default search action
Search dblp for Publications
export results for "ICISSP"
@inproceedings{DBLP:conf/icissp/0001UGWM24, author = {Ali Ahmed and Victor Ungureanu and Tarek Gaber and Craig A. Watterson and Fatma Masmoudi}, title = {Smart Home Privacy: {A} Scoping Review}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {635--642}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, timestamp = {Tue, 02 Apr 2024 14:37:52 +0200}, biburl = {https://dblp.org/rec/conf/icissp/0001UGWM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AksoyVMPK24, author = {Ahmet Aksoy and Sundeep Varma and Ganesha Moorthy and Enya Pan and Gorkem Kar}, title = {Comparative Analysis of Feature Selection Algorithms for Automated IoT Device Fingerprinting}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {430--437}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012379100003648}, doi = {10.5220/0012379100003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AksoyVMPK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Alcaraz24, author = {Cristina Alcaraz}, title = {Safeguarding Industry 5.0 Ecosystems Through Digital Twins}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {5}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Alcaraz24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AldabjanFCP24, author = {Aseel Aldabjan and Steven Furnell and Xavier Carpent and Maria Papadaki}, title = {Cybersecurity Incident Response Readiness in Organisations}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {262--269}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012487600003648}, doi = {10.5220/0012487600003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AldabjanFCP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlipourjeddiM24, author = {Narges Alipourjeddi and Ali Miri}, title = {Preserving Privacy in High-Dimensional Data Publishing}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {845--852}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012455600003648}, doi = {10.5220/0012455600003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlipourjeddiM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AnderssonS24, author = {Josefin Andersson and Elias Seid}, title = {The Classification and Impact of Cyber Attacks Targeting Critical Service Providers}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {137--145}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012374500003648}, doi = {10.5220/0012374500003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AnderssonS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AurnaHOTKK24, author = {Nahid Ferdous Aurna and Md Delwar Hossain and Hideya Ochiai and Yuzo Taenaka and Latifur Khan and Youki Kadobayashi}, title = {Banking Malware Detection: Leveraging Federated Learning with Conditional Model Updates and Client Data Heterogeneity}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {309--319}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012409700003648}, doi = {10.5220/0012409700003648}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AurnaHOTKK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BagheriJD24, author = {Sally Bagheri and Andreas Jacobsson and Paul Davidsson}, title = {Smart Homes as Digital Ecosystems: Exploring Privacy in IoT Contexts}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {869--877}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012458700003648}, doi = {10.5220/0012458700003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BagheriJD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BarretoRC024, author = {Jackson Barreto and Paulina Rutecka and Karina Cicha and Pedro Pinto}, title = {The Status and Management of Web-Related Security at Higher Education Institutions in Poland}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {789--798}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012423000003648}, doi = {10.5220/0012423000003648}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BarretoRC024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BozorgiJA24, author = {Arastoo Bozorgi and Mahya Soleimani Jadidi and Jonathan Anderson}, title = {{UPSS:} {A} Global, Least-Privileged Storage System with Stronger Security and Better Performance}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {660--671}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012306600003648}, doi = {10.5220/0012306600003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BozorgiJA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BrodschelmG24, author = {Lukas Brodschelm and Marcus Gelderie}, title = {Using {ILP} to Learn AppArmor Policies}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {766--773}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012379000003648}, doi = {10.5220/0012379000003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BrodschelmG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BuchananGU24, author = {William J. Buchanan and Sam Grierson and Daniel Uribe}, title = {Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {226--233}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012454300003648}, doi = {10.5220/0012454300003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BuchananGU24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ButtnerG24, author = {Andre B{\"{u}}ttner and Nils Gruschka}, title = {Evaluating the Influence of Multi-Factor Authentication and Recovery Settings on the Security and Accessibility of User Accounts}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {691--700}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012319000003648}, doi = {10.5220/0012319000003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ButtnerG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ChakrabortyB24, author = {Olive Chakraborty and Aymen Boudguiga}, title = {A Decentralized Federated Learning Using Reputation}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {799--806}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012428300003648}, doi = {10.5220/0012428300003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ChakrabortyB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ChikulBM24, author = {Pavel Chikul and Hayretdin Bahsi and Olaf Maennel}, title = {The Design and Implementation of a Semantic Web Framework for the Event-Centric Digital Forensics Analysis}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {570--581}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012437700003648}, doi = {10.5220/0012437700003648}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ChikulBM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Conti24, author = {Mauro Conti}, title = {Covert {\&} Side Stories: Threats Evolution in Traditional and Modern Technologies}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {7}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Conti24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DebonoS24, author = {David Debono and Aleandro Sultana}, title = {Desktop Crypto Wallets: {A} Digital Forensic Investigation and Analysis of Remnants and Traces on end-User Machines}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {350--357}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012313000003648}, doi = {10.5220/0012313000003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DebonoS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DeloueeD0K24, author = {Majid Lotfian Delouee and Victoria Degeler and Peter Amthor and Boris Koldehofe}, title = {{APP-CEP:} Adaptive Pattern-Level Privacy Protection in Complex Event Processing Systems}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {486--497}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012358700003648}, doi = {10.5220/0012358700003648}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DeloueeD0K24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DelvecchioZBS24, author = {Tony Delvecchio and Sander Zeijlemaker and Giancarlo De Bernardis and Michael Siegel}, title = {Revolutionizing Board Cyber-Risk Management Using Collaborative Gaming}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {112--119}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012349400003648}, doi = {10.5220/0012349400003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DelvecchioZBS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DoganB24, author = {Ali Dogan and Kemal Bicakci}, title = {{KAIME:} Central Bank Digital Currency with Realistic and Modular Privacy}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {672--681}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012308600003648}, doi = {10.5220/0012308600003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DoganB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/EleshinIRI24, author = {Farida Eleshin and Patrick Iradukunda and David Ishimwe Ruberamitwe and Eric Ishimwe}, title = {Your Robot Might Be Inadvertently or Deliberately Spying on You: {A} Critical Analysis of Privacy Practices in the Robotics Industry}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {219--225}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012422200003648}, doi = {10.5220/0012422200003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/EleshinIRI24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FarooqHFR24, author = {Muhammad Ali Farooq and Syed Muhammad Fasih Ul Hassan and Muhammad Umer Farooq and Abid Rafique}, title = {High Throughput Neural Network for Network Intrusion Detection on FPGAs: An Algorithm-Architecture Interaction}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {423--429}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FarooqHFR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GazoPH24, author = {Dakouri Gazo and Asma Patel and Mohammad Hasan}, title = {Effectiveness of Malware Incident Management in Security Operations Centres: Trends, Challenges and Research Directions}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {162--169}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012389900003648}, doi = {10.5220/0012389900003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GazoPH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GelderieLB24, author = {Marcus Gelderie and Maximilian Luff and Lukas Brodschelm}, title = {Differential Privacy for Distributed Traffic Monitoring in Smart Cities}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {758--765}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012372700003648}, doi = {10.5220/0012372700003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GelderieLB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GoncalvesM24, author = {Brian Goncalves and Atefeh Mashatan}, title = {Towards Generalized Diffie-Hellman-esque Key Agreement via Generic Split {KEM} Construction}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {594--608}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012454400003648}, doi = {10.5220/0012454400003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GoncalvesM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GuerinC0M24, author = {Sylvain Gu{\'{e}}rin and Jo{\"{e}}l Champeau and Salvador Mart{\'{\i}}nez and Ra{\'{u}}l Mazo}, title = {Security Contracts a Property-Based Approach to Support Security Patterns}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {103--111}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012305600003648}, doi = {10.5220/0012305600003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GuerinC0M24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GuerraMDPF24, author = {Michele Guerra and Roberto Milanese and Michele Deodato and Vittorio Perozzi and Fausto Fasano}, title = {Visual Attention and Privacy Indicators in Android: Insights from Eye Tracking}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {320--329}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012437600003648}, doi = {10.5220/0012437600003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GuerraMDPF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HasegawaHSKFMK24, author = {Kento Hasegawa and Katsutoshi Hanahara and Hiroshi Sugisaki and Minoru Kozu and Kazuhide Fukushima and Yosuke Murakami and Shinsaku Kiyomoto}, title = {Vulnerability Information Sharing Platform for Securing Hardware Supply Chains}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {403--410}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012351800003648}, doi = {10.5220/0012351800003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HasegawaHSKFMK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HeinrichWOM24, author = {Tiago Heinrich and Newton Carlos Will and Rafael R. Obelheiro and Carlos Alberto Maziero}, title = {Anywhere on Earth: {A} Look at Regional Characteristics of DRDoS Attacks}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {21--29}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012252700003648}, doi = {10.5220/0012252700003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HeinrichWOM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HeinrichWOM24a, author = {Tiago Heinrich and Newton Carlos Will and Rafael R. Obelheiro and Carlos Alberto Maziero}, title = {A Categorical Data Approach for Anomaly Detection in WebAssembly Applications}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {275--284}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012252800003648}, doi = {10.5220/0012252800003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HeinrichWOM24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HintzRS24, author = {Jan Hintz and Jacob R{\"{u}}he and Ingo Siegert}, title = {AnonEmoFace: Emotion Preserving Facial Anonymization}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {785--788}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012410600003648}, doi = {10.5220/0012410600003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HintzRS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HosseinzadehCB24, author = {Arghavan Hosseinzadeh and Jessica Chwalek and Robin Brandst{\"{a}}dter}, title = {Policy-Driven XACML-Based Architecture for Dynamic Enforcement of Multiparty Computation}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {81--89}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012254000003648}, doi = {10.5220/0012254000003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HosseinzadehCB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HousselL24, author = {Paul R. B. Houssel and Luis A. Leiva}, title = {User Re-Authentication via Mouse Movements and Recurrent Neural Networks}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {652--659}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012296600003648}, doi = {10.5220/0012296600003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HousselL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HuT24, author = {Wanyu Hu and Vrizlynn L. L. Thing}, title = {CPE-Identifier: Automated {CPE} Identification and {CVE} Summaries Annotation with Deep Learning and {NLP}}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {67--78}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012403500003648}, doi = {10.5220/0012403500003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HuT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/IadarolaMMPS24, author = {Giacomo Iadarola and Fabio Martinelli and Francesco Mercaldo and Luca Petrillo and Antonella Santone}, title = {Cybersecurity-Related Tweet Classification by Explainable Deep Learning}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {438--445}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012411100003648}, doi = {10.5220/0012411100003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/IadarolaMMPS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/JakubeitPS24, author = {Philipp Jakubeit and Andreas Peter and Maarten van Steen}, title = {RoomKey: Extracting a Volatile Key with Information from the Local WiFi Environment Reconstructable Within a Designated Area}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {558--569}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012437500003648}, doi = {10.5220/0012437500003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/JakubeitPS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/JawedPKHS24, author = {Mohammed Jawed and Sriram Parameshwaran and Nitesh Kumar and Anand Handa and Sandeep K. Shukla}, title = {ArkThor: Threat Categorization Based on Malware's {C2} Communication}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {203--210}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012420200003648}, doi = {10.5220/0012420200003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/JawedPKHS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KaksonenHLR24, author = {Rauli Kaksonen and Kimmo Halunen and Marko Laakso and Juha R{\"{o}}ning}, title = {Automating IoT Security Standard Testing by Common Security Tools}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {42--53}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012345900003648}, doi = {10.5220/0012345900003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KaksonenHLR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KalhorD24, author = {Borna Kalhor and Sanchari Das}, title = {Evaluating the Security and Privacy Risk Postures of Virtual Assistants}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {154--161}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012389500003648}, doi = {10.5220/0012389500003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KalhorD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KimL24, author = {Seo{-}Yi Kim and Il{-}Gu Lee}, title = {{LSTM} Autoencoder-Based Insider Abnormal Behavior Detection Using De-Identified Data}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {609--620}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012458000003648}, doi = {10.5220/0012458000003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KimL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KobayashiY24, author = {Ryosuke Kobayashi and Rie Shigetomi Yamaguchi}, title = {Forgery Resistance of User Authentication Methods Using Location, Wi-Fi and Their Correlation}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {709--716}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012323400003648}, doi = {10.5220/0012323400003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KobayashiY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KohlerM24, author = {Daniel K{\"{o}}hler and Christoph Meinel}, title = {The Right Tool for the Job: Contextualization of Cybersecurity Education and Assessment Methods}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {234--241}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012457900003648}, doi = {10.5220/0012457900003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KohlerM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Kokolakis24, author = {Spyros Kokolakis}, title = {Security, Privacy and the "Human Factor": Making Sense of the Paradoxes of Security and Privacy Behaviour}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {9--11}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012640600003648}, doi = {10.5220/0012640600003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Kokolakis24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KoltaiGA24, author = {Beatrix Koltai and Andr{\'{a}}s Gazdag and Gergely {\'{A}}cs}, title = {Supporting {CAN} Bus Anomaly Detection with Correlation Data}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {285--296}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012360400003648}, doi = {10.5220/0012360400003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KoltaiGA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KumarMB24, author = {Vimal Kumar and Juliette Mayo and Khadija Bahiss}, title = {ADMIn: Attacks on Dataset, Model and Input: {A} Threat Model for {AI} Based Software}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {170--178}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012394100003648}, doi = {10.5220/0012394100003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KumarMB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LanzaLO24, author = {Claudia Lanza and Abdelkader Lahmadi and Fabian Osmond}, title = {An Empirical Study of Ransomware Vulnerabilities Descriptions}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {146--153}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012378700003648}, doi = {10.5220/0012378700003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LanzaLO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LevshunV24, author = {Dmitry Levshun and Dmitry Vesnin}, title = {Exploring {BERT} for Predicting Vulnerability Categories in Device Configurations}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {452--461}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012471800003648}, doi = {10.5220/0012471800003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LevshunV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LienBK24, author = {Eirik Lien and Karl Magnus Gr{\o}nning Bergh and Sokratis K. Katsikas}, title = {Perceptions of Cyber Security Risk of the Norwegian Advanced Metering Infrastructure}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {187--194}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012414900003648}, doi = {10.5220/0012414900003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LienBK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LiuDDS24, author = {Changwei Liu and Louis DiValentin and Aolin Ding and Malek Ben Salem}, title = {Build a Computationally Efficient Strong Defense Against Adversarial Example Attacks}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {358--365}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012315500003648}, doi = {10.5220/0012315500003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LiuDDS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LiuG24, author = {Kunlong Liu and Trinabh Gupta}, title = {Federated Learning with Differential Privacy and an Untrusted Aggregator}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {379--389}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012322100003648}, doi = {10.5220/0012322100003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LiuG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LuL24, author = {Chun{-}Shien Lu and Chao{-}Hsuan Lin}, title = {Robust Image Deepfake Detection with Perceptual Hashing}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {374--378}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012317800003648}, doi = {10.5220/0012317800003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LuL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MaciUC24, author = {Antonio Maci and Giuseppe Urbano and Antonio Coscia}, title = {Deep Q-Networks for Imbalanced Multi-Class Malware Classification}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {342--349}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012303800003648}, doi = {10.5220/0012303800003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MaciUC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MackovaBS24, author = {Katerina Mackov{\'{a}} and Dominik Benk and Martin Srot{\'{y}}r}, title = {Enhancing Cybersecurity Through Comparative Analysis of Deep Learning Models for Anomaly Detection}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {682--690}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MackovaBS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MaderL24, author = {Julia Mader and Thomas Lor{\"{u}}nser}, title = {Feasibility of Privacy Preserving Minutiae-Based Fingerprint Matching}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {899--906}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012472300003648}, doi = {10.5220/0012472300003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MaderL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MarruccoABM24, author = {Fabrizia Marrucco and Mosabbah Mushir Ahmed and Bechir Bouali and Alieeldin Mady}, title = {EMplifier: Hybrid Electromagnetic Probe for Side Channel and Fault Injection Analysis}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {815--822}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012431800003648}, doi = {10.5220/0012431800003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MarruccoABM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Maugeri24, author = {Marcello Maugeri}, title = {Fuzzing Matter(s): {A} White Paper for Fuzzing the Matter Protocol}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {446--451}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012469200003648}, doi = {10.5220/0012469200003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Maugeri24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/McConnellLSW24, author = {John McConnell and Yair Levy and Marti Snyder and Ling Wang}, title = {The Role of Heuristics and Biases in Linux Server Administrators' Information Security Policy Compliance at Healthcare Organizations}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {30--41}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012297000003648}, doi = {10.5220/0012297000003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/McConnellLSW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/McWeeneyMV24, author = {Bernard McWeeney and Ilya Mudritskiy and Renaat Verbruggen}, title = {Analysis of Payload Confidentiality for the IoT/ {LPWAN} Technology 'Lora'}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {90--102}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012271400003648}, doi = {10.5220/0012271400003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/McWeeneyMV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MeguroKNHFSH24, author = {Ryo Meguro and Hiroya Kato and Shintaro Narisada and Seira Hidano and Kazuhide Fukushima and Takuo Suganuma and Masahiro Hiji}, title = {Gradient-Based Clean Label Backdoor Attack to Graph Neural Networks}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {510--521}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012369500003648}, doi = {10.5220/0012369500003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MeguroKNHFSH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MiglioreCT24, author = {Andrea Migliore and Stelvio Cimato and Gabriella Trucco}, title = {Efficient Secure Computation of Edit Distance on Genomic Data}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {878--883}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012459400003648}, doi = {10.5220/0012459400003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MiglioreCT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MoralesRBJS24, author = {Gabriel A. Morales and Farhan Tajwar Romit and Adam Bienek{-}Parrish and Patrick Jenkins and Rocky Slavin}, title = {IoT Device Classification Using Link-Level Features for Traditional Machine Learning and Large Language Models}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {297--308}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012365700003648}, doi = {10.5220/0012365700003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MoralesRBJS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MoustafaNGE24, author = {Mariam Moustafa and Arto Niemi and Philip Ginzboorg and Jan{-}Erik Ekberg}, title = {Attestation with Constrained Relying Party}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {701--708}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012319300003648}, doi = {10.5220/0012319300003648}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MoustafaNGE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NguyenCHFB24, author = {Huynh Phuong Thanh Nguyen and Zhi Chen and Kento Hasegawa and Kazuhide Fukushima and Razvan Beuran}, title = {PenGym: Pentesting Training Framework for Reinforcement Learning Agents}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {498--509}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012367300003648}, doi = {10.5220/0012367300003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NguyenCHFB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OhLJCL24, author = {Ye{-}Sol Oh and Yeon{-}Ji Lee and Jiwon Jang and Hyunwoo Choi and Il{-}Gu Lee}, title = {Implementation and Analysis of Covert Channel Using iBeacon}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {861--868}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012457800003648}, doi = {10.5220/0012457800003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/OhLJCL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OzgunTS24, author = {Kagan {\"{O}}zg{\"{u}}n and Ayse Tosun and Mehmet Tahir Sandikkaya}, title = {A Recommender System to Detect Distributed Denial of Service Attacks with Network and Transport Layer Features}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {390--397}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012350100003648}, doi = {10.5220/0012350100003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/OzgunTS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PailletCC24, author = {Justine Paillet and Olive Chakraborty and Marina Checri}, title = {Pure Multi Key {BGV} Implementation}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {807--814}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012429000003648}, doi = {10.5220/0012429000003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PailletCC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PareK24, author = {Anjali Pare and Prasad A. Kulkarni}, title = {Exploring Errors in Binary-Level {CFG} Recovery}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {546--557}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012435400003648}, doi = {10.5220/0012435400003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PareK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PatzeltNDHHS24, author = {Luca Patzelt and Georg Neugebauer and Meik D{\"{o}}ll and Sacha Hack and Tim Hoener and Marko Schuba}, title = {A Framework for {E2E} Audit Trails in System Architectures of Different Enterprise Classes}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {750--757}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012367000003648}, doi = {10.5220/0012367000003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PatzeltNDHHS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PauwMD24, author = {C{\'{e}}drick De Pauw and Jan Tobias M{\"{u}}hlberg and Jean{-}Michel Dricot}, title = {An Improved PUF-Based Privacy-Preserving IoT Protocol for Cloud Storage}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {725--732}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012326000003648}, doi = {10.5220/0012326000003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PauwMD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PirkerH24, author = {Martin Pirker and Robert Haas}, title = {A Brief Reflection on Trusted Platform Module Support}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {890--898}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012466400003648}, doi = {10.5220/0012466400003648}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PirkerH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PohlerSHHN24, author = {Luca P{\"{o}}hler and Marko Schuba and Tim Hoener and Sacha Hack and Georg Neugebauer}, title = {An Open-Source Approach to {OT} Asset Management in Industrial Environments}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {128--136}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012362200003648}, doi = {10.5220/0012362200003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PohlerSHHN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PrillardBT24, author = {Ophelia Prillard and Costas Boletsis and Shukun Tokas}, title = {Ethical Design for Data Privacy and User Privacy Awareness in the Metaverse}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {333--341}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012296500003648}, doi = {10.5220/0012296500003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PrillardBT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Raciti24, author = {Mario Raciti}, title = {Conceptualising an Anti-Digital Forensics Kill Chain for Smart Homes}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {831--837}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012449700003648}, doi = {10.5220/0012449700003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Raciti24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RahmanHOKSR24, author = {Md. Mahbubur Rahman and Md Delwar Hossain and Hideya Ochiai and Youki Kadobayashi and Tanjim Sakib and Syed Taha Yeasin Ramadan}, title = {Vision Based Malware Classification Using Deep Neural Network with Hybrid Data Augmentation}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {823--830}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012434400003648}, doi = {10.5220/0012434400003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RahmanHOKSR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RajputA24, author = {Amitesh Singh Rajput and Arnav Agrawal}, title = {Blockchain for Privacy-Preserving Data Distribution in Healthcare}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {621--631}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012470500003648}, doi = {10.5220/0012470500003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RajputA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RashidMM24, author = {Fatema Rashid and Ali Miri and Atefeh Mashatan}, title = {PETRIoT - {A} Privacy Enhancing Technology Recommendation Framework for IoT Computing}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {838--844}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012450900003648}, doi = {10.5220/0012450900003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RashidMM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RibesMGP24, author = {Stefano Ribes and Fabio Malatesta and Grazia Garzo and Alessandro Palumbo}, title = {Machine Learning-Based Classification of Hardware Trojans in FPGAs Implementing {RISC-V} Cores}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {717--724}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012324200003648}, doi = {10.5220/0012324200003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RibesMGP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RuedlingerKLHTV24, author = {Andreas R{\"{u}}edlinger and Rebecca Klauser and Pavlos Lamprakis and Markus Happe and Bernhard Tellenbach and Onur Veyisoglu and Ariane Trammell}, title = {FeedMeter: Evaluating the Quality of Community-Driven Threat Intelligence}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {54--66}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012357600003648}, doi = {10.5220/0012357600003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RuedlingerKLHTV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ScottL0K24, author = {Jackie Scott and Yair Levy and Wei Li and Ajoy Kumar}, title = {Comparing Phishing Training and Campaign Methods for Mitigating Malicious Emails in Organizations}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {643--651}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012281600003648}, doi = {10.5220/0012281600003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ScottL0K24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SeidPB24, author = {Elias Seid and Oliver Popov and Fredrik Blix}, title = {An Automated Adaptive Security Framework for Cyber-Physical Systems}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {242--253}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012469100003648}, doi = {10.5220/0012469100003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SeidPB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SinghTG024, author = {Arunab Singh and Maryam Tanha and Yashsvi Girdhar and Aaron Hunter}, title = {Interpretable Android Malware Detection Based on Dynamic Analysis}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {195--202}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012415800003648}, doi = {10.5220/0012415800003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SinghTG024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SpitzL24, author = {Stephan Spitz and Alexander Lawall}, title = {Silicon-Integrated Security Solutions Driving IoT Security}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {398--402}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012350200003648}, doi = {10.5220/0012350200003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SpitzL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/StavrouPV24, author = {Eliana Stavrou and Andriani Piki and Panayiotis Varnava}, title = {Merging Policy and Practice: Crafting Effective Social Engineering Awareness-Raising Policies}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {179--186}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012410300003648}, doi = {10.5220/0012410300003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/StavrouPV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/StevanLLDP24, author = {Antoine Stevan and Thomas Lavaur and J{\'{e}}r{\^{o}}me Lacan and Jonathan Detchart and Tanguy P{\'{e}}rennou}, title = {Performance Evaluation of Polynomial Commitments for Erasure Code Based Information Dispersal}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {522--533}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012377900003648}, doi = {10.5220/0012377900003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/StevanLLDP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Stremlau24, author = {Thorsten P. Stremlau}, title = {Integrating Post-Quantum Cryptography into Trusted Computing Group Standards}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {15}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Stremlau24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TavolatoLEGS24, author = {Paul Tavolato and Robert Luh and Sebastian Eresheim and Simon Gmeiner and Sebastian Schrittwieser}, title = {Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {211--218}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012421800003648}, doi = {10.5220/0012421800003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TavolatoLEGS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TejapijayaSSK24, author = {Thanawat Tejapijaya and Prarinya Siritanawan and Karin Sumongkayothin and Kazunori Kotani}, title = {Botnet Detection by Integrating Multiple Machine Learning Models}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {366--373}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012317700003648}, doi = {10.5220/0012317700003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TejapijayaSSK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Teseleanu24, author = {George Teseleanu}, title = {Security Analysis of an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {467--473}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012307800003648}, doi = {10.5220/0012307800003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Teseleanu24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Teseleanu24a, author = {George Teseleanu}, title = {Security Analysis of an Image Encryption Scheme Based on a New Secure Variant of Hill Cipher and 1D Chaotic Maps}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {745--749}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012356600003648}, doi = {10.5220/0012356600003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Teseleanu24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Tezcan24, author = {Cihangir Tezcan}, title = {GPU-Based Brute Force Cryptanalysis of {KLEIN}}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {884--889}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012461900003648}, doi = {10.5220/0012461900003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Tezcan24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TrammellGISZ24, author = {Ariane Trammell and Benjamin Gehring and Marco Isele and Yvo Spielmann and Valentin Zahnd}, title = {Towards Automated Information Security Governance}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {120--127}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012357500003648}, doi = {10.5220/0012357500003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TrammellGISZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/UemuraF24, author = {Shusaku Uemura and Kazuhide Fukushima}, title = {Feasibility of Random Forest with Fully Homomorphic Encryption Applied to Network Data}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {534--545}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012394600003648}, doi = {10.5220/0012394600003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/UemuraF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/UmraniV024, author = {Alia Umrani and Apurva K. Vangujar and Paolo Palmieri}, title = {Anonymous Multi-Receiver Certificateless Hybrid Signcryption for Broadcast Communication}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {733--744}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012353400003648}, doi = {10.5220/0012353400003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/UmraniV024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ValoggiaSRB24, author = {Philippe Valoggia and Anastasia Sergeeva and Arianna Rossi and Marietjie Botes}, title = {Learning from the Dark Side About How (not) to Engineer Privacy: Analysis of Dark Patterns Taxonomies from an {ISO} 29100 Perspective}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {774--784}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012393100003648}, doi = {10.5220/0012393100003648}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ValoggiaSRB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/VaneziKP24, author = {Evangelia Vanezi and Georgia M. Kapitsaki and Anna Philippou}, title = {What's Your Purpose? An Approach to Incorporating {GDPR} Purposes into Requirements Analysis}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {907--914}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012474400003648}, doi = {10.5220/0012474400003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/VaneziKP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/VijayanFK24, author = {Visakh K. Vijayan and Maria Francis and Kotaro Kataoka}, title = {Off-Chaining Approaches for Cost-Efficiency in Threshold-Based Elliptic Curve Systems over Blockchains}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {411--422}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012361600003648}, doi = {10.5220/0012361600003648}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/VijayanFK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WakabayashiWNW24, author = {Ryousuke Wakabayashi and Lihua Wang and Ryo Nojima and Atsushi Waseda}, title = {Security Evaluation of Decision Tree Meets Data Anonymization}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {853--860}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012456600003648}, doi = {10.5220/0012456600003648}, timestamp = {Wed, 03 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WakabayashiWNW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WillM24, author = {Newton Carlos Will and Carlos Alberto Maziero}, title = {Enclave Management Models for Safe Execution of Software Components}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {474--485}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012322600003648}, doi = {10.5220/0012322600003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WillM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ZaidenbergKME24, author = {Nezer Jacob Zaidenberg and Michael Kiperberg and Eliav Menachi and Asaf Eitani}, title = {Detecting eBPF Rootkits Using Virtualization and Memory Forensics}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {254--261}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012470800003648}, doi = {10.5220/0012470800003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ZaidenbergKME24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ZareiV24, author = {Amir Zarei and Staal Amund Vinterbo}, title = {Secure Multiparty Computation of the Laplace Mechanism}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {582--593}, year = {2024}, crossref = {DBLP:conf/icissp/2024}, url = {https://doi.org/10.5220/0012453700003648}, doi = {10.5220/0012453700003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ZareiV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2024, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0000184400003648}, doi = {10.5220/0000184400003648}, isbn = {978-989-758-683-5}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/000123, author = {Luca Vigan{\`{o}}}, title = {Cybersecurity, Nicolas Cage and Peppa Pig}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {7}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, timestamp = {Thu, 11 May 2023 10:52:54 +0200}, biburl = {https://dblp.org/rec/conf/icissp/000123.