippo Tangorra},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Host Fingerprinting for Web Servers Authentication},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {45--51},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008942500450051},
  doi          = {10.5220/0008942500450051},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LefonsPT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LinFS20,
  author       = {Hsiao{-}Ying Lin and
                  Chengfang Fang and
                  Jie Shi},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Bident Structure for Neural Network Model Protection},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {377--384},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008923403770384},
  doi          = {10.5220/0008923403770384},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LinFS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LindenhoferOP20,
  author       = {Julian Lindenhofer and
                  Rene Offenthaler and
                  Martin Pirker},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {A Curious Exploration of Malicious {PDF} Documents},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {577--584},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008992305770584},
  doi          = {10.5220/0008992305770584},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LindenhoferOP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ListikSH20,
  author       = {V{\'{\i}}t List{\'{\i}}k and
                  Jan Sediv{\'{y}} and
                  V{\'{a}}clav Hlav{\'{a}}c},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Email Image Spam Classification based on ResNet Convolutional Neural
                  Network},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {457--464},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008956704570464},
  doi          = {10.5220/0008956704570464},
  timestamp    = {Wed, 24 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/ListikSH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MaghrebiA20,
  author       = {Houssem Maghrebi and
                  Davide Alessio},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Revisiting Higher-order Computational Attacks against White-box Implementations},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {265--272},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008874602650272},
  doi          = {10.5220/0008874602650272},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MaghrebiA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MalderleBMW020,
  author       = {Timo Malderle and
                  Felix Boes and
                  Gina Muuss and
                  Matthias W{\"{u}}bbeling and
                  Michael Meier},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Credential Intelligence Agency: {A} Threat Intelligence Approach to
                  Mitigate Identity Theft},
  booktitle    = {Information Systems Security and Privacy - 6th International Conference,
                  {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1545},
  pages        = {115--138},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-94900-6\_6},
  doi          = {10.1007/978-3-030-94900-6\_6},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MalderleBMW020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MalderleKLW020,
  author       = {Timo Malderle and
                  Sven Knauer and
                  Martin Lang and
                  Matthias W{\"{u}}bbeling and
                  Michael Meier},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Track Down Identity Leaks using Threat Intelligence},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {96--106},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008963000960106},
  doi          = {10.5220/0008963000960106},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MalderleKLW020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MartinelliMRS20,
  author       = {Fabio Martinelli and
                  Francesco Mercaldo and
                  Domenico Raucci and
                  Antonella Santone},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Bank Credit Risk Management based on Data Mining Techniques},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {837--843},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009371808370843},
  doi          = {10.5220/0009371808370843},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MartinelliMRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MauriCD20,
  author       = {Lara Mauri and
                  Stelvio Cimato and
                  Ernesto Damiani},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {A Formal Approach for the Analysis of the {XRP} Ledger Consensus Protocol},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {52--63},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008954200520063},
  doi          = {10.5220/0008954200520063},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MauriCD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MauriCD20a,
  author       = {Lara Mauri and
                  Stelvio Cimato and
                  Ernesto Damiani},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Untangling the {XRP} Ledger: Insights and Analysis},
  booktitle    = {Information Systems Security and Privacy - 6th International Conference,
                  {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1545},
  pages        = {48--72},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-94900-6\_3},
  doi          = {10.1007/978-3-030-94900-6\_3},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MauriCD20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MendsaikhanHYS20,
  author       = {Otgonpurev Mendsaikhan and
                  Hirokazu Hasegawa and
                  Yukiko Yamaguchi and
                  Hajime Shimada},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Quantifying the Significance of Cybersecurity Text through Semantic
                  Similarity and Named Entity Recognition},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {325--332},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008913003250332},
  doi          = {10.5220/0008913003250332},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/MendsaikhanHYS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MoubarakF20,
  author       = {Joanna Moubarak and
                  Tony Feghali},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Comparing Machine Learning Techniques for Malware Detection},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {844--851},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009373708440851},
  doi          = {10.5220/0009373708440851},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MoubarakF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MoubarakFC20,
  author       = {Joanna Moubarak and
                  Eric Filiol and
                  Maroun Chamoun},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {The Blockchain Potential in Computer Virology},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {796--803},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009371607960803},
  doi          = {10.5220/0009371607960803},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MoubarakFC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NisslmuellerF0D20,
  author       = {Utz Nisslmueller and
                  Klaus{-}Tycho Foerster and
                  Stefan Schmid and
                  Christian Decker},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Toward Active and Passive Confidentiality Attacks on Cryptocurrency
                  Off-chain Networks},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {7--14},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009429200070014},
  doi          = {10.5220/0009429200070014},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/NisslmuellerF0D20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NisslmuellerF0D20a,
  author       = {Utz Nisslmueller and
                  Klaus{-}Tycho Foerster and
                  Stefan Schmid and
                  Christian Decker},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Inferring Sensitive Information in Cryptocurrency Off-Chain Networks
                  Using Probing and Timing Attacks},
  booktitle    = {Information Systems Security and Privacy - 6th International Conference,
                  {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1545},
  pages        = {1--21},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-94900-6\_1},
  doi          = {10.1007/978-3-030-94900-6\_1},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/NisslmuellerF0D20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NitschkeRHK20,
  author       = {Mirja Nitschke and
                  Christian Roth and
                  Christian Hoyer and
                  Dogan Kesdogan},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Harmonized Group Mix for {ITS}},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {152--163},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008989101520163},
  doi          = {10.5220/0008989101520163},
  timestamp    = {Fri, 01 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/NitschkeRHK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NitschkeRHK20a,
  author       = {Mirja Nitschke and
                  Christian Roth and
                  Christian Hoyer and
                  Dogan Kesdogan},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Harmonic Group Mix: {A} Framework for Anonymous and Authenticated
                  Broadcast Messages in Vehicle-to-Vehicle Environments},
  booktitle    = {Information Systems Security and Privacy - 6th International Conference,
                  {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1545},
  pages        = {178--200},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-94900-6\_9},
  doi          = {10.1007/978-3-030-94900-6\_9},
  timestamp    = {Fri, 01 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/NitschkeRHK20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NyblomWKO20,
  author       = {Philip Nyblom and
                  Gaute Wangen and
                  Mazaher Kianpour and
                  Grethe {\O}stby},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {The Root Causes of Compromised Accounts at the University},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {540--551},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008972305400551},
  doi          = {10.5220/0008972305400551},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/NyblomWKO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/OrenderMZ20,
  author       = {Jason Orender and
                  Ravi Mukkamala and
                  Mohammad Zubair},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Is Ethereum's ProgPoW {ASIC} Resistant?},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {310--316},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008909203100316},
  doi          = {10.5220/0008909203100316},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/OrenderMZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/OstbyK20,
  author       = {Grethe {\O}stby and
                  Basel Katt},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Maturity Modelling to Prepare for Cyber Crisis Escalation and Management},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {249--256},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008871602490256},
  doi          = {10.5220/0008871602490256},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/OstbyK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/OtungM20,
  author       = {Andikan Otung and
                  Andrew P. Martin},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Distributed Defence of Service (DiDoS): {A} Network-layer Reputation-based
                  DDoS Mitigation Architecture},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {619--630},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009091206190630},
  doi          = {10.5220/0009091206190630},
  timestamp    = {Thu, 29 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/OtungM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PabloAI20,
  author       = {{\'{A}}lvaro de Pablo and
                  Oscar Araque and
                  Carlos Angel Iglesias},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Radical Text Detection based on Stylometry},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {524--531},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008971205240531},
  doi          = {10.5220/0008971205240531},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/PabloAI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PfrangMFB20,
  author       = {Steffen Pfrang and
                  David Meier and
                  Andreas Fleig and
                  J{\"{u}}rgen Beyerer},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {A Meta Model for a Comprehensive Description of Network Protocols
                  Improving Security Tests},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {671--682},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009150206710682},
  doi          = {10.5220/0009150206710682},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/PfrangMFB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PlessingO20,
  author       = {Paul Plessing and
                  Olamide Omolola},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Revisiting Privacy-aware Blockchain Public Key Infrastructure},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {415--423},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008947104150423},
  doi          = {10.5220/0008947104150423},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/PlessingO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PonsardGP20,
  author       = {Christophe Ponsard and
                  Jeremy Grandclaudon and
                  Nicolas Point},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Methodology and Feedback about Systematic Cybersecurity Experts Auditing
                  in Belgium},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {754--759},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009190307540759},
  doi          = {10.5220/0009190307540759},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/PonsardGP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/QbeahAM20,
  author       = {Mohammad Qbea'h and
                  Saed Alrabaee and
                  Djedjiga Mouheb},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {An Analytical Scanning Technique to Detect and Prevent the Transformed
                  {SQL} Injection and {XSS} Attacks},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {603--610},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009004006030610},
  doi          = {10.5220/0009004006030610},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/QbeahAM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SbaiDD20,
  author       = {Anass Sbai and
                  Cyril Drocourt and
                  Gilles Dequen},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {{CCA} Secure Unidirectional {PRE} with Key Pair in the Standard Model
                  without Pairings},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {440--447},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008955704400447},
  doi          = {10.5220/0008955704400447},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SbaiDD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ScholnastTK20,
  author       = {Hubert Sch{\"{o}}lnast and
                  Paul Tavolato and
                  Philipp Kreimel},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Anomaly Detection in Communication Networks of Cyber-physical Systems
                  using Cross-over Data Compression},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {498--505},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008964104980505},
  doi          = {10.5220/0008964104980505},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ScholnastTK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SnymanK20,
  author       = {Dirk Snyman and
                  Hennie A. Kruger},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {External Contextual Factors in Information Security Behaviour},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {185--194},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009142201850194},
  doi          = {10.5220/0009142201850194},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SnymanK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SnymanK20a,
  author       = {Dirk Snyman and
                  Hennie A. Kruger},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Contextual Factors in Information Security Group Behaviour: {A} Comparison
                  of Two Studies},
  booktitle    = {Information Systems Security and Privacy - 6th International Conference,
                  {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1545},
  pages        = {201--221},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-94900-6\_10},
  doi          = {10.1007/978-3-030-94900-6\_10},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SnymanK20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/StachGW0M20,
  author       = {Christoph Stach and
                  Corinna Giebler and
                  Manuela Wagner and
                  Christian Weber and
                  Bernhard Mitschang},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {{AMNESIA:} {A} Technical Solution towards GDPR-compliant Machine Learning},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {21--32},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008916700210032},
  doi          = {10.5220/0008916700210032},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/StachGW0M20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SultanJ20,
  author       = {Shizra Sultan and
                  Christian Damsgaard Jensen},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Privacy-preserving Measures in Smart City Video Surveillance Systems},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {506--514},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008964205060514},
  doi          = {10.5220/0008964205060514},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/SultanJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SunDGCGRMTAL20,
  author       = {Tithnara Nicolas Sun and
                  Bastien Drouot and
                  Fahad Rafique Golra and
                  Jo{\"{e}}l Champeau and
                  Sylvain Gu{\'{e}}rin and
                  Luka Le Roux and
                  Ra{\'{u}}l Mazo and
                  Ciprian Teodorov and
                  Lionel Van Aertryck and
                  Bernard L'Hostis},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {A Domain-specific Modeling Framework for Attack Surface Modeling},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {341--348},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008916203410348},
  doi          = {10.5220/0008916203410348},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SunDGCGRMTAL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SundstromLPP20,
  author       = {Andrew Sundstrom and
                  Damas W. Limoge and
                  Vadim Pinskiy and
                  Matthew Putman},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Securing Industrial Production from Sophisticated Cyberattacks},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {663--670},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009148206630670},
  doi          = {10.5220/0009148206630670},
  timestamp    = {Wed, 05 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SundstromLPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SymeonidisL20,
  author       = {Iraklis Symeonidis and
                  Gabriele Lenzini},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Systematization of Threats and Requirements for Private Messaging
                  with Untrusted Servers: The Case of e-Mailing and Instant Messaging},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {593--602},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009003805930602},
  doi          = {10.5220/0009003805930602},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SymeonidisL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/TantikulN20,
  author       = {Phitchayaphong Tantikul and
                  Sudsanguan Ngamsuriyaroj},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Exploring Vulnerabilities in Solidity Smart Contract},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {317--324},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008909803170324},
  doi          = {10.5220/0008909803170324},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/TantikulN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/TeradoH20,
  author       = {Ryosuke Terado and
                  Morihiro Hayashida},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Improving Accuracy and Speed of Network-based Intrusion Detection
                  using Gradient Boosting Trees},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {490--497},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008963504900497},
  doi          = {10.5220/0008963504900497},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/TeradoH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ThompsonE20,
  author       = {Andreas Thompson and
                  Gencer Erdogan},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Tool Support for Risk-driven Planning of Trustworthy Smart IoT Systems
                  within DevOps},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {742--753},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009189307420753},
  doi          = {10.5220/0009189307420753},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ThompsonE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Tochikubo20,
  author       = {Kouya Tochikubo},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {New General Secret Sharing Scheme using Hierarchical Threshold Scheme:
                  Improvement of Information Rates for Specified Participants},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {647--654},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009103506470654},
  doi          = {10.5220/0009103506470654},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Tochikubo20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/UwizeyemunguP20,
  author       = {Sylvestre Uwizeyemungu and
                  Placide Poba{-}Nzaou},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Privacy with Health Information Technologies: What Story Do Data Breaches
                  in {US} Tell Us?},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {131--141},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008977301310141},
  doi          = {10.5220/0008977301310141},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/UwizeyemunguP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/WirtzH20,
  author       = {Roman Wirtz and
                  Maritta Heisel},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Risk Identification: From Requirements to Threat Models},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {385--396},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008935803850396},
  doi          = {10.5220/0008935803850396},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/WirtzH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/WodoS20,
  author       = {Wojciech Wodo and
                  Damian Stygar},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Security of Digital Banking Systems in Poland: Users Study 2019},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {221--231},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008555202210231},
  doi          = {10.5220/0008555202210231},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/WodoS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/XuZ20,
  author       = {Shuaijianni Xu and
                  Liang Feng Zhang},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {A Homomorphic Proxy Re-authenticators based Efficient Multi-client
                  Non-interactive Verifiable Computation Scheme},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {195--206},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009158101950206},
  doi          = {10.5220/0009158101950206},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/XuZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ZhouHKI20,
  author       = {Jiaxing Zhou and
                  Miyuki Hirose and
                  Yoshio Kakizaki and
                  Atsuo Inomata},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Evaluation to Classify Ransomware Variants based on Correlations between
                  APIs},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {465--472},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008959904650472},
  doi          = {10.5220/0008959904650472},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ZhouHKI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ZinsmaierLW20,
  author       = {Sandra Domenique Zinsmaier and
                  Hanno Langweg and
                  Marcel Waldvogel},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {A Practical Approach to Stakeholder-driven Determination of Security
                  Requirements based on the {GDPR} and Common Criteria},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {473--480},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008960604730480},
  doi          = {10.5220/0008960604730480},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ZinsmaierLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icissp/2019s,
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Information Systems Security and Privacy - 5th International Conference,
                  {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-49443-8},
  doi          = {10.1007/978-3-030-49443-8},
  isbn         = {978-3-030-49442-1},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/2019s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icissp/2020,
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  isbn         = {978-989-758-399-5},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/0001MFKT19,
  author       = {Partha Sarathi Roy and
                  Kirill Morozov and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Security Analysis and Efficient Implementation of Code-based Signature
                  Schemes},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {213--220},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007259102130220},
  doi          = {10.5220/0007259102130220},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/0001MFKT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/0002F19,
  author       = {Carlos Moreno and
                  Sebastian Fischmeister},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Sender Authentication for Automotive In-Vehicle Networks through Dual
                  Analog Measurements to Determine the Location of the Transmitter},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {596--605},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007580105960605},
  doi          = {10.5220/0007580105960605},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/0002F19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/0006EVRDM19,
  author       = {Gaurav Sharma and
                  Soultana Ellinidou and
                  Tristan Vanspouwen and
                  Th{\'{e}}o Rigas and
                  Jean{-}Michel Dricot and
                  Olivier Markowitch},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Identity-based {TLS} for Cloud of Chips},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {44--54},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007252000440054},
  doi          = {10.5220/0007252000440054},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/0006EVRDM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AkkuzuAA19,
  author       = {Gulsum Akkuzu and
                  Benjamin Aziz and
                  Mo Adda},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Fuzzy Logic Decision based Collaborative Privacy Management Framework
                  for Online Social Networks},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {674--684},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007702206740684},
  doi          = {10.5220/0007702206740684},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AkkuzuAA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Al-MaweeBCM19,
  author       = {Wassnaa Al{-}Mawee and
                  Paul J. Bonamy and
                  Steve Carr and
                  Jean Mayo},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Maia: {A} Language for Mandatory Integrity Controls of Structured
                  Data},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {257--265},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007344802570265},
  doi          = {10.5220/0007344802570265},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Al-MaweeBCM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Al-WahahF19,
  author       = {Mouiad Al{-}Wahah and
                  Csilla Farkas},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Monotonic and Non-monotonic Context Delegation},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {449--460},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007400904490460},
  doi          = {10.5220/0007400904490460},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Al-WahahF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AlmarwaniKL19,
  author       = {Maryam Almarwani and
                  Boris Konev and
                  Alexei Lisitsa},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Flexible Access Control and Confidentiality over Encrypted Data for
                  Document-based Database},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {606--614},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007582506060614},
  doi          = {10.5220/0007582506060614},
  timestamp    = {Fri, 03 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AlmarwaniKL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AlmarwaniKL19a,
  author       = {Maryam Almarwani and
                  Boris Konev and
                  Alexei Lisitsa},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Fine-Grained Access Control for Querying Over Encrypted Document-Oriented
                  Database},
  booktitle    = {Information Systems Security and Privacy - 5th International Conference,
                  {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {403--425},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-49443-8\_19},
  doi          = {10.1007/978-3-030-49443-8\_19},
  timestamp    = {Fri, 03 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AlmarwaniKL19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AlotaibiAFC19,
  author       = {Saud Alotaibi and
                  Abdulrahman Alruban and
                  Steven Furnell and
                  Nathan L. Clarke},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {A Novel Behaviour Profiling Approach to Continuous Authentication
                  for Mobile Applications},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {246--251},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007313302460251},
  doi          = {10.5220/0007313302460251},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AlotaibiAFC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AnagrehVL19,
  author       = {Mohammad Anagreh and
                  Eero Vainikko and
                  Peeter Laud},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Accelerate Performance for Elliptic Curve Scalar Multiplication based
                  on {NAF} by Parallel Computing},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {238--245},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007312702380245},
  doi          = {10.5220/0007312702380245},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AnagrehVL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AugotCG19,
  author       = {Daniel Augot and
                  Herv{\'{e}} Chabanne and
                  William George},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Practical Solutions to Save Bitcoins Applied to an Identity System
                  Proposal},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {511--518},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007443905110518},
  doi          = {10.5220/0007443905110518},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AugotCG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BajanKD19,
  author       = {Pierre{-}Marie Bajan and
                  Christophe Kiennert and
                  Herv{\'{e}} Debar},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Methodology of a Network Simulation in the Context of an Evaluation:
                  Application to an {IDS}},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {378--388},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007378603780388},
  doi          = {10.5220/0007378603780388},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BajanKD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BartoliniCM19,
  author       = {Cesare Bartolini and
                  Antonello Calabr{\`{o}} and
                  Eda Marchetti},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Enhancing Business Process Modelling with Data Protection Compliance:
                  An Ontology-based Proposal},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {421--428},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007392304210428},
  doi          = {10.5220/0007392304210428},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/BartoliniCM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Ben-BassatR19,
  author       = {Ilan Ben{-}Bassat and
                  Erez Rokah},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Locality-Sensitive Hashing for Efficient Web Application Security
                  Testing},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {193--204},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007255301930204},
  doi          = {10.5220/0007255301930204},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Ben-BassatR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BernardeschiDP19,
  author       = {Cinzia Bernardeschi and
                  Andrea Domenici and
                  Maurizio Palmieri},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Modeling and Simulation of Attacks on Cyber-physical Systems},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {700--708},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007705307000708},
  doi          = {10.5220/0007705307000708},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/BernardeschiDP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BhodiaPTS19,
  author       = {Niket Bhodia and
                  Pratikkumar Prajapati and
                  Fabio Di Troia and
                  Mark Stamp},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Transfer Learning for Image-based Malware Classification},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {719--726},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007701407190726},
  doi          = {10.5220/0007701407190726},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/BhodiaPTS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BisphamAG19,
  author       = {Mary K. Bispham and
                  Ioannis Agrafiotis and
                  Michael Goldsmith},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Nonsense Attacks on Google Assistant and Missense Attacks on Amazon
                  Alexa},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {75--87},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007309500750087},
  doi          = {10.5220/0007309500750087},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BisphamAG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BisphamAG19a,
  author       = {Mary K. Bispham and
                  Ioannis Agrafiotis and
                  Michael Goldsmith},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Attack and Defence Modelling for Attacks via the Speech Interface},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {519--527},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007469705190527},
  doi          = {10.5220/0007469705190527},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BisphamAG19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BisphamAG19b,
  author       = {Mary K. Bispham and
                  Ioannis Agrafiotis and
                  Michael Goldsmith},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {The Security of the Speech Interface: {A} Modelling Framework and
                  Proposals for New Defence Mechanisms},
  booktitle    = {Information Systems Security and Privacy - 5th International Conference,
                  {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {288--316},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-49443-8\_14},
  doi          = {10.1007/978-3-030-49443-8\_14},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BisphamAG19b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BisphamRAG19,
  author       = {Mary K. Bispham and
                  Alastair Janse van Rensburg and
                  Ioannis Agrafiotis and
                  Michael Goldsmith},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Black-Box Attacks via the Speech Interface Using Linguistically Crafted
                  Input},
  booktitle    = {Information Systems Security and Privacy - 5th International Conference,
                  {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {93--120},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-49443-8\_5},
  doi          = {10.1007/978-3-030-49443-8\_5},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BisphamRAG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Blumbergs19,
  author       = {Bernhards Blumbergs},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Remote Exploit Development for Cyber Red Team Computer Network Operations
                  Targeting Industrial Control Systems},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {88--99},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007310300880099},
  doi          = {10.5220/0007310300880099},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Blumbergs19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BodeiG19,
  author       = {Chiara Bodei and
                  Letterio Galletta},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Tracking Data Trajectories in IoT},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {572--579},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007578305720579},
  doi          = {10.5220/0007578305720579},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BodeiG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BodeiG19a,
  author       = {Chiara Bodei and
                  Letterio Galletta},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Analysing the Provenance of IoT Data},
  booktitle    = {Information Systems Security and Privacy - 5th International Conference,
                  {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {358--381},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-49443-8\_17},
  doi          = {10.1007/978-3-030-49443-8\_17},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BodeiG19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BracamonteHTK19,
  author       = {Vanessa Bracamonte and
                  Seira Hidano and
                  Welderufael B. Tesfay and
                  Shinsaku Kiyomoto},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Evaluating Privacy Policy Summarization: An Experimental Study among
                  Japanese Users},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {370--377},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007378403700377},
  doi          = {10.5220/0007378403700377},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BracamonteHTK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BracamonteHTK19a,
  author       = {Vanessa Bracamonte and
                  Seira Hidano and
                  Welderufael B. Tesfay and
                  Shinsaku Kiyomoto},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {User Study of the Effectiveness of a Privacy Policy Summarization
                  Tool},
  booktitle    = {Information Systems Security and Privacy - 5th International Conference,
                  {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {186--206},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-49443-8\_9},
  doi          = {10.1007/978-3-030-49443-8\_9},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BracamonteHTK19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BrunnerKE19,
  author       = {Clemens Brunner and
                  Fabian Knirsch and
                  Dominik Engel},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {{SPROOF:} {A} Platform for Issuing and Verifying Documents in a Public
                  Blockchain},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {15--25},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007245600150025},
  doi          = {10.5220/0007245600150025},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BrunnerKE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BrunnerKE19a,
  author       = {Clemens Brunner and
                  Fabian Knirsch and
                  Dominik Engel},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {{SPROOF:} {A} Decentralized Platform for Attribute-Based Authentication},
  booktitle    = {Information Systems Security and Privacy - 5th International Conference,
                  {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {1--23},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-49443-8\_1},
  doi          = {10.1007/978-3-030-49443-8\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BrunnerKE19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Buchanan19,
  author       = {Bill Buchanan},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Building the Future: Tokenization, Blockchain and Citizen-focused
                  Systems},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {5},
  publisher    = {SciTePress},
  year         = {2019},
  timestamp    = {Thu, 13 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Buchanan19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ButunG19,
  author       = {Ismail Butun and
                  Mikael Gidlund},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Location Privacy Assured Internet of Things},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {623--630},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007587906230630},
  doi          = {10.5220/0007587906230630},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ButunG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/CaiWZSH19,
  author       = {Jiahao Cai and
                  Zihao Wei and
                  Yingjie Zhang and
                  Siwei Sun and
                  Lei Hu},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Zero-sum Distinguishers for Round-reduced {GIMLI} Permutation},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {38--43},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007249000380043},
  doi          = {10.5220/0007249000380043},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/CaiWZSH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/CatuognoG19,
  author       = {Luigi Catuogno and
                  Clemente Galdi},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {A Fine-grained General Purpose Secure Storage Facility for Trusted
                  Execution Environment},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {588--595},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007578605880595},
  doi          = {10.5220/0007578605880595},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/CatuognoG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/CatuognoG19a,
  author       = {Luigi Catuogno and
                  Clemente Galdi},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Improving Interoperability in Multi-domain Enterprise Right Management
                  Applications},
  booktitle    = {Information Systems Security and Privacy - 5th International Conference,
                  {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {382--402},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-49443-8\_18},
  doi          = {10.1007/978-3-030-49443-8\_18},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/CatuognoG19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ChabanneDR19,
  author       = {Herv{\'{e}} Chabanne and
                  Emmanuelle Dottax and
                  Franck Rondepierre},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Smart-card Deployment of an Electronic Voting Protocol},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {503--510},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007443805030510},
  doi          = {10.5220/0007443805030510},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ChabanneDR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ChamatidisS19,
  author       = {Ilias Chamatidis and
                  Georgios P. Spathoulas},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Machine Learning for All: {A} More Robust Federated Learning Framework},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {544--551},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007571705440551},
  doi          = {10.5220/0007571705440551},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ChamatidisS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ChavanTS19,
  author       = {Neeraj Chavan and
                  Fabio Di Troia and
                  Mark Stamp},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {A Comparative Analysis of Android Malware},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {664--673},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007701506640673},
  doi          = {10.5220/0007701506640673},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/ChavanTS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/CorayCS19,
  author       = {Sein Coray and
                  Iwen Coisel and
                  Ignacio Sanchez},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Improved Forensic Recovery of {PKZIP} Stream Cipher Passwords},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {328--335},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007360503280335},
  doi          = {10.5220/0007360503280335},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/CorayCS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/CostaBT19,
  author       = {Lu{\'{\i}}s Costa and
                  Jo{\~{a}}o Paulo Barros and
                  Miguel Tavares},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Vulnerabilities in IoT Devices for Smart Home Environment},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {615--622},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007583306150622},
  doi          = {10.5220/0007583306150622},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/CostaBT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DaoudaghLM19,
  author       = {Said Daoudagh and
                  Francesca Lonetti and
                  Eda Marchetti},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {A Decentralized Solution for Combinatorial Testing of Access Control
                  Engine},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {126--135},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007379401260135},
  doi          = {10.5220/0007379401260135},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/DaoudaghLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DaoudaghLM19a,
  author       = {Said Daoudagh and
                  Francesca Lonetti and
                  Eda Marchetti},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {A General Framework for Decentralized Combinatorial Testing of Access
                  Control Engine: Examples of Application},
  booktitle    = {Information Systems Security and Privacy - 5th International Conference,
                  {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {207--229},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-49443-8\_10},
  doi          = {10.1007/978-3-030-49443-8\_10},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/DaoudaghLM19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/EzureI19,
  author       = {Takuya Ezure and
                  Masaki Inamura},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {An Order-specified Aggregate Authority-transfer Signature},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {309--318},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007359103090318},
  doi          = {10.5220/0007359103090318},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/EzureI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/EzureI19a,
  author       = {Takuya Ezure and
                  Masaki Inamura},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Proposal and Performance Evaluation of an Order-Specified Aggregate
                  Authority-Transfer Signature},
  booktitle    = {Information Systems Security and Privacy - 5th International Conference,
                  {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {121--136},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-49443-8\_6},
  doi          = {10.1007/978-3-030-49443-8\_6},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/EzureI19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/FallK19,
  author       = {Doudou Fall and
                  Youki Kadobayashi},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {The Common Vulnerability Scoring System vs. Rock Star Vulnerabilities:
                  Why the Discrepancy?},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {405--411},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007387704050411},
  doi          = {10.5220/0007387704050411},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/FallK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/FasanoMMNS19,
  author       = {Fausto Fasano and
                  Fabio Martinelli and
                  Francesco Mercaldo and
                  Vittoria Nardone and
                  Antonella Santone},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Spyware Detection using Temporal Logic},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {690--699},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007704806900699},
  doi          = {10.5220/0007704806900699},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/FasanoMMNS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/FiliolH19,
  author       = {Eric Filiol and
                  Abhilash Hota},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Solving a Hard Instance of Suspicious Behaviour Detection with Sparse
                  Binary Vectors Clustering},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {635--644},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007347206350644},
  doi          = {10.5220/0007347206350644},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/FiliolH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/FrumentoD19,
  author       = {Enrico Frumento and
                  Carlo Dambra},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {The {HERMENEUT} Project: Enterprises Intangible Risk Management via
                  Economic Models based on Simulation of Modern Cyber Attacks},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {495--502},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007413504950502},
  doi          = {10.5220/0007413504950502},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/FrumentoD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Fukushima0NFKG19,
  author       = {Kazuhide Fukushima and
                  Damien Marion and
                  Yuto Nakano and
                  Adrien Facon and
                  Shinsaku Kiyomoto and
                  Sylvain Guilley},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Experiment on Side-Channel Key-Recovery using a Real {LPWA} End-device},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {67--74},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007259500670074},
  doi          = {10.5220/0007259500670074},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Fukushima0NFKG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Fukushima0NFKG19a,
  author       = {Kazuhide Fukushima and
                  Damien Marion and
                  Yuto Nakano and
                  Adrien Facon and
                  Shinsaku Kiyomoto and
                  Sylvain Guilley},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Evaluation of Side-Channel Key-Recovery Attacks on LoRaWAN End-Device},
  booktitle    = {Information Systems Security and Privacy - 5th International Conference,
                  {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {74--92},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-49443-8\_4},
  doi          = {10.1007/978-3-030-49443-8\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Fukushima0NFKG19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GrosseNS19,
  author       = {Christine Gro{\ss}e and
                  Maja Nyman and
                  Leif Sundberg},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Information Technology Consulting Firms' Readiness for Managing Information
                  Security Incidents},
  booktitle    = {Information Systems Security and Privacy - 5th International Conference,
                  {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {48--73},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-49443-8\_3},
  doi          = {10.1007/978-3-030-49443-8\_3},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/GrosseNS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GuanGL0K19,
  author       = {Zhi Guan and
                  Abba Garba and
                  Anran Li and
                  Zhong Chen and
                  Nesrine Kaaniche},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {AuthLedger: {A} Novel Blockchain-based Domain Name Authentication
                  Scheme},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {345--352},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007366803450352},
  doi          = {10.5220/0007366803450352},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/GuanGL0K19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Guerra-Manzanares19,
  author       = {Alejandro Guerra{-}Manzanares and
                  Sven N{\~{o}}mm and
                  Hayretdin Bahsi},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {In-depth Feature Selection and Ranking for Automated Detection of
                  Mobile Malware},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {274--283},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007349602740283},
  doi          = {10.5220/0007349602740283},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Guerra-Manzanares19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HormannF19,
  author       = {Ricardo Hormann and
                  Eric Fischer},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Detecting Anomalies by using Self-Organizing Maps in Industrial Environments},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {336--344},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007364803360344},
  doi          = {10.5220/0007364803360344},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HormannF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HotaI19,
  author       = {Abhilash Hota and
                  Paul Irolla},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Deep Neural Networks for Android Malware Detection},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {657--663},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007617606570663},
  doi          = {10.5220/0007617606570663},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HotaI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Irolla19,
  author       = {Paul Irolla},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Systematic Characterization of a Sequence Group},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {645--656},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007349706450656},
  doi          = {10.5220/0007349706450656},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Irolla19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/JensenKG19,
  author       = {Meiko Jensen and
                  Sahil Kapila and
                  Nils Gruschka},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Towards Aligning {GDPR} Compliance with Software Development: {A}
                  Research Agenda},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {389--396},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007383803890396},
  doi          = {10.5220/0007383803890396},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/JensenKG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KatsikeasJHL19,
  author       = {Sotirios Katsikeas and
                  Pontus Johnson and
                  Simon Hacks and
                  Robert Lagerstr{\"{o}}m},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Probabilistic Modeling and Simulation of Vehicular Cyber Attacks:
                  An Application of the Meta Attack Language},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {175--182},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007247901750182},
  doi          = {10.5220/0007247901750182},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/KatsikeasJHL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KhanNB19,
  author       = {Nadir Khan and
                  Sven Nitzsche and
                  J{\"{u}}rgen Becker},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {A Secure Framework with Remote Configuration of Intellectual Property},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {564--571},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007576305640571},
  doi          = {10.5220/0007576305640571},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KhanNB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KiperbergLRAZ19,
  author       = {Michael Kiperberg and
                  Roee Leon and
                  Amit Resh and
                  Asaf Algawi and
                  Nezer Zaidenberg},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Hypervisor-assisted Atomic Memory Acquisition in Modern Systems},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {155--162},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007566101550162},
  doi          = {10.5220/0007566101550162},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/KiperbergLRAZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KiwanukaAAPF19,
  author       = {Fred N. Kiwanuka and
                  Ja'far Alqatawna and
                  Anang Hudaya Muhamad Amin and
                  Sujni Paul and
                  Hossam Faris},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Towards Automated Comprehensive Feature Engineering for Spam Detection},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {429--437},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007393004290437},
  doi          = {10.5220/0007393004290437},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/KiwanukaAAPF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LestyanABS19,
  author       = {Szilvia Lestyan and
                  Gergely {\'{A}}cs and
                  Gergely Bicz{\'{o}}k and
                  Zsolt Szalay},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Extracting Vehicle Sensor Signals from {CAN} Logs for Driver Re-identification},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {136--145},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007389501360145},
  doi          = {10.5220/0007389501360145},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LestyanABS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ListikLSH19,
  author       = {V{\'{\i}}t List{\'{\i}}k and
                  Simon Let and
                  Jan Sediv{\'{y}} and
                  V{\'{a}}clav Hlav{\'{a}}c},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Phishing Email Detection based on Named Entity Recognition},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {252--256},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007314202520256},
  doi          = {10.5220/0007314202520256},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ListikLSH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Loutfi19,
  author       = {Ijlal Loutfi},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {SMMDecoy: Detecting {GPU} Keyloggers using Security by Deception Techniques},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {580--587},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007578505800587},
  doi          = {10.5220/0007578505800587},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Loutfi19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MadhusudanSMZP19,
  author       = {Akash Madhusudan and
                  Iraklis Symeonidis and
                  Mustafa A. Mustafa and
                  Ren Zhang and
                  Bart Preneel},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {SC2Share: Smart Contract for Secure Car Sharing},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {163--171},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007703601630171},
  doi          = {10.5220/0007703601630171},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MadhusudanSMZP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MashhadaniCL19,
  author       = {Shahlaa Mashhadani and
                  Nathan L. Clarke and
                  Fudong Li},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Identification and Extraction of Digital Forensic Evidence from Multimedia
                  Data Sources using Multi-algorithmic Fusion},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {438--448},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007399604380448},
  doi          = {10.5220/0007399604380448},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MashhadaniCL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MeinigTM19,
  author       = {Michael Meinig and
                  Peter Tr{\"{o}}ger and
                  Christoph Meinel},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Finding Classification Zone Violations with Anonymized Message Flow
                  Analysis},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {284--292},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007352602840292},
  doi          = {10.5220/0007352602840292},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MeinigTM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MohassebAJL19,
  author       = {Alaa Mohasseb and
                  Benjamin Aziz and
                  Jeyong Jung and
                  Julak Lee},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Predicting CyberSecurity Incidents using Machine Learning Algorithms:
                  {A} Case Study of Korean SMEs},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {230--237},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007309302300237},
  doi          = {10.5220/0007309302300237},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MohassebAJL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MoriK19,
  author       = {Takafumi Mori and
                  Hiroaki Kikuchi},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Robust Person Identification based on {DTW} Distance of Multiple-Joint
                  Gait Pattern},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {221--229},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007307002210229},
  doi          = {10.5220/0007307002210229},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MoriK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MucciB19,
  author       = {Daniele Mucci and
                  Bernhards Blumbergs},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {{TED:} {A} Container based Tool to Perform Security Risk Assessment
                  for {ELF} Binaries},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {361--369},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007371603610369},
  doi          = {10.5220/0007371603610369},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MucciB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NguyenRMD19,
  author       = {Hoai Phuong Nguyen and
                  Florent Retraint and
                  Fr{\'{e}}d{\'{e}}ric Morain{-}Nicolier and
                  Agn{\`{e}}s Delahaies},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {An Image Forgery Detection Solution based on {DCT} Coefficient Analysis},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {487--494},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007412804870494},
  doi          = {10.5220/0007412804870494},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/NguyenRMD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NymanG19,
  author       = {Maja Nyman and
                  Christine Gro{\ss}e},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Are You Ready When It Counts? {IT} Consulting Firm's Information Security
                  Incident Management},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {26--37},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007247500260037},
  doi          = {10.5220/0007247500260037},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/NymanG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/OlukoyaMO19,
  author       = {Oluwafemi Olukoya and
                  Lewis Mackenzie and