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/0001V23, author = {Alexandros Karakasidis and Vassilios Vassalos}, title = {On the Design of {GDPR} Compliant Workflows for Responsible Neuroimage Data Sharing}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {600--607}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011743000003405}, doi = {10.5220/0011743000003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/0001V23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlJuaidLS23, author = {Nouf Al{-}Juaid and Alexei Lisitsa and Sven Schewe}, title = {Secure Joint Querying Over Federated Graph Databases Utilising {SMPC} Protocols}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {210--217}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011798900003405}, doi = {10.5220/0011798900003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlJuaidLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlagarswamyBDLMSTW23, author = {Devi Padmavathi Alagarswamy and Christian Berghoff and Vasilios Danos and Fabian Langer and Thora Markert and Georg Schneider and Arndt von Twickel and Fabian Woitschek}, title = {Towards Audit Requirements for AI-Based Systems in Mobility Applications}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {339--348}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011619500003405}, doi = {10.5220/0011619500003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlagarswamyBDLMSTW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlaniMM23, author = {Mohammed M. Alani and Atefeh Mashatan and Ali Miri}, title = {XMeDNN: An Explainable Deep Neural Network System for Intrusion Detection in Internet of Medical Things}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {144--151}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011749200003405}, doi = {10.5220/0011749200003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlaniMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlbaneseCCIMMRS23, author = {Daniele Albanese and Rosangela Casolare and Giovanni Ciaramella and Giacomo Iadarola and Fabio Martinelli and Francesco Mercaldo and Marco Russodivito and Antonella Santone}, title = {StegWare: {A} Novel Malware Model Exploiting Payload Steganography and Dynamic Compilation}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {741--748}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011859000003405}, doi = {10.5220/0011859000003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlbaneseCCIMMRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlghamdiF23, author = {Samiah Alghamdi and Steven Furnell}, title = {Assessing Security and Privacy Insights for Smart Home Users}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {592--599}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011741800003405}, doi = {10.5220/0011741800003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlghamdiF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AntognazzaBPS23, author = {Francesco Antognazza and Alessandro Barenghi and Gerardo Pelosi and Ruggero Susella}, title = {An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {81--88}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011654200003405}, doi = {10.5220/0011654200003405}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AntognazzaBPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BalajiAF23, author = {Kaushik Krishnan Balaji and Dimah Almani and Steven Furnell}, title = {Assessing the Impact of Attacks on Connected and Autonomous Vehicles in Vehicular Ad Hoc Networks}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {774--782}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011894200003405}, doi = {10.5220/0011894200003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BalajiAF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BartschGKM0PP23, author = {Witali Bartsch and Prosanta Gope and Elif Bilge Kavun and Owen Millwood and Andriy Panchenko and Aryan Mohammadi Pasikhani and Ilia Polian}, title = {Design Rationale for Symbiotically Secure Key Management Systems in IoT and Beyond}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {583--591}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011726900003405}, doi = {10.5220/0011726900003405}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BartschGKM0PP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BauspiessVMCKR23, author = {Pia Bauspie{\ss} and Lasse Vad and H{\aa}vard Myrekrok and Anamaria Costache and Jascha Kolberg and Christian Rathgeb}, title = {On the Feasibility of Fully Homomorphic Encryption of Minutiae-Based Fingerprint Representations}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {462--470}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011657100003405}, doi = {10.5220/0011657100003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BauspiessVMCKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BelalisSA23, author = {Ilias Belalis and Georgios P. Spathoulas and Ioannis Anagnostopoulos}, title = {Evading Detection During Network Reconnaissance}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {528--534}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011685900003405}, doi = {10.5220/0011685900003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BelalisSA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BellizziVCH23, author = {Jennifer Bellizzi and Mark Vella and Christian Colombo and Julio C. Hernandez{-}Castro}, title = {Using Infrastructure-Based Agents to Enhance Forensic Logging of Third-Party Applications}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {389--401}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011634700003405}, doi = {10.5220/0011634700003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BellizziVCH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BodeiCVMM23, author = {Chiara Bodei and Gianpiero Costantino and Marco De Vincenzi and Ilaria Matteucci and Anna Monreale}, title = {Vehicle Data Collection: {A} Privacy Policy Analysis and Comparison}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {626--633}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011779500003405}, doi = {10.5220/0011779500003405}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BodeiCVMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BorcherdingPGB23, author = {Anne Borcherding and Nikolay Penkov and Mark Giraud and J{\"{u}}rgen Beyerer}, title = {SWaTEval: An Evaluation Framework for Stateful Web Application Testing}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {430--441}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011652200003405}, doi = {10.5220/0011652200003405}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BorcherdingPGB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Bracamonte0L23, author = {Vanessa Bracamonte and Sebastian Pape and Sascha L{\"{o}}bner}, title = {Comparing the Effect of Privacy and Non-Privacy Social Media Photo Tools on Factors of Privacy Concern}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {669--676}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011784900003405}, doi = {10.5220/0011784900003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Bracamonte0L23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Bryce23, author = {Ciar{\'{a}}n Bryce}, title = {An Analysis of Cybersecurity Awareness Efforts for Swiss SMEs}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {381--388}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011631100003405}, doi = {10.5220/0011631100003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Bryce23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BullockE23, author = {Harrison Bullock and Matthew Edwards}, title = {Temporal Constraints in Online Dating Fraud Classification}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {535--542}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011689000003405}, doi = {10.5220/0011689000003405}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BullockE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BurdiakDTLRKMPFKHMV23, author = {Patrik Burdiak and Emir Dervisevic and Amina Tankovic and Filip Lauterbach and Jan Rozhon and Lukas Kapicak and Libor Michalek and Dzana Pivac and Merima Fehric and Enio Kaljic and Mirza Hamza and Miralem Mehic and Miroslav Vozn{\'{a}}k}, title = {Use-Case Denial of Service Attack on Actual Quantum Key Distribution Nodes}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {89--94}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011672000003405}, doi = {10.5220/0011672000003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BurdiakDTLRKMPFKHMV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Chabanne23, author = {Herv{\'{e}} Chabanne}, title = {A Biometric Self Authentication Scheme}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {749--756}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011874400003405}, doi = {10.5220/0011874400003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Chabanne23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ChenLX23, author = {Shaojie Chen and Bo Lang and Chong Xie}, title = {Fast-Flux Malicious Domain Name Detection Method Based on Domain Resolution Spatial Features}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {240--251}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011872700003405}, doi = {10.5220/0011872700003405}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/ChenLX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DantasBKNS23, author = {Yuri Gil Dantas and Simon Barner and Pei Ke and Vivek Nigam and Ulrich Sch{\"{o}}pp}, title = {Automating Vehicle {SOA} Threat Analysis Using a Model-Based Methodology}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {180--191}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011786400003405}, doi = {10.5220/0011786400003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DantasBKNS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DantasS23, author = {Yuri Gil Dantas and Ulrich Sch{\"{o}}pp}, title = {SeCloud: Computer-Aided Support for Selecting Security Measures for Cloud Architectures}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {264--275}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011901900003405}, doi = {10.5220/0011901900003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DantasS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DienerB23, author = {Michael Diener and Thomas Bolz}, title = {Cloud Inspector: {A} Tool-Based Approach for Public Administrations to Establish Information Security Processes Towards Public Clouds}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {543--551}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011694900003405}, doi = {10.5220/0011694900003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DienerB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DieterichSSSP23, author = {Am{\'{e}}lie Dieterich and Matthias Schopp and Lars Stiemert and Christoph Steininger and Daniela P{\"{o}}hn}, title = {Evaluation of Persistence Methods Used by Malware on Microsoft Windows Systems}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {552--559}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011710200003405}, doi = {10.5220/0011710200003405}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DieterichSSSP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DimaratosP23, author = {Anastasia Dimaratos and Daniela P{\"{o}}hn}, title = {Evaluation Scheme to Analyze Keystroke Dynamics Methods}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {357--365}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011626100003405}, doi = {10.5220/0011626100003405}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DimaratosP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DorafshanianM23, author = {Mahboobeh Dorafshanian and Mohamed Mejri}, title = {Differential Privacy: Toward a Better Tuning of the Privacy Budget ({\(\epsilon\)}) Based on Risk}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {783--792}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011896600003405}, doi = {10.5220/0011896600003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DorafshanianM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DrevinSDKA23, author = {G{\"{u}}nther R. Drevin and Dirk P. Snyman and Lynette Drevin and Hennie A. Kruger and Johann Allers}, title = {The Story of Safety Snail and Her e-Mail: {A} Digital Wellness and Cybersecurity Serious Game for Pre-School Children}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {519--527}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011682200003405}, doi = {10.5220/0011682200003405}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DrevinSDKA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/EipperP23, author = {Andreas Eipper and Daniela P{\"{o}}hn}, title = {How to Design a Blue Team Scenario for Beginners on the Example of Brute-Force Attacks on Authentications}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {477--484}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011667300003405}, doi = {10.5220/0011667300003405}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/EipperP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ElsteC23, author = {James R. Elste and David T. Croasdell}, title = {Cyber Teaching Hospitals: Developing Cyber Workforce Competence}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {643--650}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011783800003405}, doi = {10.5220/0011783800003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ElsteC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/EmuraY23, author = {Keita Emura and Masato Yoshimi}, title = {An End-to-End Encrypted Cache System with Time-Dependent Access Control}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {321--328}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011617900003405}, doi = {10.5220/0011617900003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/EmuraY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ErdoganHBTP23, author = {Gencer Erdogan and Ragnhild Halvorsrud and Costas Boletsis and Simeon Tverdal and John Brian Pickering}, title = {Cybersecurity Awareness and Capacities of SMEs}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {296--304}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011609600003405}, doi = {10.5220/0011609600003405}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ErdoganHBTP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FarhatAMZ23, author = {Saida Farhat and Manel Abdelkader and Amel Meddeb{-}Makhlouf and Faouzi Zarai}, title = {Evaluation of DoS/DDoS Attack Detection with {ML} Techniques on {CIC-IDS2017} Dataset}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {287--295}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011605700003405}, doi = {10.5220/0011605700003405}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FarhatAMZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FloresGKBV23, author = {C{\'{e}}sar V{\'{a}}squez Flores and Jos{\'{e}} Gonzales and Miranda Kajtazi and Joseph Bugeja and Bahtijar Vogel}, title = {Human Factors for Cybersecurity Awareness in a Remote Work Environment}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {608--616}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011746000003405}, doi = {10.5220/0011746000003405}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FloresGKBV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GalliBJCP23, author = {Filippo Galli and Sayan Biswas and Kangsoo Jung and Tommaso Cucinotta and Catuscia Palamidessi}, title = {Group Privacy for Personalized Federated Learning}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {252--263}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011885000003405}, doi = {10.5220/0011885000003405}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GalliBJCP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GuerraMOF23, author = {Michele Guerra and Roberto Milanese and Rocco Oliveto and Fausto Fasano}, title = {RPCDroid: Runtime Identification of Permission Usage Contexts in Android Applications}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {714--721}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011797200003405}, doi = {10.5220/0011797200003405}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/GuerraMOF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HanTT0ML23, author = {Chansu Han and Akira Tanaka and Jun'ichi Takeuchi and Takeshi Takahashi and Tomohiro Morikawa and Tsung{-}Nan Lin}, title = {Towards Long-Term Continuous Tracing of Internet-Wide Scanning Campaigns Based on Darknet Analysis}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {617--625}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011769300003405}, doi = {10.5220/0011769300003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HanTT0ML23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HasegawaHF23, author = {Kento Hasegawa and Seira Hidano and Kazuhide Fukushima}, title = {Automating {XSS} Vulnerability Testing Using Reinforcement Learning}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {70--80}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011653600003405}, doi = {10.5220/0011653600003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HasegawaHF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HeidHRS23, author = {Kris Heid and Jens Heider and Matthias Ritscher and Jan{-}Peter Stotz}, title = {Tracing Cryptographic Agility in Android and iOS Apps}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {38--45}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011620000003405}, doi = {10.5220/0011620000003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HeidHRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HoferRSM23, author = {Philipp Hofer and Michael Roland and Philipp Schwarz and Ren{\'{e}} Mayrhofer}, title = {Efficient Aggregation of Face Embeddings for Decentralized Face Recognition Deployments}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {279--286}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011599300003405}, doi = {10.5220/0011599300003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HoferRSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ImanCJBG23, author = {Mohammad Reza Heidari Iman and Pavel Chikul and Gert Jervan and Hayretdin Bahsi and Tara Ghasempouri}, title = {Anomalous File System Activity Detection Through Temporal Association Rule Mining}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {733--740}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011805100003405}, doi = {10.5220/0011805100003405}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ImanCJBG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/JulkuK23, author = {Jukka Julku and Markku Kyl{\"{a}}np{\"{a}}{\"{a}}}, title = {Towards a Rust {SDK} for Keystone Enclave Application Development}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {29--37}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011611900003405}, doi = {10.5220/0011611900003405}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/JulkuK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KaksonenHR23, author = {Rauli Kaksonen and Kimmo Halunen and Juha R{\"{o}}ning}, title = {Vulnerabilities in IoT Devices, Backends, Applications, and Components}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {659--668}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011784400003405}, doi = {10.5220/0011784400003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KaksonenHR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KamalI23, author = {Ahmad Akmal Aminuddin Mohd Kamal and Keiichi Iwamura}, title = {TTP-Aided Searchable Encryption of Documents Using Threshold Secret Sharing}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {442--449}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011653700003405}, doi = {10.5220/0011653700003405}, timestamp = {Thu, 16 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KamalI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Khoumsi23, author = {Ahmed Khoumsi}, title = {Automata-Based Study of Dynamic Access Control Policies}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {218--227}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011819700003405}, doi = {10.5220/0011819700003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Khoumsi23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KiperbergRKZ23, author = {Michael Kiperberg and Aleksei Rozman and Aleksei Kuraev and Nezer Zaidenberg}, title = {{PDIFT:} {A} Practical Dynamic Information-Flow Tracker}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {192--198}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011786800003405}, doi = {10.5220/0011786800003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KiperbergRKZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KlineK23, author = {Jace Kline and Prasad Kulkarni}, title = {A Framework for Assessing Decompiler Inference Accuracy of Source-Level Program Constructs}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {228--239}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011872600003405}, doi = {10.5220/0011872600003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KlineK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KokesL23, author = {Josef Kokes and R{\'{o}}bert L{\'{o}}rencz}, title = {On the Use of Multiple Approximations in the Linear Cryptanalysis of Baby Rijndael}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {174--179}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011785400003405}, doi = {10.5220/0011785400003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KokesL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LauterbachMRBZV23, author = {Filip Lauterbach and Libor Michalek and Piotr Rydlichowski and Patrik Burdiak and Jaroslav Zdralek and Miroslav Vozn{\'{a}}k}, title = {Measurements of Cross-Border Quantum Key Distribution Link}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {418--423}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011647200003405}, doi = {10.5220/0011647200003405}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LauterbachMRBZV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LealWMMBM023, author = {Erika A. Leal and Cimone Wright{-}Hamor and Joseph B. Manzano and Nicholas J. Multari and Kevin J. Barker and David O. Manz and Jiang Ming}, title = {Assessing Risk in High Performance Computing Attacks}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {793--803}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011900500003405}, doi = {10.5220/0011900500003405}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LealWMMBM023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LeichtH23, author = {Jens Leicht and Maritta Heisel}, title = {{P2BAC:} Privacy Policy Based Access Control Using {P-LPL}}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {686--697}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011788500003405}, doi = {10.5220/0011788500003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LeichtH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Leitner23, author = {Maria Leitner}, title = {A Scenario-Driven Cyber Security Awareness Exercise Utilizing Dynamic Polling: Methodology and Lessons Learned}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {634--642}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011780400003405}, doi = {10.5220/0011780400003405}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Leitner23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LiZSZ23, author = {Lu Li and Guanling Zhao and Kai Shi and Fengjun Zhang}, title = {A Stochastic Game Model for Cloud Platform Security}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {152--162}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011778900003405}, doi = {10.5220/0011778900003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LiZSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LohmannAM23, author = {Pedro A. Lohmann and Carlos Albuquerque and Raphael Machado}, title = {Systematic Literature Review of Threat Modeling Concepts}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {163--173}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011783000003405}, doi = {10.5220/0011783000003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LohmannAM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LoumponiasRDTVK23, author = {Kostas Loumponias and Sotiris Raptis and Eleni Darra and Theodora Tsikrika and Stefanos Vrochidis and Ioannis Kompatsiaris}, title = {Forecasting Cyber-Attacks to Destination Ports Using Machine Learning}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {757--764}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011891000003405}, doi = {10.5220/0011891000003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LoumponiasRDTVK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LuanHB23, author = {Kaiying Luan and Ragnhild Halvorsrud and Costas Boletsis}, title = {Evaluation of a Tool to Increase Cybersecurity Awareness Among Non-experts {(SME} Employees)}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {509--518}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011680500003405}, doi = {10.5220/0011680500003405}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LuanHB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MarquesS23, author = {Ant{\'{o}}nio Marques and Bruno Sousa}, title = {{CHARRA-PM:} An Attestation Approach Relying on the Passport Model}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {349--356}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011623600003405}, doi = {10.5220/0011623600003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MarquesS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MaugeriDBP23, author = {Marcello Maugeri and Cristian Daniele and Giampaolo Bella and Erik Poll}, title = {Evaluating the Fork-Awareness of Coverage-Guided Fuzzers}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {424--429}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011648600003405}, doi = {10.5220/0011648600003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MaugeriDBP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MercaldoMS23, author = {Francesco Mercaldo and Fabio Martinelli and Antonella Santone}, title = {An Explainable Convolutional Neural Network for Dynamic Android Malware Detection}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {305--312}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011609800003405}, doi = {10.5220/0011609800003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MercaldoMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NarisadaBFK23, author = {Shintaro Narisada and Shohei Beppu and Kazuhide Fukushima and Shinsaku Kiyomoto}, title = {Concrete Quantum Circuits to Prepare Generalized Dicke States on a Quantum Machine}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {329--338}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011618000003405}, doi = {10.5220/0011618000003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NarisadaBFK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NeupaneS23, author = {Ashish Neupane and Weiqing Sun}, title = {Exploring False Demand Attacks in Power Grids with High {PV} Penetration}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {124--134}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011695800003405}, doi = {10.5220/0011695800003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NeupaneS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NichoS23, author = {Mathew Nicho and Ibrahim Sabry}, title = {Bypassing Multiple Security Layers Using Malicious {USB} Human Interface Device}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {501--508}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011677100003405}, doi = {10.5220/0011677100003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NichoS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OhiraDAF23, author = {Shuji Ohira and Araya Kibrom Desta and Ismail Arai and Kazutoshi Fujikawa}, title = {{IVNPROTECT:} Isolable and Traceable Lightweight CAN-Bus Kernel-Level Protection for Securing in-Vehicle Communication}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {17--28}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011605300003405}, doi = {10.5220/0011605300003405}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/OhiraDAF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OkadaF23, author = {Hiroki Okada and Kazuhide Fukushima}, title = {Revisiting the {DFT} Test in the {NIST} {SP} 800-22 Randomness Test Suite}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {366--372}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011626300003405}, doi = {10.5220/0011626300003405}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/OkadaF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Pavlov0E23, author = {Vitomir Pavlov and Florian Hahn and Mohammad El{-}Hajj}, title = {Security Aspects of Digital Twins in IoT}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {560--567}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011714500003405}, doi = {10.5220/0011714500003405}, timestamp = {Wed, 13 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Pavlov0E23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RabasBL23, author = {Tom{\'{a}}s Rabas and Jir{\'{\i}} Bucek and R{\'{o}}bert L{\'{o}}rencz}, title = {{SPA} Attack on {NTRU} Protected Implementation with Sparse Representation of Private Key}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {135--143}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011729200003405}, doi = {10.5220/0011729200003405}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/RabasBL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RaschkeHS23, author = {Philip Raschke and Patrick Herbke and Henry Schwerdtner}, title = {t.ex-Graph: Automated Web Tracker Detection Using Centrality Metrics and Data Flow Characteristics}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {199--209}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011787300003405}, doi = {10.5220/0011787300003405}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RaschkeHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RetiES23, author = {Daniel Reti and Karina Elzer and Hans Dieter Schotten}, title = {{SCANTRAP:} Protecting Content Management Systems from Vulnerability Scanners with Cyber Deception and Obfuscation}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {485--492}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011667400003405}, doi = {10.5220/0011667400003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RetiES23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RieraAPR23, author = {Francisco Blas {Izquierdo Riera} and Magnus Almgren and Pablo Picazo{-}Sanchez and Christian Rohner}, title = {Clipaha: {A} Scheme to Perform Password Stretching on the Client}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {58--69}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011653200003405}, doi = {10.5220/0011653200003405}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RieraAPR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RochaAP23, author = {Alexandra Rocha and Rui Alves and Tiago Pedrosa}, title = {Query Log Analysis for {SQL} Injection Detection}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {471--476}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011667200003405}, doi = {10.5220/0011667200003405}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RochaAP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RocklWM23, author = {Jonas R{\"{o}}ckl and Adam Wagenh{\"{a}}user and Tilo M{\"{u}}ller}, title = {Veto: Prohibit Outdated Edge System Software from Booting}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {46--57}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011627700003405}, doi = {10.5220/0011627700003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RocklWM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RuelleGR23, author = {Fr{\'{e}}d{\'{e}}ric Ruell{\'{e}} and Quentin Guella{\"{e}}n and Arnaud Rosay}, title = {{SHOID:} {A} Secure Herd of IoT Devices Firmware Update Protocol}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {373--380}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011628000003405}, doi = {10.5220/0011628000003405}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RuelleGR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SamirJ23, author = {Areeg Samir and H{\aa}vard Dagenborg Johansen}, title = {A Self-Configuration Controller To Detect, Identify, and Recover Misconfiguration at IoT Edge Devices and Containerized Cluster System}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {765--773}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011893700003405}, doi = {10.5220/0011893700003405}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SamirJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SeidPB23, author = {Elias Seid and Oliver Popov and Fredrik Blix}, title = {Towards Security Attack Event Monitoring for Cyber Physical-Systems}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {722--732}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011803400003405}, doi = {10.5220/0011803400003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SeidPB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SeitzTGH23, author = {Ludwig Seitz and Marco Tiloca and Martin Gunnarsson and Rikard H{\"{o}}glund}, title = {Secure Software Updates for IoT Based on Industry Requirements}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {698--705}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011790100003405}, doi = {10.5220/0011790100003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SeitzTGH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Stremlau23, author = {Thorsten P. Stremlau}, title = {Protecting IoT Ecosystems and {AI} Leveraging {TCG} Standards}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {11}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Stremlau23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SugaiSTO23, author = {Risa Sugai and Yuichi Sei and Yasuyuki Tahara and Akihiko Ohsuga}, title = {A k-Anonymization Method for Social Network Data with Link Prediction}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {493--500}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011676800003405}, doi = {10.5220/0011676800003405}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SugaiSTO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TangOB23, author = {Feiyang Tang and Bjarte M. {\O}stvold and Magiel Bruntink}, title = {Identifying Personal Data Processing for Code Review}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {568--575}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011725700003405}, doi = {10.5220/0011725700003405}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TangOB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TavolatoLE23, author = {Paul Tavolato and Robert Luh and Sebastian Eresheim}, title = {A Game Theoretic Analysis of Cyber Threats}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {706--713}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011792700003405}, doi = {10.5220/0011792700003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TavolatoLE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Teseleanu23, author = {George Teseleanu}, title = {Security Analysis of a Color Image Encryption Scheme Based on Dynamic Substitution and Diffusion Operations}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {410--417}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011646300003405}, doi = {10.5220/0011646300003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Teseleanu23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TokasES23, author = {Shukun Tokas and Gencer Erdogan and Ketil St{\o}len}, title = {Privacy-Aware IoT: State-of-the-Art and Challenges}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {450--461}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011656400003405}, doi = {10.5220/0011656400003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TokasES23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TranNE23, author = {Thanh Tran and Phu Nguyen and Gencer Erdogan}, title = {A Systematic Review of Secure IoT Data Sharing}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {95--105}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011674200003405}, doi = {10.5220/0011674200003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TranNE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Volkamer23, author = {Melanie Volkamer}, title = {Usable Security: Security 'Warnings' 2.0}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {5}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Volkamer23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WalkowP23, author = {Marcus Walkow and Daniela P{\"{o}}hn}, title = {Systematically Searching for Identity-Related Information in the Internet with {OSINT} Tools}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {402--409}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011644200003405}, doi = {10.5220/0011644200003405}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WalkowP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WangAH23, author = {Yichao Wang and Budi Arief and Julio C. Hernandez{-}Castro}, title = {Dark Ending: What Happens when a Dark Web Market Closes down}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {106--117}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011681600003405}, doi = {10.5220/0011681600003405}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WangAH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WatanabeMKU23, author = {Ryu Watanabe and Takashi Matsunaka and Ayumu Kubota and Jumpei Urakawa}, title = {Machine Learning Based Prediction of Vulnerability Information Subject to a Security Alert}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {313--320}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011613700003405}, doi = {10.5220/0011613700003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WatanabeMKU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WolfLT23, author = {Zechariah Wolf and Eric Larson and Mitchell A. Thornton}, title = {Data Leakage in Isolated Virtualized Enterprise Computing Systems}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {118--123}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011691900003405}, doi = {10.5220/0011691900003405}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WolfLT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ZhangWHWZS23, author = {Hanwen Zhang and Wenyong Wang and Lisheng Huang and Junrui Wu and Fengjun Zhang and Kai Shi}, title = {Correlating Intrusion Detection with Attack Graph on Virtual Computer Networkings}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {651--658}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011784100003405}, doi = {10.5220/0011784100003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ZhangWHWZS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Zhong023, author = {Yinzheng Zhong and Alexei Lisitsa}, title = {Online Transition-Based Feature Generation for Anomaly Detection in Concurrent Data Streams}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {576--582}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011726700003405}, doi = {10.5220/0011726700003405}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Zhong023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ZolotavkinBLMK23, author = {Yevhen Zolotavkin and Yurii Baryshev and Vitalii Lukichov and Jannik M{\"{a}}hn and Stefan K{\"{o}}psell}, title = {Improving Unlinkability in {C-ITS:} {A} Methodology For Optimal Obfuscation}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {677--685}, year = {2023}, crossref = {DBLP:conf/icissp/2023}, url = {https://doi.org/10.5220/0011786900003405}, doi = {10.5220/0011786900003405}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ZolotavkinBLMK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2022s, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Information Systems Security and Privacy - 7th International Conference, {ICISSP} 2021, Virtual Event, February 11-13, 2021, and 8th International Conference, {ICISSP} 2022, Virtual Event, February 9-11, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1851}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-37807-2}, doi = {10.1007/978-3-031-37807-2}, isbn = {978-3-031-37806-5}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2022s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2023, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0000168400003405}, doi = {10.5220/0000168400003405}, isbn = {978-989-758-624-8}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AarlandG22, author = {Mari Aarland and Terje Gj{\o}s{\ae}ter}, title = {Digital Supply Chain Vulnerabilities in Critical Infrastructure: {A} Systematic Literature Review on Cybersecurity in the Energy Sector}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {326--333}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010803800003120}, doi = {10.5220/0010803800003120}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AarlandG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Al-JuaidLS22, author = {Nouf Al{-}Juaid and Alexei Lisitsa and Sven Schewe}, title = {{SMPG:} Secure Multi Party Computation on Graph Databases}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {463--471}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010876200003120}, doi = {10.5220/0010876200003120}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Al-JuaidLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlShuhailS22, author = {Asma AlShuhail and Jianhue Shao}, title = {Semantic Attack on Disassociated Transactions}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {60--72}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010780500003120}, doi = {10.5220/0010780500003120}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlShuhailS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlasmariW022, author = {Sultan Alasmari and Weichao Wang and Yu Wang}, title = {Incentivisation of Outsourced Network Testing: View from Platform Perspective}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {499--506}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010897300003120}, doi = {10.5220/0010897300003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/AlasmariW022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlbalawiVC22, author = {Abdullah Albalawi and Vassilios G. Vassilakis and Radu Calinescu}, title = {Protecting Shared Virtualized Environments against Cache Side-channel Attacks}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {507--514}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010897800003120}, doi = {10.5220/0010897800003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/AlbalawiVC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AliHJLST22, author = {Muhammad Ali and Monem Hamid and Jacob Jasser and Joachim Lerman and Samod Shetty and Fabio Di Troia}, title = {Profile Hidden Markov Model Malware Detection and {API} Call Obfuscation}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {688--695}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0011005800003120}, doi = {10.5220/0011005800003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/AliHJLST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlmarwaniK022, author = {Maryam Almarwani and Boris Konev and Alexei Lisitsa}, title = {Zero Update Encryption Adjustment on Encrypted Database Queries}, booktitle = {Information Systems Security and Privacy - 7th International Conference, {ICISSP} 2021, Virtual Event, February 11-13, 2021, and 8th International Conference, {ICISSP} 2022, Virtual Event, February 9-11, 2022, Revised Selected Papers}, pages = {25--47}, year = {2022}, crossref = {DBLP:conf/icissp/2022s}, url = {https://doi.org/10.1007/978-3-031-37807-2\_2}, doi = {10.1007/978-3-031-37807-2\_2}, timestamp = {Wed, 06 Sep 2023 16:33:07 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlmarwaniK022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlmarwaniKL22, author = {Maryam Almarwani and Boris Konev and Alexei Lisitsa}, title = {Efficient and Secure Encryption Adjustment for {JSON} Data}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {307--313}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010791300003120}, doi = {10.5220/0010791300003120}, timestamp = {Fri, 03 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlmarwaniKL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AnagrehLV22, author = {Mohammad Anagreh and Peeter Laud and Eero Vainikko}, title = {Privacy-preserving Parallel Computation of Shortest Path Algorithms with Low Round Complexity}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {37--47}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010775700003120}, doi = {10.5220/0010775700003120}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AnagrehLV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BaksiU22, author = {Rudra Prasad Baksi and Shambhu J. Upadhyaya}, title = {Game Theoretic Analysis of Ransomware: {A} Preliminary Study}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {242--251}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0011006600003120}, doi = {10.5220/0011006600003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BaksiU22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BaksiU22a, author = {Rudra Prasad Baksi and Shambhu J. Upadhyaya}, title = {A Game Theoretic Approach to the Design of Mitigation Strategies for Generic Ransomware}, booktitle = {Information Systems Security and Privacy - 7th International Conference, {ICISSP} 2021, Virtual Event, February 11-13, 2021, and 8th International Conference, {ICISSP} 2022, Virtual Event, February 9-11, 2022, Revised Selected Papers}, pages = {104--124}, year = {2022}, crossref = {DBLP:conf/icissp/2022s}, url = {https://doi.org/10.1007/978-3-031-37807-2\_6}, doi = {10.1007/978-3-031-37807-2\_6}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BaksiU22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BarberF22, author = {Flora Barber and Steven Furnell}, title = {Benchmarking Consumer Data and Privacy Knowledge in Connected and Autonomous Vehicles}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {426--434}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010862000003120}, doi = {10.5220/0010862000003120}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BarberF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BarberF22a, author = {Flora Barber and Steven Furnell}, title = {Evaluating Consumer Understanding and Awareness of Connected and Autonomous Vehicle Data Privacy}, booktitle = {Information Systems Security and Privacy - 7th International Conference, {ICISSP} 2021, Virtual Event, February 11-13, 2021, and 8th International Conference, {ICISSP} 2022, Virtual Event, February 9-11, 2022, Revised Selected Papers}, pages = {48--71}, year = {2022}, crossref = {DBLP:conf/icissp/2022s}, url = {https://doi.org/10.1007/978-3-031-37807-2\_3}, doi = {10.1007/978-3-031-37807-2\_3}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BarberF22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BartonBPSA22, author = {Jon Barton and William J. Buchanan and Nikolaos Pitropakis and Sarwar Sayeed and Will Abramson}, title = {Post Quantum Cryptography Analysis of {TLS} Tunneling on a Constrained Device}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {551--561}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010903000003120}, doi = {10.5220/0010903000003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BartonBPSA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BorcherdingFKMB22, author = {Anne Borcherding and Lukas Feldmann and Markus Karch and Ankush Meshram and J{\"{u}}rgen Beyerer}, title = {Towards a Better Understanding of Machine Learning based Network Intrusion Detection Systems in Industrial Networks}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {314--325}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010795900003120}, doi = {10.5220/0010795900003120}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BorcherdingFKMB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BorcherdingTB22, author = {Anne Borcherding and Philipp Takacs and J{\"{u}}rgen Beyerer}, title = {Cluster Crash: Learning from Recent Vulnerabilities in Communication Stacks}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {334--344}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010806300003120}, doi = {10.5220/0010806300003120}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BorcherdingTB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BracamonteI22, author = {Vanessa Bracamonte and Takamasa Isohara}, title = {Comparing Perception of Disclosure of Different Types of Information Related to Automated Tools}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {544--550}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010901200003120}, doi = {10.5220/0010901200003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BracamonteI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CanU22, author = {{\"{O}}zg{\"{u}} Can and Murat Osman {\"{U}}nalir}, title = {Revisiting Ontology Based Access Control: The Case for Ontology Based Data Access}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {515--518}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010898100003120}, doi = {10.5220/0010898100003120}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/CanU22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CanU22a, author = {{\"{O}}zg{\"{u}} Can and Murat Osman {\"{U}}nalir}, title = {Improving Data Security and Privacy for Ontology Based Data Access}, booktitle = {Information Systems Security and Privacy - 7th International Conference, {ICISSP} 2021, Virtual Event, February 11-13, 2021, and 8th International Conference, {ICISSP} 2022, Virtual Event, February 9-11, 2022, Revised Selected Papers}, pages = {72--90}, year = {2022}, crossref = {DBLP:conf/icissp/2022s}, url = {https://doi.org/10.1007/978-3-031-37807-2\_4}, doi = {10.1007/978-3-031-37807-2\_4}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CanU22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CarrierVTL22, author = {Tristan Carrier and Princy Victor and Ali Tekeoglu and Arash Habibi Lashkari}, title = {Detecting Obfuscated Malware using Memory Feature Engineering}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {177--188}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010908200003120}, doi = {10.5220/0010908200003120}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CarrierVTL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CatuognoG22, author = {Luigi Catuogno and Clemente Galdi}, title = {On Tracking Ransomware on the File System}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {210--219}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010985000003120}, doi = {10.5220/0010985000003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/CatuognoG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ChenLTH22, author = {Shang{-}Wen Chen and Jian{-}Wei Liao and Chia{-}Wei Tien and Jung{-}Hsin Hsiao}, title = {Impact of Cross-standard Cell Libraries on Machine Learning based Hardware Trojan Detection}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {420--425}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010858800003120}, doi = {10.5220/0010858800003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/ChenLTH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ChoudhuryLN22, author = {Robert Choudhury and Zhiyuan Luo and Khuong An Nguyen}, title = {Malware in Motion}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {595--602}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010976200003120}, doi = {10.5220/0010976200003120}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ChoudhuryLN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CilliMMV22, author = {Claudio Cilli and Giulio Magnanini and Lorenzo Manduca and Fabrizio Venettoni}, title = {"Fake News Detector": An Automatic System for the Reliability Evaluation of Digital News}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {15--24}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010769700003120}, doi = {10.5220/0010769700003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/CilliMMV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CivekT22, author = {Asl{\'{\i}} Basak Civek and Cihangir Tezcan}, title = {Differential-linear Attacks on Permutation Ciphers Revisited: Experiments on Ascon and DryGASCON}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {202--209}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010982600003120}, doi = {10.5220/0010982600003120}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CivekT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CivekT22a, author = {Asl{\'{\i}} Basak Civek and Cihangir Tezcan}, title = {Experimentally Obtained Differential-Linear Distinguishers for Permutations of {ASCON} and DryGASCON}, booktitle = {Information Systems Security and Privacy - 7th International Conference, {ICISSP} 2021, Virtual Event, February 11-13, 2021, and 8th International Conference, {ICISSP} 2022, Virtual Event, February 9-11, 2022, Revised Selected Papers}, pages = {91--103}, year = {2022}, crossref = {DBLP:conf/icissp/2022s}, url = {https://doi.org/10.1007/978-3-031-37807-2\_5}, doi = {10.1007/978-3-031-37807-2\_5}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CivekT22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DaoudaghM22, author = {Said Daoudagh and Eda Marchetti}, title = {The {GDPR} Compliance and Access Control Systems: Challenges and Research Opportunities}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {571--578}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010912300003120}, doi = {10.5220/0010912300003120}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DaoudaghM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DavidianVK22, author = {Matan Davidian and Natalia Vanetik and Michael Kiperberg}, title = {Ransomware Detection with Deep Neural Networks}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {656--663}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0011008000003120}, doi = {10.5220/0011008000003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/DavidianVK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DaviesS22, author = {Jack R. Davies and Jianhua Shao}, title = {Utility of Anonymised Data in Decision Tree Derivation}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {273--280}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010778300003120}, doi = {10.5220/0010778300003120}, timestamp = {Fri, 14 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DaviesS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DemetriouBH22, author = {Phil Demetriou and Ingolf Becker and Stephen Hailes}, title = {Who Watches the Watchers: {A} Multi-Task Benchmark for Anomaly Detection}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {579--586}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010915000003120}, doi = {10.5220/0010915000003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/DemetriouBH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Ebad22, author = {Shouki A. Ebad}, title = {An Exploratory Study of Why UMLsec Is Not Adopted}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {357--364}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010821400003120}, doi = {10.5220/0010821400003120}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Ebad22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ElmiligiS22, author = {Haytham Elmiligi and Sherif Saad}, title = {iProfile: Collecting and Analyzing Keystroke Dynamics from Android Users}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {621--628}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0011002600003120}, doi = {10.5220/0011002600003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/ElmiligiS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FahlanderE0D22, author = {Per Fahlander and Mathias Ekstedt and Preetam Mukherjee and Ashish Kumar Dwivedi}, title = {Containment Strategy Formalism in a Probabilistic Threat Modelling Framework}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {108--120}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010823800003120}, doi = {10.5220/0010823800003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/FahlanderE0D22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GaficTKHQ22, author = {Melisa Gafic and Simon Tjoa and Peter Kieseberg and Otto Hellwig and Gerald Quirchmayr}, title = {Cyber Exercises in Computer Science Education}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {404--411}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010845800003120}, doi = {10.5220/0010845800003120}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GaficTKHQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HallJLS22, author = {Joanne L. Hall and Jomin John and Jessica Liebig and Anju Skariah}, title = {Age Bias in Finger Vein Biometric Research}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {472--477}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010876700003120}, doi = {10.5220/0010876700003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HallJLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HeidTHS22, author = {Kris Heid and Tobias Tefke and Jens Heider and Ralf C. Staudemeyer}, title = {Android Data Storage Locations and What App Developers Do with It from a Security and Privacy Perspective}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {378--387}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010838200003120}, doi = {10.5220/0010838200003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HeidTHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HekkalaHV22, author = {Julius Hekkala and Kimmo Halunen and Visa Antero Vallivaara}, title = {Implementing Post-quantum Cryptography for Developers}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {73--83}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010786200003120}, doi = {10.5220/0010786200003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HekkalaHV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/IssakhaniVTL22, author = {Maryam Issakhani and Princy Victor and Ali Tekeoglu and Arash Habibi Lashkari}, title = {{PDF} Malware Detection based on Stacking Learning}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {562--570}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010908400003120}, doi = {10.5220/0010908400003120}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/IssakhaniVTL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KanamoriSTN22, author = {Sachiko Kanamori and Hirotsune Sato and Naoya Tabata and Ryo Nojima}, title = {Construction of a Support Tool for User Reading of Privacy Policies and Assessment of its User Impact}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {412--419}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010847500003120}, doi = {10.5220/0010847500003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KanamoriSTN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KarimniaMS22, author = {Rooya Karimnia and Kaie Maennel and Mahtab Shahin}, title = {Culturally-sensitive Cybersecurity Awareness Program Design for Iranian High-school Students}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {121--132}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010824800003120}, doi = {10.5220/0010824800003120}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KarimniaMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KiechleBNB022, author = {Valentin Kiechle and Matthias B{\"{o}}rsig and Sven Nitzsche and Ingmar Baumgart and J{\"{u}}rgen Becker}, title = {{PREUNN:} Protocol Reverse Engineering using Neural Networks}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {345--356}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010813500003120}, doi = {10.5220/0010813500003120}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KiechleBNB022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KumazakiHYST22, author = {Masahito Kumazaki and Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada and Hiroki Takakura}, title = {Cyber Attack Stage Tracing System based on Attack Scenario Comparison}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {587--594}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010918200003120}, doi = {10.5220/0010918200003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KumazakiHYST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KunduPV22, author = {Rohon Kundu and Alessandro De Piccoli and Andrea Visconti}, title = {Public Key Compression and Fast Polynomial Multiplication for {NTRU} using the Corrected Hybridized NTT-Karatsuba Method}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {145--153}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010881300003120}, doi = {10.5220/0010881300003120}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KunduPV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LangnerSFQ22, author = {Gregor Langner and Florian Skopik and Steven Furnell and Gerald Quirchmayr}, title = {A Tailored Model for Cyber Security Education Utilizing a Cyber Range}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {365--377}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010834000003120}, doi = {10.5220/0010834000003120}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LangnerSFQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LeePPPT22, author = {Hoseong Asher Lee and Nikhil Prathapani and Rajesh Paturi and Sarp Parmaksiz and Fabio Di Troia}, title = {NLP-based User Authentication through Mouse Dynamics}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {696--702}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0011005900003120}, doi = {10.5220/0011005900003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/LeePPPT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LeeSAS0SLT22, author = {Matthew Lee and Joshua Sylvester and Sunjoli Aggarwal and Aviraj Sinha and Michael A. Taylor and Nathan Srirama and Eric C. Larson and Mitchell A. Thornton}, title = {Side Channel Identification using Granger Time Series Clustering with Applications to Control Systems}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {290--298}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010781600003120}, doi = {10.5220/0010781600003120}, timestamp = {Thu, 16 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/LeeSAS0SLT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LingE22, author = {Engla Rencelj Ling and Mathias Ekstedt}, title = {Estimating the Time-To-Compromise of Exploiting Industrial Control System Vulnerabilities}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {96--107}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010817400003120}, doi = {10.5220/0010817400003120}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LingE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LorunserWK22, author = {Thomas Lor{\"{u}}nser and Florian Wohner and Stephan Krenn}, title = {A Privacy-Preserving Auction Platform with Public Verifiability for Smart Manufacturing}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {637--647}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0011006700003120}, doi = {10.5220/0011006700003120}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LorunserWK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MadiSSG22, author = {Abbass Madi and Oana Stan and Renaud Sirdey and C{\'{e}}dric Gouy{-}Pailler}, title = {SecTL: Secure and Verifiable Transfer Learning-based inference}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {220--229}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010987700003120}, doi = {10.5220/0010987700003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/MadiSSG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MaurelVR22, author = {H{\'{e}}lo{\"{\i}}se Maurel and Santiago A. Vidal and Tamara Rezk}, title = {Comparing the Detection of {XSS} Vulnerabilities in Node.js and a Multi-tier JavaScript-based Language via Deep Learning}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {189--201}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010980800003120}, doi = {10.5220/0010980800003120}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MaurelVR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MercaldoMS022, author = {Francesco Mercaldo and Fabio Martinelli and Antonella Santone and Vinod P.}, title = {On the Influence of Image Settings in Deep Learning-based Malware Detection}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {669--676}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010890600003120}, doi = {10.5220/0010890600003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/MercaldoMS022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MohammadianL022, author = {Hesamodin Mohammadian and Arash Habibi Lashkari and Ali A. Ghorbani}, title = {Evaluating Deep Learning-based {NIDS} in Adversarial Settings}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {435--444}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010867900003120}, doi = {10.5220/0010867900003120}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MohammadianL022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NabeelG22, author = {Mohamad Nabeel and Christine Gro{\ss}e}, title = {Classifying {COVID-19} Disinformation on Twitter using a Convolutional Neural Network}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {264--272}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010774800003120}, doi = {10.5220/0010774800003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/NabeelG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NaserediniGSBSC22, author = {Amir Naseredini and Stefan Gast and Martin Schwarzl and Pedro Miguel Sousa Bernardo and Amel Smajic and Claudio Canella and Martin Berger and Daniel Gruss}, title = {Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {48--59}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010779300003120}, doi = {10.5220/0010779300003120}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NaserediniGSBSC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OttMG22, author = {David Ott and Dennis Moreau and Manish Gaur}, title = {Planning for Cryptographic Readiness in an Era of Quantum Computing Advancement}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {491--498}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010886000003120}, doi = {10.5220/0010886000003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/OttMG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PattiyanonA22, author = {Charnon Pattiyanon and Toshiaki Aoki}, title = {Analysis and Enhancement of Self-sovereign Identity System Properties Compiling Standards and Regulations}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {133--144}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010877300003120}, doi = {10.5220/0010877300003120}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PattiyanonA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Picazo-SanchezA22, author = {Pablo Picazo{-}Sanchez and Maximilian Algehed and Andrei Sabelfeld}, title = {DeDup.js: Discovering Malicious and Vulnerable Extensions by Detecting Duplication}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {528--535}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010900600003120}, doi = {10.5220/0010900600003120}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Picazo-SanchezA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PonsardM22, author = {Christophe Ponsard and Philippe Massonet}, title = {Survey and Guidelines about Learning Cyber Security Risk Assessment}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {536--543}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010900800003120}, doi = {10.5220/0010900800003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/PonsardM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RahmanMHA22, author = {Md. Rashedur Rahman and Elizabeth Miller and Moinul Hossain and Aisha I. Ali{-}Gombe}, title = {Intent-aware Permission Architecture: {A} Model for Rethinking Informed Consent for Android Apps}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {154--164}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010882900003120}, doi = {10.5220/0010882900003120}, timestamp = {Wed, 30 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RahmanMHA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Rashid22, author = {Awais Rashid}, title = {Why Rigorous Underpinnings for Cyber Security Education and Training Matter? Experiences from CyBOK: The Cyber Security Body of Knowledge}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {5}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Rashid22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RosayCCL22, author = {Arnaud Rosay and Elo{\"{\i}}se Cheval and Florent Carlier and Pascal Leroux}, title = {Network Intrusion Detection: {A} Comprehensive Analysis of {CIC-IDS2017}}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {25--36}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010774000003120}, doi = {10.5220/0010774000003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/RosayCCL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RuckaW22, author = {Agnieszka Rucka and Wojciech Wodo}, title = {On the {LPSE} Password Meter's Discrepancies among Different Datasets}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {255--263}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010766900003120}, doi = {10.5220/0010766900003120}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RuckaW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Sadeh22, author = {Norman M. Sadeh}, title = {Why Usability Has Become Privacy's Biggest Challenge and What We Can Do About It}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {9}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Sadeh22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Samarati22, author = {Pierangela Samarati}, title = {Data Security and Privacy in Emerging Scenarios}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {7}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Samarati22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SandovalL22, author = {Itzel V{\'{a}}zquez Sandoval and Gabriele Lenzini}, title = {Can We Formally Catch Cheating in E-exams?}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {648--655}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0011007900003120}, doi = {10.5220/0011007900003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/SandovalL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SerretLG22, author = {Elsa Serret and Antoine Lesueur and Alban Gabillon}, title = {Linguistic Steganography for Messaging Applications}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {519--527}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010899300003120}, doi = {10.5220/0010899300003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/SerretLG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SertkayaK22, author = {Isa Sertkaya and {\"{O}}znur Kalkar}, title = {Cryptanalysis of Some Electronic Checkbook Schemes}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {603--612}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010981900003120}, doi = {10.5220/0010981900003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/SertkayaK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SnymanK22, author = {Dirk P. Snyman and Hennie A. Kruger}, title = {The Role of Information Deserts in Information Security Awareness and Behaviour}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {613--620}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010984200003120}, doi = {10.5220/0010984200003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/SnymanK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Soares22, author = {Alberto Magno Muniz Soares}, title = {WhatsApp Web Client Live Forensics Technique}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {629--636}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0011006400003120}, doi = {10.5220/0011006400003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Soares22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TalbiVLFC022, author = {Adam Talbi and Arthur Viens and Louis{-}Cl{\'{e}}ment Leroux and Morgane Fran{\c{c}}ois and Mathias Caillol and Nga Nguyen}, title = {Feature Importance and Deep Learning for Android Malware Detection}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {453--462}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010875500003120}, doi = {10.5220/0010875500003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/TalbiVLFC022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TavolatoLE22, author = {Paul Tavolato and Robert Luh and Sebastian Eresheim}, title = {Formalizing Real-world Threat Scenarios}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {281--289}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010781300003120}, doi = {10.5220/0010781300003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/TavolatoLE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/UljansB22, author = {Austris Uljans and Bernhards Blumbergs}, title = {Industrial and Automation Control System Cyber Range Prototype for Offensive Capability Development}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {478--490}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010879500003120}, doi = {10.5220/0010879500003120}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/UljansB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/VeronesePFL22, author = {Leonardo Veronese and Francesco Palmarini and Riccardo Focardi and Flaminia L. Luccio}, title = {A Fast and Cost-effective Design for FPGA-based Fuzzy Rainbow Tradeoffs}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {165--176}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010904300003120}, doi = {10.5220/0010904300003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/VeronesePFL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WangB22, author = {Tian Wang and Masooda N. Bashir}, title = {An Analysis of Cloud Certifications' Performance on Privacy Protections}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {299--306}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010783200003120}, doi = {10.5220/0010783200003120}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WangB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WareusDTH22, author = {Emil W{\aa}reus and Anton Duppils and Magnus Tullberg and Martin Hell}, title = {Security Issue Classification for Vulnerability Management with Semi-supervised Learning}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {84--95}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010813000003120}, doi = {10.5220/0010813000003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/WareusDTH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WenS22, author = {Shengyuan Wen and Weiqing Sun}, title = {SpamFender: {A} Semi-supervised Incremental Spam Classification System across Social Networks}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {388--395}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010840300003120}, doi = {10.5220/0010840300003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/WenS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WerdenML22, author = {David Werden and Matthew Muccioli and Anyi Liu}, title = {TEEm: {A} Tangle-based Elastic Emulator for Storing Connected Vehicle Data in a Distributed Ledger Technology}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {230--241}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010990100003120}, doi = {10.5220/0010990100003120}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WerdenML22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WuSZYLZGLH22, author = {Yixiong Wu and Shangru Song and Jianwei Zhuge and Tingting Yin and Tianyi Li and Junmin Zhu and Guannan Guo and Yue Liu and Jianju Hu}, title = {ICScope: Detecting and Measuring Vulnerable {ICS} Devices Exposed on the Internet}, booktitle = {Information Systems Security and Privacy - 7th International Conference, {ICISSP} 2021, Virtual Event, February 11-13, 2021, and 8th International Conference, {ICISSP} 2022, Virtual Event, February 9-11, 2022, Revised Selected Papers}, pages = {1--24}, year = {2022}, crossref = {DBLP:conf/icissp/2022s}, url = {https://doi.org/10.1007/978-3-031-37807-2\_1}, doi = {10.1007/978-3-031-37807-2\_1}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WuSZYLZGLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/XiaoNFS22, author = {Junhui Xiao and Ashish Neupane and Hiba F. Fayoumi and Weiqing Sun}, title = {A Novel Key Exchange Protocol using Logic Algebra for the Factorization Problem}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {396--403}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010843300003120}, doi = {10.5220/0010843300003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/XiaoNFS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/YassinR22, author = {Ghadeer I. Yassin and Lakshmish Ramaswamy}, title = {Effective {\&} Efficient Access Control in Smart Farms: Opportunities, Challenges {\&} Potential Approaches}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {445--452}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010873000003120}, doi = {10.5220/0010873000003120}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/YassinR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/YonamineTK22, author = {Shun Yonamine and Yuzo Taenaka and Youki Kadobayashi}, title = {Tamer: {A} Sandbox for Facilitating and Automating IoT Malware Analysis with Techniques to Elicit Malicious Behavior}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {677--687}, year = {2022}, crossref = {DBLP:conf/icissp/2022}, url = {https://doi.org/10.5220/0010968300003120}, doi = {10.5220/0010968300003120}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/YonamineTK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2020s, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Information Systems Security and Privacy - 6th International Conference, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1545}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-94900-6}, doi = {10.1007/978-3-030-94900-6}, isbn = {978-3-030-94899-3}, timestamp = {Mon, 21 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/2020s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2022, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0000157000003120}, doi = {10.5220/0000157000003120}, isbn = {978-989-758-553-1}, timestamp = {Tue, 06 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/0002E0SE21, author = {Clemens Brunner and G{\"{u}}nther Eibl and Peter Fr{\"{o}}hlich and Andreas Sackl and Dominik Engel}, title = {Who Stores the Private Key? An Exploratory Study about User Preferences of Key Management for Blockchain-based Applications}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {23--32}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010173200230032}, doi = {10.5220/0010173200230032}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/0002E0SE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/0018O021, author = {Yan Yan and Elisabeth Oswald and Srinivas Vivek}, title = {An Analytic Attack against {ARX} Addition Exploiting Standard Side-channel Leakage}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {89--97}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010223600890097}, doi = {10.5220/0010223600890097}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/0018O021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/0046CKLG21, author = {Lu Zhang and Reginald Cushing and Ralph Koning and Cees de Laat and Paola Grosso}, title = {Profiling and Discriminating of Containerized {ML} Applications in Digital Data Marketplaces {(DDM)}}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {508--515}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010254105080515}, doi = {10.5220/0010254105080515}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/0046CKLG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AkandeT21, author = {Alexander O. Akande and Vu N. Tran}, title = {Predicting Security Program Effectiveness in Bring-Your-Own-Device Deployment in Organizations}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {55--65}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010195800550065}, doi = {10.5220/0010195800550065}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AkandeT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Al-MaweeCM21, author = {Wassnaa Al{-}Mawee and Steve Carr and Jean Mayo}, title = {Admonita: {A} Recommendation-based Trust Model for Dynamic Data Integrity}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {273--282}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010150402730282}, doi = {10.5220/0010150402730282}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Al-MaweeCM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlmarwaniKL21, author = {Maryam Almarwani and Boris Konev and Alexei Lisitsa}, title = {Release-aware In-out Encryption Adjustment in MongoDB Query Processing}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {714--722}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010395007140722}, doi = {10.5220/0010395007140722}, timestamp = {Fri, 03 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlmarwaniKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlturkiKKNST21, author = {Musab A. Alturki and Tajana Ban Kirigin and Max I. Kanovich and Vivek Nigam and Andre Scedrov and Carolyn L. Talcott}, title = {On Security Analysis of Periodic Systems: Expressiveness and Complexity}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {43--54}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010195100430054}, doi = {10.5220/0010195100430054}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/AlturkiKKNST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AmitYKZ21, author = {Guy Amit and Amir Yeshooroon and Michael Kiperberg and Nezer J. Zaidenberg}, title = {DLP-Visor: {A} Hypervisor-based Data Leakage Prevention System}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {416--423}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010221104160423}, doi = {10.5220/0010221104160423}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/AmitYKZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AnagrehVL21, author = {Mohammad Anagreh and Eero Vainikko and Peeter Laud}, title = {Parallel Privacy-preserving Computation of Minimum Spanning Trees}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {181--190}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010255701810190}, doi = {10.5220/0010255701810190}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/AnagrehVL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AyotteBHS21, author = {Blaine Ayotte and Mahesh K. Banavar and Daqing Hou and Stephanie Schuckers}, title = {Study of Intra- and Inter-user Variance in Password Keystroke Dynamics}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {467--474}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010235504670474}, doi = {10.5220/0010235504670474}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/AyotteBHS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BasuKB21, author = {Srijita Basu and Sandip Karmakar and Debasish Bera}, title = {Blockchain based Secured Virtual Machine Image Monitor}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {432--439}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010228804320439}, doi = {10.5220/0010228804320439}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BasuKB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BhattacharjyaS21, author = {Sairath Bhattacharjya and Hossein Saiedian}, title = {A Novel Simplified Framework to Secure IoT Communications}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {399--406}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010210003990406}, doi = {10.5220/0010210003990406}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BhattacharjyaS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BohmVP21, author = {Fabian B{\"{o}}hm and Manfred Vielberth and G{\"{u}}nther Pernul}, title = {Bridging Knowledge Gaps in Security Analytics}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {98--108}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010225400980108}, doi = {10.5220/0010225400980108}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BohmVP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BoudguigaSFLC21, author = {Aymen Boudguiga and Oana Stan and Abdessamad Fazzat and Houda Labiod and Pierre{-}Emmanuel Clet}, title = {Privacy Preserving Services for Intelligent Transportation Systems with Homomorphic Encryption}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {684--693}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010349706840693}, doi = {10.5220/0010349706840693}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BoudguigaSFLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BracamonteTK21, author = {Vanessa Bracamonte and Welderufael B. Tesfay and Shinsaku Kiyomoto}, title = {Towards Exploring User Perception of a Privacy Sensitive Information Detection Tool}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {628--634}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010319706280634}, doi = {10.5220/0010319706280634}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BracamonteTK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BryantS21, author = {Blake D. Bryant and Hossein Saiedian}, title = {A State Saturation Attack against Massively Multiplayer Online Videogames}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {217--225}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010302002170225}, doi = {10.5220/0010302002170225}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BryantS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CadalzoTOMW21, author = {Lucas Cadalzo and Christopher H. Todd and Banjo Obayomi and W. Brad Moore and Anthony C. Wong}, title = {Canopy: {A} Learning-based Approach for Automatic Low-and-Slow DDoS Mitigation}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {356--367}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010192303560367}, doi = {10.5220/0010192303560367}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/CadalzoTOMW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CasolareMMS21, author = {Rosangela Casolare and Fabio Martinelli and Francesco Mercaldo and Antonella Santone}, title = {Colluding Covert Channel for Malicious Information Exfiltration in Android Environment}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {811--818}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010396708110818}, doi = {10.5220/0010396708110818}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/CasolareMMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ChabanneDG21, author = {Herv{\'{e}} Chabanne and Vincent Despiegel and Linda Guiga}, title = {A Protection against the Extraction of Neural Network Models}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {258--269}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010373302580269}, doi = {10.5220/0010373302580269}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/ChabanneDG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CholterES21, author = {William La Cholter and Matthew Elder and Antonius Stalick}, title = {Windows Malware Binaries in {C/C++} GitHub Repositories: Prevalence and Lessons Learned}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {475--484}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010237904750484}, doi = {10.5220/0010237904750484}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/CholterES21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DahdahLKLDG21, author = {Christian Dahdah and Coline Van Leeuwen and Ziad Kheil and J{\'{e}}r{\^{o}}me Lacan and Jonathan Detchart and Thibault Gateau}, title = {Enabling Monetization of Depreciating Data on Blockchains}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {500--507}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010252105000507}, doi = {10.5220/0010252105000507}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/DahdahLKLDG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DamT21, author = {Khanh{-}Huu{-}The Dam and Tayssir Touili}, title = {{MADLIRA:} {A} Tool for Android Malware Detection}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {670--675}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010339506700675}, doi = {10.5220/0010339506700675}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/DamT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DangTS21, author = {Dennis Dang and Fabio Di Troia and Mark Stamp}, title = {Malware Classification using Long Short-term Memory Models}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {743--752}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010378007430752}, doi = {10.5220/0010378007430752}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/DangTS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DaoudaghMSBA21, author = {Said Daoudagh and Eda Marchetti and Vincenzo Savarino and Roberto Di Bernardo and Marco Alessi}, title = {How to Improve the {GDPR} Compliance through Consent Management and Access Control}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {534--541}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010260205340541}, doi = {10.5220/0010260205340541}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DaoudaghMSBA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DavilaLT21, author = {Carlos Ocanto D{\'{a}}vila and Roc{\'{\i}}o Cabrera Lozoya and Slim Trabelsi}, title = {Sociocultural Influences for Password Definition: An AI-based Study}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {542--549}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010269305420549}, doi = {10.5220/0010269305420549}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/DavilaLT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ErdoganRZZBAOPK21, author = {Gencer Erdogan and Antonio {\'{A}}lvarez Romero and Niccol{\`{o}} Zazzeri and Anze Zitnik and Mariano Basile and Giorgio Aprile and Mafalda Os{\'{o}}rio and Claudia Pani and Ioannis Kechaoglou}, title = {Developing Cyber-risk Centric Courses and Training Material for Cyber Ranges: {A} Systematic Approach}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {702--713}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010393107020713}, doi = {10.5220/0010393107020713}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ErdoganRZZBAOPK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Filiol21, author = {Eric Filiol}, title = {Unconventional Attack against Voting Machines Enlarging the Scope of Cybersecurity Risk Analysis}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {763--770}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010417607630770}, doi = {10.5220/0010417607630770}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Filiol21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FloodCC021, author = {Robert Flood and Sheung Shi Chan and Wei Chen and David Aspinall}, title = {Checking Contact Tracing App Implementations}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {133--144}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010237201330144}, doi = {10.5220/0010237201330144}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FloodCC021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Garg21, author = {Vaibhav Garg}, title = {A Lemon by Any Other Label}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {558--565}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010295205580565}, doi = {10.5220/0010295205580565}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Garg21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Grosse21, author = {Christine Gro{\ss}e}, title = {Enhanced Information Management in Inter-organisational Planning for Critical Infrastructure Protection: Case and Framework}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {319--330}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010186803190330}, doi = {10.5220/0010186803190330}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Grosse21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GuilleyRQ21, author = {Sylvain Guilley and Michel Le Rolland and Damien Quenson}, title = {Implementing Secure Applications Thanks to an Integrated Secure Element}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {566--571}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010298205660571}, doi = {10.5220/0010298205660571}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/GuilleyRQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HaarB21, author = {Christoph Haar and Erik Buchmann}, title = {Securing Orchestrated Containers with {BSI} Module {SYS.1.6}}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {676--683}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010340406760683}, doi = {10.5220/0010340406760683}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HaarB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HaglMP21, author = {Jakob Hagl and Oliver Mann and Martin Pirker}, title = {Securing the Linux Boot Process: From Start to Finish}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {604--610}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010313906040610}, doi = {10.5220/0010313906040610}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HaglMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HasegawaT21, author = {Hirokazu Hasegawa and Hiroki Takakura}, title = {A Dynamic Access Control System based on Situations of Users}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {653--660}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010327406530660}, doi = {10.5220/0010327406530660}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HasegawaT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HazhirpasandEN21, author = {Mohammadreza Hazhirpasand and Arash Ale Ebrahim and Oscar Nierstrasz}, title = {Stopping {DNS} Rebinding Attacks in the Browser}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {596--603}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010310705960603}, doi = {10.5220/0010310705960603}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HazhirpasandEN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HnainiRCT21, author = {Hiba Hnaini and Luka Le Roux and Jo{\"{e}}l Champeau and Ciprian Teodorov}, title = {Security Property Modeling}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {694--701}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010388206940701}, doi = {10.5220/0010388206940701}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HnainiRCT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HuangTSS21, author = {Elliu Huang and Fabio Di Troia and Mark Stamp and Preethi Sundaravaradhan}, title = {A New Dataset for Smartphone Gesture-based Authentication}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {771--780}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010425807710780}, doi = {10.5220/0010425807710780}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HuangTSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HutschenreuterC21, author = {Helmar Hutschenreuter and Salva Daneshgadeh {\c{C}}akmak{\c{c}}i and Christian Maeder and Thomas Kemmerich}, title = {Ontology-based Cybersecurity and Resilience Framework}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {458--466}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010233604580466}, doi = {10.5220/0010233604580466}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HutschenreuterC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/IrvanTK0Y21, author = {Mhd Irvan and Tran Phuong Thao and Ryosuke Kobayashi and Toshiyuki Nakata and Rie Shigetomi Yamaguchi}, title = {Learning from Smartphone Location Data as Anomaly Detection for Behavioral Authentication through Deep Neuroevolution}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {723--728}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010395407230728}, doi = {10.5220/0010395407230728}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/IrvanTK0Y21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/JacobQL21, author = {Stephen Jacob and Yuansong Qiao and Brian Lee}, title = {Detecting Cyber Security Attacks against a Microservices Application using Distributed Tracing}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {588--595}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010308905880595}, doi = {10.5220/0010308905880595}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/JacobQL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/JurecekJL21, author = {Martin Jurecek and Olha Jureckov{\'{a}} and R{\'{o}}bert L{\'{o}}rencz}, title = {Improving Classification of Malware Families using Learning a Distance Metric}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {643--652}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010326306430652}, doi = {10.5220/0010326306430652}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/JurecekJL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/JurecekK21, author = {Martin Jurecek and Matous Koz{\'{a}}k}, title = {Representation of {PE} Files using {LSTM} Networks}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {516--525}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010257105160525}, doi = {10.5220/0010257105160525}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/JurecekK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KadenaNR21, author = {Esmeralda Kadena and Huu Phuoc Dai Nguyen and Lourdes Ruiz}, title = {Mobile Robots: An Overview of Data and Security}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {291--299}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KadenaNR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KaleTS21, author = {Aparna Sunil Kale and Fabio Di Troia and Mark Stamp}, title = {Malware Classification with Word Embedding Features}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {733--742}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010377907330742}, doi = {10.5220/0010377907330742}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KaleTS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KallT21, author = {Sabrina Kall and Slim Trabelsi}, title = {An Asynchronous Federated Learning Approach for a Security Source Code Scanner}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {572--579}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010300305720579}, doi = {10.5220/0010300305720579}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KallT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KamalI21, author = {Ahmad Akmal Aminuddin Mohd Kamal and Keiichi Iwamura}, title = {Improvement of Secure Multi-Party Multiplication of (k, n) Threshold Secret Sharing Using Only {N} = k Servers}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {77--88}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010206400770088}, doi = {10.5220/0010206400770088}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KamalI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KiperbergZ21, author = {Michael Kiperberg and Nezer J. Zaidenberg}, title = {HyperPass: Secure Password Input Platform}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {580--587}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010301905800587}, doi = {10.5220/0010301905800587}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KiperbergZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KlaudelR21, author = {Witold Klaudel and Artur Rataj}, title = {Towards a Formalisation of Expert's Knowledge for an Automatic Construction of a Vulnerability Model of a Cyberphysical System}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {391--398}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010207003910398}, doi = {10.5220/0010207003910398}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KlaudelR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KokesML21, author = {Josef Kokes and Jonatan Matejka and R{\'{o}}bert L{\'{o}}rencz}, title = {Automatic Detection and Decryption of {AES} by Monitoring S-Box Access}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {172--180}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010255201720180}, doi = {10.5220/0010255201720180}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KokesML21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KotlabaBL21, author = {Luk{\'{a}}s Kotlaba and Simona Buchoveck{\'{a}} and R{\'{o}}bert L{\'{o}}rencz}, title = {Active Directory Kerberoasting Attack: Detection using Machine Learning Techniques}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {376--383}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010202803760383}, doi = {10.5220/0010202803760383}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KotlabaBL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KushnirFREZ21, author = {Malte Kushnir and Olivier Favre and Marc Rennhard and Damiano Esposito and Valentin Zahnd}, title = {Automated Black Box Detection of {HTTP} {GET} Request-based Access Control Vulnerabilities in Web Applications}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {204--216}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010300102040216}, doi = {10.5220/0010300102040216}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KushnirFREZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LouniciRNTO21, author = {Sofiane Lounici and Marco Rosa and Carlo Maria Negri and Slim Trabelsi and Melek {\"{O}}nen}, title = {Optimizing Leak Detection in Open-source Platforms with Machine Learning Techniques}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {145--159}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010238101450159}, doi = {10.5220/0010238101450159}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/LouniciRNTO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Maffei21, author = {Matteo Maffei}, title = {Practical and Provably Sound Static Analysis of Ethereum Smart Contracts}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {7}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Maffei21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MandalM21, author = {Debashis Mandal and Chandan Mazumdar}, title = {Towards an Ontology for Enterprise Level Information Security Policy Analysis}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {492--499}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010248004920499}, doi = {10.5220/0010248004920499}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/MandalM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MartinyBDJM21, author = {Karsten Martiny and Linda Briesemeister and Grit Denker and Mark F. St. John and Ron Moore}, title = {Protecting Privacy during a Pandemic Outbreak}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {308--318}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010186603080318}, doi = {10.5220/0010186603080318}, timestamp = {Mon, 13 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/MartinyBDJM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/McClaryS21, author = {Jack McClary and Sid Stamm}, title = {Understanding How People Weigh the Costs and Benefits of using Facebook}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {526--533}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010258405260533}, doi = {10.5220/0010258405260533}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/McClaryS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NagashimaII21, author = {Nozomi Nagashima and Masaki Inamura and Keiichi Iwamura}, title = {Implementation of Secondary Available Digital Content Protection Schemes using Identity-based Signatures}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {485--491}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010245504850491}, doi = {10.5220/0010245504850491}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/NagashimaII21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NakataO21, author = {Ryotaro Nakata and Akira Otsuka}, title = {CyExec*: Automatic Generation of Randomized Cyber Range Scenarios}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {226--236}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010324502260236}, doi = {10.5220/0010324502260236}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/NakataO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NakataO21a, author = {Ryotaro Nakata and Akira Otsuka}, title = {Evaluation of Vulnerability Reproducibility in Container-based Cyber Range}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {635--642}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010324606350642}, doi = {10.5220/0010324606350642}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/NakataO21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NeuschmiedWHSK21, author = {Helmut Neuschmied and Martin Winter and Katharina Hofer{-}Schmitz and Branka Stojanovic and Ulrike Kleb}, title = {Two Stage Anomaly Detection for Network Intrusion Detection}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {450--457}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010233404500457}, doi = {10.5220/0010233404500457}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NeuschmiedWHSK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NguyenTIU21, author = {Hai Ngoc Nguyen and Songpon Teerakanok and Atsuo Inomata and Tetsutaro Uehara}, title = {The Comparison of Word Embedding Techniques in RNNs for Vulnerability Detection}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {109--120}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010232301090120}, doi = {10.5220/0010232301090120}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NguyenTIU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NguyenTIU21a, author = {Hoang Viet Nguyen and Songpon Teerakanok and Atsuo Inomata and Tetsutaro Uehara}, title = {The Proposal of Double Agent Architecture using Actor-critic Algorithm for Penetration Testing}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {440--449}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010232504400449}, doi = {10.5220/0010232504400449}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/NguyenTIU21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NiedermaierHFM21, author = {Matthias Niedermaier and Thomas Hanka and Florian Fischer and Dominik Merli}, title = {A Secure Network Scanner Architecture for Asset Management in Strongly Segmented {ICS} Networks}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {347--355}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010191603470355}, doi = {10.5220/0010191603470355}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/NiedermaierHFM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OlssonT21, author = {Christoffer Olsson and Mohsen Toorani}, title = {A Permissioned Blockchain-based System for Collaborative Drug Discovery}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {121--132}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010236901210132}, doi = {10.5220/0010236901210132}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/OlssonT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OsliakSMD21, author = {Oleksii Osliak and Andrea Saracino and Fabio Martinelli and Theo Dimitrakos}, title = {Towards Collaborative Cyber Threat Intelligence for Security Management}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {339--346}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010191403390346}, doi = {10.5220/0010191403390346}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/OsliakSMD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OzcelikMBS21, author = {Ilker {\"{O}}z{\c{c}}elik and Sai Medury and Justin T. Broaddus and Anthony Skjellum}, title = {An Overview of Cryptographic Accumulators}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {661--669}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010337806610669}, doi = {10.5220/0010337806610669}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/OzcelikMBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PachecoS21, author = {Yulexis Pacheco and Weiqing Sun}, title = {Adversarial Machine Learning: {A} Comparative Study on Contemporary Intrusion Detection Datasets}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {160--171}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010253501600171}, doi = {10.5220/0010253501600171}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/PachecoS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PatzerB21, author = {Florian Patzer and J{\"{u}}rgen Beyerer}, title = {Efficient Semantic Representation of Network Access Control Configuration for Ontology-based Security Analysis}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {550--557}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010285305500557}, doi = {10.5220/0010285305500557}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PatzerB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Perrig21, author = {Adrian Perrig}, title = {New Directions for High-throughput and High-security Communication}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {5}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Perrig21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PhamSSSPH21, author = {Stefanie Pham and Matthias Schopp and Lars Stiemert and Sebastian Seeber and Daniela P{\"{o}}hn and Wolfgang Hommel}, title = {Field Studies on the Impact of Cryptographic Signatures and Encryption on Phishing Emails}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {384--390}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010206003840390}, doi = {10.5220/0010206003840390}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PhamSSSPH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PilipchukHR21, author = {Roman Pilipchuk and Robert Heinrich and Ralf H. Reussner}, title = {Automatically Extracting Business Level Access Control Requirements from {BPMN} Models to Align {RBAC} Policies}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {300--307}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010184403000307}, doi = {10.5220/0010184403000307}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/PilipchukHR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PonsardD21, author = {Christophe Ponsard and Denis Darquennes}, title = {Towards Formal Security Verification of Over-the-Air Update Protocol: Requirements, Survey and UpKit Case Study}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {800--808}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010431408000808}, doi = {10.5220/0010431408000808}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/PonsardD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PretoriusDM21, author = {Morn{\'{e}} Pretorius and Nelisiwe Dlamini and Sthembile Mthethwa}, title = {Towards Academic and Skills Credentialing Standards and Distributed Ledger Technologies}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {249--257}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010340602490257}, doi = {10.5220/0010340602490257}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/PretoriusDM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PuchtaGP21, author = {Alexander Puchta and Sebastian Groll and G{\"{u}}nther Pernul}, title = {Leveraging Dynamic Information for Identity and Access Management: An Extension of Current Enterprise {IAM} Architecture}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {611--618}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010315706110618}, doi = {10.5220/0010315706110618}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/PuchtaGP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Raimondo0021, author = {Mariapia Raimondo and Simona Bernardi and Stefano Marrone}, title = {On Formalising and Analysing the Tweetchain Protocol}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {781--791}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010427907810791}, doi = {10.5220/0010427907810791}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Raimondo0021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RayHSB21, author = {Aratrika Ray and Daqing Hou and Stephanie Schuckers and Abbie Barbir}, title = {Continuous Authentication based on Hand Micro-movement during Smartphone Form Filling by Seated Human Subjects}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {424--431}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010225804240431}, doi = {10.5220/0010225804240431}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/RayHSB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Renaud21, author = {Karen Renaud}, title = {Accessible Cyber Security: The Next Frontier?}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {9--18}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010419500090018}, doi = {10.5220/0010419500090018}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Renaud21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SchatzRS21, author = {David Schatz and Michael Rossberg and Guenter Schaefer}, title = {Hydra: Practical Metadata Security for Contact Discovery, Messaging, and Dialing}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {191--203}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010262201910203}, doi = {10.5220/0010262201910203}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SchatzRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ShakedR21, author = {Avi Shaked and Yoram Reich}, title = {Model-based Threat and Risk Assessment for Systems Design}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {331--338}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010187203310338}, doi = {10.5220/0010187203310338}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/ShakedR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Sommervoll21, author = {{\AA}vald {\AA}slaugson Sommervoll}, title = {Dreaming of Keys: Introducing the Phantom Gradient Attack}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {619--627}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010317806190627}, doi = {10.5220/0010317806190627}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Sommervoll21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SonntagM21, author = {Michael Sonntag and Ren{\'{e}} Mayrhofer}, title = {Experiences and Recommendations from Operating a Tor Exit Node at a University}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {283--290}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010156802830290}, doi = {10.5220/0010156802830290}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/SonntagM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SvecBH21, author = {Peter Svec and Stefan Balogh and Martin Homola}, title = {Experimental Evaluation of Description Logic Concept Learning Algorithms for Static Malware Detection}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {792--799}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010429707920799}, doi = {10.5220/0010429707920799}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SvecBH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Sy21, author = {Bon Sy}, title = {Linking Biometric Voice Identity with Self-monitoring Health Data as a Temporal-spatial Event Stored in a Mobile Device}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {407--415}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010216104070415}, doi = {10.5220/0010216104070415}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Sy21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/UralA21, author = {{\"{O}}zg{\"{u}}r Ural and Cengiz Acart{\"{u}}rk}, title = {Automatic Detection of Cyber Security Events from Turkish Twitter Stream and Newspaper Data}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {66--76}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010201600660076}, doi = {10.5220/0010201600660076}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/UralA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WagnerHH21, author = {Paul Wagner and Kris Heid and Jens Heider}, title = {Remote WebAuthn: {FIDO2} Authentication for Less Accessible Devices}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {368--375}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010192703680375}, doi = {10.5220/0010192703680375}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/WagnerHH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WahabHSB21, author = {Ahmed Anu Wahab and Daqing Hou and Stephanie Schuckers and Abbie Barbir}, title = {Utilizing Keystroke Dynamics as Additional Security Measure to Protect Account Recovery Mechanism}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {33--42}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010191200330042}, doi = {10.5220/0010191200330042}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WahabHSB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WuZYLZGLH21, author = {Yixiong Wu and Jianwei Zhuge and Tingting Yin and Tianyi Li and Junmin Zhu and Guannan Guo and Yue Liu and Jianju Hu}, title = {From Exposed to Exploited: Drawing the Picture of Industrial Control Systems Security Status in the Internet Age}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {237--248}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010327902370248}, doi = {10.5220/0010327902370248}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/WuZYLZGLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ZhaoBS21, author = {Jing Zhao and Samanvitha Basole and Mark Stamp}, title = {Malware Classification with {GMM-HMM} Models}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {753--762}, year = {2021}, crossref = {DBLP:conf/icissp/2021}, url = {https://doi.org/10.5220/0010409907530762}, doi = {10.5220/0010409907530762}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/ZhaoBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2021, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, publisher = {{SCITEPRESS}}, year = {2021}, isbn = {978-989-758-491-6}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/0002MMTJK20, author = {Masahiro Ishii and Satoshi Matsuura and Kento Mori and Masahiko Tomoishi and Yong Jin and Yoshiaki Kitaguchi}, title = {A Study of Classification of Texts into Categories of Cybersecurity Incident and Attack with Topic Models}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {639--646}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009099606390646}, doi = {10.5220/0009099606390646}, timestamp = {Tue, 14 Apr 2020 10:48:30 +0200}, biburl = {https://dblp.org/rec/conf/icissp/0002MMTJK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AkerlundG20, author = {Agnes {\AA}kerlund and Christine Gro{\ss}e}, title = {Integration of Data Envelopment Analysis in Business Process Models: {A} Novel Approach to Measure Information Security}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {281--288}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008875802810288}, doi = {10.5220/0008875802810288}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AkerlundG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlmeidaV020, author = {Rafael Almeida and Pedro Vieira{-}Marques and Ana Ferreira}, title = {Patients to Mobilize Their Data: Secure and Flexible mHealth Delegation}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {552--560}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008972905520560}, doi = {10.5220/0008972905520560}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlmeidaV020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AnagrehVL20, author = {Mohammad Anagreh and Eero Vainikko and Peeter Laud}, title = {Speeding Up the Computation of Elliptic Curve Scalar Multiplication based on {CRT} and {DRM}}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {176--184}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009129501760184}, doi = {10.5220/0009129501760184}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/AnagrehVL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AriefPCH20, author = {Budi Arief and Andy Periam and Or{\c{c}}un {\c{C}}etin and Julio C. Hernandez{-}Castro}, title = {Using Eyetracker to Find Ways to Mitigate Ransomware}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {448--456}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008956004480456}, doi = {10.5220/0008956004480456}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/AriefPCH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Barni20, author = {Mauro Barni}, title = {Backdooring Deep Learning Architectures: Threats and (some) Opportunities}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {15--16}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Barni20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BernardeschiDPR20, author = {Cinzia Bernardeschi and Gianluca Dini and Maurizio Palmieri and Francesco Racciatti}, title = {Analysis of Security Attacks in Wireless Sensor Networks: From {UPPAAL} to Castalia}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {815--824}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009380508150824}, doi = {10.5220/0009380508150824}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BernardeschiDPR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BoudguigaSSC20, author = {Aymen Boudguiga and Oana Stan and Hichem Sedjelmaci and Sergiu Carpov}, title = {Homomorphic Encryption at Work for Private Analysis of Security Logs}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {515--523}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008969205150523}, doi = {10.5220/0008969205150523}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BoudguigaSSC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BowditchABPH20, author = {William Bowditch and Will Abramson and William J. Buchanan and Nikolaos Pitropakis and Adam J. Hall}, title = {Privacy-preserving Surveillance Methods using Homomorphic Encryption}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {240--248}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008864902400248}, doi = {10.5220/0008864902400248}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BowditchABPH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BracamonteHTK20, author = {Vanessa Bracamonte and Seira Hidano and Welderufael B. Tesfay and Shinsaku Kiyomoto}, title = {Evaluating the Effect of Justification and Confidence Information on User Perception of a Privacy Policy Summarization Tool}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {142--151}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008986101420151}, doi = {10.5220/0008986101420151}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BracamonteHTK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BracamonteHTK20a, author = {Vanessa Bracamonte and Seira Hidano and Welderufael B. Tesfay and Shinsaku Kiyomoto}, title = {Effects of Explanatory Information on Privacy Policy Summarization Tool Perception}, booktitle = {Information Systems Security and Privacy - 6th International Conference, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers}, pages = {156--177}, year = {2020}, crossref = {DBLP:conf/icissp/2020s}, url = {https://doi.org/10.1007/978-3-030-94900-6\_8}, doi = {10.1007/978-3-030-94900-6\_8}, timestamp = {Mon, 21 Mar 2022 16:15:19 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BracamonteHTK20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BraccialeLRN020, author = {Lorenzo Bracciale and Pierpaolo Loreti and Emanuele Raso and Maurizio Naldi and Giuseppe Bianchi}, title = {CoProtect: Collaborative Management of Cryptographic Keys for Data Security in Cloud Systems}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {361--368}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008921603610368}, doi = {10.5220/0008921603610368}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BraccialeLRN020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BromanderSESB20, author = {Siri Bromander and Morton Swimmer and Martin Eian and Geir Skjotskift and Fredrik Borg}, title = {Modeling Cyber Threat Intelligence}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {273--280}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008875302730280}, doi = {10.5220/0008875302730280}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BromanderSESB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BrunnerKUE20, author = {Clemens Brunner and Fabian Knirsch and Andreas Unterweger and Dominik Engel}, title = {A Comparison of Blockchain-based {PKI} Implementations}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {333--340}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008914503330340}, doi = {10.5220/0008914503330340}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BrunnerKUE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BuchoveckaLBK20, author = {Simona Buchoveck{\'{a}} and R{\'{o}}bert L{\'{o}}rencz and Jir{\'{\i}} Bucek and Filip Kod{\'{y}}tek}, title = {Lightweight Authentication and Secure Communication Suitable for IoT Devices}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {75--83}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008959600750083}, doi = {10.5220/0008959600750083}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BuchoveckaLBK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BuchoveckaLBK20a, author = {Simona Buchoveck{\'{a}} and R{\'{o}}bert L{\'{o}}rencz and Jir{\'{\i}} Bucek and Filip Kod{\'{y}}tek}, title = {Symmetric and Asymmetric Schemes for Lightweight Secure Communication}, booktitle = {Information Systems Security and Privacy - 6th International Conference, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers}, pages = {97--114}, year = {2020}, crossref = {DBLP:conf/icissp/2020s}, url = {https://doi.org/10.1007/978-3-030-94900-6\_5}, doi = {10.1007/978-3-030-94900-6\_5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BuchoveckaLBK20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ButunLS20, author = {Ismail Butun and Alexios Lekidis and Daniel Ricardo dos Santos}, title = {Security and Privacy in Smart Grids: Challenges, Current Solutions and Future Opportunities}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {733--741}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009187307330741}, doi = {10.5220/0009187307330741}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ButunLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ChristouPPMB20, author = {Orestis Christou and Nikolaos Pitropakis and Pavlos Papadopoulos and Sean McKeown and William J. Buchanan}, title = {Phishing {URL} Detection Through Top-level Domain Analysis: {A} Descriptive Approach}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {289--298}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008902202890298}, doi = {10.5220/0008902202890298}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ChristouPPMB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ChuL20, author = {Ge Chu and Alexei Lisitsa}, title = {Ontology-based Automation of Penetration Testing}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {713--720}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009171007130720}, doi = {10.5220/0009171007130720}, timestamp = {Fri, 03 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ChuL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CiobanuFMMS20, author = {Madalina G. Ciobanu and Fausto Fasano and Fabio Martinelli and Francesco Mercaldo and Antonella Santone}, title = {Accidental Sensitive Data Leaks Prevention via Formal Verification}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {825--834}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009380608250834}, doi = {10.5220/0009380608250834}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CiobanuFMMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ColomboV20, author = {Christian Colombo and Mark Vella}, title = {Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {765--774}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008851507650774}, doi = {10.5220/0008851507650774}, timestamp = {Sat, 12 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ColomboV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DanielsB20, author = {Jesse Daniels and Sajal Bhatia}, title = {Legislation and the Negative Impact on Cybersecurity in Healthcare}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {691--697}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009157906910697}, doi = {10.5220/0009157906910697}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DanielsB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DaoudaghLM20, author = {Said Daoudagh and Francesca Lonetti and Eda Marchetti}, title = {Assessing Testing Strategies for Access Control Systems: {A} Controlled Experiment}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {107--118}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008974201070118}, doi = {10.5220/0008974201070118}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DaoudaghLM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DebarBT20, author = {Herv{\'{e}} Debar and Razvan Beuran and Yasuo Tan}, title = {A Quantitative Study of Vulnerabilities in the Internet of Medical Things}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {164--175}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009105801640175}, doi = {10.5220/0009105801640175}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DebarBT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DelongDF20, author = {Maxence Delong and Baptiste David and Eric Filiol}, title = {Detection of Crawler Traps: Formalization and Implementation Defeating Protection on Internet and on the {TOR} Network}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {775--783}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009367207750783}, doi = {10.5220/0009367207750783}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DelongDF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DiopLLT20, author = {A{\"{\i}}da Diop and Maryline Laurent and Jean Leneutre and Jacques Traor{\'{e}}}, title = {CoRA: {A} Scalable Collective Remote Attestation Protocol for Sensor Networks}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {84--95}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008962700840095}, doi = {10.5220/0008962700840095}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DiopLLT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FacchiniGSD20, author = {Simone Facchini and Giacomo Giorgi and Andrea Saracino and Gianluca Dini}, title = {Multi-level Distributed Intrusion Detection System for an IoT based Smart Home Environment}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {705--712}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009170807050712}, doi = {10.5220/0009170807050712}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FacchiniGSD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FasanoMMS20, author = {Fausto Fasano and Fabio Martinelli and Francesco Mercaldo and Antonella Santone}, title = {Android Run-time Permission Exploitation User Awareness by Means of Formal Methods}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {804--814}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009372308040814}, doi = {10.5220/0009372308040814}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FasanoMMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FilhoG20, author = {Eduardo Magalh{\~{a}}es De Lacerda Filho and Vin{\'{\i}}cius P. Gon{\c{c}}alves}, title = {Achieving Privacy, Security, and Interoperability among Biometric Networks using Symmetric Encryption}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {481--489}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008961504810489}, doi = {10.5220/0008961504810489}, timestamp = {Tue, 25 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FilhoG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FujiiII20, author = {Wataru Fujii and Keiichi Iwamura and Masaki Inamura}, title = {Secure Comparison and Interval Test Protocols based on Three-party {MPC}}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {698--704}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009161406980704}, doi = {10.5220/0009161406980704}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FujiiII20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GencL20, author = {Ziya Alper Gen{\c{c}} and Gabriele Lenzini}, title = {Dual-use Research in Ransomware Attacks: {A} Discussion on Ransomware Defence Intelligence}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {585--592}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009000505850592}, doi = {10.5220/0009000505850592}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GencL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GiorgiSM20, author = {Giacomo Giorgi and Andrea Saracino and Fabio Martinelli}, title = {Email Spoofing Attack Detection through an End to End Authorship Attribution System}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {64--74}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008954600640074}, doi = {10.5220/0008954600640074}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GiorgiSM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GiorgiSM20a, author = {Giacomo Giorgi and Andrea Saracino and Fabio Martinelli}, title = {End to End Autorship Email Verification Framework for a Secure Communication}, booktitle = {Information Systems Security and Privacy - 6th International Conference, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers}, pages = {73--96}, year = {2020}, crossref = {DBLP:conf/icissp/2020s}, url = {https://doi.org/10.1007/978-3-030-94900-6\_4}, doi = {10.1007/978-3-030-94900-6\_4}, timestamp = {Mon, 21 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/GiorgiSM20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Gladychev20, author = {Nikolai Gladychev}, title = {Computer Viruses: The Abstract Theory Revisited}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {406--414}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008942704060414}, doi = {10.5220/0008942704060414}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Gladychev20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GuarinoMZCR20, author = {Alfonso Guarino and Delfina Malandrino and Rocco Zaccagnino and Federico Cozza and Antonio Rapuano}, title = {On Analyzing Third-party Tracking via Machine Learning}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {532--539}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008972005320539}, doi = {10.5220/0008972005320539}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GuarinoMZCR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Guerra-Manzanares20, author = {Alejandro Guerra{-}Manzanares and Jorge Medina{-}Galindo and Hayretdin Bahsi and Sven N{\~{o}}mm}, title = {MedBIoT: Generation of an IoT Botnet Dataset in a Medium-sized IoT Network}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {207--218}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009187802070218}, doi = {10.5220/0009187802070218}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Guerra-Manzanares20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Guerra-Manzanares20a, author = {Alejandro Guerra{-}Manzanares and Jorge Medina{-}Galindo and Hayretdin Bahsi and Sven N{\~{o}}mm}, title = {Using MedBIoT Dataset to Build Effective Machine Learning-Based IoT Botnet Detection Systems}, booktitle = {Information Systems Security and Privacy - 6th International Conference, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers}, pages = {222--243}, year = {2020}, crossref = {DBLP:conf/icissp/2020s}, url = {https://doi.org/10.1007/978-3-030-94900-6\_11}, doi = {10.1007/978-3-030-94900-6\_11}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Guerra-Manzanares20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GuigaR20, author = {Linda Guiga and A. W. Roscoe}, title = {Neural Network Security: Hiding {CNN} Parameters with Guided Grad-CAM}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {611--618}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009061206110618}, doi = {10.5220/0009061206110618}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GuigaR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GunduM20, author = {Tapiwa Gundu and Nthabiseng Modiba}, title = {Building Competitive Advantage from Ubuntu: An African Information Security Awareness Model}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {569--576}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008983305690576}, doi = {10.5220/0008983305690576}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GunduM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GunnarssonG20, author = {Martin Gunnarsson and Christian Gehrmann}, title = {Secure Ownership Transfer for the Internet of Things}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {33--44}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008928300330044}, doi = {10.5220/0008928300330044}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GunnarssonG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GunnarssonG20a, author = {Martin Gunnarsson and Christian Gehrmann}, title = {Secure Ownership Transfer for Resource Constrained IoT Infrastructures}, booktitle = {Information Systems Security and Privacy - 6th International Conference, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers}, pages = {22--47}, year = {2020}, crossref = {DBLP:conf/icissp/2020s}, url = {https://doi.org/10.1007/978-3-030-94900-6\_2}, doi = {10.1007/978-3-030-94900-6\_2}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GunnarssonG20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HavurSK20, author = {Giray Havur and Miel Vander Sande and Sabrina Kirrane}, title = {Greater Control and Transparency in Personal Data Processing}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {655--662}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009143206550662}, doi = {10.5220/0009143206550662}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HavurSK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HegartyH20, author = {Robert Hegarty and John Haggerty}, title = {Presence Metadata in the Internet of Things: Challenges and Opportunities}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {631--638}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009094106310638}, doi = {10.5220/0009094106310638}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HegartyH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HeidingOWL20, author = {Fredrik Heiding and Mohammad{-}Ali Omer and Andreas Wallstr{\"{o}}m and Robert Lagerstr{\"{o}}m}, title = {Securing IoT Devices using Geographic and Continuous Login Blocking: {A} Honeypot Study}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {424--431}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008954704240431}, doi = {10.5220/0008954704240431}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HeidingOWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HidanoK20, author = {Seira Hidano and Shinsaku Kiyomoto}, title = {Recommender Systems Robust to Data Poisoning using Trim Learning}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {721--724}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009180407210724}, doi = {10.5220/0009180407210724}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HidanoK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HosseinzadehEJ20, author = {Arghavan Hosseinzadeh and Andreas Eitel and Christian Jung}, title = {A Systematic Approach toward Extracting Technically Enforceable Policies from Data Usage Control Requirements}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {397--405}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008936003970405}, doi = {10.5220/0008936003970405}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HosseinzadehEJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HuttelS20, author = {Hans H{\"{u}}ttel and Vilim Staroveski}, title = {Secrecy and Authenticity Properties of the Lightning Network