                  Inah Omoronyia},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Permission-based Risk Signals for App Behaviour Characterization in
                  Android Apps},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {183--192},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007248701830192},
  doi          = {10.5220/0007248701830192},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/OlukoyaMO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/OudahGB19,
  author       = {Hussein Oudah and
                  Bogdan V. Ghita and
                  Taimur Bakhshi},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {A Novel Features Set for Internet Traffic Classification using Burstiness},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {397--404},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007384203970404},
  doi          = {10.5220/0007384203970404},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/OudahGB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PatzerLMB19,
  author       = {Florian Patzer and
                  Philipp L{\"{u}}dtke and
                  Ankush Meshram and
                  J{\"{u}}rgen Beyerer},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Context-Aware Software-Defined Networking for Automated Incident Response
                  in Industrial Networks},
  booktitle    = {Information Systems Security and Privacy - 5th International Conference,
                  {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {137--161},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-49443-8\_7},
  doi          = {10.1007/978-3-030-49443-8\_7},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/PatzerLMB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PatzerMH19,
  author       = {Florian Patzer and
                  Ankush Meshram and
                  Maximilian He{\ss}},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Automated Incident Response for Industrial Control Systems Leveraging
                  Software-defined Networking},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {319--327},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007359503190327},
  doi          = {10.5220/0007359503190327},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/PatzerMH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PfrangGBMB19,
  author       = {Steffen Pfrang and
                  Mark Giraud and
                  Anne Borcherding and
                  David Meier and
                  J{\"{u}}rgen Beyerer},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Design of an Example Network Protocol for Security Tests Targeting
                  Industrial Automation Systems},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {727--738},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007704907270738},
  doi          = {10.5220/0007704907270738},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/PfrangGBMB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Pietro19,
  author       = {Roberto Di Pietro},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Next Generation Information Warfare: Challenges and Research Directions},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {7--8},
  publisher    = {SciTePress},
  year         = {2019},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Pietro19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PietroCR19,
  author       = {Roberto Di Pietro and
                  Maurantonio Caprolu and
                  Simone Raponi},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Next Generation Information Warfare: Rationales, Scenarios, Threats,
                  and Open Issues},
  booktitle    = {Information Systems Security and Privacy - 5th International Conference,
                  {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {24--47},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-49443-8\_2},
  doi          = {10.1007/978-3-030-49443-8\_2},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/PietroCR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PonsardG19,
  author       = {Christophe Ponsard and
                  Jeremy Grandclaudon},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Guidelines and Tool Support for Building a Cybersecurity Awareness
                  Program for SMEs},
  booktitle    = {Information Systems Security and Privacy - 5th International Conference,
                  {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {335--357},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-49443-8\_16},
  doi          = {10.1007/978-3-030-49443-8\_16},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/PonsardG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PonsardGB19,
  author       = {Christophe Ponsard and
                  Jeremy Grandclaudon and
                  S{\'{e}}bastien Bal},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Survey and Lessons Learned on Raising {SME} Awareness about Cybersecurity},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {558--563},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007574305580563},
  doi          = {10.5220/0007574305580563},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/PonsardGB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Quirchmayr19,
  author       = {Gerald Quirchmayr},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Challenges of {GDPR} and the {NIS} Directive},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {9},
  publisher    = {SciTePress},
  year         = {2019},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Quirchmayr19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Reza0E19,
  author       = {Khondker Jahid Reza and
                  Md Zahidul Islam and
                  Vladimir Estivill{-}Castro},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Privacy Preservation of Social Network Users Against Attribute Inference
                  Attacks via Malicious Data Mining},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {412--420},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007390404120420},
  doi          = {10.5220/0007390404120420},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Reza0E19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Reza0E19a,
  author       = {Khondker Jahid Reza and
                  Md Zahidul Islam and
                  Vladimir Estivill{-}Castro},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Protection of User-Defined Sensitive Attributes on Online Social Networks
                  Against Attribute Inference Attack via Adversarial Data Mining},
  booktitle    = {Information Systems Security and Privacy - 5th International Conference,
                  {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {230--249},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-49443-8\_11},
  doi          = {10.1007/978-3-030-49443-8\_11},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Reza0E19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SaadBE19,
  author       = {Sherif Saad and
                  William Briguglio and
                  Haytham Elmiligi},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {The Curious Case of Machine Learning in Malware Detection},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {528--535},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007470705280535},
  doi          = {10.5220/0007470705280535},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SaadBE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SaaudiTF19,
  author       = {Ahmed Saaudi and
                  Yan Tong and
                  Csilla Farkas},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Probabilistic Graphical Model on Detecting Insiders: Modeling with
                  {SGD-HMM}},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {461--470},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007404004610470},
  doi          = {10.5220/0007404004610470},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SaaudiTF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SatoHT19,
  author       = {Yuya Sato and
                  Hirokazu Hasegawa and
                  Hiroki Takakura},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Construction of Secure Internal Networks with Communication Classifying
                  System},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {552--557},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007571905520557},
  doi          = {10.5220/0007571905520557},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SatoHT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SchwittmannWW19,
  author       = {Lorenz Schwittmann and
                  Matth{\"{a}}us Wander and
                  Torben Weis},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Mobile Devices as Digital Sextants for Zero-Permission Geolocation},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {55--66},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007254000550066},
  doi          = {10.5220/0007254000550066},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SchwittmannWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SnymanK19,
  author       = {Dirk Snyman and
                  Hennie A. Kruger},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Theorising on Information Cascades and Sequential Decision-making
                  for Analysing Security Behaviour},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {205--212},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007258702050212},
  doi          = {10.5220/0007258702050212},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SnymanK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Sonntag19,
  author       = {Michael Sonntag},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Malicious {DNS} Traffic in Tor: Analysis and Countermeasures},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {536--543},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007471205360543},
  doi          = {10.5220/0007471205360543},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Sonntag19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SpagnueloFL19,
  author       = {Dayana Spagnuelo and
                  Ana Ferreira and
                  Gabriele Lenzini},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Accomplishing Transparency within the General Data Protection Regulation},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {114--125},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007366501140125},
  doi          = {10.5220/0007366501140125},
  timestamp    = {Mon, 03 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SpagnueloFL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SpagnueloFL19a,
  author       = {Dayana Spagnuelo and
                  Ana Ferreira and
                  Gabriele Lenzini},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Transparency Enhancing Tools and the {GDPR:} Do They Match?},
  booktitle    = {Information Systems Security and Privacy - 5th International Conference,
                  {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {162--185},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-49443-8\_8},
  doi          = {10.1007/978-3-030-49443-8\_8},
  timestamp    = {Mon, 03 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SpagnueloFL19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/TavolatoT19,
  author       = {Paul Tavolato and
                  Christina Tavolato{-}W{\"{o}}tzl},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Analytical Modelling of Cyber-physical Systems},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {685--689},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007704706850689},
  doi          = {10.5220/0007704706850689},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/TavolatoT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/TorresSAP19,
  author       = {Jos{\'{e}} Torres and
                  Sergio de los Santos and
                  Efthimios Alepis and
                  Constantinos Patsakis},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Behavioral Biometric Authentication in Android Unlock Patterns through
                  Machine Learning},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {146--154},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007394201460154},
  doi          = {10.5220/0007394201460154},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/TorresSAP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/TorresSAP19a,
  author       = {Jos{\'{e}} Torres and
                  Sergio de los Santos and
                  Efthimios Alepis and
                  Constantinos Patsakis},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {User Behavioral Biometrics and Machine Learning Towards Improving
                  User Authentication in Smartphones},
  booktitle    = {Information Systems Security and Privacy - 5th International Conference,
                  {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {250--271},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-49443-8\_12},
  doi          = {10.1007/978-3-030-49443-8\_12},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/TorresSAP19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/UlzFPS19,
  author       = {Thomas Ulz and
                  Markus Feldbacher and
                  Thomas W. Pieber and
                  Christian Steger},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Sensing Danger: Exploiting Sensors to Build Covert Channels},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {100--113},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007353801000113},
  doi          = {10.5220/0007353801000113},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/UlzFPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/VendittiF19,
  author       = {Antonello Venditti and
                  Fausto Fasano},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {A Systematic Approach to Choose the Data Warehouse Architecture},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {711--718},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007700307110718},
  doi          = {10.5220/0007700307110718},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/VendittiF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/WahshehL19,
  author       = {Heider A. M. Wahsheh and
                  Flaminia L. Luccio},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Evaluating Security, Privacy and Usability Features of {QR} Code Readers},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {266--273},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007346202660273},
  doi          = {10.5220/0007346202660273},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/WahshehL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/WeinhardtO19,
  author       = {Stephanie Weinhardt and
                  Olamide Omolola},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Usability of Policy Authoring Tools: {A} Layered Approach},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {301--308},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007355003010308},
  doi          = {10.5220/0007355003010308},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/WeinhardtO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/XiongKL19,
  author       = {Wenjun Xiong and
                  Fredrik Krantz and
                  Robert Lagerstr{\"{o}}m},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Threat Modeling and Attack Simulations of Connected Vehicles: {A}
                  Research Outlook},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {479--486},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007412104790486},
  doi          = {10.5220/0007412104790486},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/XiongKL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/XiongKL19a,
  author       = {Wenjun Xiong and
                  Fredrik Krantz and
                  Robert Lagerstr{\"{o}}m},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Threat Modeling and Attack Simulations of Connected Vehicles: Proof
                  of Concept},
  booktitle    = {Information Systems Security and Privacy - 5th International Conference,
                  {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {272--287},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-49443-8\_13},
  doi          = {10.1007/978-3-030-49443-8\_13},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/XiongKL19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/YamadaKMI19,
  author       = {Michihiro Yamada and
                  Hiroaki Kikuchi and
                  Naoki Matsuyama and
                  Koji Inui},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Mathematical Model to Estimate Loss by Cyber Incident in Japan},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {353--360},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007368503530360},
  doi          = {10.5220/0007368503530360},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/YamadaKMI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/YonamineKMT19,
  author       = {Shun Yonamine and
                  Youki Kadobayashi and
                  Daisuke Miyamoto and
                  Yuzo Taenaka},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Towards Automated Characterization of Malware's High-level Mechanism
                  using Virtual Machine Introspection},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {471--478},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007405504710478},
  doi          = {10.5220/0007405504710478},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/YonamineKMT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/YoshinoSNS19,
  author       = {Masayuki Yoshino and
                  Takayuki Suzuki and
                  Ken Naganuma and
                  Hisayoshi Sato},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Definition and Efficient Construction of Encrypted k-anonymization
                  Scheme},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {293--300},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007354702930300},
  doi          = {10.5220/0007354702930300},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/YoshinoSNS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ZaidenbergKYLAR19,
  author       = {Nezer Jacob Zaidenberg and
                  Michael Kiperberg and
                  Raz Ben Yehuda and
                  Roee Leon and
                  Asaf Algawi and
                  Amit Resh},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot},
  booktitle    = {Information Systems Security and Privacy - 5th International Conference,
                  {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {317--334},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-49443-8\_15},
  doi          = {10.1007/978-3-030-49443-8\_15},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ZaidenbergKYLAR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icissp/2018s,
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Information Systems Security and Privacy - 4th International Conference,
                  {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-25109-3},
  doi          = {10.1007/978-3-030-25109-3},
  isbn         = {978-3-030-25108-6},
  timestamp    = {Tue, 08 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/2018s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icissp/2019,
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  publisher    = {SciTePress},
  year         = {2019},
  isbn         = {978-989-758-359-9},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AbomharaKOH18,
  author       = {Mohamed Abomhara and
                  Geir M. K{\o}ien and
                  Vladimir A. Oleshchuk and
                  Mohamed Hamid},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Towards Risk-aware Access Control Framework for Healthcare Information
                  Sharing},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {312--321},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006608103120321},
  doi          = {10.5220/0006608103120321},
  timestamp    = {Wed, 11 Apr 2018 15:27:25 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AbomharaKOH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AburawiLC18,
  author       = {Nahla Aburawi and
                  Alexei Lisitsa and
                  Frans Coenen},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Querying Encrypted Graph Databases},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {447--451},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006660004470451},
  doi          = {10.5220/0006660004470451},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AburawiLC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Alepis18,
  author       = {Efthimios Alepis},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Notify This: Exploiting Android Notifications for Fun and Profit},
  booktitle    = {Information Systems Security and Privacy - 4th International Conference,
                  {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {86--108},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-25109-3\_5},
  doi          = {10.1007/978-3-030-25109-3\_5},
  timestamp    = {Tue, 08 Oct 2019 13:28:02 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Alepis18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AlpersPOR18,
  author       = {Sascha Alpers and
                  Roman Pilipchuk and
                  Andreas Oberweis and
                  Ralf H. Reussner},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Identifying Needs for a Holistic Modelling Approach to Privacy Aspects
                  in Enterprise Software Systems},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {74--82},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006606200740082},
  doi          = {10.5220/0006606200740082},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AlpersPOR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AlpersPOR18a,
  author       = {Sascha Alpers and
                  Roman Pilipchuk and
                  Andreas Oberweis and
                  Ralf H. Reussner},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {The Current State of the Holistic Privacy and Security Modelling Approach
                  in Business Process and Software Architecture Modelling},
  booktitle    = {Information Systems Security and Privacy - 4th International Conference,
                  {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {109--124},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-25109-3\_6},
  doi          = {10.1007/978-3-030-25109-3\_6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AlpersPOR18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AlqahtaniCHG18,
  author       = {Ohud Alqahtani and
                  Zhiyuan Chen and
                  Qiong Huang and
                  Karthik Gottipati},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Is Bigger Safer? Analyzing Factors Related to Data Breaches using
                  Publicly Available Information},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {373--378},
  publisher    = {SciTePress},
  year         = {2018},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AlqahtaniCHG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AlshehriCB18,
  author       = {Abdullah Alshehri and
                  Frans Coenen and
                  Danushka Bollegala},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Spectral Analysis of Keystroke Streams: Towards Effective Real-time
                  Continuous User Authentication},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {62--73},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006606100620073},
  doi          = {10.5220/0006606100620073},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AlshehriCB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AlvesM18,
  author       = {Thiago Alves and
                  Thomas H. Morris},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Hardware-based Cyber Threats},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {259--266},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006577202590266},
  doi          = {10.5220/0006577202590266},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/AlvesM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Anderson18,
  author       = {Ross Anderson},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Sustainable Security - an Internet of Durable Goods},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {7},
  publisher    = {SciTePress},
  year         = {2018},
  timestamp    = {Tue, 25 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Anderson18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BacciBMMMV18,
  author       = {Alessandro Bacci and
                  Alberto Bartoli and
                  Fabio Martinelli and
                  Eric Medvet and
                  Francesco Mercaldo and
                  Corrado Aaron Visaggio},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Impact of Code Obfuscation on Android Malware Detection based on Static
                  and Dynamic Analysis},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {379--385},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006642503790385},
  doi          = {10.5220/0006642503790385},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BacciBMMMV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BacciMMM18,
  author       = {Alessandro Bacci and
                  Fabio Martinelli and
                  Eric Medvet and
                  Francesco Mercaldo},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {VizMal: {A} Visualization Tool for Analyzing the Behavior of Android
                  Malware},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {517--525},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006665005170525},
  doi          = {10.5220/0006665005170525},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BacciMMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BadjiD18,
  author       = {Radja Badji and
                  Fida Kamal Dankar},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {A Risk-aware Access Control Model for Biomedical Research Platforms},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {322--328},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006608403220328},
  doi          = {10.5220/0006608403220328},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BadjiD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BarrosL18,
  author       = {Martina J. Zucule de Barros and
                  Horst Lazarek},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {A Cyber Safety Model for Schools in Mozambique},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {251--258},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006573802510258},
  doi          = {10.5220/0006573802510258},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BarrosL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/CalderonHYS18,
  author       = {Paul Calderon and
                  Hirokazu Hasegawa and
                  Yukiko Yamaguchi and
                  Hajime Shimada},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Malware Detection based on {HTTPS} Characteristic via Machine Learning},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {410--417},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006654604100417},
  doi          = {10.5220/0006654604100417},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/CalderonHYS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DagherMMM18,
  author       = {Gaby G. Dagher and
                  Praneeth Babu Marella and
                  Matea Milojkovic and
                  Jordan Mohler},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {BroncoVote: Secure Voting System using Ethereum's Blockchain},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {96--107},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006609700960107},
  doi          = {10.5220/0006609700960107},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/DagherMMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DeyBS18,
  author       = {Alexandre Dey and
                  Loic Beheshti and
                  Marie{-}Kerguelen Sido},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Health State of Google's PlayStore - Finding Malware in Large Sets
                  of Applications from the Android Market},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {538--544},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006727705380544},
  doi          = {10.5220/0006727705380544},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/DeyBS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DieschPK18,
  author       = {Rainer Diesch and
                  Matthias Pfaff and
                  Helmut Krcmar},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Prerequisite to Measure Information Security - {A} State of the Art
                  Literature Review},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {207--215},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006545602070215},
  doi          = {10.5220/0006545602070215},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/DieschPK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/EiblBE18,
  author       = {G{\"{u}}nther Eibl and
                  Sebastian Burkhart and
                  Dominik Engel},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Unsupervised Holiday Detection from Low-resolution Smart Metering
                  Data},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {477--486},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006719704770486},
  doi          = {10.5220/0006719704770486},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/EiblBE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/EiblBE18a,
  author       = {G{\"{u}}nther Eibl and
                  Sebastian Burkhart and
                  Dominik Engel},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Insights into Unsupervised Holiday Detection from Low-Resolution Smart
                  Metering Data},
  booktitle    = {Information Systems Security and Privacy - 4th International Conference,
                  {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {281--302},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-25109-3\_15},
  doi          = {10.1007/978-3-030-25109-3\_15},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/EiblBE18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/EignerKT18,
  author       = {Oliver Eigner and
                  Philipp Kreimel and
                  Paul Tavolato},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Attacks on Industrial Control Systems - Modeling and Anomaly Detection},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {581--588},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006755405810588},
  doi          = {10.5220/0006755405810588},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/EignerKT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/EreminK18,
  author       = {Aleksandr Eremin and
                  Konstantin Kogos},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Incoming Call Implicit User Authentication - User Authentication via
                  Hand Movement Pattern},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {24--29},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006555200240029},
  doi          = {10.5220/0006555200240029},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/EreminK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/EreminKV18,
  author       = {Aleksandr Eremin and
                  Konstantin Kogos and
                  Yana Valatskayte},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Touch and Move: Incoming Call User Authentication},
  booktitle    = {Information Systems Security and Privacy - 4th International Conference,
                  {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {26--39},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-25109-3\_2},
  doi          = {10.1007/978-3-030-25109-3\_2},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/EreminKV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/FerreiraM18,
  author       = {Ana Ferreira and
                  Pedro Manuel Vieira Marques},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Phishing Through Time: {A} Ten Year Story based on Abstracts},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {225--232},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006552602250232},
  doi          = {10.5220/0006552602250232},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/FerreiraM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/FiliolJD18,
  author       = {Eric Filiol and
                  J. Nicolas and
                  Maxence Delong},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Statistical and Combinatorial Analysis of the {TOR} Routing Protocol