Protocol}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {119--130}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008974801190130}, doi = {10.5220/0008974801190130}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HuttelS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HuttelS20a, author = {Hans H{\"{u}}ttel and Vilim Staroveski}, title = {Key Agreement in the Lightning Network Protocol}, booktitle = {Information Systems Security and Privacy - 6th International Conference, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers}, pages = {139--155}, year = {2020}, crossref = {DBLP:conf/icissp/2020s}, url = {https://doi.org/10.1007/978-3-030-94900-6\_7}, doi = {10.1007/978-3-030-94900-6\_7}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HuttelS20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/JasserK20, author = {Stefanie Jasser and Jonas Kelbert}, title = {An Approach to Secure Legacy Software Systems}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {299--309}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008902802990309}, doi = {10.5220/0008902802990309}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/JasserK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Jost020, author = {David Jost and Mathias Fischer}, title = {Accountant: Protection of Data Integrity and Identification of Malicious Nodes in In-network Data Processing}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {561--568}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008974405610568}, doi = {10.5220/0008974405610568}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Jost020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/JurecekL20, author = {Martin Jurecek and R{\'{o}}bert L{\'{o}}rencz}, title = {Distance Metric Learning using Particle Swarm Optimization to Improve Static Malware Detection}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {725--732}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009180807250732}, doi = {10.5220/0009180807250732}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/JurecekL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Katsikas20, author = {Sokratis K. Katsikas}, title = {Leveraging Blockchain Technology to Enhance Security and Privacy in the Internet of Things}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {5}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Katsikas20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Kneuper20, author = {Ralf Kneuper}, title = {Translating Data Protection into Software Requirements}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {257--264}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008873902570264}, doi = {10.5220/0008873902570264}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Kneuper20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KnirschUUE20, author = {Fabian Knirsch and Andreas Unterweger and Maximilian Unterrainer and Dominik Engel}, title = {Comparison of the Paillier and ElGamal Cryptosystems for Smart Grid Aggregation Protocols}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {232--239}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008770902320239}, doi = {10.5220/0008770902320239}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KnirschUUE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KotlabaBL20, author = {Luk{\'{a}}s Kotlaba and Simona Buchoveck{\'{a}} and R{\'{o}}bert L{\'{o}}rencz}, title = {Active Directory Kerberoasting Attack: Monitoring and Detection Techniques}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {432--439}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008955004320439}, doi = {10.5220/0008955004320439}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KotlabaBL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KrasnowskiLM20, author = {Piotr Krasnowski and J{\'{e}}r{\^{o}}me Lebrun and Bruno Martin}, title = {Introducing a Verified Authenticated Key Exchange Protocol over Voice Channels for Secure Voice Communication}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {683--690}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009156506830690}, doi = {10.5220/0009156506830690}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KrasnowskiLM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LagerstromXE20, author = {Robert Lagerstr{\"{o}}m and Wenjun Xiong and Mathias Ekstedt}, title = {Threat Modeling and Attack Simulations of Smart Cities: {A} Literature Review and Explorative Study}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {369--376}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008921903690376}, doi = {10.5220/0008921903690376}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LagerstromXE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LandauerSWHR20, author = {Max Landauer and Florian Skopik and Markus Wurzenberger and Wolfgang Hotwagner and Andreas Rauber}, title = {Visualizing Syscalls using Self-organizing Maps for System Intrusion Detection}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {349--360}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008918703490360}, doi = {10.5220/0008918703490360}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LandauerSWHR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LathouwersEH20, author = {Sophie Lathouwers and Maarten H. Everts and Marieke Huisman}, title = {Verifying Sanitizer Correctness through Black-Box Learning: {A} Symbolic Finite Transducer Approach}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {784--795}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009371207840795}, doi = {10.5220/0009371207840795}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LathouwersEH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LefonsPT20, author = {Ezio Lefons and Sebastiano Pizzutilo and Filippo Tangorra}, title = {Host Fingerprinting for Web Servers Authentication}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {45--51}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008942500450051}, doi = {10.5220/0008942500450051}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LefonsPT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LinFS20, author = {Hsiao{-}Ying Lin and Chengfang Fang and Jie Shi}, title = {Bident Structure for Neural Network Model Protection}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {377--384}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008923403770384}, doi = {10.5220/0008923403770384}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LinFS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LindenhoferOP20, author = {Julian Lindenhofer and Rene Offenthaler and Martin Pirker}, title = {A Curious Exploration of Malicious {PDF} Documents}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {577--584}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008992305770584}, doi = {10.5220/0008992305770584}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LindenhoferOP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ListikSH20, author = {V{\'{\i}}t List{\'{\i}}k and Jan Sediv{\'{y}} and V{\'{a}}clav Hlav{\'{a}}c}, title = {Email Image Spam Classification based on ResNet Convolutional Neural Network}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {457--464}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008956704570464}, doi = {10.5220/0008956704570464}, timestamp = {Wed, 24 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/ListikSH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MaghrebiA20, author = {Houssem Maghrebi and Davide Alessio}, title = {Revisiting Higher-order Computational Attacks against White-box Implementations}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {265--272}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008874602650272}, doi = {10.5220/0008874602650272}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MaghrebiA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MalderleBMW020, author = {Timo Malderle and Felix Boes and Gina Muuss and Matthias W{\"{u}}bbeling and Michael Meier}, title = {Credential Intelligence Agency: {A} Threat Intelligence Approach to Mitigate Identity Theft}, booktitle = {Information Systems Security and Privacy - 6th International Conference, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers}, pages = {115--138}, year = {2020}, crossref = {DBLP:conf/icissp/2020s}, url = {https://doi.org/10.1007/978-3-030-94900-6\_6}, doi = {10.1007/978-3-030-94900-6\_6}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MalderleBMW020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MalderleKLW020, author = {Timo Malderle and Sven Knauer and Martin Lang and Matthias W{\"{u}}bbeling and Michael Meier}, title = {Track Down Identity Leaks using Threat Intelligence}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {96--106}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008963000960106}, doi = {10.5220/0008963000960106}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MalderleKLW020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MartinelliMRS20, author = {Fabio Martinelli and Francesco Mercaldo and Domenico Raucci and Antonella Santone}, title = {Bank Credit Risk Management based on Data Mining Techniques}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {837--843}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009371808370843}, doi = {10.5220/0009371808370843}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MartinelliMRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MauriCD20, author = {Lara Mauri and Stelvio Cimato and Ernesto Damiani}, title = {A Formal Approach for the Analysis of the {XRP} Ledger Consensus Protocol}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {52--63}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008954200520063}, doi = {10.5220/0008954200520063}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MauriCD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MauriCD20a, author = {Lara Mauri and Stelvio Cimato and Ernesto Damiani}, title = {Untangling the {XRP} Ledger: Insights and Analysis}, booktitle = {Information Systems Security and Privacy - 6th International Conference, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers}, pages = {48--72}, year = {2020}, crossref = {DBLP:conf/icissp/2020s}, url = {https://doi.org/10.1007/978-3-030-94900-6\_3}, doi = {10.1007/978-3-030-94900-6\_3}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MauriCD20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MendsaikhanHYS20, author = {Otgonpurev Mendsaikhan and Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada}, title = {Quantifying the Significance of Cybersecurity Text through Semantic Similarity and Named Entity Recognition}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {325--332}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008913003250332}, doi = {10.5220/0008913003250332}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/MendsaikhanHYS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MoubarakF20, author = {Joanna Moubarak and Tony Feghali}, title = {Comparing Machine Learning Techniques for Malware Detection}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {844--851}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009373708440851}, doi = {10.5220/0009373708440851}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MoubarakF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MoubarakFC20, author = {Joanna Moubarak and Eric Filiol and Maroun Chamoun}, title = {The Blockchain Potential in Computer Virology}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {796--803}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009371607960803}, doi = {10.5220/0009371607960803}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MoubarakFC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NisslmuellerF0D20, author = {Utz Nisslmueller and Klaus{-}Tycho Foerster and Stefan Schmid and Christian Decker}, title = {Toward Active and Passive Confidentiality Attacks on Cryptocurrency Off-chain Networks}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {7--14}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009429200070014}, doi = {10.5220/0009429200070014}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NisslmuellerF0D20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NisslmuellerF0D20a, author = {Utz Nisslmueller and Klaus{-}Tycho Foerster and Stefan Schmid and Christian Decker}, title = {Inferring Sensitive Information in Cryptocurrency Off-Chain Networks Using Probing and Timing Attacks}, booktitle = {Information Systems Security and Privacy - 6th International Conference, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers}, pages = {1--21}, year = {2020}, crossref = {DBLP:conf/icissp/2020s}, url = {https://doi.org/10.1007/978-3-030-94900-6\_1}, doi = {10.1007/978-3-030-94900-6\_1}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NisslmuellerF0D20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NitschkeRHK20, author = {Mirja Nitschke and Christian Roth and Christian Hoyer and Dogan Kesdogan}, title = {Harmonized Group Mix for {ITS}}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {152--163}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008989101520163}, doi = {10.5220/0008989101520163}, timestamp = {Fri, 01 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NitschkeRHK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NitschkeRHK20a, author = {Mirja Nitschke and Christian Roth and Christian Hoyer and Dogan Kesdogan}, title = {Harmonic Group Mix: {A} Framework for Anonymous and Authenticated Broadcast Messages in Vehicle-to-Vehicle Environments}, booktitle = {Information Systems Security and Privacy - 6th International Conference, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers}, pages = {178--200}, year = {2020}, crossref = {DBLP:conf/icissp/2020s}, url = {https://doi.org/10.1007/978-3-030-94900-6\_9}, doi = {10.1007/978-3-030-94900-6\_9}, timestamp = {Fri, 01 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NitschkeRHK20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NyblomWKO20, author = {Philip Nyblom and Gaute Wangen and Mazaher Kianpour and Grethe {\O}stby}, title = {The Root Causes of Compromised Accounts at the University}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {540--551}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008972305400551}, doi = {10.5220/0008972305400551}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NyblomWKO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OrenderMZ20, author = {Jason Orender and Ravi Mukkamala and Mohammad Zubair}, title = {Is Ethereum's ProgPoW {ASIC} Resistant?}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {310--316}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008909203100316}, doi = {10.5220/0008909203100316}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/OrenderMZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OstbyK20, author = {Grethe {\O}stby and Basel Katt}, title = {Maturity Modelling to Prepare for Cyber Crisis Escalation and Management}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {249--256}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008871602490256}, doi = {10.5220/0008871602490256}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/OstbyK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OtungM20, author = {Andikan Otung and Andrew P. Martin}, title = {Distributed Defence of Service (DiDoS): {A} Network-layer Reputation-based DDoS Mitigation Architecture}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {619--630}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009091206190630}, doi = {10.5220/0009091206190630}, timestamp = {Thu, 29 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/OtungM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PabloAI20, author = {{\'{A}}lvaro de Pablo and Oscar Araque and Carlos Angel Iglesias}, title = {Radical Text Detection based on Stylometry}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {524--531}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008971205240531}, doi = {10.5220/0008971205240531}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PabloAI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PfrangMFB20, author = {Steffen Pfrang and David Meier and Andreas Fleig and J{\"{u}}rgen Beyerer}, title = {A Meta Model for a Comprehensive Description of Network Protocols Improving Security Tests}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {671--682}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009150206710682}, doi = {10.5220/0009150206710682}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PfrangMFB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PlessingO20, author = {Paul Plessing and Olamide Omolola}, title = {Revisiting Privacy-aware Blockchain Public Key Infrastructure}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {415--423}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008947104150423}, doi = {10.5220/0008947104150423}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PlessingO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PonsardGP20, author = {Christophe Ponsard and Jeremy Grandclaudon and Nicolas Point}, title = {Methodology and Feedback about Systematic Cybersecurity Experts Auditing in Belgium}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {754--759}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009190307540759}, doi = {10.5220/0009190307540759}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PonsardGP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/QbeahAM20, author = {Mohammad Qbea'h and Saed Alrabaee and Djedjiga Mouheb}, title = {An Analytical Scanning Technique to Detect and Prevent the Transformed {SQL} Injection and {XSS} Attacks}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {603--610}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009004006030610}, doi = {10.5220/0009004006030610}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/QbeahAM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SbaiDD20, author = {Anass Sbai and Cyril Drocourt and Gilles Dequen}, title = {{CCA} Secure Unidirectional {PRE} with Key Pair in the Standard Model without Pairings}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {440--447}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008955704400447}, doi = {10.5220/0008955704400447}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SbaiDD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ScholnastTK20, author = {Hubert Sch{\"{o}}lnast and Paul Tavolato and Philipp Kreimel}, title = {Anomaly Detection in Communication Networks of Cyber-physical Systems using Cross-over Data Compression}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {498--505}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008964104980505}, doi = {10.5220/0008964104980505}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ScholnastTK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SnymanK20, author = {Dirk Snyman and Hennie A. Kruger}, title = {External Contextual Factors in Information Security Behaviour}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {185--194}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009142201850194}, doi = {10.5220/0009142201850194}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SnymanK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SnymanK20a, author = {Dirk Snyman and Hennie A. Kruger}, title = {Contextual Factors in Information Security Group Behaviour: {A} Comparison of Two Studies}, booktitle = {Information Systems Security and Privacy - 6th International Conference, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers}, pages = {201--221}, year = {2020}, crossref = {DBLP:conf/icissp/2020s}, url = {https://doi.org/10.1007/978-3-030-94900-6\_10}, doi = {10.1007/978-3-030-94900-6\_10}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SnymanK20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/StachGW0M20, author = {Christoph Stach and Corinna Giebler and Manuela Wagner and Christian Weber and Bernhard Mitschang}, title = {{AMNESIA:} {A} Technical Solution towards GDPR-compliant Machine Learning}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {21--32}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008916700210032}, doi = {10.5220/0008916700210032}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/StachGW0M20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SultanJ20, author = {Shizra Sultan and Christian Damsgaard Jensen}, title = {Privacy-preserving Measures in Smart City Video Surveillance Systems}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {506--514}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008964205060514}, doi = {10.5220/0008964205060514}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/SultanJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SunDGCGRMTAL20, author = {Tithnara Nicolas Sun and Bastien Drouot and Fahad Rafique Golra and Jo{\"{e}}l Champeau and Sylvain Gu{\'{e}}rin and Luka Le Roux and Ra{\'{u}}l Mazo and Ciprian Teodorov and Lionel Van Aertryck and Bernard L'Hostis}, title = {A Domain-specific Modeling Framework for Attack Surface Modeling}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {341--348}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008916203410348}, doi = {10.5220/0008916203410348}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SunDGCGRMTAL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SundstromLPP20, author = {Andrew Sundstrom and Damas W. Limoge and Vadim Pinskiy and Matthew Putman}, title = {Securing Industrial Production from Sophisticated Cyberattacks}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {663--670}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009148206630670}, doi = {10.5220/0009148206630670}, timestamp = {Wed, 05 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SundstromLPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SymeonidisL20, author = {Iraklis Symeonidis and Gabriele Lenzini}, title = {Systematization of Threats and Requirements for Private Messaging with Untrusted Servers: The Case of e-Mailing and Instant Messaging}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {593--602}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009003805930602}, doi = {10.5220/0009003805930602}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SymeonidisL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TantikulN20, author = {Phitchayaphong Tantikul and Sudsanguan Ngamsuriyaroj}, title = {Exploring Vulnerabilities in Solidity Smart Contract}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {317--324}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008909803170324}, doi = {10.5220/0008909803170324}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TantikulN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TeradoH20, author = {Ryosuke Terado and Morihiro Hayashida}, title = {Improving Accuracy and Speed of Network-based Intrusion Detection using Gradient Boosting Trees}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {490--497}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008963504900497}, doi = {10.5220/0008963504900497}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TeradoH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ThompsonE20, author = {Andreas Thompson and Gencer Erdogan}, title = {Tool Support for Risk-driven Planning of Trustworthy Smart IoT Systems within DevOps}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {742--753}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009189307420753}, doi = {10.5220/0009189307420753}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ThompsonE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Tochikubo20, author = {Kouya Tochikubo}, title = {New General Secret Sharing Scheme using Hierarchical Threshold Scheme: Improvement of Information Rates for Specified Participants}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {647--654}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009103506470654}, doi = {10.5220/0009103506470654}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Tochikubo20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/UwizeyemunguP20, author = {Sylvestre Uwizeyemungu and Placide Poba{-}Nzaou}, title = {Privacy with Health Information Technologies: What Story Do Data Breaches in {US} Tell Us?}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {131--141}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008977301310141}, doi = {10.5220/0008977301310141}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/UwizeyemunguP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WirtzH20, author = {Roman Wirtz and Maritta Heisel}, title = {Risk Identification: From Requirements to Threat Models}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {385--396}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008935803850396}, doi = {10.5220/0008935803850396}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WirtzH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WodoS20, author = {Wojciech Wodo and Damian Stygar}, title = {Security of Digital Banking Systems in Poland: Users Study 2019}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {221--231}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008555202210231}, doi = {10.5220/0008555202210231}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WodoS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/XuZ20, author = {Shuaijianni Xu and Liang Feng Zhang}, title = {A Homomorphic Proxy Re-authenticators based Efficient Multi-client Non-interactive Verifiable Computation Scheme}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {195--206}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0009158101950206}, doi = {10.5220/0009158101950206}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/XuZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ZhouHKI20, author = {Jiaxing Zhou and Miyuki Hirose and Yoshio Kakizaki and Atsuo Inomata}, title = {Evaluation to Classify Ransomware Variants based on Correlations between APIs}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {465--472}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008959904650472}, doi = {10.5220/0008959904650472}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ZhouHKI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ZinsmaierLW20, author = {Sandra Domenique Zinsmaier and Hanno Langweg and Marcel Waldvogel}, title = {A Practical Approach to Stakeholder-driven Determination of Security Requirements based on the {GDPR} and Common Criteria}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {473--480}, year = {2020}, crossref = {DBLP:conf/icissp/2020}, url = {https://doi.org/10.5220/0008960604730480}, doi = {10.5220/0008960604730480}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ZinsmaierLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2019s, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1221}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-49443-8}, doi = {10.1007/978-3-030-49443-8}, isbn = {978-3-030-49442-1}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2019s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2020, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, publisher = {{SCITEPRESS}}, year = {2020}, isbn = {978-989-758-399-5}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/0001MFKT19, author = {Partha Sarathi Roy and Kirill Morozov and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, title = {Security Analysis and Efficient Implementation of Code-based Signature Schemes}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {213--220}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007259102130220}, doi = {10.5220/0007259102130220}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/0001MFKT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/0002F19, author = {Carlos Moreno and Sebastian Fischmeister}, title = {Sender Authentication for Automotive In-Vehicle Networks through Dual Analog Measurements to Determine the Location of the Transmitter}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {596--605}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007580105960605}, doi = {10.5220/0007580105960605}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/0002F19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/0006EVRDM19, author = {Gaurav Sharma and Soultana Ellinidou and Tristan Vanspouwen and Th{\'{e}}o Rigas and Jean{-}Michel Dricot and Olivier Markowitch}, title = {Identity-based {TLS} for Cloud of Chips}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {44--54}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007252000440054}, doi = {10.5220/0007252000440054}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/0006EVRDM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AkkuzuAA19, author = {Gulsum Akkuzu and Benjamin Aziz and Mo Adda}, title = {Fuzzy Logic Decision based Collaborative Privacy Management Framework for Online Social Networks}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {674--684}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007702206740684}, doi = {10.5220/0007702206740684}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AkkuzuAA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Al-MaweeBCM19, author = {Wassnaa Al{-}Mawee and Paul J. Bonamy and Steve Carr and Jean Mayo}, title = {Maia: {A} Language for Mandatory Integrity Controls of Structured Data}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {257--265}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007344802570265}, doi = {10.5220/0007344802570265}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Al-MaweeBCM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Al-WahahF19, author = {Mouiad Al{-}Wahah and Csilla Farkas}, title = {Monotonic and Non-monotonic Context Delegation}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {449--460}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007400904490460}, doi = {10.5220/0007400904490460}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Al-WahahF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlmarwaniKL19, author = {Maryam Almarwani and Boris Konev and Alexei Lisitsa}, title = {Flexible Access Control and Confidentiality over Encrypted Data for Document-based Database}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {606--614}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007582506060614}, doi = {10.5220/0007582506060614}, timestamp = {Fri, 03 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlmarwaniKL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlmarwaniKL19a, author = {Maryam Almarwani and Boris Konev and Alexei Lisitsa}, title = {Fine-Grained Access Control for Querying Over Encrypted Document-Oriented Database}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, pages = {403--425}, year = {2019}, crossref = {DBLP:conf/icissp/2019s}, url = {https://doi.org/10.1007/978-3-030-49443-8\_19}, doi = {10.1007/978-3-030-49443-8\_19}, timestamp = {Fri, 03 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlmarwaniKL19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlotaibiAFC19, author = {Saud Alotaibi and Abdulrahman Alruban and Steven Furnell and Nathan L. Clarke}, title = {A Novel Behaviour Profiling Approach to Continuous Authentication for Mobile Applications}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {246--251}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007313302460251}, doi = {10.5220/0007313302460251}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlotaibiAFC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AnagrehVL19, author = {Mohammad Anagreh and Eero Vainikko and Peeter Laud}, title = {Accelerate Performance for Elliptic Curve Scalar Multiplication based on {NAF} by Parallel Computing}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {238--245}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007312702380245}, doi = {10.5220/0007312702380245}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AnagrehVL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AugotCG19, author = {Daniel Augot and Herv{\'{e}} Chabanne and William George}, title = {Practical Solutions to Save Bitcoins Applied to an Identity System Proposal}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {511--518}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007443905110518}, doi = {10.5220/0007443905110518}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AugotCG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BajanKD19, author = {Pierre{-}Marie Bajan and Christophe Kiennert and Herv{\'{e}} Debar}, title = {Methodology of a Network Simulation in the Context of an Evaluation: Application to an {IDS}}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {378--388}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007378603780388}, doi = {10.5220/0007378603780388}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BajanKD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BartoliniCM19, author = {Cesare Bartolini and Antonello Calabr{\`{o}} and Eda Marchetti}, title = {Enhancing Business Process Modelling with Data Protection Compliance: An Ontology-based Proposal}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {421--428}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007392304210428}, doi = {10.5220/0007392304210428}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BartoliniCM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Ben-BassatR19, author = {Ilan Ben{-}Bassat and Erez Rokah}, title = {Locality-Sensitive Hashing for Efficient Web Application Security Testing}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {193--204}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007255301930204}, doi = {10.5220/0007255301930204}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Ben-BassatR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BernardeschiDP19, author = {Cinzia Bernardeschi and Andrea Domenici and Maurizio Palmieri}, title = {Modeling and Simulation of Attacks on Cyber-physical Systems}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {700--708}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007705307000708}, doi = {10.5220/0007705307000708}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BernardeschiDP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BhodiaPTS19, author = {Niket Bhodia and Pratikkumar Prajapati and Fabio Di Troia and Mark Stamp}, title = {Transfer Learning for Image-based Malware Classification}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {719--726}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007701407190726}, doi = {10.5220/0007701407190726}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BhodiaPTS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BisphamAG19, author = {Mary K. Bispham and Ioannis Agrafiotis and Michael Goldsmith}, title = {Nonsense Attacks on Google Assistant and Missense Attacks on Amazon Alexa}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {75--87}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007309500750087}, doi = {10.5220/0007309500750087}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BisphamAG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BisphamAG19a, author = {Mary K. Bispham and Ioannis Agrafiotis and Michael Goldsmith}, title = {Attack and Defence Modelling for Attacks via the Speech Interface}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {519--527}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007469705190527}, doi = {10.5220/0007469705190527}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BisphamAG19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BisphamAG19b, author = {Mary K. Bispham and Ioannis Agrafiotis and Michael Goldsmith}, title = {The Security of the Speech Interface: {A} Modelling Framework and Proposals for New Defence Mechanisms}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, pages = {288--316}, year = {2019}, crossref = {DBLP:conf/icissp/2019s}, url = {https://doi.org/10.1007/978-3-030-49443-8\_14}, doi = {10.1007/978-3-030-49443-8\_14}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BisphamAG19b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BisphamRAG19, author = {Mary K. Bispham and Alastair Janse van Rensburg and Ioannis Agrafiotis and Michael Goldsmith}, title = {Black-Box Attacks via the Speech Interface Using Linguistically Crafted Input}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, pages = {93--120}, year = {2019}, crossref = {DBLP:conf/icissp/2019s}, url = {https://doi.org/10.1007/978-3-030-49443-8\_5}, doi = {10.1007/978-3-030-49443-8\_5}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BisphamRAG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Blumbergs19, author = {Bernhards Blumbergs}, title = {Remote Exploit Development for Cyber Red Team Computer Network Operations Targeting Industrial Control Systems}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {88--99}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007310300880099}, doi = {10.5220/0007310300880099}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Blumbergs19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BodeiG19, author = {Chiara Bodei and Letterio Galletta}, title = {Tracking Data Trajectories in IoT}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {572--579}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007578305720579}, doi = {10.5220/0007578305720579}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BodeiG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BodeiG19a, author = {Chiara Bodei and Letterio Galletta}, title = {Analysing the Provenance of IoT Data}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, pages = {358--381}, year = {2019}, crossref = {DBLP:conf/icissp/2019s}, url = {https://doi.org/10.1007/978-3-030-49443-8\_17}, doi = {10.1007/978-3-030-49443-8\_17}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BodeiG19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BracamonteHTK19, author = {Vanessa Bracamonte and Seira Hidano and Welderufael B. Tesfay and Shinsaku Kiyomoto}, title = {Evaluating Privacy Policy Summarization: An Experimental Study among Japanese Users}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {370--377}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007378403700377}, doi = {10.5220/0007378403700377}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BracamonteHTK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BracamonteHTK19a, author = {Vanessa Bracamonte and Seira Hidano and Welderufael B. Tesfay and Shinsaku Kiyomoto}, title = {User Study of the Effectiveness of a Privacy Policy Summarization Tool}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, pages = {186--206}, year = {2019}, crossref = {DBLP:conf/icissp/2019s}, url = {https://doi.org/10.1007/978-3-030-49443-8\_9}, doi = {10.1007/978-3-030-49443-8\_9}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BracamonteHTK19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BrunnerKE19, author = {Clemens Brunner and Fabian Knirsch and Dominik Engel}, title = {{SPROOF:} {A} Platform for Issuing and Verifying Documents in a Public Blockchain}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {15--25}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007245600150025}, doi = {10.5220/0007245600150025}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BrunnerKE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BrunnerKE19a, author = {Clemens Brunner and Fabian Knirsch and Dominik Engel}, title = {{SPROOF:} {A} Decentralized Platform for Attribute-Based Authentication}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, pages = {1--23}, year = {2019}, crossref = {DBLP:conf/icissp/2019s}, url = {https://doi.org/10.1007/978-3-030-49443-8\_1}, doi = {10.1007/978-3-030-49443-8\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BrunnerKE19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Buchanan19, author = {Bill Buchanan}, title = {Building the Future: Tokenization, Blockchain and Citizen-focused Systems}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {5}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, timestamp = {Thu, 13 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Buchanan19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ButunG19, author = {Ismail Butun and Mikael Gidlund}, title = {Location Privacy Assured Internet of Things}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {623--630}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007587906230630}, doi = {10.5220/0007587906230630}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ButunG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CaiWZSH19, author = {Jiahao Cai and Zihao Wei and Yingjie Zhang and Siwei Sun and Lei Hu}, title = {Zero-sum Distinguishers for Round-reduced {GIMLI} Permutation}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {38--43}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007249000380043}, doi = {10.5220/0007249000380043}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/CaiWZSH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CatuognoG19, author = {Luigi Catuogno and Clemente Galdi}, title = {A Fine-grained General Purpose Secure Storage Facility for Trusted Execution Environment}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {588--595}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007578605880595}, doi = {10.5220/0007578605880595}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CatuognoG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CatuognoG19a, author = {Luigi Catuogno and Clemente Galdi}, title = {Improving Interoperability in Multi-domain Enterprise Right Management Applications}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, pages = {382--402}, year = {2019}, crossref = {DBLP:conf/icissp/2019s}, url = {https://doi.org/10.1007/978-3-030-49443-8\_18}, doi = {10.1007/978-3-030-49443-8\_18}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CatuognoG19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ChabanneDR19, author = {Herv{\'{e}} Chabanne and Emmanuelle Dottax and Franck Rondepierre}, title = {Smart-card Deployment of an Electronic Voting Protocol}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {503--510}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007443805030510}, doi = {10.5220/0007443805030510}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ChabanneDR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ChamatidisS19, author = {Ilias Chamatidis and Georgios P. Spathoulas}, title = {Machine Learning for All: {A} More Robust Federated Learning Framework}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {544--551}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007571705440551}, doi = {10.5220/0007571705440551}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ChamatidisS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ChavanTS19, author = {Neeraj Chavan and Fabio Di Troia and Mark Stamp}, title = {A Comparative Analysis of Android Malware}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {664--673}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007701506640673}, doi = {10.5220/0007701506640673}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/ChavanTS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CorayCS19, author = {Sein Coray and Iwen Coisel and Ignacio Sanchez}, title = {Improved Forensic Recovery of {PKZIP} Stream Cipher Passwords}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {328--335}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007360503280335}, doi = {10.5220/0007360503280335}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CorayCS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CostaBT19, author = {Lu{\'{\i}}s Costa and Jo{\~{a}}o Paulo Barros and Miguel Tavares}, title = {Vulnerabilities in IoT Devices for Smart Home Environment}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {615--622}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007583306150622}, doi = {10.5220/0007583306150622}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CostaBT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DaoudaghLM19, author = {Said Daoudagh and Francesca Lonetti and Eda Marchetti}, title = {A Decentralized Solution for Combinatorial Testing of Access Control Engine}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {126--135}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007379401260135}, doi = {10.5220/0007379401260135}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DaoudaghLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DaoudaghLM19a, author = {Said Daoudagh and Francesca Lonetti and Eda Marchetti}, title = {A General Framework for Decentralized Combinatorial Testing of Access Control Engine: Examples of Application}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, pages = {207--229}, year = {2019}, crossref = {DBLP:conf/icissp/2019s}, url = {https://doi.org/10.1007/978-3-030-49443-8\_10}, doi = {10.1007/978-3-030-49443-8\_10}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DaoudaghLM19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/EzureI19, author = {Takuya Ezure and Masaki Inamura}, title = {An Order-specified Aggregate Authority-transfer Signature}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {309--318}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007359103090318}, doi = {10.5220/0007359103090318}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/EzureI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/EzureI19a, author = {Takuya Ezure and Masaki Inamura}, title = {Proposal and Performance Evaluation of an Order-Specified Aggregate Authority-Transfer Signature}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, pages = {121--136}, year = {2019}, crossref = {DBLP:conf/icissp/2019s}, url = {https://doi.org/10.1007/978-3-030-49443-8\_6}, doi = {10.1007/978-3-030-49443-8\_6}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/EzureI19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FallK19, author = {Doudou Fall and Youki Kadobayashi}, title = {The Common Vulnerability Scoring System vs. Rock Star Vulnerabilities: Why the Discrepancy?}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {405--411}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007387704050411}, doi = {10.5220/0007387704050411}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FallK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FasanoMMNS19, author = {Fausto Fasano and Fabio Martinelli and Francesco Mercaldo and Vittoria Nardone and Antonella Santone}, title = {Spyware Detection using Temporal Logic}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {690--699}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007704806900699}, doi = {10.5220/0007704806900699}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FasanoMMNS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FiliolH19, author = {Eric Filiol and Abhilash Hota}, title = {Solving a Hard Instance of Suspicious Behaviour Detection with Sparse Binary Vectors Clustering}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {635--644}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007347206350644}, doi = {10.5220/0007347206350644}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FiliolH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FrumentoD19, author = {Enrico Frumento and Carlo Dambra}, title = {The {HERMENEUT} Project: Enterprises Intangible Risk Management via Economic Models based on Simulation of Modern Cyber Attacks}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {495--502}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007413504950502}, doi = {10.5220/0007413504950502}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FrumentoD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Fukushima0NFKG19, author = {Kazuhide Fukushima and Damien Marion and Yuto Nakano and Adrien Facon and Shinsaku Kiyomoto and Sylvain Guilley}, title = {Experiment on Side-Channel Key-Recovery using a Real {LPWA} End-device}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {67--74}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007259500670074}, doi = {10.5220/0007259500670074}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Fukushima0NFKG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Fukushima0NFKG19a, author = {Kazuhide Fukushima and Damien Marion and Yuto Nakano and Adrien Facon and Shinsaku Kiyomoto and Sylvain Guilley}, title = {Evaluation of Side-Channel Key-Recovery Attacks on LoRaWAN End-Device}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, pages = {74--92}, year = {2019}, crossref = {DBLP:conf/icissp/2019s}, url = {https://doi.org/10.1007/978-3-030-49443-8\_4}, doi = {10.1007/978-3-030-49443-8\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Fukushima0NFKG19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GrosseNS19, author = {Christine Gro{\ss}e and Maja Nyman and Leif Sundberg}, title = {Information Technology Consulting Firms' Readiness for Managing Information Security Incidents}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, pages = {48--73}, year = {2019}, crossref = {DBLP:conf/icissp/2019s}, url = {https://doi.org/10.1007/978-3-030-49443-8\_3}, doi = {10.1007/978-3-030-49443-8\_3}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GrosseNS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GuanGL0K19, author = {Zhi Guan and Abba Garba and Anran Li and Zhong Chen and Nesrine Kaaniche}, title = {AuthLedger: {A} Novel Blockchain-based Domain Name Authentication Scheme}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {345--352}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007366803450352}, doi = {10.5220/0007366803450352}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GuanGL0K19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Guerra-Manzanares19, author = {Alejandro Guerra{-}Manzanares and Sven N{\~{o}}mm and Hayretdin Bahsi}, title = {In-depth Feature Selection and Ranking for Automated Detection of Mobile Malware}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {274--283}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007349602740283}, doi = {10.5220/0007349602740283}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Guerra-Manzanares19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HormannF19, author = {Ricardo Hormann and Eric Fischer}, title = {Detecting Anomalies by using Self-Organizing Maps in Industrial Environments}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {336--344}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007364803360344}, doi = {10.5220/0007364803360344}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HormannF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HotaI19, author = {Abhilash Hota and Paul Irolla}, title = {Deep Neural Networks for Android Malware Detection}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {657--663}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007617606570663}, doi = {10.5220/0007617606570663}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HotaI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Irolla19, author = {Paul Irolla}, title = {Systematic Characterization of a Sequence Group}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {645--656}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007349706450656}, doi = {10.5220/0007349706450656}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Irolla19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/JensenKG19, author = {Meiko Jensen and Sahil Kapila and Nils Gruschka}, title = {Towards Aligning {GDPR} Compliance with Software Development: {A} Research Agenda}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {389--396}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007383803890396}, doi = {10.5220/0007383803890396}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/JensenKG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KatsikeasJHL19, author = {Sotirios Katsikeas and Pontus Johnson and Simon Hacks and Robert Lagerstr{\"{o}}m}, title = {Probabilistic Modeling and Simulation of Vehicular Cyber Attacks: An Application of the Meta Attack Language}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {175--182}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007247901750182}, doi = {10.5220/0007247901750182}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KatsikeasJHL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KhanNB19, author = {Nadir Khan and Sven Nitzsche and J{\"{u}}rgen Becker}, title = {A Secure Framework with Remote Configuration of Intellectual Property}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {564--571}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007576305640571}, doi = {10.5220/0007576305640571}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KhanNB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KiperbergLRAZ19, author = {Michael Kiperberg and Roee Leon and Amit Resh and Asaf Algawi and Nezer Zaidenberg}, title = {Hypervisor-assisted Atomic Memory Acquisition in Modern Systems}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {155--162}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007566101550162}, doi = {10.5220/0007566101550162}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KiperbergLRAZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KiwanukaAAPF19, author = {Fred N. Kiwanuka and Ja'far Alqatawna and Anang Hudaya Muhamad Amin and Sujni Paul and Hossam Faris}, title = {Towards Automated Comprehensive Feature Engineering for Spam Detection}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {429--437}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007393004290437}, doi = {10.5220/0007393004290437}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KiwanukaAAPF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LestyanABS19, author = {Szilvia Lestyan and Gergely {\'{A}}cs and Gergely Bicz{\'{o}}k and Zsolt Szalay}, title = {Extracting Vehicle Sensor Signals from {CAN} Logs for Driver Re-identification}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {136--145}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007389501360145}, doi = {10.5220/0007389501360145}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LestyanABS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ListikLSH19, author = {V{\'{\i}}t List{\'{\i}}k and Simon Let and Jan Sediv{\'{y}} and V{\'{a}}clav Hlav{\'{a}}c}, title = {Phishing Email Detection based on Named Entity Recognition}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {252--256}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007314202520256}, doi = {10.5220/0007314202520256}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ListikLSH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Loutfi19, author = {Ijlal Loutfi}, title = {SMMDecoy: Detecting {GPU} Keyloggers using Security by Deception Techniques}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {580--587}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007578505800587}, doi = {10.5220/0007578505800587}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Loutfi19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MadhusudanSMZP19, author = {Akash Madhusudan and Iraklis Symeonidis and Mustafa A. Mustafa and Ren Zhang and Bart Preneel}, title = {SC2Share: Smart Contract for Secure Car Sharing}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {163--171}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007703601630171}, doi = {10.5220/0007703601630171}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MadhusudanSMZP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MashhadaniCL19, author = {Shahlaa Mashhadani and Nathan L. Clarke and Fudong Li}, title = {Identification and Extraction of Digital Forensic Evidence from Multimedia Data Sources using Multi-algorithmic Fusion}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {438--448}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007399604380448}, doi = {10.5220/0007399604380448}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MashhadaniCL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MeinigTM19, author = {Michael Meinig and Peter Tr{\"{o}}ger and Christoph Meinel}, title = {Finding Classification Zone Violations with Anonymized Message Flow Analysis}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {284--292}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007352602840292}, doi = {10.5220/0007352602840292}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MeinigTM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MohassebAJL19, author = {Alaa Mohasseb and Benjamin Aziz and Jeyong Jung and Julak Lee}, title = {Predicting CyberSecurity Incidents using Machine Learning Algorithms: {A} Case Study of Korean SMEs}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {230--237}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007309302300237}, doi = {10.5220/0007309302300237}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MohassebAJL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MoriK19, author = {Takafumi Mori and Hiroaki Kikuchi}, title = {Robust Person Identification based on {DTW} Distance of Multiple-Joint Gait Pattern}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {221--229}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007307002210229}, doi = {10.5220/0007307002210229}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MoriK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MucciB19, author = {Daniele Mucci and Bernhards Blumbergs}, title = {{TED:} {A} Container based Tool to Perform Security Risk Assessment for {ELF} Binaries}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {361--369}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007371603610369}, doi = {10.5220/0007371603610369}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MucciB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NguyenRMD19, author = {Hoai Phuong Nguyen and Florent Retraint and Fr{\'{e}}d{\'{e}}ric Morain{-}Nicolier and Agn{\`{e}}s Delahaies}, title = {An Image Forgery Detection Solution based on {DCT} Coefficient Analysis}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {487--494}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007412804870494}, doi = {10.5220/0007412804870494}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NguyenRMD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NymanG19, author = {Maja Nyman and Christine Gro{\ss}e}, title = {Are You Ready When It Counts? {IT} Consulting Firm's Information Security Incident Management}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {26--37}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007247500260037}, doi = {10.5220/0007247500260037}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NymanG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OlukoyaMO19, author = {Oluwafemi Olukoya and Lewis Mackenzie and Inah Omoronyia}, title = {Permission-based Risk Signals for App Behaviour Characterization in Android Apps}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {183--192}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007248701830192}, doi = {10.5220/0007248701830192}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/OlukoyaMO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OudahGB19, author = {Hussein Oudah and Bogdan V. Ghita and Taimur Bakhshi}, title = {A Novel Features Set for Internet Traffic Classification using Burstiness}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {397--404}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007384203970404}, doi = {10.5220/0007384203970404}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/OudahGB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PatzerLMB19, author = {Florian Patzer and Philipp L{\"{u}}dtke and Ankush Meshram and J{\"{u}}rgen Beyerer}, title = {Context-Aware Software-Defined Networking for Automated Incident Response in Industrial Networks}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, pages = {137--161}, year = {2019}, crossref = {DBLP:conf/icissp/2019s}, url = {https://doi.org/10.1007/978-3-030-49443-8\_7}, doi = {10.1007/978-3-030-49443-8\_7}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PatzerLMB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PatzerMH19, author = {Florian Patzer and Ankush Meshram and Maximilian He{\ss}}, title = {Automated Incident Response for Industrial Control Systems Leveraging Software-defined Networking}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {319--327}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007359503190327}, doi = {10.5220/0007359503190327}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/PatzerMH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PfrangGBMB19, author = {Steffen Pfrang and Mark Giraud and Anne Borcherding and David Meier and J{\"{u}}rgen Beyerer}, title = {Design of an Example Network Protocol for Security Tests Targeting Industrial Automation Systems}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {727--738}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007704907270738}, doi = {10.5220/0007704907270738}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PfrangGBMB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Pietro19, author = {Roberto Di Pietro}, title = {Next Generation Information Warfare: Challenges and Research Directions}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {7--8}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Pietro19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PietroCR19, author = {Roberto Di Pietro and Maurantonio Caprolu and Simone Raponi}, title = {Next Generation Information Warfare: Rationales, Scenarios, Threats, and Open Issues}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, pages = {24--47}, year = {2019}, crossref = {DBLP:conf/icissp/2019s}, url = {https://doi.org/10.1007/978-3-030-49443-8\_2}, doi = {10.1007/978-3-030-49443-8\_2}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PietroCR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PonsardG19, author = {Christophe Ponsard and Jeremy Grandclaudon}, title = {Guidelines and Tool Support for Building a Cybersecurity Awareness Program for SMEs}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, pages = {335--357}, year = {2019}, crossref = {DBLP:conf/icissp/2019s}, url = {https://doi.org/10.1007/978-3-030-49443-8\_16}, doi = {10.1007/978-3-030-49443-8\_16}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PonsardG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PonsardGB19, author = {Christophe Ponsard and Jeremy Grandclaudon and S{\'{e}}bastien Bal}, title = {Survey and Lessons Learned on Raising {SME} Awareness about Cybersecurity}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {558--563}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007574305580563}, doi = {10.5220/0007574305580563}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PonsardGB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Quirchmayr19, author = {Gerald Quirchmayr}, title = {Challenges of {GDPR} and the {NIS} Directive}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {9}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Quirchmayr19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Reza0E19, author = {Khondker Jahid Reza and Md Zahidul Islam and Vladimir Estivill{-}Castro}, title = {Privacy Preservation of Social Network Users Against Attribute Inference Attacks via Malicious Data Mining}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {412--420}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007390404120420}, doi = {10.5220/0007390404120420}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Reza0E19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Reza0E19a, author = {Khondker Jahid Reza and Md Zahidul Islam and Vladimir Estivill{-}Castro}, title = {Protection of User-Defined Sensitive Attributes on Online Social Networks Against Attribute Inference Attack via Adversarial Data Mining}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, pages = {230--249}, year = {2019}, crossref = {DBLP:conf/icissp/2019s}, url = {https://doi.org/10.1007/978-3-030-49443-8\_11}, doi = {10.1007/978-3-030-49443-8\_11}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Reza0E19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SaadBE19, author = {Sherif Saad and William Briguglio and Haytham Elmiligi}, title = {The Curious Case of Machine Learning in Malware Detection}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {528--535}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007470705280535}, doi = {10.5220/0007470705280535}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SaadBE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SaaudiTF19, author = {Ahmed Saaudi and Yan Tong and Csilla Farkas}, title = {Probabilistic Graphical Model on Detecting Insiders: Modeling with {SGD-HMM}}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {461--470}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007404004610470}, doi = {10.5220/0007404004610470}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SaaudiTF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SatoHT19, author = {Yuya Sato and Hirokazu Hasegawa and Hiroki Takakura}, title = {Construction of Secure Internal Networks with Communication Classifying System}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {552--557}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007571905520557}, doi = {10.5220/0007571905520557}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SatoHT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SchwittmannWW19, author = {Lorenz Schwittmann and Matth{\"{a}}us Wander and Torben Weis}, title = {Mobile Devices as Digital Sextants for Zero-Permission Geolocation}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {55--66}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007254000550066}, doi = {10.5220/0007254000550066}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SchwittmannWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SnymanK19, author = {Dirk Snyman and Hennie A. Kruger}, title = {Theorising on Information Cascades and Sequential Decision-making for Analysing Security Behaviour}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {205--212}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007258702050212}, doi = {10.5220/0007258702050212}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SnymanK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Sonntag19, author = {Michael Sonntag}, title = {Malicious {DNS} Traffic in Tor: Analysis and Countermeasures}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {536--543}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007471205360543}, doi = {10.5220/0007471205360543}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Sonntag19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SpagnueloFL19, author = {Dayana Spagnuelo and Ana Ferreira and Gabriele Lenzini}, title = {Accomplishing Transparency within the General Data Protection Regulation}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {114--125}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007366501140125}, doi = {10.5220/0007366501140125}, timestamp = {Mon, 03 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SpagnueloFL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SpagnueloFL19a, author = {Dayana Spagnuelo and Ana Ferreira and Gabriele Lenzini}, title = {Transparency Enhancing Tools and the {GDPR:} Do They Match?}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, pages = {162--185}, year = {2019}, crossref = {DBLP:conf/icissp/2019s}, url = {https://doi.org/10.1007/978-3-030-49443-8\_8}, doi = {10.1007/978-3-030-49443-8\_8}, timestamp = {Mon, 03 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SpagnueloFL19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TavolatoT19, author = {Paul Tavolato and Christina Tavolato{-}W{\"{o}}tzl}, title = {Analytical Modelling of Cyber-physical Systems}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {685--689}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007704706850689}, doi = {10.5220/0007704706850689}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TavolatoT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TorresSAP19, author = {Jos{\'{e}} Torres and Sergio de los Santos and Efthimios Alepis and Constantinos Patsakis}, title = {Behavioral Biometric Authentication in Android Unlock Patterns through Machine Learning}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {146--154}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007394201460154}, doi = {10.5220/0007394201460154}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TorresSAP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TorresSAP19a, author = {Jos{\'{e}} Torres and Sergio de los Santos and Efthimios Alepis and Constantinos Patsakis}, title = {User Behavioral Biometrics and Machine Learning Towards Improving User Authentication in Smartphones}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, pages = {250--271}, year = {2019}, crossref = {DBLP:conf/icissp/2019s}, url = {https://doi.org/10.1007/978-3-030-49443-8\_12}, doi = {10.1007/978-3-030-49443-8\_12}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TorresSAP19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/UlzFPS19, author = {Thomas Ulz and Markus Feldbacher and Thomas W. Pieber and Christian Steger}, title = {Sensing Danger: Exploiting Sensors to Build Covert Channels}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {100--113}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007353801000113}, doi = {10.5220/0007353801000113}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/UlzFPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/VendittiF19, author = {Antonello Venditti and Fausto Fasano}, title = {A Systematic Approach to Choose the Data Warehouse Architecture}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {711--718}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007700307110718}, doi = {10.5220/0007700307110718}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/VendittiF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WahshehL19, author = {Heider A. M. Wahsheh and Flaminia L. Luccio}, title = {Evaluating Security, Privacy and Usability Features of {QR} Code Readers}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {266--273}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007346202660273}, doi = {10.5220/0007346202660273}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/WahshehL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WeinhardtO19, author = {Stephanie Weinhardt and Olamide Omolola}, title = {Usability of Policy Authoring Tools: {A} Layered Approach}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {301--308}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007355003010308}, doi = {10.5220/0007355003010308}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WeinhardtO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/XiongKL19, author = {Wenjun Xiong and Fredrik Krantz and Robert Lagerstr{\"{o}}m}, title = {Threat Modeling and Attack Simulations of Connected Vehicles: {A} Research Outlook}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {479--486}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007412104790486}, doi = {10.5220/0007412104790486}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/XiongKL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/XiongKL19a, author = {Wenjun Xiong and Fredrik Krantz and Robert Lagerstr{\"{o}}m}, title = {Threat Modeling and Attack Simulations of Connected Vehicles: Proof of Concept}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, pages = {272--287}, year = {2019}, crossref = {DBLP:conf/icissp/2019s}, url = {https://doi.org/10.1007/978-3-030-49443-8\_13}, doi = {10.1007/978-3-030-49443-8\_13}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/XiongKL19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/YamadaKMI19, author = {Michihiro Yamada and Hiroaki Kikuchi and Naoki Matsuyama and Koji Inui}, title = {Mathematical Model to Estimate Loss by Cyber Incident in Japan}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {353--360}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007368503530360}, doi = {10.5220/0007368503530360}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/YamadaKMI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/YonamineKMT19, author = {Shun Yonamine and Youki Kadobayashi and Daisuke Miyamoto and Yuzo Taenaka}, title = {Towards Automated Characterization of Malware's High-level Mechanism using Virtual Machine Introspection}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {471--478}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007405504710478}, doi = {10.5220/0007405504710478}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/YonamineKMT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/YoshinoSNS19, author = {Masayuki Yoshino and Takayuki Suzuki and Ken Naganuma and Hisayoshi Sato}, title = {Definition and Efficient Construction of Encrypted k-anonymization Scheme}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {293--300}, year = {2019}, crossref = {DBLP:conf/icissp/2019}, url = {https://doi.org/10.5220/0007354702930300}, doi = {10.5220/0007354702930300}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/YoshinoSNS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ZaidenbergKYLAR19, author = {Nezer Jacob Zaidenberg and Michael Kiperberg and Raz Ben Yehuda and Roee Leon and Asaf Algawi and Amit Resh}, title = {Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, pages = {317--334}, year = {2019}, crossref = {DBLP:conf/icissp/2019s}, url = {https://doi.org/10.1007/978-3-030-49443-8\_15}, doi = {10.1007/978-3-030-49443-8\_15}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ZaidenbergKYLAR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2018s, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {977}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-25109-3}, doi = {10.1007/978-3-030-25109-3}, isbn = {978-3-030-25108-6}, timestamp = {Tue, 08 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2018s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2019, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, publisher = {SciTePress}, year = {2019}, isbn = {978-989-758-359-9}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AbomharaKOH18, author = {Mohamed Abomhara and Geir M. K{\o}ien and Vladimir A. Oleshchuk and Mohamed Hamid}, title = {Towards Risk-aware Access Control Framework for Healthcare Information Sharing}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {312--321}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006608103120321}, doi = {10.5220/0006608103120321}, timestamp = {Wed, 11 Apr 2018 15:27:25 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AbomharaKOH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AburawiLC18, author = {Nahla Aburawi and Alexei Lisitsa and Frans Coenen}, title = {Querying Encrypted Graph Databases}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {447--451}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006660004470451}, doi = {10.5220/0006660004470451}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AburawiLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Alepis18, author = {Efthimios Alepis}, title = {Notify This: Exploiting Android Notifications for Fun and Profit}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, pages = {86--108}, year = {2018}, crossref = {DBLP:conf/icissp/2018s}, url = {https://doi.org/10.1007/978-3-030-25109-3\_5}, doi = {10.1007/978-3-030-25109-3\_5}, timestamp = {Tue, 08 Oct 2019 13:28:02 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Alepis18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlpersPOR18, author = {Sascha Alpers and Roman Pilipchuk and Andreas Oberweis and Ralf H. Reussner}, title = {Identifying Needs for a Holistic Modelling Approach to Privacy Aspects in Enterprise Software Systems}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {74--82}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006606200740082}, doi = {10.5220/0006606200740082}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlpersPOR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlpersPOR18a, author = {Sascha Alpers and Roman Pilipchuk and Andreas Oberweis and Ralf H. Reussner}, title = {The Current State of the Holistic Privacy and Security Modelling Approach in Business Process and Software Architecture Modelling}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, pages = {109--124}, year = {2018}, crossref = {DBLP:conf/icissp/2018s}, url = {https://doi.org/10.1007/978-3-030-25109-3\_6}, doi = {10.1007/978-3-030-25109-3\_6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlpersPOR18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlqahtaniCHG18, author = {Ohud Alqahtani and Zhiyuan Chen and Qiong Huang and Karthik Gottipati}, title = {Is Bigger Safer? Analyzing Factors Related to Data Breaches using Publicly Available Information}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {373--378}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlqahtaniCHG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlshehriCB18, author = {Abdullah Alshehri and Frans Coenen and Danushka Bollegala}, title = {Spectral Analysis of Keystroke Streams: Towards Effective Real-time Continuous User Authentication}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {62--73}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006606100620073}, doi = {10.5220/0006606100620073}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlshehriCB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlvesM18, author = {Thiago Alves and Thomas H. Morris}, title = {Hardware-based Cyber Threats}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {259--266}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006577202590266}, doi = {10.5220/0006577202590266}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/AlvesM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Anderson18, author = {Ross Anderson}, title = {Sustainable Security - an Internet of Durable Goods}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {7}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, timestamp = {Tue, 25 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Anderson18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BacciBMMMV18, author = {Alessandro Bacci and Alberto Bartoli and Fabio Martinelli and Eric Medvet and Francesco Mercaldo and Corrado Aaron Visaggio}, title = {Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {379--385}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006642503790385}, doi = {10.5220/0006642503790385}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BacciBMMMV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BacciMMM18, author = {Alessandro Bacci and Fabio Martinelli and Eric Medvet and Francesco Mercaldo}, title = {VizMal: {A} Visualization Tool for Analyzing the Behavior of Android Malware}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {517--525}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006665005170525}, doi = {10.5220/0006665005170525}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BacciMMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BadjiD18, author = {Radja Badji and Fida Kamal Dankar}, title = {A Risk-aware Access Control Model for Biomedical Research Platforms}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {322--328}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006608403220328}, doi = {10.5220/0006608403220328}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BadjiD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BarrosL18, author = {Martina J. Zucule de Barros and Horst Lazarek}, title = {A Cyber Safety Model for Schools in Mozambique}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {251--258}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006573802510258}, doi = {10.5220/0006573802510258}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BarrosL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CalderonHYS18, author = {Paul Calderon and Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada}, title = {Malware Detection based on {HTTPS} Characteristic via Machine Learning}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {410--417}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006654604100417}, doi = {10.5220/0006654604100417}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CalderonHYS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DagherMMM18, author = {Gaby G. Dagher and Praneeth Babu Marella and Matea Milojkovic and Jordan Mohler}, title = {BroncoVote: Secure Voting System using Ethereum's Blockchain}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {96--107}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006609700960107}, doi = {10.5220/0006609700960107}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DagherMMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DeyBS18, author = {Alexandre Dey and Loic Beheshti and Marie{-}Kerguelen Sido}, title = {Health State of Google's PlayStore - Finding Malware in Large Sets of Applications from the Android Market}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {538--544}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006727705380544}, doi = {10.5220/0006727705380544}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DeyBS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DieschPK18, author = {Rainer Diesch and Matthias Pfaff and Helmut Krcmar}, title = {Prerequisite to Measure Information Security - {A} State of the Art Literature Review}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {207--215}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006545602070215}, doi = {10.5220/0006545602070215}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/DieschPK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/EiblBE18, author = {G{\"{u}}nther Eibl and Sebastian Burkhart and Dominik Engel}, title = {Unsupervised Holiday Detection from Low-resolution Smart Metering Data}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {477--486}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006719704770486}, doi = {10.5220/0006719704770486}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/EiblBE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/EiblBE18a, author = {G{\"{u}}nther Eibl and Sebastian Burkhart and Dominik Engel}, title = {Insights into Unsupervised Holiday Detection from Low-Resolution Smart Metering Data}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, pages = {281--302}, year = {2018}, crossref = {DBLP:conf/icissp/2018s}, url = {https://doi.org/10.1007/978-3-030-25109-3\_15}, doi = {10.1007/978-3-030-25109-3\_15}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/EiblBE18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/EignerKT18, author = {Oliver Eigner and Philipp Kreimel and Paul Tavolato}, title = {Attacks on Industrial Control Systems - Modeling and Anomaly Detection}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {581--588}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006755405810588}, doi = {10.5220/0006755405810588}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/EignerKT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/EreminK18, author = {Aleksandr Eremin and Konstantin Kogos}, title = {Incoming Call Implicit User Authentication - User Authentication via Hand Movement Pattern}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {24--29}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006555200240029}, doi = {10.5220/0006555200240029}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/EreminK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/EreminKV18, author = {Aleksandr Eremin and Konstantin Kogos and Yana Valatskayte}, title = {Touch and Move: Incoming Call User Authentication}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, pages = {26--39}, year = {2018}, crossref = {DBLP:conf/icissp/2018s}, url = {https://doi.org/10.1007/978-3-030-25109-3\_2}, doi = {10.1007/978-3-030-25109-3\_2}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/EreminKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FerreiraM18, author = {Ana Ferreira and Pedro Manuel Vieira Marques}, title = {Phishing Through Time: {A} Ten Year Story based on Abstracts}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {225--232}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006552602250232}, doi = {10.5220/0006552602250232}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FerreiraM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FiliolJD18, author = {Eric Filiol and J. Nicolas and Maxence Delong}, title = {Statistical and Combinatorial Analysis of the {TOR} Routing Protocol - Structural Weaknesses Identified in the {TOR} Network}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {507--516}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006634705070516}, doi = {10.5220/0006634705070516}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/FiliolJD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Fortuna0B18, author = {Pedro Fortuna and Nuno Pereira and Ismail Butun}, title = {A Framework for Web Application Integrity}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {487--493}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006720204870493}, doi = {10.5220/0006720204870493}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Fortuna0B18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FredjLC18, author = {Feten Ben Fredj and Nadira Lammari and Isabelle Comyn{-}Wattiau}, title = {Relational Database Anonymization - {A} Model-driven Guiding Approach}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {161--170}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006659201610170}, doi = {10.5220/0006659201610170}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FredjLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GaoW18, author = {Yuanyuan Gao and Kunpeng Wang}, title = {Probability Preservation Property with Relative Error and Its Applications}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {461--468}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006717204610468}, doi = {10.5220/0006717204610468}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GaoW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GencLRS18, author = {Ziya Alper Gen{\c{c}} and Gabriele Lenzini and Peter Y. A. Ryan and Itzel V{\'{a}}zquez Sandoval}, title = {A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {83--95}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006609100830095}, doi = {10.5220/0006609100830095}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GencLRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GencLRS18a, author = {Ziya Alper Gen{\c{c}} and Gabriele Lenzini and Peter Y. A. Ryan and Itzel V{\'{a}}zquez Sandoval}, title = {A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, pages = {125--151}, year = {2018}, crossref = {DBLP:conf/icissp/2018s}, url = {https://doi.org/10.1007/978-3-030-25109-3\_7}, doi = {10.1007/978-3-030-25109-3\_7}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GencLRS18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GougeonL18, author = {Thomas Gougeon and Patrick Lacharme}, title = {How to Break CaptchaStar}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {41--51}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006577600410051}, doi = {10.5220/0006577600410051}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GougeonL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GougeonL18a, author = {Thomas Gougeon and Patrick Lacharme}, title = {A Simple Attack on CaptchaStar}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, pages = {66--85}, year = {2018}, crossref = {DBLP:conf/icissp/2018s}, url = {https://doi.org/10.1007/978-3-030-25109-3\_4}, doi = {10.1007/978-3-030-25109-3\_4}, timestamp = {Tue, 08 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GougeonL18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GrafK18, author = {Roman Graf and Ross King}, title = {Cyber Threat Information Classification and Life Cycle Management using Smart Contracts}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {304--311}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006605203040311}, doi = {10.5220/0006605203040311}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GrafK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HakbilenPEU18, author = {Onur Hakbilen and Piraveen Perinparajan and Michael Eikeland and Nils Ulltveit{-}Moe}, title = {{SAFEPASS} - Presenting a Convenient, Portable and Secure Password Manager}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {292--303}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006603102920303}, doi = {10.5220/0006603102920303}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HakbilenPEU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HamidiSM18, author = {Mona Hamidi and Mina Sheikhalishahi and Fabio Martinelli}, title = {Secure Two-party Agglomerative Hierarchical Clustering Construction}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {432--437}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006659704320437}, doi = {10.5220/0006659704320437}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HamidiSM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HaupertM18, author = {Vincent Haupert and Tilo M{\"{u}}ller}, title = {On App-based Matrix Code Authentication in Online Banking}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {149--160}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006650501490160}, doi = {10.5220/0006650501490160}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HaupertM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HerwonoE18, author = {Ian Herwono and Fadi Ali El{-}Moussa}, title = {Automated Detection of the Early Stages of Cyber Kill Chain}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {182--189}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006543301820189}, doi = {10.5220/0006543301820189}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HerwonoE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HuangTS18, author = {Jasper Huang and Fabio Di Troia and Mark Stamp}, title = {Acoustic Gait Analysis using Support Vector Machines}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {545--552}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006730705450552}, doi = {10.5220/0006730705450552}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HuangTS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HummerGKFP18, author = {Matthias Hummer and Sebastian Groll and Michael Kunz and Ludwig Fuchs and G{\"{u}}nther Pernul}, title = {Measuring Identity and Access Management Performance - An Expert Survey on Possible Performance Indicators}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {233--240}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006557702330240}, doi = {10.5220/0006557702330240}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HummerGKFP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HunterW18, author = {Aaron Hunter and Ken Wong}, title = {Decoy Systems with Low Energy Bluetooth Communication}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {404--409}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006646604040409}, doi = {10.5220/0006646604040409}, timestamp = {Fri, 15 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HunterW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Jacoby18, author = {David Jacoby}, title = {Hacking the Security Industry for Fun and Profit and Humanity}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {5}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Jacoby18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/JasserTSR18, author = {Stefanie Jasser and Katja Tuma and Riccardo Scandariato and Matthias Riebisch}, title = {Back to the Drawing Board - Bringing Security Constraints in an Architecture-centric Software Development Process}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {438--446}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006659904380446}, doi = {10.5220/0006659904380446}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/JasserTSR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KandoussiB18, author = {Asmaa El Kandoussi and Hanan El Bakkali}, title = {Novel Access Control Approach for Inter-organizational Workflows}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {345--352}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KandoussiB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KarlzenBH18, author = {Henrik Karlz{\'{e}}n and Johan E. Bengtsson and Jonas Hallberg}, title = {A