                  - Structural Weaknesses Identified in the {TOR} Network},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {507--516},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006634705070516},
  doi          = {10.5220/0006634705070516},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/FiliolJD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Fortuna0B18,
  author       = {Pedro Fortuna and
                  Nuno Pereira and
                  Ismail Butun},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {A Framework for Web Application Integrity},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {487--493},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006720204870493},
  doi          = {10.5220/0006720204870493},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/Fortuna0B18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/FredjLC18,
  author       = {Feten Ben Fredj and
                  Nadira Lammari and
                  Isabelle Comyn{-}Wattiau},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Relational Database Anonymization - {A} Model-driven Guiding Approach},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {161--170},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006659201610170},
  doi          = {10.5220/0006659201610170},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/FredjLC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GaoW18,
  author       = {Yuanyuan Gao and
                  Kunpeng Wang},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Probability Preservation Property with Relative Error and Its Applications},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {461--468},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006717204610468},
  doi          = {10.5220/0006717204610468},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/GaoW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GencLRS18,
  author       = {Ziya Alper Gen{\c{c}} and
                  Gabriele Lenzini and
                  Peter Y. A. Ryan and
                  Itzel V{\'{a}}zquez Sandoval},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {83--95},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006609100830095},
  doi          = {10.5220/0006609100830095},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/GencLRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GencLRS18a,
  author       = {Ziya Alper Gen{\c{c}} and
                  Gabriele Lenzini and
                  Peter Y. A. Ryan and
                  Itzel V{\'{a}}zquez Sandoval},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {A Critical Security Analysis of the Password-Based Authentication
                  Honeywords System Under Code-Corruption Attack},
  booktitle    = {Information Systems Security and Privacy - 4th International Conference,
                  {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {125--151},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-25109-3\_7},
  doi          = {10.1007/978-3-030-25109-3\_7},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/GencLRS18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GougeonL18,
  author       = {Thomas Gougeon and
                  Patrick Lacharme},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {How to Break CaptchaStar},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {41--51},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006577600410051},
  doi          = {10.5220/0006577600410051},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/GougeonL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GougeonL18a,
  author       = {Thomas Gougeon and
                  Patrick Lacharme},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {A Simple Attack on CaptchaStar},
  booktitle    = {Information Systems Security and Privacy - 4th International Conference,
                  {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {66--85},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-25109-3\_4},
  doi          = {10.1007/978-3-030-25109-3\_4},
  timestamp    = {Tue, 08 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/GougeonL18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GrafK18,
  author       = {Roman Graf and
                  Ross King},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Cyber Threat Information Classification and Life Cycle Management
                  using Smart Contracts},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {304--311},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006605203040311},
  doi          = {10.5220/0006605203040311},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/GrafK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HakbilenPEU18,
  author       = {Onur Hakbilen and
                  Piraveen Perinparajan and
                  Michael Eikeland and
                  Nils Ulltveit{-}Moe},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {{SAFEPASS} - Presenting a Convenient, Portable and Secure Password
                  Manager},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {292--303},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006603102920303},
  doi          = {10.5220/0006603102920303},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HakbilenPEU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HamidiSM18,
  author       = {Mona Hamidi and
                  Mina Sheikhalishahi and
                  Fabio Martinelli},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Secure Two-party Agglomerative Hierarchical Clustering Construction},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {432--437},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006659704320437},
  doi          = {10.5220/0006659704320437},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HamidiSM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HaupertM18,
  author       = {Vincent Haupert and
                  Tilo M{\"{u}}ller},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {On App-based Matrix Code Authentication in Online Banking},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {149--160},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006650501490160},
  doi          = {10.5220/0006650501490160},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HaupertM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HerwonoE18,
  author       = {Ian Herwono and
                  Fadi Ali El{-}Moussa},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Automated Detection of the Early Stages of Cyber Kill Chain},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {182--189},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006543301820189},
  doi          = {10.5220/0006543301820189},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HerwonoE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HuangTS18,
  author       = {Jasper Huang and
                  Fabio Di Troia and
                  Mark Stamp},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Acoustic Gait Analysis using Support Vector Machines},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {545--552},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006730705450552},
  doi          = {10.5220/0006730705450552},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/HuangTS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HummerGKFP18,
  author       = {Matthias Hummer and
                  Sebastian Groll and
                  Michael Kunz and
                  Ludwig Fuchs and
                  G{\"{u}}nther Pernul},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Measuring Identity and Access Management Performance - An Expert Survey
                  on Possible Performance Indicators},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {233--240},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006557702330240},
  doi          = {10.5220/0006557702330240},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HummerGKFP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HunterW18,
  author       = {Aaron Hunter and
                  Ken Wong},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Decoy Systems with Low Energy Bluetooth Communication},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {404--409},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006646604040409},
  doi          = {10.5220/0006646604040409},
  timestamp    = {Fri, 15 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HunterW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Jacoby18,
  author       = {David Jacoby},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Hacking the Security Industry for Fun and Profit and Humanity},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {5},
  publisher    = {SciTePress},
  year         = {2018},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Jacoby18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/JasserTSR18,
  author       = {Stefanie Jasser and
                  Katja Tuma and
                  Riccardo Scandariato and
                  Matthias Riebisch},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Back to the Drawing Board - Bringing Security Constraints in an Architecture-centric
                  Software Development Process},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {438--446},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006659904380446},
  doi          = {10.5220/0006659904380446},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/JasserTSR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KandoussiB18,
  author       = {Asmaa El Kandoussi and
                  Hanan El Bakkali},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Novel Access Control Approach for Inter-organizational Workflows},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {345--352},
  publisher    = {SciTePress},
  year         = {2018},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KandoussiB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KarlzenBH18,
  author       = {Henrik Karlz{\'{e}}n and
                  Johan E. Bengtsson and
                  Jonas Hallberg},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {A Test of Structured Threat Descriptions for Information Security
                  Risk Assessments},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {469--476},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006719604690476},
  doi          = {10.5220/0006719604690476},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KarlzenBH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LeeOKL18,
  author       = {Wei{-}Han Lee and
                  Jorge Ortiz and
                  Bongjun Ko and
                  Ruby B. Lee},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Inferring Smartphone Users' Handwritten Patterns by using Motion Sensors},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {139--148},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006650301390148},
  doi          = {10.5220/0006650301390148},
  timestamp    = {Fri, 07 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LeeOKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LuhTTS18,
  author       = {Robert Luh and
                  Marlies Temper and
                  Simon Tjoa and
                  Sebastian Schrittwieser},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {{APT} {RPG:} Design of a Gamified Attacker/Defender Meta Model},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {526--537},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006717805260537},
  doi          = {10.5220/0006717805260537},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/LuhTTS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MarellaMMD18,
  author       = {Praneeth Babu Marella and
                  Matea Milojkovic and
                  Jordan Mohler and
                  Gaby G. Dagher},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {GenVote: Blockchain-Based Customizable and Secure Voting Platform},
  booktitle    = {Information Systems Security and Privacy - 4th International Conference,
                  {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {152--171},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-25109-3\_8},
  doi          = {10.1007/978-3-030-25109-3\_8},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MarellaMMD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MartinelliMN18,
  author       = {Fabio Martinelli and
                  Francesco Mercaldo and
                  Vittoria Nardone},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Identifying Insecure Features in Android Applications using Model
                  Checking},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {589--596},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006758105890596},
  doi          = {10.5220/0006758105890596},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MartinelliMN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MartinelliMNOS18,
  author       = {Fabio Martinelli and
                  Francesco Mercaldo and
                  Vittoria Nardone and
                  Albina Orlando and
                  Antonella Santone},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Who's Driving My Car? {A} Machine Learning based Approach to Driver
                  Identification},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {367--372},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006633403670372},
  doi          = {10.5220/0006633403670372},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MartinelliMNOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MartinelliMNOS18a,
  author       = {Fabio Martinelli and
                  Francesco Mercaldo and
                  Vittoria Nardone and
                  Albina Orlando and
                  Antonella Santone},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Cluster Analysis for Driver Aggressiveness Identification},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {562--569},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006755205620569},
  doi          = {10.5220/0006755205620569},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MartinelliMNOS18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MauriCD18,
  author       = {Lara Mauri and
                  Stelvio Cimato and
                  Ernesto Damiani},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {A Comparative Analysis of Current Cryptocurrencies},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {127--138},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006648801270138},
  doi          = {10.5220/0006648801270138},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MauriCD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MaynardMS18,
  author       = {Peter Maynard and
                  Kieran McLaughlin and
                  Sakir Sezer},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Using Application Layer Metrics to Detect Advanced {SCADA} Attacks},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {418--425},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006656204180425},
  doi          = {10.5220/0006656204180425},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/MaynardMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MeinigM18,
  author       = {Michael Meinig and
                  Christoph Meinel},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Securing the Flow - Data Flow Analysis with Operational Node Structures},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {241--250},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006570302410250},
  doi          = {10.5220/0006570302410250},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MeinigM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MigdalR18,
  author       = {Denis Migdal and
                  Christophe Rosenberger},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Towards a Personal Identity Code Respecting Privacy},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {267--274},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006578902670274},
  doi          = {10.5220/0006578902670274},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MigdalR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MorissetS18,
  author       = {Charles Morisset and
                  David Sanchez},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {VisABAC: {A} Tool for Visualising {ABAC} Policies},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {117--126},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006647401170126},
  doi          = {10.5220/0006647401170126},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MorissetS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MorissetS18a,
  author       = {Charles Morisset and
                  David Sanchez},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {On Building a Visualisation Tool for Access Control Policies},
  booktitle    = {Information Systems Security and Privacy - 4th International Conference,
                  {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {215--239},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-25109-3\_12},
  doi          = {10.1007/978-3-030-25109-3\_12},
  timestamp    = {Tue, 08 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MorissetS18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NagarajanTAS18,
  author       = {Prathiba Nagarajan and
                  Fabio Di Troia and
                  Thomas H. Austin and
                  Mark Stamp},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Autocorrelation Analysis of Financial Botnet Traffic},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {599--606},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006685705990606},
  doi          = {10.5220/0006685705990606},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/NagarajanTAS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Nazmul0C18,
  author       = {Rumana Nazmul and
                  Md. Rafiqul Islam and
                  Ahsan Raja Chowdhury},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Alignment-free Cancellable Template Generation for Fingerprint based
                  Authentication},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {361--366},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006614303610366},
  doi          = {10.5220/0006614303610366},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Nazmul0C18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NguyenZRDMN18,
  author       = {Kim Trong Nguyen and
                  Cathel Zitzmann and
                  Florent Retraint and
                  Agn{\`{e}}s Delahaies and
                  Fr{\'{e}}d{\'{e}}ric Morain{-}Nicolier and
                  Hoai Phuong Nguyen},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Face Spoofing Detection for Smartphones using a 3D Reconstruction
                  and the Motion Sensors},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {286--291},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006602202860291},
  doi          = {10.5220/0006602202860291},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/NguyenZRDMN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NinassiVR18,
  author       = {Alexandre Ninassi and
                  Sylvain Vernois and
                  Christophe Rosenberger},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Privacy Compliant Multi-biometric Authentication on Smartphones},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {173--181},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006534601730181},
  doi          = {10.5220/0006534601730181},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/NinassiVR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PatsakisA18,
  author       = {Constantinos Patsakis and
                  Efthimios Alepis},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Knock-Knock: The Unbearable Lightness of Android Notifications},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {52--61},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006603200520061},
  doi          = {10.5220/0006603200520061},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/PatsakisA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PfrangMFB18,
  author       = {Steffen Pfrang and
                  David Meier and
                  Michael Friedrich and
                  J{\"{u}}rgen Beyerer},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Advancing Protocol Fuzzing for Industrial Automation and Control Systems},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {570--580},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006755305700580},
  doi          = {10.5220/0006755305700580},
  timestamp    = {Mon, 11 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/PfrangMFB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PonsardG18,
  author       = {Christophe Ponsard and
                  Jeremy Grandclaudon},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Survey and Guidelines for the Design and Deployment of a Cyber Security
                  Label for SMEs},
  booktitle    = {Information Systems Security and Privacy - 4th International Conference,
                  {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {240--260},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-25109-3\_13},
  doi          = {10.1007/978-3-030-25109-3\_13},
  timestamp    = {Tue, 08 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/PonsardG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PonsardGD18,
  author       = {Christophe Ponsard and
                  Jeremy Grandclaudon and
                  Gautier Dallons},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Towards a Cyber Security Label for SMEs: {A} European Perspective
                  -},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {426--431},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006657604260431},
  doi          = {10.5220/0006657604260431},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/PonsardGD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Rosenberger18,
  author       = {Christophe Rosenberger},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Evaluation of Biometric Template Protection Schemes based on a Transformation},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {216--224},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006550502160224},
  doi          = {10.5220/0006550502160224},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Rosenberger18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SharafaldinLG18,
  author       = {Iman Sharafaldin and
                  Arash Habibi Lashkari and
                  Ali A. Ghorbani},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Toward Generating a New Intrusion Detection Dataset and Intrusion
                  Traffic Characterization},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {108--116},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006639801080116},
  doi          = {10.5220/0006639801080116},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SharafaldinLG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SharafaldinLG18a,
  author       = {Iman Sharafaldin and
                  Arash Habibi Lashkari and
                  Ali A. Ghorbani},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {A Detailed Analysis of the {CICIDS2017} Data Set},
  booktitle    = {Information Systems Security and Privacy - 4th International Conference,
                  {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {172--188},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-25109-3\_9},
  doi          = {10.1007/978-3-030-25109-3\_9},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SharafaldinLG18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SheikhalishahiH18,
  author       = {Mina Sheikhalishahi and
                  Mona Hamidi and
                  Fabio Martinelli},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Privacy Preserving Collaborative Agglomerative Hierarchical Clustering
                  Construction},
  booktitle    = {Information Systems Security and Privacy - 4th International Conference,
                  {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {261--280},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-25109-3\_14},
  doi          = {10.1007/978-3-030-25109-3\_14},
  timestamp    = {Tue, 08 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SheikhalishahiH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SilvaNS18,
  author       = {Marco Silva and
                  Ant{\'{o}}nio Nogueira and
                  Paulo Salvador},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Modular Platform for Customer-Side Detection of {BGP} Redirection
                  Attacks},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {199--206},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006543601990206},
  doi          = {10.5220/0006543601990206},
  timestamp    = {Wed, 16 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SilvaNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SinghRS18,
  author       = {Dilpreet Singh and
                  Ron Ruhl and
                  Hamman Samuel},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Attack Tree for Modelling Unauthorized {EMV} Card Transactions at
                  {POS} Terminals},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {494--502},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006723304940502},
  doi          = {10.5220/0006723304940502},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SinghRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Stach18,
  author       = {Christoph Stach},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Big Brother is Smart Watching You - Privacy Concerns about Health
                  and Fitness Applications},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {13--23},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006537000130023},
  doi          = {10.5220/0006537000130023},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/Stach18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Stach18a,
  author       = {Christoph Stach},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Fine-Grained Privacy Control for Fitness and Health Applications Using
                  the Privacy Management Platform},
  booktitle    = {Information Systems Security and Privacy - 4th International Conference,
                  {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {1--25},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-25109-3\_1},
  doi          = {10.1007/978-3-030-25109-3\_1},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/Stach18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/StachM18,
  author       = {Christoph Stach and
                  Bernhard Mitschang},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {{ACCESSORS} - {A} Data-Centric Permission Model for the Internet of
                  Things},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {30--40},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006572100300040},
  doi          = {10.5220/0006572100300040},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/StachM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/StachM18a,
  author       = {Christoph Stach and
                  Bernhard Mitschang},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Elicitation of Privacy Requirements for the Internet of Things Using
                  {ACCESSORS}},
  booktitle    = {Information Systems Security and Privacy - 4th International Conference,
                  {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {40--65},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-25109-3\_3},
  doi          = {10.1007/978-3-030-25109-3\_3},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/StachM18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ToliP18,
  author       = {Christina{-}Angeliki Toli and
                  Bart Preneel},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Privacy-preserving Biometric Authentication Model for e-Finance Applications},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {353--360},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006611303530360},
  doi          = {10.5220/0006611303530360},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ToliP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/TorresS18,
  author       = {Jos{\'{e}} Torres and
                  Sergio de los Santos},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Malicious {PDF} Documents Detection using Machine Learning Techniques
                  - {A} Practical Approach with Cloud Computing Applications},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {337--344},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006609503370344},
  doi          = {10.5220/0006609503370344},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/TorresS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/VasileiouF18,
  author       = {Ismini Vasileiou and
                  Steven Furnell},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Enhancing Security Education - Recognising Threshold Concepts and
                  Other Influencing Factors},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {398--403},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006646203980403},
  doi          = {10.5220/0006646203980403},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/VasileiouF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/VasileiouF18a,
  author       = {Ismini Vasileiou and
                  Steven Furnell},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Personalising Security Education: Factors Influencing Individual Awareness
                  and Compliance},
  booktitle    = {Information Systems Security and Privacy - 4th International Conference,
                  {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {189--200},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-25109-3\_10},
  doi          = {10.1007/978-3-030-25109-3\_10},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/VasileiouF18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/VibertCBR18,
  author       = {Beno{\^{\i}}t Vibert and
                  Christophe Charrier and
                  Jean{-}Marie Le Bars and
                  Christophe Rosenberger},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Towards an Optimal Template Reduction for Securing Embedded Fingerprint
                  Devices},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {329--336},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006608903290336},
  doi          = {10.5220/0006608903290336},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/VibertCBR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/WaagsnesU18,
  author       = {Henrik Waagsnes and
                  Nils Ulltveit{-}Moe},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Intrusion Detection System Test Framework for {SCADA} Systems},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {275--285},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006588202750285},
  doi          = {10.5220/0006588202750285},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/WaagsnesU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/WangZL18,
  author       = {Wenbo Wang and
                  Tianning Zang and
                  Yuqing Lan},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {The Rapid Extraction of Suspicious Traffic from Passive {DNS}},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {190--198},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006543401900198},
  doi          = {10.5220/0006543401900198},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/WangZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/WongH18,
  author       = {Kenneth C. K. Wong and
                  Aaron Hunter},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Managing Cybersecurity Break-ins Using Bluetooth Low Energy Devices
                  to Verify Attackers: {A} Practical Study},
  booktitle    = {Information Systems Security and Privacy - 4th International Conference,
                  {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {201--214},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-25109-3\_11},
  doi          = {10.1007/978-3-030-25109-3\_11},
  timestamp    = {Fri, 15 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/WongH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/WurzenbergerSSF18,
  author       = {Markus Wurzenberger and
                  Florian Skopik and
                  Giuseppe Settanni and
                  Roman Fiedler},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {{AECID:} {A} Self-learning Anomaly Detection Approach based on Light-weight
                  Log Parser Models},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {386--397},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006643003860397},
  doi          = {10.5220/0006643003860397},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/WurzenbergerSSF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/YajamanamSTS18,
  author       = {Sravani Yajamanam and
                  Vikash Raja Samuel Selvin and
                  Fabio Di Troia and
                  Mark Stamp},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Deep Learning versus Gist Descriptors for Image-based Malware Classification},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {553--561},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006685805530561},
  doi          = {10.5220/0006685805530561},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/YajamanamSTS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ZhengW18,
  author       = {Kaiyan Zheng and
                  Peng Wang},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Encryption Schemes based on a Single Permutation: PCBC, POFB, {PCFB}
                  and {PCTR}},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {452--460},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006713804520460},
  doi          = {10.5220/0006713804520460},
  timestamp    = {Tue, 17 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/ZhengW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icissp/2017s,
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Information Systems Security and Privacy - Third International Conference,
                  {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93354-2},
  doi          = {10.1007/978-3-319-93354-2},
  isbn         = {978-3-319-93353-5},
  timestamp    = {Fri, 24 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/2017s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icissp/2018,
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  publisher    = {SciTePress},
  year         = {2018},
  isbn         = {978-989-758-282-0},
  timestamp    = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AhmadiS17,
  author       = {Ahmad Ahmadi and
                  Reihaneh Safavi{-}Naini},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Distance-bounding Identification},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {202--212},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006211102020212},
  doi          = {10.5220/0006211102020212},
  timestamp    = {Thu, 18 May 2017 14:22:34 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AhmadiS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AhmadiS17a,
  author       = {Ahmad Ahmadi and
                  Reihaneh Safavi{-}Naini},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Directional Distance-Bounding Identification},
  booktitle    = {Information Systems Security and Privacy - Third International Conference,
                  {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  pages        = {197--221},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93354-2\_10},
  doi          = {10.1007/978-3-319-93354-2\_10},
  timestamp    = {Fri, 24 Aug 2018 07:46:20 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AhmadiS17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AldayelA17,
  author       = {Mashael Aldayel and
                  Mohammad Alhussain},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Enhanced Identification of Sensitive User Inputs in Mobile Applications},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {506--515},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006238405060515},
  doi          = {10.5220/0006238405060515},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AldayelA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AlepisP17,
  author       = {Efthimios Alepis and
                  Constantinos Patsakis},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {There's Wally! Location Tracking in Android without Permissions},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {278--284},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006125502780284},
  doi          = {10.5220/0006125502780284},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AlepisP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AlruhailyBC17,
  author       = {Nada Alruhaily and
                  Behzad Bordbar and
                  Tom Chothia},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Towards an Understanding of the Misclassification Rates of Machine
                  Learning-based Malware Detection Systems},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {101--112},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006174301010112},
  doi          = {10.5220/0006174301010112},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AlruhailyBC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AlruhailyCB17,
  author       = {Nada Alruhaily and
                  Tom Chothia and
                  Behzad Bordbar},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {A Better Understanding of Machine Learning Malware Misclassifcation},
  booktitle    = {Information Systems Security and Privacy - Third International Conference,
                  {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  pages        = {35--58},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93354-2\_3},
  doi          = {10.1007/978-3-319-93354-2\_3},
  timestamp    = {Fri, 24 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AlruhailyCB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BannierF17,
  author       = {Arnaud Bannier and
                  Eric Filiol},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Mathematical Backdoors in Symmetric Encryption Systems - Proposal
                  for a Backdoored AES-like Block Cipher},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {622--631},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006244406220631},
  doi          = {10.5220/0006244406220631},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BannierF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BarghVC17,
  author       = {Mortaza S. Bargh and
                  Marco Vink and
                  Sunil Choenni},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {On Usage Control in Relational Database Management Systems - Obligations
                  and Their Enforcement in Joining Datasets},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {190--201},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006209801900201},
  doi          = {10.5220/0006209801900201},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BarghVC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BarghVC17a,
  author       = {Mortaza S. Bargh and
                  Marco Vink and
                  Sunil Choenni},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {On Using Obligations for Usage Control in Joining of Datasets},
  booktitle    = {Information Systems Security and Privacy - Third International Conference,
                  {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  pages        = {173--196},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93354-2\_9},
  doi          = {10.1007/978-3-319-93354-2\_9},
  timestamp    = {Fri, 24 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BarghVC17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BernardeschiNDP17,
  author       = {Cinzia Bernardeschi and
                  Marco Di Natale and
                  Gianluca Dini and
                  Maurizio Palmieri},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Verifying Data Secure Flow in {AUTOSAR} Models by Static Analysis},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {704--713},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006288707040713},
  doi          = {10.5220/0006288707040713},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/BernardeschiNDP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Bertino17,
  author       = {Elisa Bertino},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Security and Privacy in the IoT},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {5},
  publisher    = {SciTePress},
  year         = {2017},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Bertino17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BeukemaAS17,
  author       = {Wietze J. B. Beukema and
                  Thomas Attema and
                  Harm A. Schotanus},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Internal Network Monitoring and Anomaly Detection through Host Clustering},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {694--703},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006288606940703},
  doi          = {10.5220/0006288606940703},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BeukemaAS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BeuranPTCTS17,
  author       = {Razvan Beuran and
                  Cuong Pham and
                  Dat Tang and
                  Ken{-}ichi Chinen and
                  Yasuo Tan and
                  Yoichi Shinoda},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {CyTrONE: An Integrated Cybersecurity Training Framework},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {157--166},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006206401570166},
  doi          = {10.5220/0006206401570166},
  timestamp    = {Thu, 29 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BeuranPTCTS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BuK17,
  author       = {Lake Bu and
                  Mark G. Karpovsky},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {A Design of Secure and ReliableWireless Transmission Channel for Implantable
                  Medical Devices},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {233--242},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006270502330242},
  doi          = {10.5220/0006270502330242},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BuK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Cam-Winget17,
  author       = {Nancy Cam{-}Winget},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Sensor Networks as the new Attack Target},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {7},
  publisher    = {SciTePress},
  year         = {2017},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Cam-Winget17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/CiminoV17,
  author       = {Mario Giovanni C. A. Cimino and
                  Gigliola Vaglini},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Localization and Inhibition of Malicious Behaviors through a Model
                  Checking based Methodology},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {644--652},
  publisher    = {SciTePress},
  year         = {2017},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/CiminoV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/CimitileMM17,
  author       = {Aniello Cimitile and
                  Fabio Martinelli and
                  Francesco Mercaldo},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Machine Learning Meets iOS Malware: Identifying Malicious Applications
                  on Apple Environment},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {487--492},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006217304870492},
  doi          = {10.5220/0006217304870492},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/CimitileMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/CostantinoMMP17,
  author       = {Gianpiero Costantino and
                  Fabio Martinelli and
                  Ilaria Matteucci and
                  Marinella Petrocchi},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Analysis of Data Sharing Agreements},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {167--178},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006207501670178},
  doi          = {10.5220/0006207501670178},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/CostantinoMMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/CostantinoMMP17a,
  author       = {Gianpiero Costantino and
                  Fabio Martinelli and
                  Ilaria Matteucci and
                  Marinella Petrocchi},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Efficient Detection of Conflicts in Data Sharing Agreements},
  booktitle    = {Information Systems Security and Privacy - Third International Conference,
                  {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  pages        = {148--172},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93354-2\_8},
  doi          = {10.1007/978-3-319-93354-2\_8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/CostantinoMMP17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/CourtoisM17,
  author       = {Nicolas T. Courtois and
                  Rebekah Mercer},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Stealth Address and Key Management Techniques in Blockchain Systems},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {559--566},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006270005590566},
  doi          = {10.5220/0006270005590566},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/CourtoisM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/CozzaTCK17,
  author       = {Vittoria Cozza and
                  Zisis Tsiatsikas and
                  Mauro Conti and
                  Georgios Kambourakis},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Why Snoopy Loves Online Services: An Analysis of (Lack of) Privacy
                  in Online Services},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {431--438},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006207204310438},
  doi          = {10.5220/0006207204310438},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/CozzaTCK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DamT17,
  author       = {Khanh{-}Huu{-}The Dam and
                  Tayssir Touili},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Malware Detection based on Graph Classification},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {455--463},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006209504550463},
  doi          = {10.5220/0006209504550463},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/DamT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DamT17a,
  author       = {Khanh{-}Huu{-}The Dam and
                  Tayssir Touili},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Extracting Android Malicious Behaviors},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {714--723},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006288807140723},
  doi          = {10.5220/0006288807140723},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/DamT17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DuboisF17,
  author       = {Michel Dubois and
                  Eric Filiol},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Hacking of the {AES} with Boolean Functions},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {599--609},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006091305990609},
  doi          = {10.5220/0006091305990609},
  timestamp    = {Wed, 08 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/DuboisF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DutaGT17,
  author       = {Cristina{-}Loredana Duta and
                  Laura Gheorghe and
                  Nicolae Tapus},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Real-time {DSP} Implementations of Voice Encryption Algorithms},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {439--446},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006208304390446},
  doi          = {10.5220/0006208304390446},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/DutaGT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/EbrahimyP17,
  author       = {Razgar Ebrahimy and
                  Zoya Pourmirza},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Cyber-interdependency in Smart Energy Systems},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {529--537},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006262805290537},
  doi          = {10.5220/0006262805290537},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/EbrahimyP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/EiblFHSBRE17,
  author       = {G{\"{u}}nther Eibl and
                  Cornelia Ferner and
                  Tobias Hildebrandt and
                  Florian Stertz and
                  Sebastian Burkhart and
                  Stefanie Rinderle{-}Ma and
                  Dominik Engel},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Exploration of the Potential of Process Mining for Intrusion Detection
                  in Smart Metering},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {38--46},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006103900380046},
  doi          = {10.5220/0006103900380046},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/EiblFHSBRE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/FukushimaHK17,
  author       = {Kazuhide Fukushima and
                  Seira Hidano and
                  Shinsaku Kiyomoto},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {White-box Implementation of Stream Cipher},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {263--269},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006115202630269},
  doi          = {10.5220/0006115202630269},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/FukushimaHK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GjertsenGBF17,
  author       = {Eyvind Garder B. Gjertsen and
                  Erlend Andreas Gj{\ae}re and
                  Maria Bartnes and
                  Waldo Rocha Flores},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Gamification of Information Security Awareness and Training},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {59--70},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006128500590070},
  doi          = {10.5220/0006128500590070},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/GjertsenGBF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HadadPSOR17,
  author       = {Tal Hadad and
                  Rami Puzis and
                  Bronislav Sidik and
                  Nir Ofek and
                  Lior Rokach},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Application Marketplace Malware Detection by User Feedback Analysis},
  booktitle    = {Information Systems Security and Privacy - Third International Conference,
                  {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  pages        = {1--19},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93354-2\_1},
  doi          = {10.1007/978-3-319-93354-2\_1},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HadadPSOR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HadadSOPR17,
  author       = {Tal Hadad and
                  Bronislav Sidik and
                  Nir Ofek and
                  Rami Puzis and
                  Lior Rokach},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {User Feedback Analysis for Mobile Malware Detection},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {83--94},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006131200830094},
  doi          = {10.5220/0006131200830094},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HadadSOPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HamadP17,
  author       = {Mohammad Hamad and
                  Vassilis Prevelakis},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Secure APIs for Applications in Microkernel-based Systems},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {553--558},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006265805530558},
  doi          = {10.5220/0006265805530558},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/HamadP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HatinCSR17,
  author       = {Julien Hatin and
                  Estelle Cherrier and
                  Jean{-}Jacques Schwartzmann and
                  Christophe Rosenberger},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Privacy Preserving Transparent Mobile Authentication},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {354--361},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006186803540361},
  doi          = {10.5220/0006186803540361},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HatinCSR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HaupertM17,
  author       = {Vincent Haupert and
                  Tilo M{\"{u}}ller},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Rest in Protection - {A} Kernel-level Approach to Mitigate {RIP} Tampering},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {25--37},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006083800250037},
  doi          = {10.5220/0006083800250037},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HaupertM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HerwonoE17,
  author       = {Ian Herwono and
                  Fadi Ali El{-}Moussa},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {A Collaborative Tool for Modelling Multi-stage Attacks},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {312--317},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006137103120317},
  doi          = {10.5220/0006137103120317},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HerwonoE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HerwonoE17a,
  author       = {Ian Herwono and
                  Fadi Ali El{-}Moussa},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {A System for Detecting Targeted Cyber-Attacks Using Attack Patterns},
  booktitle    = {Information Systems Security and Privacy - Third International Conference,
                  {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  pages        = {20--34},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93354-2\_2},
  doi          = {10.1007/978-3-319-93354-2\_2},
  timestamp    = {Fri, 24 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HerwonoE17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HuffmeyerHMSW17,
  author       = {Marc H{\"{u}}ffmeyer and
                  Pascal Hirmer and
                  Bernhard Mitschang and
                  Ulf Schreier and
                  Matthias Wieland},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {SitAC - {A} System for Situation-aware Access Control - Controlling
                  Access to Sensor Data},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {113--125},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006186501130125},
  doi          = {10.5220/0006186501130125},
  timestamp    = {Fri, 29 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/HuffmeyerHMSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HuffmeyerHMSW17a,
  author       = {Marc H{\"{u}}ffmeyer and
                  Pascal Hirmer and
                  Bernhard Mitschang and
                  Ulf Schreier and
                  Matthias Wieland},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Situation-Aware Access Control for Industrie 4.0},
  booktitle    = {Information Systems Security and Privacy - Third International Conference,
                  {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  pages        = {59--83},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93354-2\_4},
  doi          = {10.1007/978-3-319-93354-2\_4},
  timestamp    = {Fri, 29 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/HuffmeyerHMSW17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HuynenL17,
  author       = {Jean{-}Louis Huynen and
                  Gabriele Lenzini},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {From Situation Awareness to Action: An Information Security Management
                  Toolkit for Socio-technical Security Retrospective and Prospective
                  Analysis},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {213--224},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006211302130224},
  doi          = {10.5220/0006211302130224},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HuynenL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HuynenL17a,
  author       = {Jean{-}Louis Huynen and
                  Gabriele Lenzini},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {An Information Security Management for Socio-Technical Analysis of
                  System Security},
  booktitle    = {Information Systems Security and Privacy - Third International Conference,
                  {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  pages        = {222--251},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93354-2\_11},
  doi          = {10.1007/978-3-319-93354-2\_11},
  timestamp    = {Fri, 24 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HuynenL17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/IrollaF17,
  author       = {Paul Irolla and
                  Eric Filiol},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Glassbox: Dynamic Analysis Platform for Malware Android Applications
                  on Real Devices},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {610--621},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006094006100621},
  doi          = {10.5220/0006094006100621},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/IrollaF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KapratwarTS17,
  author       = {Ankita Kapratwar and
                  Fabio Di Troia and
                  Mark Stamp},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Static and Dynamic Analysis of Android Malware},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {653--662},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006256706530662},
  doi          = {10.5220/0006256706530662},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/KapratwarTS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KarlssonHS17,
  author       = {Linus Karlsson and
                  Martin Hell and
                  Paul Stankovski},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Improved Greedy Nonrandomness Detectors for Stream Ciphers},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {225--232},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006268202250232},
  doi          = {10.5220/0006268202250232},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KarlssonHS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KarlssonHS17a,
  author       = {Linus Karlsson and
                  Martin Hell and
                  Paul Stankovski},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Not So Greedy: Enhanced Subset Exploration for Nonrandomness Detectors},
  booktitle    = {Information Systems Security and Privacy - Third International Conference,
                  {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  pages        = {273--294},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93354-2\_13},
  doi          = {10.1007/978-3-319-93354-2\_13},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/KarlssonHS17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KarlzenBH17,
  author       = {Henrik Karlz{\'{e}}n and
                  Johan E. Bengtsson and
                  Jonas Hallberg},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Assessing Information Security Risks using Pairwise Weighting},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {318--324},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006138203180324},
  doi          = {10.5220/0006138203180324},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KarlzenBH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KiperbergRAZ17,
  author       = {Michael Kiperberg and
                  Amit Resh and
                  Asaf Algawi and
                  Nezer Jacob Zaidenberg},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {System for Executing Encrypted Java Programs},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {245--252},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006078902450252},
  doi          = {10.5220/0006078902450252},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KiperbergRAZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KippeP17,
  author       = {J{\"{o}}rg Kippe and
                  Steffen Pfrang},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Network and Topology Models to Support {IDS} Event Processing},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {372--379},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006189403720379},
  doi          = {10.5220/0006189403720379},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KippeP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KrennLS17,
  author       = {Stephan Krenn and
                  Thomas Lor{\"{u}}nser and
                  Christoph Striecks},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Batch-verifiable Secret Sharing with Unconditional Privacy},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {303--311},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006133003030311},
  doi          = {10.5220/0006133003030311},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KrennLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KumarL17,
  author       = {Gautam Kumar and
                  Brent Lagesse},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Limited Use Cryptographic Tokens in Securing Ephemeral Cloud Servers},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {447--454},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006208704470454},
  doi          = {10.5220/0006208704470454},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KumarL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LashkariDMG17,
  author       = {Arash Habibi Lashkari and
                  Gerard Draper{-}Gil and
                  Mohammad Saiful Islam Mamun and
                  Ali A. Ghorbani},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Characterization of Tor Traffic using Time based Features},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {253--262},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006105602530262},
  doi          = {10.5220/0006105602530262},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LashkariDMG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LeeLJML17,
  author       = {Wei{-}Han Lee and
                  Changchang Liu and
                  Shouling Ji and
                  Prateek Mittal and
                  Ruby B. Lee},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Quantification of De-anonymization Risks in Social Networks},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {126--135},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006192501260135},
  doi          = {10.5220/0006192501260135},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LeeLJML17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LeeLJML17a,
  author       = {Wei{-}Han Lee and
                  Changchang Liu and
                  Shouling Ji and
                  Prateek Mittal and
                  Ruby B. Lee},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {How to Quantify Graph De-anonymization Risks},
  booktitle    = {Information Systems Security and Privacy - Third International Conference,
                  {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  pages        = {84--104},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93354-2\_5},
  doi          = {10.1007/978-3-319-93354-2\_5},
  timestamp    = {Fri, 24 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LeeLJML17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LigierCFS17,
  author       = {Damien Ligier and
                  Sergiu Carpov and
                  Caroline Fontaine and
                  Renaud Sirdey},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Privacy Preserving Data Classification using Inner-product Functional
                  Encryption},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {423--430},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006206704230430},
  doi          = {10.5220/0006206704230430},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LigierCFS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LopesA17,
  author       = {Arthur Costa Lopes and
                  Diego F. Aranha},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Platform-agnostic Low-intrusion Optical Data Exfiltration},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {474--480},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006211504740480},
  doi          = {10.5220/0006211504740480},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/LopesA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LuhS0S17,
  author       = {Robert Luh and
                  Gregor Schramm and
                  Markus Wagner and
                  Sebastian Schrittwieser},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Sequitur-based Inference and Analysis Framework for Malicious System
                  Behavior},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {632--643},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006250206320643},
  doi          = {10.5220/0006250206320643},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/LuhS0S17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LuhSMJ17,
  author       = {Robert Luh and
                  Sebastian Schrittwieser and