Test of Structured Threat Descriptions for Information Security Risk Assessments}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {469--476}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006719604690476}, doi = {10.5220/0006719604690476}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KarlzenBH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LeeOKL18, author = {Wei{-}Han Lee and Jorge Ortiz and Bongjun Ko and Ruby B. Lee}, title = {Inferring Smartphone Users' Handwritten Patterns by using Motion Sensors}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {139--148}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006650301390148}, doi = {10.5220/0006650301390148}, timestamp = {Fri, 07 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LeeOKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LuhTTS18, author = {Robert Luh and Marlies Temper and Simon Tjoa and Sebastian Schrittwieser}, title = {{APT} {RPG:} Design of a Gamified Attacker/Defender Meta Model}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {526--537}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006717805260537}, doi = {10.5220/0006717805260537}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/LuhTTS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MarellaMMD18, author = {Praneeth Babu Marella and Matea Milojkovic and Jordan Mohler and Gaby G. Dagher}, title = {GenVote: Blockchain-Based Customizable and Secure Voting Platform}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, pages = {152--171}, year = {2018}, crossref = {DBLP:conf/icissp/2018s}, url = {https://doi.org/10.1007/978-3-030-25109-3\_8}, doi = {10.1007/978-3-030-25109-3\_8}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MarellaMMD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MartinelliMN18, author = {Fabio Martinelli and Francesco Mercaldo and Vittoria Nardone}, title = {Identifying Insecure Features in Android Applications using Model Checking}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {589--596}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006758105890596}, doi = {10.5220/0006758105890596}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MartinelliMN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MartinelliMNOS18, author = {Fabio Martinelli and Francesco Mercaldo and Vittoria Nardone and Albina Orlando and Antonella Santone}, title = {Who's Driving My Car? {A} Machine Learning based Approach to Driver Identification}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {367--372}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006633403670372}, doi = {10.5220/0006633403670372}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MartinelliMNOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MartinelliMNOS18a, author = {Fabio Martinelli and Francesco Mercaldo and Vittoria Nardone and Albina Orlando and Antonella Santone}, title = {Cluster Analysis for Driver Aggressiveness Identification}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {562--569}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006755205620569}, doi = {10.5220/0006755205620569}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MartinelliMNOS18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MauriCD18, author = {Lara Mauri and Stelvio Cimato and Ernesto Damiani}, title = {A Comparative Analysis of Current Cryptocurrencies}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {127--138}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006648801270138}, doi = {10.5220/0006648801270138}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MauriCD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MaynardMS18, author = {Peter Maynard and Kieran McLaughlin and Sakir Sezer}, title = {Using Application Layer Metrics to Detect Advanced {SCADA} Attacks}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {418--425}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006656204180425}, doi = {10.5220/0006656204180425}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/MaynardMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MeinigM18, author = {Michael Meinig and Christoph Meinel}, title = {Securing the Flow - Data Flow Analysis with Operational Node Structures}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {241--250}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006570302410250}, doi = {10.5220/0006570302410250}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MeinigM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MigdalR18, author = {Denis Migdal and Christophe Rosenberger}, title = {Towards a Personal Identity Code Respecting Privacy}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {267--274}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006578902670274}, doi = {10.5220/0006578902670274}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MigdalR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MorissetS18, author = {Charles Morisset and David Sanchez}, title = {VisABAC: {A} Tool for Visualising {ABAC} Policies}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {117--126}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006647401170126}, doi = {10.5220/0006647401170126}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MorissetS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MorissetS18a, author = {Charles Morisset and David Sanchez}, title = {On Building a Visualisation Tool for Access Control Policies}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, pages = {215--239}, year = {2018}, crossref = {DBLP:conf/icissp/2018s}, url = {https://doi.org/10.1007/978-3-030-25109-3\_12}, doi = {10.1007/978-3-030-25109-3\_12}, timestamp = {Tue, 08 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MorissetS18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NagarajanTAS18, author = {Prathiba Nagarajan and Fabio Di Troia and Thomas H. Austin and Mark Stamp}, title = {Autocorrelation Analysis of Financial Botnet Traffic}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {599--606}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006685705990606}, doi = {10.5220/0006685705990606}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/NagarajanTAS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Nazmul0C18, author = {Rumana Nazmul and Md. Rafiqul Islam and Ahsan Raja Chowdhury}, title = {Alignment-free Cancellable Template Generation for Fingerprint based Authentication}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {361--366}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006614303610366}, doi = {10.5220/0006614303610366}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Nazmul0C18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NguyenZRDMN18, author = {Kim Trong Nguyen and Cathel Zitzmann and Florent Retraint and Agn{\`{e}}s Delahaies and Fr{\'{e}}d{\'{e}}ric Morain{-}Nicolier and Hoai Phuong Nguyen}, title = {Face Spoofing Detection for Smartphones using a 3D Reconstruction and the Motion Sensors}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {286--291}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006602202860291}, doi = {10.5220/0006602202860291}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NguyenZRDMN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NinassiVR18, author = {Alexandre Ninassi and Sylvain Vernois and Christophe Rosenberger}, title = {Privacy Compliant Multi-biometric Authentication on Smartphones}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {173--181}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006534601730181}, doi = {10.5220/0006534601730181}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NinassiVR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PatsakisA18, author = {Constantinos Patsakis and Efthimios Alepis}, title = {Knock-Knock: The Unbearable Lightness of Android Notifications}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {52--61}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006603200520061}, doi = {10.5220/0006603200520061}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PatsakisA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PfrangMFB18, author = {Steffen Pfrang and David Meier and Michael Friedrich and J{\"{u}}rgen Beyerer}, title = {Advancing Protocol Fuzzing for Industrial Automation and Control Systems}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {570--580}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006755305700580}, doi = {10.5220/0006755305700580}, timestamp = {Mon, 11 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/PfrangMFB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PonsardG18, author = {Christophe Ponsard and Jeremy Grandclaudon}, title = {Survey and Guidelines for the Design and Deployment of a Cyber Security Label for SMEs}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, pages = {240--260}, year = {2018}, crossref = {DBLP:conf/icissp/2018s}, url = {https://doi.org/10.1007/978-3-030-25109-3\_13}, doi = {10.1007/978-3-030-25109-3\_13}, timestamp = {Tue, 08 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PonsardG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PonsardGD18, author = {Christophe Ponsard and Jeremy Grandclaudon and Gautier Dallons}, title = {Towards a Cyber Security Label for SMEs: {A} European Perspective -}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {426--431}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006657604260431}, doi = {10.5220/0006657604260431}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PonsardGD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Rosenberger18, author = {Christophe Rosenberger}, title = {Evaluation of Biometric Template Protection Schemes based on a Transformation}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {216--224}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006550502160224}, doi = {10.5220/0006550502160224}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Rosenberger18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SharafaldinLG18, author = {Iman Sharafaldin and Arash Habibi Lashkari and Ali A. Ghorbani}, title = {Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {108--116}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006639801080116}, doi = {10.5220/0006639801080116}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SharafaldinLG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SharafaldinLG18a, author = {Iman Sharafaldin and Arash Habibi Lashkari and Ali A. Ghorbani}, title = {A Detailed Analysis of the {CICIDS2017} Data Set}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, pages = {172--188}, year = {2018}, crossref = {DBLP:conf/icissp/2018s}, url = {https://doi.org/10.1007/978-3-030-25109-3\_9}, doi = {10.1007/978-3-030-25109-3\_9}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SharafaldinLG18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SheikhalishahiH18, author = {Mina Sheikhalishahi and Mona Hamidi and Fabio Martinelli}, title = {Privacy Preserving Collaborative Agglomerative Hierarchical Clustering Construction}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, pages = {261--280}, year = {2018}, crossref = {DBLP:conf/icissp/2018s}, url = {https://doi.org/10.1007/978-3-030-25109-3\_14}, doi = {10.1007/978-3-030-25109-3\_14}, timestamp = {Tue, 08 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SheikhalishahiH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SilvaNS18, author = {Marco Silva and Ant{\'{o}}nio Nogueira and Paulo Salvador}, title = {Modular Platform for Customer-Side Detection of {BGP} Redirection Attacks}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {199--206}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006543601990206}, doi = {10.5220/0006543601990206}, timestamp = {Wed, 16 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SilvaNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SinghRS18, author = {Dilpreet Singh and Ron Ruhl and Hamman Samuel}, title = {Attack Tree for Modelling Unauthorized {EMV} Card Transactions at {POS} Terminals}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {494--502}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006723304940502}, doi = {10.5220/0006723304940502}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SinghRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Stach18, author = {Christoph Stach}, title = {Big Brother is Smart Watching You - Privacy Concerns about Health and Fitness Applications}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {13--23}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006537000130023}, doi = {10.5220/0006537000130023}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Stach18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Stach18a, author = {Christoph Stach}, title = {Fine-Grained Privacy Control for Fitness and Health Applications Using the Privacy Management Platform}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, pages = {1--25}, year = {2018}, crossref = {DBLP:conf/icissp/2018s}, url = {https://doi.org/10.1007/978-3-030-25109-3\_1}, doi = {10.1007/978-3-030-25109-3\_1}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/Stach18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/StachM18, author = {Christoph Stach and Bernhard Mitschang}, title = {{ACCESSORS} - {A} Data-Centric Permission Model for the Internet of Things}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {30--40}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006572100300040}, doi = {10.5220/0006572100300040}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/StachM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/StachM18a, author = {Christoph Stach and Bernhard Mitschang}, title = {Elicitation of Privacy Requirements for the Internet of Things Using {ACCESSORS}}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, pages = {40--65}, year = {2018}, crossref = {DBLP:conf/icissp/2018s}, url = {https://doi.org/10.1007/978-3-030-25109-3\_3}, doi = {10.1007/978-3-030-25109-3\_3}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/StachM18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ToliP18, author = {Christina{-}Angeliki Toli and Bart Preneel}, title = {Privacy-preserving Biometric Authentication Model for e-Finance Applications}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {353--360}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006611303530360}, doi = {10.5220/0006611303530360}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ToliP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TorresS18, author = {Jos{\'{e}} Torres and Sergio de los Santos}, title = {Malicious {PDF} Documents Detection using Machine Learning Techniques - {A} Practical Approach with Cloud Computing Applications}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {337--344}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006609503370344}, doi = {10.5220/0006609503370344}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TorresS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/VasileiouF18, author = {Ismini Vasileiou and Steven Furnell}, title = {Enhancing Security Education - Recognising Threshold Concepts and Other Influencing Factors}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {398--403}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006646203980403}, doi = {10.5220/0006646203980403}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/VasileiouF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/VasileiouF18a, author = {Ismini Vasileiou and Steven Furnell}, title = {Personalising Security Education: Factors Influencing Individual Awareness and Compliance}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, pages = {189--200}, year = {2018}, crossref = {DBLP:conf/icissp/2018s}, url = {https://doi.org/10.1007/978-3-030-25109-3\_10}, doi = {10.1007/978-3-030-25109-3\_10}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/VasileiouF18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/VibertCBR18, author = {Beno{\^{\i}}t Vibert and Christophe Charrier and Jean{-}Marie Le Bars and Christophe Rosenberger}, title = {Towards an Optimal Template Reduction for Securing Embedded Fingerprint Devices}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {329--336}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006608903290336}, doi = {10.5220/0006608903290336}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/VibertCBR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WaagsnesU18, author = {Henrik Waagsnes and Nils Ulltveit{-}Moe}, title = {Intrusion Detection System Test Framework for {SCADA} Systems}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {275--285}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006588202750285}, doi = {10.5220/0006588202750285}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WaagsnesU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WangZL18, author = {Wenbo Wang and Tianning Zang and Yuqing Lan}, title = {The Rapid Extraction of Suspicious Traffic from Passive {DNS}}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {190--198}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006543401900198}, doi = {10.5220/0006543401900198}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WangZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WongH18, author = {Kenneth C. K. Wong and Aaron Hunter}, title = {Managing Cybersecurity Break-ins Using Bluetooth Low Energy Devices to Verify Attackers: {A} Practical Study}, booktitle = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, pages = {201--214}, year = {2018}, crossref = {DBLP:conf/icissp/2018s}, url = {https://doi.org/10.1007/978-3-030-25109-3\_11}, doi = {10.1007/978-3-030-25109-3\_11}, timestamp = {Fri, 15 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WongH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WurzenbergerSSF18, author = {Markus Wurzenberger and Florian Skopik and Giuseppe Settanni and Roman Fiedler}, title = {{AECID:} {A} Self-learning Anomaly Detection Approach based on Light-weight Log Parser Models}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {386--397}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006643003860397}, doi = {10.5220/0006643003860397}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WurzenbergerSSF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/YajamanamSTS18, author = {Sravani Yajamanam and Vikash Raja Samuel Selvin and Fabio Di Troia and Mark Stamp}, title = {Deep Learning versus Gist Descriptors for Image-based Malware Classification}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {553--561}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006685805530561}, doi = {10.5220/0006685805530561}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/YajamanamSTS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ZhengW18, author = {Kaiyan Zheng and Peng Wang}, title = {Encryption Schemes based on a Single Permutation: PCBC, POFB, {PCFB} and {PCTR}}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {452--460}, year = {2018}, crossref = {DBLP:conf/icissp/2018}, url = {https://doi.org/10.5220/0006713804520460}, doi = {10.5220/0006713804520460}, timestamp = {Tue, 17 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/ZhengW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2017s, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93354-2}, doi = {10.1007/978-3-319-93354-2}, isbn = {978-3-319-93353-5}, timestamp = {Fri, 24 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2017s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2018, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, publisher = {SciTePress}, year = {2018}, isbn = {978-989-758-282-0}, timestamp = {Wed, 11 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AhmadiS17, author = {Ahmad Ahmadi and Reihaneh Safavi{-}Naini}, title = {Distance-bounding Identification}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {202--212}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006211102020212}, doi = {10.5220/0006211102020212}, timestamp = {Thu, 18 May 2017 14:22:34 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AhmadiS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AhmadiS17a, author = {Ahmad Ahmadi and Reihaneh Safavi{-}Naini}, title = {Directional Distance-Bounding Identification}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, pages = {197--221}, year = {2017}, crossref = {DBLP:conf/icissp/2017s}, url = {https://doi.org/10.1007/978-3-319-93354-2\_10}, doi = {10.1007/978-3-319-93354-2\_10}, timestamp = {Fri, 24 Aug 2018 07:46:20 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AhmadiS17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AldayelA17, author = {Mashael Aldayel and Mohammad Alhussain}, title = {Enhanced Identification of Sensitive User Inputs in Mobile Applications}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {506--515}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006238405060515}, doi = {10.5220/0006238405060515}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AldayelA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlepisP17, author = {Efthimios Alepis and Constantinos Patsakis}, title = {There's Wally! Location Tracking in Android without Permissions}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {278--284}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006125502780284}, doi = {10.5220/0006125502780284}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlepisP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlruhailyBC17, author = {Nada Alruhaily and Behzad Bordbar and Tom Chothia}, title = {Towards an Understanding of the Misclassification Rates of Machine Learning-based Malware Detection Systems}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {101--112}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006174301010112}, doi = {10.5220/0006174301010112}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlruhailyBC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlruhailyCB17, author = {Nada Alruhaily and Tom Chothia and Behzad Bordbar}, title = {A Better Understanding of Machine Learning Malware Misclassifcation}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, pages = {35--58}, year = {2017}, crossref = {DBLP:conf/icissp/2017s}, url = {https://doi.org/10.1007/978-3-319-93354-2\_3}, doi = {10.1007/978-3-319-93354-2\_3}, timestamp = {Fri, 24 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlruhailyCB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BannierF17, author = {Arnaud Bannier and Eric Filiol}, title = {Mathematical Backdoors in Symmetric Encryption Systems - Proposal for a Backdoored AES-like Block Cipher}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {622--631}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006244406220631}, doi = {10.5220/0006244406220631}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BannierF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BarghVC17, author = {Mortaza S. Bargh and Marco Vink and Sunil Choenni}, title = {On Usage Control in Relational Database Management Systems - Obligations and Their Enforcement in Joining Datasets}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {190--201}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006209801900201}, doi = {10.5220/0006209801900201}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BarghVC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BarghVC17a, author = {Mortaza S. Bargh and Marco Vink and Sunil Choenni}, title = {On Using Obligations for Usage Control in Joining of Datasets}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, pages = {173--196}, year = {2017}, crossref = {DBLP:conf/icissp/2017s}, url = {https://doi.org/10.1007/978-3-319-93354-2\_9}, doi = {10.1007/978-3-319-93354-2\_9}, timestamp = {Fri, 24 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BarghVC17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BernardeschiNDP17, author = {Cinzia Bernardeschi and Marco Di Natale and Gianluca Dini and Maurizio Palmieri}, title = {Verifying Data Secure Flow in {AUTOSAR} Models by Static Analysis}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {704--713}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006288707040713}, doi = {10.5220/0006288707040713}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BernardeschiNDP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Bertino17, author = {Elisa Bertino}, title = {Security and Privacy in the IoT}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {5}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Bertino17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BeukemaAS17, author = {Wietze J. B. Beukema and Thomas Attema and Harm A. Schotanus}, title = {Internal Network Monitoring and Anomaly Detection through Host Clustering}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {694--703}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006288606940703}, doi = {10.5220/0006288606940703}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BeukemaAS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BeuranPTCTS17, author = {Razvan Beuran and Cuong Pham and Dat Tang and Ken{-}ichi Chinen and Yasuo Tan and Yoichi Shinoda}, title = {CyTrONE: An Integrated Cybersecurity Training Framework}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {157--166}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006206401570166}, doi = {10.5220/0006206401570166}, timestamp = {Thu, 29 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BeuranPTCTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BuK17, author = {Lake Bu and Mark G. Karpovsky}, title = {A Design of Secure and ReliableWireless Transmission Channel for Implantable Medical Devices}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {233--242}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006270502330242}, doi = {10.5220/0006270502330242}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BuK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Cam-Winget17, author = {Nancy Cam{-}Winget}, title = {Sensor Networks as the new Attack Target}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {7}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Cam-Winget17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CiminoV17, author = {Mario Giovanni C. A. Cimino and Gigliola Vaglini}, title = {Localization and Inhibition of Malicious Behaviors through a Model Checking based Methodology}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {644--652}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CiminoV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CimitileMM17, author = {Aniello Cimitile and Fabio Martinelli and Francesco Mercaldo}, title = {Machine Learning Meets iOS Malware: Identifying Malicious Applications on Apple Environment}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {487--492}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006217304870492}, doi = {10.5220/0006217304870492}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CimitileMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CostantinoMMP17, author = {Gianpiero Costantino and Fabio Martinelli and Ilaria Matteucci and Marinella Petrocchi}, title = {Analysis of Data Sharing Agreements}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {167--178}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006207501670178}, doi = {10.5220/0006207501670178}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CostantinoMMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CostantinoMMP17a, author = {Gianpiero Costantino and Fabio Martinelli and Ilaria Matteucci and Marinella Petrocchi}, title = {Efficient Detection of Conflicts in Data Sharing Agreements}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, pages = {148--172}, year = {2017}, crossref = {DBLP:conf/icissp/2017s}, url = {https://doi.org/10.1007/978-3-319-93354-2\_8}, doi = {10.1007/978-3-319-93354-2\_8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CostantinoMMP17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CourtoisM17, author = {Nicolas T. Courtois and Rebekah Mercer}, title = {Stealth Address and Key Management Techniques in Blockchain Systems}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {559--566}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006270005590566}, doi = {10.5220/0006270005590566}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/CourtoisM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CozzaTCK17, author = {Vittoria Cozza and Zisis Tsiatsikas and Mauro Conti and Georgios Kambourakis}, title = {Why Snoopy Loves Online Services: An Analysis of (Lack of) Privacy in Online Services}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {431--438}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006207204310438}, doi = {10.5220/0006207204310438}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/CozzaTCK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DamT17, author = {Khanh{-}Huu{-}The Dam and Tayssir Touili}, title = {Malware Detection based on Graph Classification}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {455--463}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006209504550463}, doi = {10.5220/0006209504550463}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DamT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DamT17a, author = {Khanh{-}Huu{-}The Dam and Tayssir Touili}, title = {Extracting Android Malicious Behaviors}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {714--723}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006288807140723}, doi = {10.5220/0006288807140723}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DamT17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DuboisF17, author = {Michel Dubois and Eric Filiol}, title = {Hacking of the {AES} with Boolean Functions}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {599--609}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006091305990609}, doi = {10.5220/0006091305990609}, timestamp = {Wed, 08 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/DuboisF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DutaGT17, author = {Cristina{-}Loredana Duta and Laura Gheorghe and Nicolae Tapus}, title = {Real-time {DSP} Implementations of Voice Encryption Algorithms}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {439--446}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006208304390446}, doi = {10.5220/0006208304390446}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/DutaGT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/EbrahimyP17, author = {Razgar Ebrahimy and Zoya Pourmirza}, title = {Cyber-interdependency in Smart Energy Systems}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {529--537}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006262805290537}, doi = {10.5220/0006262805290537}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/EbrahimyP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/EiblFHSBRE17, author = {G{\"{u}}nther Eibl and Cornelia Ferner and Tobias Hildebrandt and Florian Stertz and Sebastian Burkhart and Stefanie Rinderle{-}Ma and Dominik Engel}, title = {Exploration of the Potential of Process Mining for Intrusion Detection in Smart Metering}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {38--46}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006103900380046}, doi = {10.5220/0006103900380046}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/EiblFHSBRE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FukushimaHK17, author = {Kazuhide Fukushima and Seira Hidano and Shinsaku Kiyomoto}, title = {White-box Implementation of Stream Cipher}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {263--269}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006115202630269}, doi = {10.5220/0006115202630269}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FukushimaHK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GjertsenGBF17, author = {Eyvind Garder B. Gjertsen and Erlend Andreas Gj{\ae}re and Maria Bartnes and Waldo Rocha Flores}, title = {Gamification of Information Security Awareness and Training}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {59--70}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006128500590070}, doi = {10.5220/0006128500590070}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GjertsenGBF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HadadPSOR17, author = {Tal Hadad and Rami Puzis and Bronislav Sidik and Nir Ofek and Lior Rokach}, title = {Application Marketplace Malware Detection by User Feedback Analysis}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, pages = {1--19}, year = {2017}, crossref = {DBLP:conf/icissp/2017s}, url = {https://doi.org/10.1007/978-3-319-93354-2\_1}, doi = {10.1007/978-3-319-93354-2\_1}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HadadPSOR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HadadSOPR17, author = {Tal Hadad and Bronislav Sidik and Nir Ofek and Rami Puzis and Lior Rokach}, title = {User Feedback Analysis for Mobile Malware Detection}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {83--94}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006131200830094}, doi = {10.5220/0006131200830094}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HadadSOPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HamadP17, author = {Mohammad Hamad and Vassilis Prevelakis}, title = {Secure APIs for Applications in Microkernel-based Systems}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {553--558}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006265805530558}, doi = {10.5220/0006265805530558}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HamadP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HatinCSR17, author = {Julien Hatin and Estelle Cherrier and Jean{-}Jacques Schwartzmann and Christophe Rosenberger}, title = {Privacy Preserving Transparent Mobile Authentication}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {354--361}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006186803540361}, doi = {10.5220/0006186803540361}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HatinCSR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HaupertM17, author = {Vincent Haupert and Tilo M{\"{u}}ller}, title = {Rest in Protection - {A} Kernel-level Approach to Mitigate {RIP} Tampering}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {25--37}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006083800250037}, doi = {10.5220/0006083800250037}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HaupertM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HerwonoE17, author = {Ian Herwono and Fadi Ali El{-}Moussa}, title = {A Collaborative Tool for Modelling Multi-stage Attacks}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {312--317}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006137103120317}, doi = {10.5220/0006137103120317}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HerwonoE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HerwonoE17a, author = {Ian Herwono and Fadi Ali El{-}Moussa}, title = {A System for Detecting Targeted Cyber-Attacks Using Attack Patterns}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, pages = {20--34}, year = {2017}, crossref = {DBLP:conf/icissp/2017s}, url = {https://doi.org/10.1007/978-3-319-93354-2\_2}, doi = {10.1007/978-3-319-93354-2\_2}, timestamp = {Fri, 24 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HerwonoE17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HuffmeyerHMSW17, author = {Marc H{\"{u}}ffmeyer and Pascal Hirmer and Bernhard Mitschang and Ulf Schreier and Matthias Wieland}, title = {SitAC - {A} System for Situation-aware Access Control - Controlling Access to Sensor Data}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {113--125}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006186501130125}, doi = {10.5220/0006186501130125}, timestamp = {Fri, 29 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HuffmeyerHMSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HuffmeyerHMSW17a, author = {Marc H{\"{u}}ffmeyer and Pascal Hirmer and Bernhard Mitschang and Ulf Schreier and Matthias Wieland}, title = {Situation-Aware Access Control for Industrie 4.0}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, pages = {59--83}, year = {2017}, crossref = {DBLP:conf/icissp/2017s}, url = {https://doi.org/10.1007/978-3-319-93354-2\_4}, doi = {10.1007/978-3-319-93354-2\_4}, timestamp = {Fri, 29 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HuffmeyerHMSW17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HuynenL17, author = {Jean{-}Louis Huynen and Gabriele Lenzini}, title = {From Situation Awareness to Action: An Information Security Management Toolkit for Socio-technical Security Retrospective and Prospective Analysis}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {213--224}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006211302130224}, doi = {10.5220/0006211302130224}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HuynenL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HuynenL17a, author = {Jean{-}Louis Huynen and Gabriele Lenzini}, title = {An Information Security Management for Socio-Technical Analysis of System Security}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, pages = {222--251}, year = {2017}, crossref = {DBLP:conf/icissp/2017s}, url = {https://doi.org/10.1007/978-3-319-93354-2\_11}, doi = {10.1007/978-3-319-93354-2\_11}, timestamp = {Fri, 24 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HuynenL17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/IrollaF17, author = {Paul Irolla and Eric Filiol}, title = {Glassbox: Dynamic Analysis Platform for Malware Android Applications on Real Devices}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {610--621}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006094006100621}, doi = {10.5220/0006094006100621}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/IrollaF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KapratwarTS17, author = {Ankita Kapratwar and Fabio Di Troia and Mark Stamp}, title = {Static and Dynamic Analysis of Android Malware}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {653--662}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006256706530662}, doi = {10.5220/0006256706530662}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KapratwarTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KarlssonHS17, author = {Linus Karlsson and Martin Hell and Paul Stankovski}, title = {Improved Greedy Nonrandomness Detectors for Stream Ciphers}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {225--232}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006268202250232}, doi = {10.5220/0006268202250232}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KarlssonHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KarlssonHS17a, author = {Linus Karlsson and Martin Hell and Paul Stankovski}, title = {Not So Greedy: Enhanced Subset Exploration for Nonrandomness Detectors}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, pages = {273--294}, year = {2017}, crossref = {DBLP:conf/icissp/2017s}, url = {https://doi.org/10.1007/978-3-319-93354-2\_13}, doi = {10.1007/978-3-319-93354-2\_13}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/KarlssonHS17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KarlzenBH17, author = {Henrik Karlz{\'{e}}n and Johan E. Bengtsson and Jonas Hallberg}, title = {Assessing Information Security Risks using Pairwise Weighting}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {318--324}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006138203180324}, doi = {10.5220/0006138203180324}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KarlzenBH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KiperbergRAZ17, author = {Michael Kiperberg and Amit Resh and Asaf Algawi and Nezer Jacob Zaidenberg}, title = {System for Executing Encrypted Java Programs}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {245--252}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006078902450252}, doi = {10.5220/0006078902450252}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KiperbergRAZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KippeP17, author = {J{\"{o}}rg Kippe and Steffen Pfrang}, title = {Network and Topology Models to Support {IDS} Event Processing}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {372--379}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006189403720379}, doi = {10.5220/0006189403720379}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KippeP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KrennLS17, author = {Stephan Krenn and Thomas Lor{\"{u}}nser and Christoph Striecks}, title = {Batch-verifiable Secret Sharing with Unconditional Privacy}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {303--311}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006133003030311}, doi = {10.5220/0006133003030311}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KrennLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KumarL17, author = {Gautam Kumar and Brent Lagesse}, title = {Limited Use Cryptographic Tokens in Securing Ephemeral Cloud Servers}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {447--454}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006208704470454}, doi = {10.5220/0006208704470454}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KumarL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LashkariDMG17, author = {Arash Habibi Lashkari and Gerard Draper{-}Gil and Mohammad Saiful Islam Mamun and Ali A. Ghorbani}, title = {Characterization of Tor Traffic using Time based Features}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {253--262}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006105602530262}, doi = {10.5220/0006105602530262}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LashkariDMG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LeeLJML17, author = {Wei{-}Han Lee and Changchang Liu and Shouling Ji and Prateek Mittal and Ruby B. Lee}, title = {Quantification of De-anonymization Risks in Social Networks}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {126--135}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006192501260135}, doi = {10.5220/0006192501260135}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LeeLJML17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LeeLJML17a, author = {Wei{-}Han Lee and Changchang Liu and Shouling Ji and Prateek Mittal and Ruby B. Lee}, title = {How to Quantify Graph De-anonymization Risks}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, pages = {84--104}, year = {2017}, crossref = {DBLP:conf/icissp/2017s}, url = {https://doi.org/10.1007/978-3-319-93354-2\_5}, doi = {10.1007/978-3-319-93354-2\_5}, timestamp = {Fri, 24 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LeeLJML17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LigierCFS17, author = {Damien Ligier and Sergiu Carpov and Caroline Fontaine and Renaud Sirdey}, title = {Privacy Preserving Data Classification using Inner-product Functional Encryption}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {423--430}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006206704230430}, doi = {10.5220/0006206704230430}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LigierCFS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LopesA17, author = {Arthur Costa Lopes and Diego F. Aranha}, title = {Platform-agnostic Low-intrusion Optical Data Exfiltration}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {474--480}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006211504740480}, doi = {10.5220/0006211504740480}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/LopesA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LuhS0S17, author = {Robert Luh and Gregor Schramm and Markus Wagner and Sebastian Schrittwieser}, title = {Sequitur-based Inference and Analysis Framework for Malicious System Behavior}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {632--643}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006250206320643}, doi = {10.5220/0006250206320643}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/LuhS0S17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LuhSMJ17, author = {Robert Luh and Sebastian Schrittwieser and Stefan Marschalek and Helge Janicke}, title = {Design of an Anomaly-based Threat Detection {\&} Explication System}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {397--402}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006205203970402}, doi = {10.5220/0006205203970402}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LuhSMJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LutasTC17, author = {Andrei Lutas and Daniel Ticle and Octavian Cret}, title = {Hypervisor based Memory Introspection: Challenges, Problems and Limitations}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {285--294}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006125802850294}, doi = {10.5220/0006125802850294}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LutasTC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MartinelliMNSV17, author = {Fabio Martinelli and Francesco Mercaldo and Vittoria Nardone and Antonella Santone and Corrado Aaron Visaggio}, title = {Identifying Mobile Repackaged Applications through Formal Methods}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {673--682}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006287906730682}, doi = {10.5220/0006287906730682}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MartinelliMNSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MartinezEMZ17, author = {V. Gayoso Mart{\'{\i}}nez and Luis Hern{\'{a}}ndez Encinas and Agust{\'{\i}}n Mart{\'{\i}}n Mu{\~{n}}oz and J. Zhang}, title = {Breaking a Hitag2 Protocol with Low Cost Technology}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {579--584}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006271905790584}, doi = {10.5220/0006271905790584}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MartinezEMZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MorenoF17, author = {Carlos Moreno and Sebastian Fischmeister}, title = {On the Security of Safety-critical Embedded Systems: Who Watches the Watchers? Who Reprograms the Watchers?