                  Stefan Marschalek and
                  Helge Janicke},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Design of an Anomaly-based Threat Detection {\&} Explication System},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {397--402},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006205203970402},
  doi          = {10.5220/0006205203970402},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LuhSMJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LutasTC17,
  author       = {Andrei Lutas and
                  Daniel Ticle and
                  Octavian Cret},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Hypervisor based Memory Introspection: Challenges, Problems and Limitations},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {285--294},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006125802850294},
  doi          = {10.5220/0006125802850294},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LutasTC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MartinelliMNSV17,
  author       = {Fabio Martinelli and
                  Francesco Mercaldo and
                  Vittoria Nardone and
                  Antonella Santone and
                  Corrado Aaron Visaggio},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Identifying Mobile Repackaged Applications through Formal Methods},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {673--682},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006287906730682},
  doi          = {10.5220/0006287906730682},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MartinelliMNSV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MartinezEMZ17,
  author       = {V. Gayoso Mart{\'{\i}}nez and
                  Luis Hern{\'{a}}ndez Encinas and
                  Agust{\'{\i}}n Mart{\'{\i}}n Mu{\~{n}}oz and
                  J. Zhang},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Breaking a Hitag2 Protocol with Low Cost Technology},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {579--584},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006271905790584},
  doi          = {10.5220/0006271905790584},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MartinezEMZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MorenoF17,
  author       = {Carlos Moreno and
                  Sebastian Fischmeister},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {On the Security of Safety-critical Embedded Systems: Who Watches the
                  Watchers? Who Reprograms the Watchers?},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {493--498},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006228304930498},
  doi          = {10.5220/0006228304930498},
  timestamp    = {Tue, 06 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/MorenoF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NardoneV17,
  author       = {Vittoria Nardone and
                  Corrado Aaron Visaggio},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {"Mirror, Mirror on the Wall, Who is the Fairest One of All?" - Machine
                  Learning versus Model Checking: {A} Comparison between Two Static
                  Techniques for Malware Family Identification},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {663--672},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006287506630672},
  doi          = {10.5220/0006287506630672},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/NardoneV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/OhtakeSZ17,
  author       = {Go Ohtake and
                  Reihaneh Safavi{-}Naini and
                  Liang Feng Zhang},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Outsourcing Scheme of {ABE} Encryption Secure against Malicious Adversary},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {71--82},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006129600710082},
  doi          = {10.5220/0006129600710082},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/OhtakeSZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/OmerovicNT17,
  author       = {Aida Omerovic and
                  Marit Kj{\o}snes Natvig and
                  Isabelle C. R. Tardy},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Towards a Privacy Scorecard - Initial Design Exemplified on an Intelligent
                  Transport Systems Service},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {585--593},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006284405850593},
  doi          = {10.5220/0006284405850593},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/OmerovicNT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/OrunsoluS17,
  author       = {Abdul A. Orunsolu and
                  Adesina S. Sodiya},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {An Anti-Phishing Kit Scheme for Secure Web Transactions},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {15--24},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006074900150024},
  doi          = {10.5220/0006074900150024},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/OrunsoluS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PahiLS17,
  author       = {Timea Pahi and
                  Maria Leitner and
                  Florian Skopik},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Analysis and Assessment of Situational Awareness Models for National
                  Cyber Security Centers},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {334--345},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006149703340345},
  doi          = {10.5220/0006149703340345},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/PahiLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PeacockJV17,
  author       = {Matthew Peacock and
                  Michael N. Johnstone and
                  Craig Valli},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Security Issues with BACnet Value Handling},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {546--552},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006263405460552},
  doi          = {10.5220/0006263405460552},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/PeacockJV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PeacockJV17a,
  author       = {Matthew Peacock and
                  Michael N. Johnstone and
                  Craig Valli},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {An Exploration of Some Security Issues Within the BACnet Protocol},
  booktitle    = {Information Systems Security and Privacy - Third International Conference,
                  {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  pages        = {252--272},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93354-2\_12},
  doi          = {10.1007/978-3-319-93354-2\_12},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/PeacockJV17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PereiraA17,
  author       = {Hilder V. L. Pereira and
                  Diego F. Aranha},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Non-interactive Privacy-preserving k-NN Classifier},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {362--371},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006187703620371},
  doi          = {10.5220/0006187703620371},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/PereiraA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PfrangM17,
  author       = {Steffen Pfrang and
                  David Meier},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {On the Detection of Replay Attacks in Industrial Automation Networks
                  Operated with Profinet {IO}},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {683--693},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006288106830693},
  doi          = {10.5220/0006288106830693},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/PfrangM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PooryousefA17,
  author       = {Shahrooz Pooryousef and
                  Morteza Amini},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Enhancing Accuracy of Android Malware Detection using Intent Instrumentation},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {380--388},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006195803800388},
  doi          = {10.5220/0006195803800388},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/PooryousefA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Preneel17,
  author       = {Bart Preneel},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {The Future of Information Security},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {9},
  publisher    = {SciTePress},
  year         = {2017},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Preneel17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/RauchbergerLS17,
  author       = {Julian Rauchberger and
                  Robert Luh and
                  Sebastian Schrittwieser},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Longkit - {A} Universal Framework for {BIOS/UEFI} Rootkits in System
                  Management Mode},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {346--353},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006165603460353},
  doi          = {10.5220/0006165603460353},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/RauchbergerLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/RegainiaS17,
  author       = {Loukmen Regainia and
                  S{\'{e}}bastien Salva},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {A Methodology of Security Pattern Classification and of Attack-Defense
                  Tree Generation},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {136--146},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006198301360146},
  doi          = {10.5220/0006198301360146},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/RegainiaS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ReshetovaBA17,
  author       = {Elena Reshetova and
                  Filippo Bonazzi and
                  N. Asokan},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {SELint: An SEAndroid Policy Analysis Tool},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {47--58},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006126600470058},
  doi          = {10.5220/0006126600470058},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ReshetovaBA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/RiemannG17,
  author       = {Robert Riemann and
                  St{\'{e}}phane Grumbach},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Distributed Protocols at the Rescue for Trustworthy Online Voting},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {499--505},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006228504990505},
  doi          = {10.5220/0006228504990505},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/RiemannG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SalvaR17,
  author       = {S{\'{e}}bastien Salva and
                  Loukmen Regainia},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {A Security Pattern Classification Based on Data Integration},
  booktitle    = {Information Systems Security and Privacy - Third International Conference,
                  {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  pages        = {105--129},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93354-2\_6},
  doi          = {10.1007/978-3-319-93354-2\_6},
  timestamp    = {Fri, 24 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SalvaR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SantosT17,
  author       = {Sergio de los Santos and
                  Jos{\'{e}} Torres},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Macro Malware Detection using Machine Learning Techniques - {A} New
                  Approach},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {295--302},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006132202950302},
  doi          = {10.5220/0006132202950302},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SantosT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SedeeqCL17,
  author       = {Iman Sedeeq and
                  Frans Coenen and
                  Alexei Lisitsa},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Attribute Permutation Steganography Detection using Attribute Position
                  Changes Count},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {95--100},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006166400950100},
  doi          = {10.5220/0006166400950100},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SedeeqCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SinghSACC17,
  author       = {Kalpana Singh and
                  Renaud Sirdey and
                  Fran{\c{c}}ois Artiguenave and
                  David Cohen and
                  Sergiu Carpov},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Towards Confidentiality-strengthened Personalized Genomic Medicine
                  Embedding Homomorphic Cryptography},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {325--333},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006148303250333},
  doi          = {10.5220/0006148303250333},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SinghSACC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SoaresJ17,
  author       = {Alberto Magno Muniz Soares and
                  Rafael Tim{\'{o}}teo de Sousa J{\'{u}}nior},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Forensic Analysis of Android Runtime {(ART)} Application Heap Objects
                  in Emulated and Real Devices},
  booktitle    = {Information Systems Security and Privacy - Third International Conference,
                  {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  pages        = {130--147},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93354-2\_7},
  doi          = {10.1007/978-3-319-93354-2\_7},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SoaresJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SoaresS17,
  author       = {Alberto Magno Muniz Soares and
                  Rafael Tim{\'{o}}teo de Sousa Jr.},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {A Technique for Extraction and Analysis of Application Heap Objects
                  within Android Runtime {(ART)}},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {147--156},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006204101470156},
  doi          = {10.5220/0006204101470156},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SoaresS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SonntagM17,
  author       = {Michael Sonntag and
                  Ren{\'{e}} Mayrhofer},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Traffic Statistics of a High-Bandwidth Tor Exit Node},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {270--277},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006124202700277},
  doi          = {10.5220/0006124202700277},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SonntagM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/TelikicherlaAC17,
  author       = {Krishna Chaitanya Telikicherla and
                  Akash Agrawall and
                  Venkatesh Choppella},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {A Formal Model of Web Security Showing Malicious Cross Origin Requests
                  and Its Mitigation using {CORP}},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {516--523},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006261105160523},
  doi          = {10.5220/0006261105160523},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/TelikicherlaAC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Tezcan17,
  author       = {Cihangir Tezcan},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Brute Force Cryptanalysis of {MIFARE} Classic Cards on {GPU}},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {524--528},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006262705240528},
  doi          = {10.5220/0006262705240528},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Tezcan17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ThuloE17,
  author       = {Motlatsi i Isaac Thulo and
                  Jan H. P. Eloff},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Towards Optimized Security-aware (O-Sec) {VM} Placement Algorithms},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {411--422},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006206504110422},
  doi          = {10.5220/0006206504110422},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ThuloE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/UwizeyemunguP17,
  author       = {Sylvestre Uwizeyemungu and
                  Placide Poba{-}Nzaou},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Health Information Exchange and Related IT-security Practices in European
                  Hospitals},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {538--545},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006263305380545},
  doi          = {10.5220/0006263305380545},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/UwizeyemunguP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/VellaC17,
  author       = {Mark Vella and
                  Rachel Cilia},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Memory Forensics of Insecure Android Inter-app Communications},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {481--486},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006215504810486},
  doi          = {10.5220/0006215504810486},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/VellaC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/VibertBRC17,
  author       = {Beno{\^{\i}}t Vibert and
                  Jean{-}Marie Le Bars and
                  Christophe Rosenberger and
                  Christophe Charrier},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Fingerprint Class Recognition for Securing {EMV} Transaction},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {403--410},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006205704030410},
  doi          = {10.5220/0006205704030410},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/VibertBRC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/VolleroBSBMT17,
  author       = {Luca Vollero and
                  Daniele Biondo and
                  Roberto Setola and
                  Gianluca Bocci and
                  Rocco Mammoliti and
                  Alessandra Toma},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Improving the Automatic Identification of Malicious Android Apps in
                  Unofficial Stores through Logo Analysis},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {567--572},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006270305670572},
  doi          = {10.5220/0006270305670572},
  timestamp    = {Fri, 18 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/VolleroBSBMT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/VyasMK17,
  author       = {Tanvi Vyas and
                  Andrea Marchesini and
                  Christoph Kerschbaumer},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Extending the Same Origin Policy with Origin Attributes},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {464--473},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006210404640473},
  doi          = {10.5220/0006210404640473},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/VyasMK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/WaltE17,
  author       = {Est{\'{e}}e van der Walt and
                  Jan H. P. Eloff},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Identity Deception Detection on Social Media Platforms},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {573--578},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006271105730578},
  doi          = {10.5220/0006271105730578},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/WaltE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Yesuf17,
  author       = {Ahmed Seid Yesuf},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {A Review of Risk Identification Approaches in the Telecommunication
                  Domain},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {389--396},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006197603890396},
  doi          = {10.5220/0006197603890396},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Yesuf17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ZhiouaRAKS17,
  author       = {Zeineb Zhioua and
                  Yves Roudier and
                  Rab{\'{e}}a Ameur{-}Boulifa and
                  Takoua Kechiche and
                  Stuart Short},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Tracking Dependent Information Flows},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {179--189},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006209301790189},
  doi          = {10.5220/0006209301790189},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ZhiouaRAKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icissp/2016s,
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Information Systems Security and Privacy - Second International Conference,
                  {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {691},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-54433-5},
  doi          = {10.1007/978-3-319-54433-5},
  isbn         = {978-3-319-54432-8},
  timestamp    = {Thu, 16 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/2016s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icissp/2017,
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  publisher    = {SciTePress},
  year         = {2017},
  isbn         = {978-989-758-209-7},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AbduL16,
  author       = {Nadia Jemil Abdu and
                  Ulrike Lechner},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {A Threat Analysis Model for Identity and Access Management},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {498--502},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005790304980502},
  doi          = {10.5220/0005790304980502},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AbduL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AbuelgasimK16,
  author       = {Ammar Abuelgasim and
                  Anne Kayem},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {An Approach to Personalized Privacy Policy Recommendations on Online
                  Social Networks},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {126--137},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005689701260137},
  doi          = {10.5220/0005689701260137},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AbuelgasimK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AbuelgasimK16a,
  author       = {Ammar Abuelgasim and
                  Anne V. D. M. Kayem},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {A Snow-Ball Algorithm for Automating Privacy Policy Configuration
                  in Social Media},
  booktitle    = {Information Systems Security and Privacy - Second International Conference,
                  {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {691},
  pages        = {108--129},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54433-5\_7},
  doi          = {10.1007/978-3-319-54433-5\_7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AbuelgasimK16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AlsmadiXC16,
  author       = {Izzat Alsmadi and
                  Dianxiang Xu and
                  Jin{-}Hee Cho},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Interaction-based Reputation Model in Online Social Networks},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {265--272},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005668302650272},
  doi          = {10.5220/0005668302650272},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AlsmadiXC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BalushiMS16,
  author       = {Abdullah Al Balushi and
                  Kieran McLaughlin and
                  Sakir Sezer},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Contextual Intrusion Alerts for Scada Networks - An Ontology based
                  Approach for Intrusion Alerts Post Processing},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {457--464},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005745504570464},
  doi          = {10.5220/0005745504570464},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BalushiMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BattistaMNSV16,
  author       = {Pasquale Battista and
                  Francesco Mercaldo and
                  Vittoria Nardone and
                  Antonella Santone and
                  Corrado Aaron Visaggio},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Identification of Android Malware Families with Model Checking},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {542--547},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005809205420547},
  doi          = {10.5220/0005809205420547},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BattistaMNSV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BhanuDKLLLRRW16,
  author       = {Yogesh Bhanu and
                  Sebastian D{\"{a}}nnart and
                  Henning von Kielpinski and
                  Alexander Laux and
                  Ulrike Lechner and
                  Tobias Lehmann and
                  Andreas Rieb and
                  Martin Riedl and
                  Florian Wolf},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {A Cyberthreat Search Process and Service},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {528--535},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005806605280535},
  doi          = {10.5220/0005806605280535},
  timestamp    = {Tue, 24 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BhanuDKLLLRRW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BhattacharjeeSM16,
  author       = {Jaya Bhattacharjee and
                  Anirban Sengupta and
                  Chandan Mazumdar},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {A Quantitative Methodology for Security Risk Assessment of Enterprise
                  Business Processes},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {388--399},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005739703880399},
  doi          = {10.5220/0005739703880399},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BhattacharjeeSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BittlR16,
  author       = {Sebastian Bittl and
                  Karsten Roscher},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Efficient Authorization Authority Certificate Distribution in VANETs},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {85--96},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005685600850096},
  doi          = {10.5220/0005685600850096},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BittlR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BittlR16a,
  author       = {Sebastian Bittl and
                  Karsten Roscher},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Efficient Distribution of Certificate Chains in VANETs},
  booktitle    = {Information Systems Security and Privacy - Second International Conference,
                  {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {691},
  pages        = {86--107},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54433-5\_6},
  doi          = {10.1007/978-3-319-54433-5\_6},
  timestamp    = {Thu, 16 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BittlR16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BossiAB16,
  author       = {Simone Bossi and
                  Tea Anselmo and
                  Guido Bertoni},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {On {TLS} 1.3 - Early Performance Analysis in the IoT Field},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {117--125},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005688901170125},
  doi          = {10.5220/0005688901170125},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/BossiAB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BottaAGV16,
  author       = {Alessio Botta and
                  Aniello Avallone and
                  Mauro Garofalo and
                  Giorgio Ventre},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Internet Streaming and Network Neutrality: Comparing the Performance
                  of Video Hosting Services},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {514--521},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005798705140521},
  doi          = {10.5220/0005798705140521},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BottaAGV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BroennerHS16,
  author       = {Simon Broenner and
                  Hans H{\"{o}}fken and
                  Marko Schuba},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Streamlining Extraction and Analysis of Android {RAM} Images},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {255--264},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005652802550264},
  doi          = {10.5220/0005652802550264},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BroennerHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ButtnerH16,
  author       = {Carsten B{\"{u}}ttner and
                  Sorin A. Huss},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {An Anonymous Geocast Scheme for {ITS} Applications},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {179--189},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005797501790189},
  doi          = {10.5220/0005797501790189},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ButtnerH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ButtnerH16a,
  author       = {Carsten B{\"{u}}ttner and
                  Sorin A. Huss},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {An Efficient Approach to Anonymous Distribution of {ITS} Messages
                  in Geographic Areas via {LTE} and {IRS} Networks},
  booktitle    = {Information Systems Security and Privacy - Second International Conference,
                  {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {691},
  pages        = {192--214},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54433-5\_11},
  doi          = {10.1007/978-3-319-54433-5\_11},
  timestamp    = {Thu, 16 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ButtnerH16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ChenSLLYW16,
  author       = {Kang Chen and
                  Qingni Shen and
                  Cong Li and
                  Yang Luo and
                  Yahui Yang and
                  Zhonghai Wu},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Sift - An Efficient Method for Co-residency Detection on Amazon {EC2}},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {423--431},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005742004230431},
  doi          = {10.5220/0005742004230431},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ChenSLLYW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Draper-GilLMG16,
  author       = {Gerard Draper{-}Gil and
                  Arash Habibi Lashkari and
                  Mohammad Saiful Islam Mamun and
                  Ali A. Ghorbani},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Characterization of Encrypted and {VPN} Traffic using Time-related
                  Features},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {407--414},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005740704070414},
  doi          = {10.5220/0005740704070414},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Draper-GilLMG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DutaGT16,
  author       = {Cristina{-}Loredana Duta and
                  Laura Gheorghe and
                  Nicolae Tapus},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Performance Analysis of Real Time Implementations of Voice Encryption
                  Algorithms using Blackfin Processors},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {157--166},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005744601570166},
  doi          = {10.5220/0005744601570166},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/DutaGT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/DutaGT16a,
  author       = {Cristina{-}Loredana Duta and
                  Laura Gheorghe and
                  Nicolae Tapus},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Performance Comparison of Voice Encryption Algorithms Implemented
                  on Blackfin Platform},
  booktitle    = {Information Systems Security and Privacy - Second International Conference,
                  {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {691},
  pages        = {169--191},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54433-5\_10},
  doi          = {10.1007/978-3-319-54433-5\_10},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/DutaGT16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ErdoganSA16,
  author       = {Gencer Erdogan and
                  Ketil St{\o}len and
                  Jan {\O}yvind Aagedal},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Evaluation of the {CORAL} Approach for Risk-driven Security Testing
                  based on an Industrial Case Study},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {219--226},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005650902190226},
  doi          = {10.5220/0005650902190226},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ErdoganSA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/FerreiraL16,
  author       = {Ana Ferreira and
                  Gabriele Lenzini},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Comparing and Integrating Break-the-Glass and Delegation in Role-based
                  Access Control for Healthcare},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {63--73},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005683600630073},
  doi          = {10.5220/0005683600630073},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/FerreiraL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GeorgescuHOKY16,
  author       = {Marius Georgescu and
                  Hiroaki Hazeyama and
                  Takeshi Okuda and
                  Youki Kadobayashi and
                  Suguru Yamaguchi},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {The {STRIDE} Towards IPv6: {A} Comprehensive Threat Model for IPv6
                  Transition Technologies},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {243--254},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005652402430254},
  doi          = {10.5220/0005652402430254},
  timestamp    = {Wed, 28 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/GeorgescuHOKY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GraaCCL16,
  author       = {Mariem Graa and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Jean{-}Louis Lanet},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Tracking Explicit and Control Flows in Java and Native Android Apps
                  Code},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {307--316},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005686603070316},
  doi          = {10.5220/0005686603070316},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/GraaCCL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GrafGRH16,
  author       = {Roman Graf and
                  Sergiu Gordea and
                  Heather M. Ryan and
                  Tibaut Houzanme},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {An Expert System for Facilitating an Institutional Risk Profile Definition
                  for Cyber Situational Awareness},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {347--354},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005738303470354},
  doi          = {10.5220/0005738303470354},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/GrafGRH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HappaFNAGC16,
  author       = {Jassim Happa and
                  Graham Fairclough and
                  Jason R. C. Nurse and
                  Ioannis Agrafiotis and
                  Michael Goldsmith and
                  Sadie Creese},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {A Pragmatic System-failure Assessment and Response Model},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {503--508},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005795105030508},
  doi          = {10.5220/0005795105030508},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/HappaFNAGC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HatinCSFR16,
  author       = {Julien Hatin and
                  Estelle Cherrier and
                  Jean{-}Jacques Schwartzmann and
                  Vincent Frey and
                  Christophe Rosenberger},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {A Continuous LoA Compliant Trust Evaluation Method},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {355--363},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005738403550363},
  doi          = {10.5220/0005738403550363},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/HatinCSFR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HeinS16,
  author       = {Daniel D. Hein and
                  Hossein Saiedian},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Predicting Attack Prone Software Components using Repository Mined
                  Change Metrics},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {554--563},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005812905540563},
  doi          = {10.5220/0005812905540563},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HeinS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Hong16,
  author       = {Jason I. Hong},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Privacy, Ethics and Big Data},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {5},
  publisher    = {SciTePress},
  year         = {2016},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Hong16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HossainSK16,
  author       = {Md. Selim Hossain and
                  Ehsan Saeedi and
                  Yinan Kong},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {High-Performance {FPGA} Implementation of Elliptic Curve Cryptography
                  Processor over Binary Field {GF(2163)}},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {415--422},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005741604150422},
  doi          = {10.5220/0005741604150422},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HossainSK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HranickyMRV16,
  author       = {Radek Hranicky and
                  Petr Matousek and
                  Ondrej Rysav{\'{y}} and
                  Vladim{\'{\i}}r Vesel{\'{y}}},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Experimental Evaluation of Password Recovery in Encrypted Documents},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {299--306},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005685802990306},
  doi          = {10.5220/0005685802990306},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HranickyMRV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/IshiiIF16,
  author       = {Masahiro Ishii and
                  Atsuo Inomata and
                  Kazutoshi Fujikawa},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {A Construction of a Twisted Ate Pairing on a Family of Kawazoe-Takahashi
                  Curves at 192-bit Security Level and Its Cost Estimate},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {432--439},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005742304320439},
  doi          = {10.5220/0005742304320439},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/IshiiIF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Izuakor16,
  author       = {Christine Izuakor},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Understanding the Impact of Cyber Security Risks on Safety},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {509--513},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005796805090513},
  doi          = {10.5220/0005796805090513},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Izuakor16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/JollyVR16,
  author       = {Germain Jolly and
                  Sylvain Vernois and
                  Christophe Rosenberger},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {An Observe-and-Detect Methodology for the Security and Functional
                  Testing of Smart Card Applications},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {282--289},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005682202820289},
  doi          = {10.5220/0005682202820289},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/JollyVR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KerschbaumerSB16,
  author       = {Christoph Kerschbaumer and
                  Sid Stamm and
                  Stefan Brunthaler},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Injecting {CSP} for Fun and Security},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {15--25},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005650100150025},
  doi          = {10.5220/0005650100150025},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KerschbaumerSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KhanMLS16,
  author       = {Rafiullah Khan and
                  Kieran McLaughlin and
                  David M. Laverty and
                  Sakir Sezer},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {{IEEE} {C37.118-2} Synchrophasor Communication Framework - Overview,
                  Cyber Vulnerabilities Analysis and Performance Evaluation},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {167--178},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005745001670178},
  doi          = {10.5220/0005745001670178},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KhanMLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LaviG16,
  author       = {Tamir Lavi and
                  Ehud Gudes},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Trust-based Dynamic {RBAC}},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {317--324},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005687503170324},
  doi          = {10.5220/0005687503170324},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LaviG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LaxBNNF16,
  author       = {Gianluca Lax and
                  Francesco Buccafurri and
                  Serena Nicolazzo and
                  Antonino Nocera and
                  Lidia Fotia},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {A New Approach for Electronic Signature},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {440--447},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005743404400447},
  doi          = {10.5220/0005743404400447},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LaxBNNF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Lenz16,
  author       = {Hans{-}Joachim Lenz},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Tax Fraud and Investigation Procedures - Everybody, Every Where, Every
                  Time},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {7--8},
  publisher    = {SciTePress},
  year         = {2016},
  timestamp    = {Fri, 22 Jul 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Lenz16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Lenz16a,
  author       = {Hans{-}Joachim Lenz},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Tax Fraud and Investigation: {A} Framework for a Knowledge Based Methodology},
  booktitle    = {Information Systems Security and Privacy - Second International Conference,
                  {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {691},
  pages        = {3--13},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54433-5\_1},
  doi          = {10.1007/978-3-319-54433-5\_1},
  timestamp    = {Thu, 16 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Lenz16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LiSCYW16,
  author       = {Cong Li and
                  Qingni Shen and
                  Kang Chen and
                  Yahui Yang and
                  Zhonghai Wu},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Whispers in the Cloud - {A} Covert Channel using the Result of Creating
                  a Virtual Machine},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {380--387},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005739403800387},
  doi          = {10.5220/0005739403800387},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LiSCYW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LiSDYW16,
  author       = {Wenting Li and
                  Qingni Shen and
                  Chuntao Dong and
                  Yahui Yang and
                  Zhonghai Wu},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {{DDHCS:} Distributed Denial-of-service Threat to {YARN} Clusters based
                  on Health Check Service},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {146--156},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005741801460156},
  doi          = {10.5220/0005741801460156},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LiSDYW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LiSDYW16a,
  author       = {Wenting Li and
                  Qingni Shen and
                  Chuntao Dong and
                  Yahui Yang and
                  Zhonghai Wu},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {{SEYARN:} Enhancing Security of {YARN} Clusters Based on Health Check
                  Service},
  booktitle    = {Information Systems Security and Privacy - Second International Conference,
                  {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {691},
  pages        = {148--168},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54433-5\_9},
  doi          = {10.1007/978-3-319-54433-5\_9},
  timestamp    = {Thu, 16 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LiSDYW16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MaddarKCY16,
  author       = {Hela Maddar and
                  Wafa Kammoun and
                  Omar Cheikhrouhou and
                  Habib Youssef},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Lightweight Trust Model with High Longevity for Wireless Sensor Networks},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {548--553},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005811005480553},
  doi          = {10.5220/0005811005480553},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MaddarKCY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MarufuKW16,
  author       = {Anesu M. C. Marufu and
                  Anne V. D. M. Kayem and
                  Stephen D. Wolthusen},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Fault-tolerant Distributed Continuous Double Auctioning on Computationally
                  Constrained Microgrids},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {448--456},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005744304480456},
  doi          = {10.5220/0005744304480456},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MarufuKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MathewsJF16,
  author       = {M. Lisa Mathews and
                  Anupam Joshi and
                  Tim Finin},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Detecting Botnets using a Collaborative Situational-aware {IDPS}},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {290--298},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005684902900298},
  doi          = {10.5220/0005684902900298},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MathewsJF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MaynardMS16,
  author       = {Peter Maynard and
                  Kieran McLaughlin and
                  Sakir Sezer},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {465--472},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005745704650472},
  doi          = {10.5220/0005745704650472},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/MaynardMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Mzila16,
  author       = {Phiwa Mzila},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Review Analysis of Properties for an Ideal Secure Biometric Template
                  Scheme},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {333--339},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005727303330339},
  doi          = {10.5220/0005727303330339},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Mzila16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NakamuraKTS16,
  author       = {Toru Nakamura and
                  Shinsaku Kiyomoto and
                  Welderufael B. Tesfay and
                  Jetzabel M. Serna},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Personalised Privacy by Default Preferences - Experiment and Analysis},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {53--62},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005681100530062},
  doi          = {10.5220/0005681100530062},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/NakamuraKTS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NakamuraKTS16a,
  author       = {Toru Nakamura and
                  Shinsaku Kiyomoto and
                  Welderufael B. Tesfay and
                  Jetzabel M. Serna},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Easing the Burden of Setting Privacy Preferences: {A} Machine Learning
                  Approach},
  booktitle    = {Information Systems Security and Privacy - Second International Conference,
                  {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {691},
  pages        = {44--63},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54433-5\_4},
  doi          = {10.1007/978-3-319-54433-5\_4},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/NakamuraKTS16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PalBM16,
  author       = {Asim K. Pal and
                  Subrata Bose and
                  Arpita Maitra},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Collaborative Information Service - Privacy Algebra for User Defined
                  Security},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {473--481},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005746304730481},
  doi          = {10.5220/0005746304730481},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/PalBM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PaudelQI16,
  author       = {Nilakantha Paudel and
                  Marco Querini and
                  Giuseppe F. Italiano},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Handwritten Signature Verification for Mobile Phones},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {46--52},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005675200460052},
  doi          = {10.5220/0005675200460052},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/PaudelQI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PaudelQI16a,
  author       = {Nilakantha Paudel and
                  Marco Querini and
                  Giuseppe F. Italiano},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Online Handwritten Signature Verification for Low-End Devices},
  booktitle    = {Information Systems Security and Privacy - Second International Conference,
                  {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {691},
  pages        = {25--43},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54433-5\_3},
  doi          = {10.1007/978-3-319-54433-5\_3},
  timestamp    = {Thu, 16 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/PaudelQI16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Pohn16,
  author       = {Daniela P{\"{o}}hn},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Risk Management for Dynamic Metadata Exchange via a Trusted Third
                  Party},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {227--234},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005651702270234},
  doi          = {10.5220/0005651702270234},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Pohn16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/QiaoHS16,
  author       = {Kexin Qiao and
                  Lei Hu and
                  Siwei Sun},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Differential Security Evaluation of Simeck with Dynamic Key-guessing
                  Techniques},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {74--84},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005684400740084},
  doi          = {10.5220/0005684400740084},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/QiaoHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/QiaoHS16a,
  author       = {Kexin Qiao and
                  Lei Hu and
                  Siwei Sun},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Differential Analysis on Simeck and {SIMON} with Dynamic Key-Guessing
                  Techniques},
  booktitle    = {Information Systems Security and Privacy - Second International Conference,
                  {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {691},
  pages        = {64--85},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54433-5\_5},
  doi          = {10.1007/978-3-319-54433-5\_5},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/QiaoHS16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/R16,
  author       = {Feno Heriniaina R.},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {A Privacy Threat for Internet Users in Internet-censoring Countries},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {372--379},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005739203720379},
  doi          = {10.5220/0005739203720379},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/R16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/RampineN16,
  author       = {Edwin T. L. Rampine and
                  Cynthia H. Ngejane},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {A Brief Overview of Hybrid Schemes for Biometric Fingerprint Template
                  Security},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {340--346},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005730503400346},
  doi          = {10.5220/0005730503400346},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/RampineN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ReshetovaBNBA16,
  author       = {Elena Reshetova and
                  Filippo Bonazzi and
                  Thomas Nyman and
                  Ravishankar Borgaonkar and
                  N. Asokan},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Characterizing SEAndroid Policies in the Wild},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {482--489},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005759204820489},
  doi          = {10.5220/0005759204820489},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ReshetovaBNBA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SedeeqCL16,
  author       = {Iman Sedeeq and
                  Frans Coenen and
                  Alexei Lisitsa},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {A Statistical Approach to the Detection of {HTML} Attribute Permutation
                  Steganography},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {522--527},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005801705220527},
  doi          = {10.5220/0005801705220527},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SedeeqCL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SettanniSSF16,
  author       = {Giuseppe Settanni and
                  Florian Skopik and
                  Yegor Shovgenya and
                  Roman Fiedler},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {A Collaborative Analysis System for Cross-organization Cyber Incident
                  Handling},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {105--116},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005688301050116},
  doi          = {10.5220/0005688301050116},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SettanniSSF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ShaoLX16,
  author       = {C. Shao and
                  H. Li and
                  G. Xu},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Quantitative Evaluation of Security on Cryptographic ICs against Fault
                  Injection Attacks},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {97--104},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005686300970104},
  doi          = {10.5220/0005686300970104},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ShaoLX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ShiHSS16,
  author       = {Danping Shi and
                  Lei Hu and
                  Siwei Sun and
                  Ling Song},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Linear(hull) Cryptanalysis of Round-reduced Versions of {KATAN}},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {364--371},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005739103640371},
  doi          = {10.5220/0005739103640371},
  timestamp    = {Sun, 18 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/ShiHSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/StenzelKBR16,
  author       = {Kurt Stenzel and
                  Kuzman Katkalov and
                  Marian Borek and
                  Wolfgang Reif},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Declassification of Information with Complex Filter Functions},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {490--497},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005782904900497},
  doi          = {10.5220/0005782904900497},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/StenzelKBR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SugioIKH16,
  author       = {Nobuyuki Sugio and
                  Yasutaka Igarashi and
                  Toshinobu Kaneko and
                  Kenichi Higuchi},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {A Practical-time Attack on Reduced-round {MISTY1}},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {235--242},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005652202350242},
  doi          = {10.5220/0005652202350242},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SugioIKH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SusukiYS16,
  author       = {Hiroya Susuki and
                  Rie Shigetomi Yamaguchi and
                  Shizuo Sakamoto},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Multi-factor Authentication Updating System Evaluation Dynamically
                  for Service Continuity},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {273--281},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005681802730281},
  doi          = {10.5220/0005681802730281},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SusukiYS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SymeonidisTP16,
  author       = {Iraklis Symeonidis and
                  Pagona Tsormpatzoudi and
                  Bart Preneel},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Collateral Damage of Online Social Network Applications},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {536--541},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005806705360541},
  doi          = {10.5220/0005806705360541},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SymeonidisTP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/TariqS16,
  author       = {Muhammad Imran Tariq and
                  Vito Santarcangelo},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Analysis of {ISO} 27001: 2013 Controls Effectiveness for Cloud Computing},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {201--208},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005648702010208},
  doi          = {10.5220/0005648702010208},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/TariqS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/TeubertGM16,
  author       = {Dominik Teubert and
                  Fred Grossmann and
                  Ulrike Meyer},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Anomaly-based Mobile Malware Detection: System Calls as Source for
                  Features},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {26--36},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005652900260036},
  doi          = {10.5220/0005652900260036},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/TeubertGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Tezcan16,
  author       = {Cihangir Tezcan},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Truncated, Impossible, and Improbable Differential Analysis of {ASCON}},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {325--332},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005689903250332},
  doi          = {10.5220/0005689903250332},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Tezcan16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/TriaLT16,
  author       = {Francesco Di Tria and
                  Ezio Lefons and
                  Filippo Tangorra},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Improving Database Security in Web-based Environments},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {193--200},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005646901930200},
  doi          = {10.5220/0005646901930200},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/TriaLT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Ulltveit-MoePEN16,
  author       = {Nils Ulltveit{-}Moe and
                  Steffen Pfrang and
                  L{\'{a}}szl{\'{o}} Erd{\"{o}}di and
                  H{\'{e}}ctor Nebot},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Mitigating Local Attacks Against a City Traffic Controller},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {209--218},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005649802090218},
  doi          = {10.5220/0005649802090218},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Ulltveit-MoePEN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/UwizeyemunguP16,
  author       = {Sylvestre Uwizeyemungu and
                  Placide Poba{-}Nzaou},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Security and Privacy Practices in Healthcare Information Systems:
                  {A} Cluster Analysis of European Hospitals},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {37--45},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005654800370045},
  doi          = {10.5220/0005654800370045},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/UwizeyemunguP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/WambachB16,
  author       = {Tim Wambach and
                  Katharina Br{\"{a}}unlich},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Retrospective Study of Third-party Web Tracking},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {138--145},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005741301380145},
  doi          = {10.5220/0005741301380145},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/WambachB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/WambachB16a,
  author       = {Tim Wambach and
                  Katharina Br{\"{a}}unlich},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {The Evolution of Third-Party Web Tracking},
  booktitle    = {Information Systems Security and Privacy - Second International Conference,
                  {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {691},
  pages        = {130--147},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54433-5\_8},
  doi          = {10.1007/978-3-319-54433-5\_8},
  timestamp    = {Thu, 16 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/WambachB16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Weippl16,
  author       = {Edgar R. Weippl},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Ethics in Security Research},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {9},
  publisher    = {SciTePress},
  year         = {2016},
  timestamp    = {Fri, 22 Jul 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Weippl16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/WeipplSR16,
  author       = {Edgar R. Weippl and
                  Sebastian Schrittwieser and
                  Sylvi Rennert},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Empirical Research and Research Ethics in Information Security},
  booktitle    = {Information Systems Security and Privacy - Second International Conference,
                  {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {691},
  pages        = {14--22},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54433-5\_2},
  doi          = {10.1007/978-3-319-54433-5\_2},
  timestamp    = {Thu, 16 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/WeipplSR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/YangCWC16,
  author       = {Ching{-}Nung Yang and
                  Stelvio Cimato and
                  Jihi{-}Han Wu and
                  Song{-}Ruei Cai},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {3-Out-of-n Cheating Prevention Visual Cryptographic Schemes},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {400--406},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005740504000406},
  doi          = {10.5220/0005740504000406},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/YangCWC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icissp/2016,
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  publisher    = {SciTePress},
  year         = {2016},
  isbn         = {978-989-758-167-0},
  timestamp    = {Wed, 22 Mar 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AblizZ15,
  author       = {Mehmud Abliz and
                  Taieb F. Znati},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Defeating DDoS using Productive Puzzles},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {114--123},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/document/7509937/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AblizZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Accorsi15,
  author       = {Rafael Accorsi},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {A Posteriori Process Security Control},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {IS--5},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/document/7509905/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Accorsi15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AlishahiMT15,
  author       = {Mina Sheikh Alishahi and
                  Mohamed Mejri and
                  Nadia Tawbi},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Clustering Spam Emails into Campaigns},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {90--97},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005244500900097},
  doi          = {10.5220/0005244500900097},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AlishahiMT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AnjumRPF15,
  author       = {Bushra Anjum and
                  Manish Rajangam and
                  Harry G. Perros and
                  Wenjuan Fan},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Filtering Unfair Users - {A} Hidden Markov Model Approach},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {147--154},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/document/7509945/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AnjumRPF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ArakalaHDH15,
  author       = {Arathi Arakala and
                  Hao Hao and
                  Stephen A. Davis and
                  Kathy J. Horadam},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {The Palm Vein Graph - Feature Extraction and Matching},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {295--303},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005239102950303},
  doi          = {10.5220/0005239102950303},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ArakalaHDH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ArakalaHDH15a,
  author       = {Arathi Arakala and
                  Hao Hao and
                  Stephen A. Davis and
                  Kathy J. Horadam},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {The Palm Vein Graph for Biometric Authentication},
  booktitle    = {Information Systems Security and Privacy - First International Conference,
                  {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {199--218},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27668-7\_12},
  doi          = {10.1007/978-3-319-27668-7\_12},
  timestamp    = {Fri, 20 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/ArakalaHDH15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BonneyHPS15,
  author       = {Gregor Bonney and
                  Hans H{\"{o}}fken and
                  Benedikt Paffen and
                  Marko Schuba},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {{ICS/SCADA} Security - Analysis of a Beckhoff {CX5020} {PLC}},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {137--142},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005330101370142},
  doi          = {10.5220/0005330101370142},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BonneyHPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ButtnerH15,
  author       = {Carsten B{\"{u}}ttner and
                  Sorin A. Huss},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular
                  Ad Hoc Networks},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {259--269},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005238902590269},
  doi          = {10.5220/0005238902590269},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ButtnerH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ButtnerH15a,
  author       = {Carsten B{\"{u}}ttner and
                  Sorin A. Huss},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {An Efficient Anonymous Authenticated Key Agreement Protocol for Vehicular
                  Ad-Hoc Networks Based on Ring Signatures and the Elliptic Curve Integrated
                  Encryption Scheme},
  booktitle    = {Information Systems Security and Privacy - First International Conference,
                  {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {139--159},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27668-7\_9},
  doi          = {10.1007/978-3-319-27668-7\_9},
  timestamp    = {Thu, 16 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ButtnerH15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/CourtoisEW15,
  author       = {Nicolas T. Courtois and
                  Pinar Emirdag and
                  Zhouyixing Wang},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {On Detection of Bitcoin Mining Redirection Attacks},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {98--105},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005245600980105},
  doi          = {10.5220/0005245600980105},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/CourtoisEW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Desfray15,
  author       = {Philippe Desfray},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Model Repositories at the Enterprises and Systems Scale - The Modelio
                  Constellation Solution},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {IS--17},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/document/7509917/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Desfray15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/FavrePBC15,
  author       = {M{\'{e}}lanie Favre and
                  Sylvaine Picard and
                  Julien Bringer and
                  Herv{\'{e}} Chabanne},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Balancing is the Key - Performing Finger Vein Template Protection
                  using Fuzzy Commitment},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {304--311},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005241403040311},
  doi          = {10.5220/0005241403040311},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/FavrePBC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Ford15,
  author       = {Bryan Ford},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Hiding in a Panopticon - Grand Challenges in Internet Anonymity},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {IS--9},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/document/7509909/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Ford15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Furnell15,
  author       = {Steven Furnell},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {From Passwords to Biometrics - In Pursuit of a Panacea},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {IS--7},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/document/7509907/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Furnell15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Furnell15a,
  author       = {Steven M. Furnell},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {From Passwords to Biometrics: In Pursuit of a Panacea},
  booktitle    = {Information Systems Security and Privacy - First International Conference,
                  {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27668-7\_1},
  doi          = {10.1007/978-3-319-27668-7\_1},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Furnell15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HossainZ15,
  author       = {Al Amin Hossain and
                  Weining Zhang},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Privacy and Security Concern of Online Social Networks from User Perspective},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {246--253},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005318202460253},
  doi          = {10.5220/0005318202460253},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HossainZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HusztiK15,
  author       = {Andrea Huszti and
                  Zita Kov{\'{a}}cs},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Bilinear Pairing-based Hybrid Mixnet with Anonymity Revocation},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {238--245},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005273002380245},
  doi          = {10.5220/0005273002380245},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HusztiK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Inamura15,
  author       = {Masaki Inamura},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Expansions of {CHAP} - Modificationless on Its Structures of Packet
                  and Data Exchange},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {213--220},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005228002130220},
  doi          = {10.5220/0005228002130220},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Inamura15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Jacobs15,
  author       = {Stuart Jacobs},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Optimizing Cryptographically based Security in Wireless Networks},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {39--45},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/document/7509928/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Jacobs15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KangGK15,
  author       = {Bolam Kang and
                  Sung Cheol Goh and
                  Myungsun Kim},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Private Web Search with Constant Round Efficiency},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {205--212},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005225602050212},
  doi          = {10.5220/0005225602050212},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KangGK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KimHKSPP15,
  author       = {Taegyu Kim and
                  Woomin Hwang and
                  Chulmin Kim and
                  Dong{-}Jae Shin and
                  Ki{-}Woong Park and
                  Kyu Ho Park},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Malfinder: Accelerated Malware Classification System through Filtering
                  on Manycore System},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {17--26},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005227500170026},
  doi          = {10.5220/0005227500170026},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KimHKSPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KimP15,
  author       = {Taegyu Kim and
                  Ki{-}Woong Park},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {MalCore: Toward a Practical Malware Identification System Enhanced
                  with Manycore Technology},
  booktitle    = {Information Systems Security and Privacy - First International Conference,
                  {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {31--48},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27668-7\_3},
  doi          = {10.1007/978-3-319-27668-7\_3},
  timestamp    = {Thu, 16 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KimP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KnirschENFP15,
  author       = {Fabian Knirsch and
                  Dominik Engel and
                  Christian Neureiter and
                  Marc Fr{\^{\i}}ncu and
                  Viktor K. Prasanna},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Model-driven Privacy Assessment in the Smart Grid},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {173--181},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005229601730181},
  doi          = {10.5220/0005229601730181},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KnirschENFP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KnirschENFP15a,
  author       = {Fabian Knirsch and
                  Dominik Engel and
                  Christian Neureiter and
                  Marc Fr{\^{\i}}ncu and
                  Viktor K. Prasanna},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Privacy Assessment of Data Flow Graphs for an Advanced Recommender
                  System in the Smart Grid},
  booktitle    = {Information Systems Security and Privacy - First International Conference,
                  {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {89--106},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27668-7\_6},
  doi          = {10.1007/978-3-319-27668-7\_6},
  timestamp    = {Thu, 16 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KnirschENFP15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KoenePCSAORM15,
  author       = {Ansgar R. Koene and
                  Elvira Perez and
                  Christopher James Carter and
                  Ramona Statache and
                  Svenja Adolphs and
                  Claire O'Malley and
                  Tom Rodden and
                  Derek McAuley},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Research Ethics and Public Trust, Preconditions for Continued Growth
                  of Internet Mediated Research - Public Confidence in Internet Mediate
                  Research},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {163--168},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005331501630168},
  doi          = {10.5220/0005331501630168},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KoenePCSAORM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KrishnamachariN15,
  author       = {Sriram Krishnamachari and
                  Mehrdad Nojoumian and
                  Kemal Akkaya},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational
                  vs Unconditional Security},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {106--113},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005258501060113},
  doi          = {10.5220/0005258501060113},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KrishnamachariN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KunzFNP15,
  author       = {Michael Kunz and
                  Ludwig Fuchs and
                  Michael Netter and
                  G{\"{u}}nther Pernul},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Analyzing Quality Criteria in Role-based Identity and Access Management},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {64--72},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005232100640072},
  doi          = {10.5220/0005232100640072},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KunzFNP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KunzFNP15a,
  author       = {Michael Kunz and
                  Ludwig Fuchs and
                  Michael Netter and
                  G{\"{u}}nther Pernul},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {How to Discover High-Quality Roles? {A} Survey and Dependency Analysis
                  of Quality Criteria in Role Mining},
  booktitle    = {Information Systems Security and Privacy - First International Conference,
                  {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {49--67},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27668-7\_4},
  doi          = {10.1007/978-3-319-27668-7\_4},
  timestamp    = {Thu, 16 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KunzFNP15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LeeL15,
  author       = {Wei{-}Han Lee and
                  Ruby B. Lee},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Multi-sensor Authentication to Improve Smartphone Security},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {270--280},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005239802700280},
  doi          = {10.5220/0005239802700280},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LeeL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LeeL15a,
  author       = {Wei{-}Han Lee and
                  Ruby B. Lee},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Implicit Authentication for Smartphone Security},
  booktitle    = {Information Systems Security and Privacy - First International Conference,
                  {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {160--176},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27668-7\_10},
  doi          = {10.1007/978-3-319-27668-7\_10},
  timestamp    = {Thu, 16 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LeeL15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LehnhardtRSC15,
  author       = {Jan Lehnhardt and
                  Tobias Rho and
                  Adrian Spalka and
                  Armin B. Cremers},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Performance-optimized Indexes for Inequality Searches on Encrypted
                  Data in Practice},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {221--229},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005231702210229},
  doi          = {10.5220/0005231702210229},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LehnhardtRSC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/LimYST15,
  author       = {Hyoyoung Lim and
                  Yukiko Yamaguchi and
                  Hajime Shimada and
                  Hiroki Takakura},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Malware Classification Method Based on Sequence of Traffic Flow},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {230--237},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005235002300237},
  doi          = {10.5220/0005235002300237},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/LimYST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MaiorcaACG15,
  author       = {Davide Maiorca and
                  Davide Ariu and
                  Igino Corona and
                  Giorgio Giacinto},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {A Structural and Content-based Approach for a Precise and Robust Detection
                  of Malicious {PDF} Files},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {27--36},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005264400270036},
  doi          = {10.5220/0005264400270036},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MaiorcaACG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MaiorcaACG15a,
  author       = {Davide Maiorca and
                  Davide Ariu and
                  Igino Corona and
                  Giorgio Giacinto},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {An Evasion Resilient Approach to the Detection of Malicious {PDF}
                  Files},
  booktitle    = {Information Systems Security and Privacy - First International Conference,
                  {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {68--85},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27668-7\_5},
  doi          = {10.1007/978-3-319-27668-7\_5},
  timestamp    = {Thu, 16 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MaiorcaACG15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/McDaniel15,
  author       = {Patrick D. McDaniel},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {A New Science of Security Decision Making},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {IS--13},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/document/7509913/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/McDaniel15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MoingS15,
  author       = {Josselyn Le Moing and
                  Ingo Stengel},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {The Smartphone as a Gait Recognition Device - Impact of Selected Parameters
                  on Gait Recognition},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {322--328},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005243003220328},
  doi          = {10.5220/0005243003220328},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MoingS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MoingS15a,
  author       = {Josselyn Le Moing and
                  Ingo Stengel},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Impact of External Parameters on the Gait Recognition Using a Smartphone},
  booktitle    = {Information Systems Security and Privacy - First International Conference,
                  {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {219--233},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27668-7\_13},
  doi          = {10.1007/978-3-319-27668-7\_13},
  timestamp    = {Thu, 16 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MoingS15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MukherjeeM15,
  author       = {Preetam Mukherjee and
                  Chandan Mazumdar},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {A Novel Model of Security Policies and Requirements},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {73--82},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005239400730082},
  doi          = {10.5220/0005239400730082},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MukherjeeM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NarayanaswamySS15,
  author       = {Jayagopal Narayanaswamy and
                  Raghav V. Sampangi and
                  Srinivas Sampalli},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {{HIDE:} Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic
                  Key Generation and Encryption},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {124--131},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005273901240131},
  doi          = {10.5220/0005273901240131},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/NarayanaswamySS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NergaardUG15,
  author       = {Henrik Nergaard and
                  Nils Ulltveit{-}Moe and
                  Terje Gj{\o}s{\ae}ter},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {A Scratch-based Graphical Policy Editor for {XACML}},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {182--190},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005240101820190},
  doi          = {10.5220/0005240101820190},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/NergaardUG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NergaardUG15a,
  author       = {Henrik Nergaard and
                  Nils Ulltveit{-}Moe and
                  Terje Gj{\o}s{\ae}ter},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {ViSPE: {A} Graphical Policy Editor for {XACML}},
  booktitle    = {Information Systems Security and Privacy - First International Conference,
                  {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {107--121},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27668-7\_7},
  doi          = {10.1007/978-3-319-27668-7\_7},
  timestamp    = {Thu, 16 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/NergaardUG15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NetterPRR15,
  author       = {Michael Netter and
                  G{\"{u}}nther Pernul and
                  Christian Richthammer and
                  Moritz Riesner},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Privacy in Social Networks: Existing Challenges and Proposals for
                  Solutions},
  booktitle    = {Information Systems Security and Privacy - First International Conference,
                  {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {16--27},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27668-7\_2},
  doi          = {10.1007/978-3-319-27668-7\_2},
  timestamp    = {Thu, 16 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/NetterPRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NoorafizaMUKS15,
  author       = {Matrazali Noorafiza and
                  Hiroshi Maeda and
                  Ryuya Uda and
                  Toshiyuki Kinoshita and
                  M. Shiratori},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Vulnerability Analysis using Network Timestamps in Full Virtualization
                  Virtual Machine},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {83--89},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005242000830089},
  doi          = {10.5220/0005242000830089},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/NoorafizaMUKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Pernul15,
  author       = {G{\"{u}}nther Pernul},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Privacy in Social Networks - Existing Challenges and Proposals for
                  Solution},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {IS--11},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/document/7509911/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Pernul15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PrevelakisH15,
  author       = {Vassilis Prevelakis and
                  Mohammad Hamad},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {A Policy-based Communications Architecture for Vehicles},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {155--162},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005325001550162},
  doi          = {10.5220/0005325001550162},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/PrevelakisH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/RoyM15,
  author       = {Puloma Roy and
                  Chandan Mazumdar},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Modelling of Enterprise Insider Threats},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {132--136},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005327901320136},
  doi          = {10.5220/0005327901320136},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/RoyM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SakpereK15,
  author       = {Aderonke Busayo Sakpere and
                  Anne V. D. M. Kayem},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Adaptive Buffer Resizing for Efficient Anonymization of Streaming
                  Data with Minimal Information Loss},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {191--201},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005288901910201},
  doi          = {10.5220/0005288901910201},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SakpereK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SakpereK15a,
  author       = {Aderonke Busayo Sakpere and
                  Anne V. D. M. Kayem},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Supporting Streaming Data Anonymization with Expressions of User Privacy
                  Preferences},
  booktitle    = {Information Systems Security and Privacy - First International Conference,
                  {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {122--136},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27668-7\_8},
  doi          = {10.1007/978-3-319-27668-7\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SakpereK15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ShoufanAB15,
  author       = {Abdulhadi Shoufan and
                  Hassan Alnoon and
                  Joonsang Baek},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {On the Power Consumption of Cryptographic Processors in Civil Microdrones},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {283--290},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005273402830290},
  doi          = {10.5220/0005273402830290},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ShoufanAB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ShoufanAB15a,
  author       = {Abdulhadi Shoufan and
                  Hassan Alnoon and
                  Joonsang Baek},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Secure Communication in Civil Drones},
  booktitle    = {Information Systems Security and Privacy - First International Conference,
                  {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {177--195},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27668-7\_11},
  doi          = {10.1007/978-3-319-27668-7\_11},
  timestamp    = {Wed, 29 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ShoufanAB15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/TimpanaroCCF15,
  author       = {Juan Pablo Timpanaro and
                  Thibault Cholez and
                  Isabelle Chrisment and
                  Olivier Festor},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Evaluation of the Anonymous {I2P} Network's Design Choices Against
                  Performance and Security},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {46--55},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005226600460055},
  doi          = {10.5220/0005226600460055},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/TimpanaroCCF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/TondelLJ15,
  author       = {Inger Anne T{\o}ndel and
                  Maria B. Line and
                  Gorm Johansen},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Assessing Information Security Risks of {AMI} - What Makes it so Difficult?},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {56--63},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005228900560063},
  doi          = {10.5220/0005228900560063},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/TondelLJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/UwizeyemunguP15,
  author       = {Sylvestre Uwizeyemungu and
                  Placide Poba{-}Nzaou},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Understanding Information Technology Security Standards Diffusion
                  - An Institutional Perspective},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {5--16},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005227200050016},
  doi          = {10.5220/0005227200050016},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/UwizeyemunguP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/VibertYVBCR15,
  author       = {Beno{\^{\i}}t Vibert and
                  Zhigang Yao and
                  Sylvain Vernois and
                  Jean{-}Marie Le Bars and
                  Christophe Charrier and
                  Christophe Rosenberger},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {EvaBio Platform for the Evaluation Biometric System - Application
                  to the Optimization of the Enrollment Process for Fingerprints Devices},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {329--335},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005244203290335},
  doi          = {10.5220/0005244203290335},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/VibertYVBCR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/VibertYVBCR15a,
  author       = {Beno{\^{\i}}t Vibert and
                  Zhigang Yao and
                  Sylvain Vernois and
                  Jean{-}Marie Le Bars and
                  Christophe Charrier and
                  Christophe Rosenberger},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {EvaBio a New Modular Platform to Evaluate Biometric System},
  booktitle    = {Information Systems Security and Privacy - First International Conference,
                  {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {234--250},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27668-7\_14},
  doi          = {10.1007/978-3-319-27668-7\_14},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/VibertYVBCR15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/YaoBCR15,
  author       = {Zhigang Yao and
                  Jean{-}Marie Le Bars and
                  Christophe Charrier and
                  Christophe Rosenberger},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Quality Assessment of Fingerprints with Minutiae Delaunay Triangulation},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {315--321},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005235603150321},
  doi          = {10.5220/0005235603150321},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/YaoBCR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/YaoBCR15a,
  author       = {Zhigang Yao and
                  Jean{-}Marie Le Bars and
                  Christophe Charrier and
                  Christophe Rosenberger},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Fingerprint Quality Assessment Combining Blind Image Quality, Texture
                  and Minutiae Features},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {336--343},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005268403360343},
  doi          = {10.5220/0005268403360343},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/YaoBCR15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icissp/2015,
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7504796/proceeding},
  isbn         = {978-989-758-081-9},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icissp/2015s,
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Information Systems Security and Privacy - First International Conference,
                  {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27668-7},
  doi          = {10.1007/978-3-319-27668-7},
  isbn         = {978-3-319-27667-0},
  timestamp    = {Thu, 16 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/2015s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}