}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {493--498}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006228304930498}, doi = {10.5220/0006228304930498}, timestamp = {Tue, 06 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/MorenoF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NardoneV17, author = {Vittoria Nardone and Corrado Aaron Visaggio}, title = {"Mirror, Mirror on the Wall, Who is the Fairest One of All?" - Machine Learning versus Model Checking: {A} Comparison between Two Static Techniques for Malware Family Identification}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {663--672}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006287506630672}, doi = {10.5220/0006287506630672}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NardoneV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OhtakeSZ17, author = {Go Ohtake and Reihaneh Safavi{-}Naini and Liang Feng Zhang}, title = {Outsourcing Scheme of {ABE} Encryption Secure against Malicious Adversary}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {71--82}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006129600710082}, doi = {10.5220/0006129600710082}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/OhtakeSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OmerovicNT17, author = {Aida Omerovic and Marit Kj{\o}snes Natvig and Isabelle C. R. Tardy}, title = {Towards a Privacy Scorecard - Initial Design Exemplified on an Intelligent Transport Systems Service}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {585--593}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006284405850593}, doi = {10.5220/0006284405850593}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/OmerovicNT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OrunsoluS17, author = {Abdul A. Orunsolu and Adesina S. Sodiya}, title = {An Anti-Phishing Kit Scheme for Secure Web Transactions}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {15--24}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006074900150024}, doi = {10.5220/0006074900150024}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/OrunsoluS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PahiLS17, author = {Timea Pahi and Maria Leitner and Florian Skopik}, title = {Analysis and Assessment of Situational Awareness Models for National Cyber Security Centers}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {334--345}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006149703340345}, doi = {10.5220/0006149703340345}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PahiLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PeacockJV17, author = {Matthew Peacock and Michael N. Johnstone and Craig Valli}, title = {Security Issues with BACnet Value Handling}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {546--552}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006263405460552}, doi = {10.5220/0006263405460552}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/PeacockJV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PeacockJV17a, author = {Matthew Peacock and Michael N. Johnstone and Craig Valli}, title = {An Exploration of Some Security Issues Within the BACnet Protocol}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, pages = {252--272}, year = {2017}, crossref = {DBLP:conf/icissp/2017s}, url = {https://doi.org/10.1007/978-3-319-93354-2\_12}, doi = {10.1007/978-3-319-93354-2\_12}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/PeacockJV17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PereiraA17, author = {Hilder V. L. Pereira and Diego F. Aranha}, title = {Non-interactive Privacy-preserving k-NN Classifier}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {362--371}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006187703620371}, doi = {10.5220/0006187703620371}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/PereiraA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PfrangM17, author = {Steffen Pfrang and David Meier}, title = {On the Detection of Replay Attacks in Industrial Automation Networks Operated with Profinet {IO}}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {683--693}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006288106830693}, doi = {10.5220/0006288106830693}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PfrangM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PooryousefA17, author = {Shahrooz Pooryousef and Morteza Amini}, title = {Enhancing Accuracy of Android Malware Detection using Intent Instrumentation}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {380--388}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006195803800388}, doi = {10.5220/0006195803800388}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PooryousefA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Preneel17, author = {Bart Preneel}, title = {The Future of Information Security}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {9}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Preneel17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RauchbergerLS17, author = {Julian Rauchberger and Robert Luh and Sebastian Schrittwieser}, title = {Longkit - {A} Universal Framework for {BIOS/UEFI} Rootkits in System Management Mode}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {346--353}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006165603460353}, doi = {10.5220/0006165603460353}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RauchbergerLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RegainiaS17, author = {Loukmen Regainia and S{\'{e}}bastien Salva}, title = {A Methodology of Security Pattern Classification and of Attack-Defense Tree Generation}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {136--146}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006198301360146}, doi = {10.5220/0006198301360146}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RegainiaS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ReshetovaBA17, author = {Elena Reshetova and Filippo Bonazzi and N. Asokan}, title = {SELint: An SEAndroid Policy Analysis Tool}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {47--58}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006126600470058}, doi = {10.5220/0006126600470058}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ReshetovaBA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RiemannG17, author = {Robert Riemann and St{\'{e}}phane Grumbach}, title = {Distributed Protocols at the Rescue for Trustworthy Online Voting}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {499--505}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006228504990505}, doi = {10.5220/0006228504990505}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RiemannG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SalvaR17, author = {S{\'{e}}bastien Salva and Loukmen Regainia}, title = {A Security Pattern Classification Based on Data Integration}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, pages = {105--129}, year = {2017}, crossref = {DBLP:conf/icissp/2017s}, url = {https://doi.org/10.1007/978-3-319-93354-2\_6}, doi = {10.1007/978-3-319-93354-2\_6}, timestamp = {Fri, 24 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SalvaR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SantosT17, author = {Sergio de los Santos and Jos{\'{e}} Torres}, title = {Macro Malware Detection using Machine Learning Techniques - {A} New Approach}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {295--302}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006132202950302}, doi = {10.5220/0006132202950302}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SantosT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SedeeqCL17, author = {Iman Sedeeq and Frans Coenen and Alexei Lisitsa}, title = {Attribute Permutation Steganography Detection using Attribute Position Changes Count}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {95--100}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006166400950100}, doi = {10.5220/0006166400950100}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SedeeqCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SinghSACC17, author = {Kalpana Singh and Renaud Sirdey and Fran{\c{c}}ois Artiguenave and David Cohen and Sergiu Carpov}, title = {Towards Confidentiality-strengthened Personalized Genomic Medicine Embedding Homomorphic Cryptography}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {325--333}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006148303250333}, doi = {10.5220/0006148303250333}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SinghSACC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SoaresJ17, author = {Alberto Magno Muniz Soares and Rafael Tim{\'{o}}teo de Sousa J{\'{u}}nior}, title = {Forensic Analysis of Android Runtime {(ART)} Application Heap Objects in Emulated and Real Devices}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, pages = {130--147}, year = {2017}, crossref = {DBLP:conf/icissp/2017s}, url = {https://doi.org/10.1007/978-3-319-93354-2\_7}, doi = {10.1007/978-3-319-93354-2\_7}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SoaresJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SoaresS17, author = {Alberto Magno Muniz Soares and Rafael Tim{\'{o}}teo de Sousa Jr.}, title = {A Technique for Extraction and Analysis of Application Heap Objects within Android Runtime {(ART)}}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {147--156}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006204101470156}, doi = {10.5220/0006204101470156}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SoaresS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SonntagM17, author = {Michael Sonntag and Ren{\'{e}} Mayrhofer}, title = {Traffic Statistics of a High-Bandwidth Tor Exit Node}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {270--277}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006124202700277}, doi = {10.5220/0006124202700277}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SonntagM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TelikicherlaAC17, author = {Krishna Chaitanya Telikicherla and Akash Agrawall and Venkatesh Choppella}, title = {A Formal Model of Web Security Showing Malicious Cross Origin Requests and Its Mitigation using {CORP}}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {516--523}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006261105160523}, doi = {10.5220/0006261105160523}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TelikicherlaAC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Tezcan17, author = {Cihangir Tezcan}, title = {Brute Force Cryptanalysis of {MIFARE} Classic Cards on {GPU}}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {524--528}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006262705240528}, doi = {10.5220/0006262705240528}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Tezcan17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ThuloE17, author = {Motlatsi i Isaac Thulo and Jan H. P. Eloff}, title = {Towards Optimized Security-aware (O-Sec) {VM} Placement Algorithms}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {411--422}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006206504110422}, doi = {10.5220/0006206504110422}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ThuloE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/UwizeyemunguP17, author = {Sylvestre Uwizeyemungu and Placide Poba{-}Nzaou}, title = {Health Information Exchange and Related IT-security Practices in European Hospitals}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {538--545}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006263305380545}, doi = {10.5220/0006263305380545}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/UwizeyemunguP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/VellaC17, author = {Mark Vella and Rachel Cilia}, title = {Memory Forensics of Insecure Android Inter-app Communications}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {481--486}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006215504810486}, doi = {10.5220/0006215504810486}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/VellaC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/VibertBRC17, author = {Beno{\^{\i}}t Vibert and Jean{-}Marie Le Bars and Christophe Rosenberger and Christophe Charrier}, title = {Fingerprint Class Recognition for Securing {EMV} Transaction}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {403--410}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006205704030410}, doi = {10.5220/0006205704030410}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/VibertBRC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/VolleroBSBMT17, author = {Luca Vollero and Daniele Biondo and Roberto Setola and Gianluca Bocci and Rocco Mammoliti and Alessandra Toma}, title = {Improving the Automatic Identification of Malicious Android Apps in Unofficial Stores through Logo Analysis}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {567--572}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006270305670572}, doi = {10.5220/0006270305670572}, timestamp = {Fri, 18 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/VolleroBSBMT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/VyasMK17, author = {Tanvi Vyas and Andrea Marchesini and Christoph Kerschbaumer}, title = {Extending the Same Origin Policy with Origin Attributes}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {464--473}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006210404640473}, doi = {10.5220/0006210404640473}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/VyasMK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WaltE17, author = {Est{\'{e}}e van der Walt and Jan H. P. Eloff}, title = {Identity Deception Detection on Social Media Platforms}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {573--578}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006271105730578}, doi = {10.5220/0006271105730578}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WaltE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Yesuf17, author = {Ahmed Seid Yesuf}, title = {A Review of Risk Identification Approaches in the Telecommunication Domain}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {389--396}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006197603890396}, doi = {10.5220/0006197603890396}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Yesuf17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ZhiouaRAKS17, author = {Zeineb Zhioua and Yves Roudier and Rab{\'{e}}a Ameur{-}Boulifa and Takoua Kechiche and Stuart Short}, title = {Tracking Dependent Information Flows}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {179--189}, year = {2017}, crossref = {DBLP:conf/icissp/2017}, url = {https://doi.org/10.5220/0006209301790189}, doi = {10.5220/0006209301790189}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ZhiouaRAKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2016s, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Information Systems Security and Privacy - Second International Conference, {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {691}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-54433-5}, doi = {10.1007/978-3-319-54433-5}, isbn = {978-3-319-54432-8}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2016s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2017, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, publisher = {SciTePress}, year = {2017}, isbn = {978-989-758-209-7}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AbduL16, author = {Nadia Jemil Abdu and Ulrike Lechner}, title = {A Threat Analysis Model for Identity and Access Management}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {498--502}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005790304980502}, doi = {10.5220/0005790304980502}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AbduL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AbuelgasimK16, author = {Ammar Abuelgasim and Anne Kayem}, title = {An Approach to Personalized Privacy Policy Recommendations on Online Social Networks}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {126--137}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005689701260137}, doi = {10.5220/0005689701260137}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AbuelgasimK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AbuelgasimK16a, author = {Ammar Abuelgasim and Anne V. D. M. Kayem}, title = {A Snow-Ball Algorithm for Automating Privacy Policy Configuration in Social Media}, booktitle = {Information Systems Security and Privacy - Second International Conference, {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers}, pages = {108--129}, year = {2016}, crossref = {DBLP:conf/icissp/2016s}, url = {https://doi.org/10.1007/978-3-319-54433-5\_7}, doi = {10.1007/978-3-319-54433-5\_7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AbuelgasimK16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlsmadiXC16, author = {Izzat Alsmadi and Dianxiang Xu and Jin{-}Hee Cho}, title = {Interaction-based Reputation Model in Online Social Networks}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {265--272}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005668302650272}, doi = {10.5220/0005668302650272}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlsmadiXC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BalushiMS16, author = {Abdullah Al Balushi and Kieran McLaughlin and Sakir Sezer}, title = {Contextual Intrusion Alerts for Scada Networks - An Ontology based Approach for Intrusion Alerts Post Processing}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {457--464}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005745504570464}, doi = {10.5220/0005745504570464}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BalushiMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BattistaMNSV16, author = {Pasquale Battista and Francesco Mercaldo and Vittoria Nardone and Antonella Santone and Corrado Aaron Visaggio}, title = {Identification of Android Malware Families with Model Checking}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {542--547}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005809205420547}, doi = {10.5220/0005809205420547}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BattistaMNSV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BhanuDKLLLRRW16, author = {Yogesh Bhanu and Sebastian D{\"{a}}nnart and Henning von Kielpinski and Alexander Laux and Ulrike Lechner and Tobias Lehmann and Andreas Rieb and Martin Riedl and Florian Wolf}, title = {A Cyberthreat Search Process and Service}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {528--535}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005806605280535}, doi = {10.5220/0005806605280535}, timestamp = {Tue, 24 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BhanuDKLLLRRW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BhattacharjeeSM16, author = {Jaya Bhattacharjee and Anirban Sengupta and Chandan Mazumdar}, title = {A Quantitative Methodology for Security Risk Assessment of Enterprise Business Processes}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {388--399}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005739703880399}, doi = {10.5220/0005739703880399}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BhattacharjeeSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BittlR16, author = {Sebastian Bittl and Karsten Roscher}, title = {Efficient Authorization Authority Certificate Distribution in VANETs}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {85--96}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005685600850096}, doi = {10.5220/0005685600850096}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BittlR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BittlR16a, author = {Sebastian Bittl and Karsten Roscher}, title = {Efficient Distribution of Certificate Chains in VANETs}, booktitle = {Information Systems Security and Privacy - Second International Conference, {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers}, pages = {86--107}, year = {2016}, crossref = {DBLP:conf/icissp/2016s}, url = {https://doi.org/10.1007/978-3-319-54433-5\_6}, doi = {10.1007/978-3-319-54433-5\_6}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BittlR16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BossiAB16, author = {Simone Bossi and Tea Anselmo and Guido Bertoni}, title = {On {TLS} 1.3 - Early Performance Analysis in the IoT Field}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {117--125}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005688901170125}, doi = {10.5220/0005688901170125}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BossiAB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BottaAGV16, author = {Alessio Botta and Aniello Avallone and Mauro Garofalo and Giorgio Ventre}, title = {Internet Streaming and Network Neutrality: Comparing the Performance of Video Hosting Services}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {514--521}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005798705140521}, doi = {10.5220/0005798705140521}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BottaAGV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BroennerHS16, author = {Simon Broenner and Hans H{\"{o}}fken and Marko Schuba}, title = {Streamlining Extraction and Analysis of Android {RAM} Images}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {255--264}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005652802550264}, doi = {10.5220/0005652802550264}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BroennerHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ButtnerH16, author = {Carsten B{\"{u}}ttner and Sorin A. Huss}, title = {An Anonymous Geocast Scheme for {ITS} Applications}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {179--189}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005797501790189}, doi = {10.5220/0005797501790189}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ButtnerH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ButtnerH16a, author = {Carsten B{\"{u}}ttner and Sorin A. Huss}, title = {An Efficient Approach to Anonymous Distribution of {ITS} Messages in Geographic Areas via {LTE} and {IRS} Networks}, booktitle = {Information Systems Security and Privacy - Second International Conference, {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers}, pages = {192--214}, year = {2016}, crossref = {DBLP:conf/icissp/2016s}, url = {https://doi.org/10.1007/978-3-319-54433-5\_11}, doi = {10.1007/978-3-319-54433-5\_11}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ButtnerH16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ChenSLLYW16, author = {Kang Chen and Qingni Shen and Cong Li and Yang Luo and Yahui Yang and Zhonghai Wu}, title = {Sift - An Efficient Method for Co-residency Detection on Amazon {EC2}}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {423--431}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005742004230431}, doi = {10.5220/0005742004230431}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ChenSLLYW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Draper-GilLMG16, author = {Gerard Draper{-}Gil and Arash Habibi Lashkari and Mohammad Saiful Islam Mamun and Ali A. Ghorbani}, title = {Characterization of Encrypted and {VPN} Traffic using Time-related Features}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {407--414}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005740704070414}, doi = {10.5220/0005740704070414}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Draper-GilLMG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DutaGT16, author = {Cristina{-}Loredana Duta and Laura Gheorghe and Nicolae Tapus}, title = {Performance Analysis of Real Time Implementations of Voice Encryption Algorithms using Blackfin Processors}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {157--166}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005744601570166}, doi = {10.5220/0005744601570166}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DutaGT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/DutaGT16a, author = {Cristina{-}Loredana Duta and Laura Gheorghe and Nicolae Tapus}, title = {Performance Comparison of Voice Encryption Algorithms Implemented on Blackfin Platform}, booktitle = {Information Systems Security and Privacy - Second International Conference, {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers}, pages = {169--191}, year = {2016}, crossref = {DBLP:conf/icissp/2016s}, url = {https://doi.org/10.1007/978-3-319-54433-5\_10}, doi = {10.1007/978-3-319-54433-5\_10}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/DutaGT16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ErdoganSA16, author = {Gencer Erdogan and Ketil St{\o}len and Jan {\O}yvind Aagedal}, title = {Evaluation of the {CORAL} Approach for Risk-driven Security Testing based on an Industrial Case Study}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {219--226}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005650902190226}, doi = {10.5220/0005650902190226}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ErdoganSA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FerreiraL16, author = {Ana Ferreira and Gabriele Lenzini}, title = {Comparing and Integrating Break-the-Glass and Delegation in Role-based Access Control for Healthcare}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {63--73}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005683600630073}, doi = {10.5220/0005683600630073}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FerreiraL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GeorgescuHOKY16, author = {Marius Georgescu and Hiroaki Hazeyama and Takeshi Okuda and Youki Kadobayashi and Suguru Yamaguchi}, title = {The {STRIDE} Towards IPv6: {A} Comprehensive Threat Model for IPv6 Transition Technologies}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {243--254}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005652402430254}, doi = {10.5220/0005652402430254}, timestamp = {Wed, 28 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GeorgescuHOKY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GraaCCL16, author = {Mariem Graa and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Jean{-}Louis Lanet}, title = {Tracking Explicit and Control Flows in Java and Native Android Apps Code}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {307--316}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005686603070316}, doi = {10.5220/0005686603070316}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GraaCCL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GrafGRH16, author = {Roman Graf and Sergiu Gordea and Heather M. Ryan and Tibaut Houzanme}, title = {An Expert System for Facilitating an Institutional Risk Profile Definition for Cyber Situational Awareness}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {347--354}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005738303470354}, doi = {10.5220/0005738303470354}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GrafGRH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HappaFNAGC16, author = {Jassim Happa and Graham Fairclough and Jason R. C. Nurse and Ioannis Agrafiotis and Michael Goldsmith and Sadie Creese}, title = {A Pragmatic System-failure Assessment and Response Model}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {503--508}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005795105030508}, doi = {10.5220/0005795105030508}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HappaFNAGC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HatinCSFR16, author = {Julien Hatin and Estelle Cherrier and Jean{-}Jacques Schwartzmann and Vincent Frey and Christophe Rosenberger}, title = {A Continuous LoA Compliant Trust Evaluation Method}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {355--363}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005738403550363}, doi = {10.5220/0005738403550363}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/HatinCSFR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HeinS16, author = {Daniel D. Hein and Hossein Saiedian}, title = {Predicting Attack Prone Software Components using Repository Mined Change Metrics}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {554--563}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005812905540563}, doi = {10.5220/0005812905540563}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HeinS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Hong16, author = {Jason I. Hong}, title = {Privacy, Ethics and Big Data}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {5}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Hong16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HossainSK16, author = {Md. Selim Hossain and Ehsan Saeedi and Yinan Kong}, title = {High-Performance {FPGA} Implementation of Elliptic Curve Cryptography Processor over Binary Field {GF(2163)}}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {415--422}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005741604150422}, doi = {10.5220/0005741604150422}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HossainSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HranickyMRV16, author = {Radek Hranicky and Petr Matousek and Ondrej Rysav{\'{y}} and Vladim{\'{\i}}r Vesel{\'{y}}}, title = {Experimental Evaluation of Password Recovery in Encrypted Documents}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {299--306}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005685802990306}, doi = {10.5220/0005685802990306}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HranickyMRV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/IshiiIF16, author = {Masahiro Ishii and Atsuo Inomata and Kazutoshi Fujikawa}, title = {A Construction of a Twisted Ate Pairing on a Family of Kawazoe-Takahashi Curves at 192-bit Security Level and Its Cost Estimate}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {432--439}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005742304320439}, doi = {10.5220/0005742304320439}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/IshiiIF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Izuakor16, author = {Christine Izuakor}, title = {Understanding the Impact of Cyber Security Risks on Safety}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {509--513}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005796805090513}, doi = {10.5220/0005796805090513}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Izuakor16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/JollyVR16, author = {Germain Jolly and Sylvain Vernois and Christophe Rosenberger}, title = {An Observe-and-Detect Methodology for the Security and Functional Testing of Smart Card Applications}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {282--289}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005682202820289}, doi = {10.5220/0005682202820289}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/JollyVR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KerschbaumerSB16, author = {Christoph Kerschbaumer and Sid Stamm and Stefan Brunthaler}, title = {Injecting {CSP} for Fun and Security}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {15--25}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005650100150025}, doi = {10.5220/0005650100150025}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KerschbaumerSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KhanMLS16, author = {Rafiullah Khan and Kieran McLaughlin and David M. Laverty and Sakir Sezer}, title = {{IEEE} {C37.118-2} Synchrophasor Communication Framework - Overview, Cyber Vulnerabilities Analysis and Performance Evaluation}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {167--178}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005745001670178}, doi = {10.5220/0005745001670178}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KhanMLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LaviG16, author = {Tamir Lavi and Ehud Gudes}, title = {Trust-based Dynamic {RBAC}}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {317--324}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005687503170324}, doi = {10.5220/0005687503170324}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LaviG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LaxBNNF16, author = {Gianluca Lax and Francesco Buccafurri and Serena Nicolazzo and Antonino Nocera and Lidia Fotia}, title = {A New Approach for Electronic Signature}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {440--447}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005743404400447}, doi = {10.5220/0005743404400447}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LaxBNNF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Lenz16, author = {Hans{-}Joachim Lenz}, title = {Tax Fraud and Investigation Procedures - Everybody, Every Where, Every Time}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {7--8}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, timestamp = {Fri, 22 Jul 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Lenz16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Lenz16a, author = {Hans{-}Joachim Lenz}, title = {Tax Fraud and Investigation: {A} Framework for a Knowledge Based Methodology}, booktitle = {Information Systems Security and Privacy - Second International Conference, {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers}, pages = {3--13}, year = {2016}, crossref = {DBLP:conf/icissp/2016s}, url = {https://doi.org/10.1007/978-3-319-54433-5\_1}, doi = {10.1007/978-3-319-54433-5\_1}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Lenz16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LiSCYW16, author = {Cong Li and Qingni Shen and Kang Chen and Yahui Yang and Zhonghai Wu}, title = {Whispers in the Cloud - {A} Covert Channel using the Result of Creating a Virtual Machine}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {380--387}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005739403800387}, doi = {10.5220/0005739403800387}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LiSCYW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LiSDYW16, author = {Wenting Li and Qingni Shen and Chuntao Dong and Yahui Yang and Zhonghai Wu}, title = {{DDHCS:} Distributed Denial-of-service Threat to {YARN} Clusters based on Health Check Service}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {146--156}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005741801460156}, doi = {10.5220/0005741801460156}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LiSDYW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LiSDYW16a, author = {Wenting Li and Qingni Shen and Chuntao Dong and Yahui Yang and Zhonghai Wu}, title = {{SEYARN:} Enhancing Security of {YARN} Clusters Based on Health Check Service}, booktitle = {Information Systems Security and Privacy - Second International Conference, {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers}, pages = {148--168}, year = {2016}, crossref = {DBLP:conf/icissp/2016s}, url = {https://doi.org/10.1007/978-3-319-54433-5\_9}, doi = {10.1007/978-3-319-54433-5\_9}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LiSDYW16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MaddarKCY16, author = {Hela Maddar and Wafa Kammoun and Omar Cheikhrouhou and Habib Youssef}, title = {Lightweight Trust Model with High Longevity for Wireless Sensor Networks}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {548--553}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005811005480553}, doi = {10.5220/0005811005480553}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MaddarKCY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MarufuKW16, author = {Anesu M. C. Marufu and Anne V. D. M. Kayem and Stephen D. Wolthusen}, title = {Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {448--456}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005744304480456}, doi = {10.5220/0005744304480456}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MarufuKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MathewsJF16, author = {M. Lisa Mathews and Anupam Joshi and Tim Finin}, title = {Detecting Botnets using a Collaborative Situational-aware {IDPS}}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {290--298}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005684902900298}, doi = {10.5220/0005684902900298}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MathewsJF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MaynardMS16, author = {Peter Maynard and Kieran McLaughlin and Sakir Sezer}, title = {Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {465--472}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005745704650472}, doi = {10.5220/0005745704650472}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/MaynardMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Mzila16, author = {Phiwa Mzila}, title = {Review Analysis of Properties for an Ideal Secure Biometric Template Scheme}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {333--339}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005727303330339}, doi = {10.5220/0005727303330339}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Mzila16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NakamuraKTS16, author = {Toru Nakamura and Shinsaku Kiyomoto and Welderufael B. Tesfay and Jetzabel M. Serna}, title = {Personalised Privacy by Default Preferences - Experiment and Analysis}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {53--62}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005681100530062}, doi = {10.5220/0005681100530062}, timestamp = {Mon, 30 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/NakamuraKTS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NakamuraKTS16a, author = {Toru Nakamura and Shinsaku Kiyomoto and Welderufael B. Tesfay and Jetzabel M. Serna}, title = {Easing the Burden of Setting Privacy Preferences: {A} Machine Learning Approach}, booktitle = {Information Systems Security and Privacy - Second International Conference, {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers}, pages = {44--63}, year = {2016}, crossref = {DBLP:conf/icissp/2016s}, url = {https://doi.org/10.1007/978-3-319-54433-5\_4}, doi = {10.1007/978-3-319-54433-5\_4}, timestamp = {Mon, 30 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/NakamuraKTS16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PalBM16, author = {Asim K. Pal and Subrata Bose and Arpita Maitra}, title = {Collaborative Information Service - Privacy Algebra for User Defined Security}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {473--481}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005746304730481}, doi = {10.5220/0005746304730481}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PalBM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PaudelQI16, author = {Nilakantha Paudel and Marco Querini and Giuseppe F. Italiano}, title = {Handwritten Signature Verification for Mobile Phones}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {46--52}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005675200460052}, doi = {10.5220/0005675200460052}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PaudelQI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PaudelQI16a, author = {Nilakantha Paudel and Marco Querini and Giuseppe F. Italiano}, title = {Online Handwritten Signature Verification for Low-End Devices}, booktitle = {Information Systems Security and Privacy - Second International Conference, {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers}, pages = {25--43}, year = {2016}, crossref = {DBLP:conf/icissp/2016s}, url = {https://doi.org/10.1007/978-3-319-54433-5\_3}, doi = {10.1007/978-3-319-54433-5\_3}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PaudelQI16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Pohn16, author = {Daniela P{\"{o}}hn}, title = {Risk Management for Dynamic Metadata Exchange via a Trusted Third Party}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {227--234}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005651702270234}, doi = {10.5220/0005651702270234}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Pohn16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/QiaoHS16, author = {Kexin Qiao and Lei Hu and Siwei Sun}, title = {Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {74--84}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005684400740084}, doi = {10.5220/0005684400740084}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/QiaoHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/QiaoHS16a, author = {Kexin Qiao and Lei Hu and Siwei Sun}, title = {Differential Analysis on Simeck and {SIMON} with Dynamic Key-Guessing Techniques}, booktitle = {Information Systems Security and Privacy - Second International Conference, {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers}, pages = {64--85}, year = {2016}, crossref = {DBLP:conf/icissp/2016s}, url = {https://doi.org/10.1007/978-3-319-54433-5\_5}, doi = {10.1007/978-3-319-54433-5\_5}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/QiaoHS16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/R16, author = {Feno Heriniaina R.}, title = {A Privacy Threat for Internet Users in Internet-censoring Countries}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {372--379}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005739203720379}, doi = {10.5220/0005739203720379}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/R16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RampineN16, author = {Edwin T. L. Rampine and Cynthia H. Ngejane}, title = {A Brief Overview of Hybrid Schemes for Biometric Fingerprint Template Security}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {340--346}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005730503400346}, doi = {10.5220/0005730503400346}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RampineN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ReshetovaBNBA16, author = {Elena Reshetova and Filippo Bonazzi and Thomas Nyman and Ravishankar Borgaonkar and N. Asokan}, title = {Characterizing SEAndroid Policies in the Wild}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {482--489}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005759204820489}, doi = {10.5220/0005759204820489}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ReshetovaBNBA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SedeeqCL16, author = {Iman Sedeeq and Frans Coenen and Alexei Lisitsa}, title = {A Statistical Approach to the Detection of {HTML} Attribute Permutation Steganography}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {522--527}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005801705220527}, doi = {10.5220/0005801705220527}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SedeeqCL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SettanniSSF16, author = {Giuseppe Settanni and Florian Skopik and Yegor Shovgenya and Roman Fiedler}, title = {A Collaborative Analysis System for Cross-organization Cyber Incident Handling}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {105--116}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005688301050116}, doi = {10.5220/0005688301050116}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SettanniSSF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ShaoLX16, author = {C. Shao and H. Li and G. Xu}, title = {Quantitative Evaluation of Security on Cryptographic ICs against Fault Injection Attacks}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {97--104}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005686300970104}, doi = {10.5220/0005686300970104}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ShaoLX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ShiHSS16, author = {Danping Shi and Lei Hu and Siwei Sun and Ling Song}, title = {Linear(hull) Cryptanalysis of Round-reduced Versions of {KATAN}}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {364--371}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005739103640371}, doi = {10.5220/0005739103640371}, timestamp = {Sun, 18 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/ShiHSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/StenzelKBR16, author = {Kurt Stenzel and Kuzman Katkalov and Marian Borek and Wolfgang Reif}, title = {Declassification of Information with Complex Filter Functions}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {490--497}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005782904900497}, doi = {10.5220/0005782904900497}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/StenzelKBR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SugioIKH16, author = {Nobuyuki Sugio and Yasutaka Igarashi and Toshinobu Kaneko and Kenichi Higuchi}, title = {A Practical-time Attack on Reduced-round {MISTY1}}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {235--242}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005652202350242}, doi = {10.5220/0005652202350242}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SugioIKH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SusukiYS16, author = {Hiroya Susuki and Rie Shigetomi Yamaguchi and Shizuo Sakamoto}, title = {Multi-factor Authentication Updating System Evaluation Dynamically for Service Continuity}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {273--281}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005681802730281}, doi = {10.5220/0005681802730281}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SusukiYS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SymeonidisTP16, author = {Iraklis Symeonidis and Pagona Tsormpatzoudi and Bart Preneel}, title = {Collateral Damage of Online Social Network Applications}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {536--541}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005806705360541}, doi = {10.5220/0005806705360541}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SymeonidisTP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TariqS16, author = {Muhammad Imran Tariq and Vito Santarcangelo}, title = {Analysis of {ISO} 27001: 2013 Controls Effectiveness for Cloud Computing}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {201--208}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005648702010208}, doi = {10.5220/0005648702010208}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/TariqS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TeubertGM16, author = {Dominik Teubert and Fred Grossmann and Ulrike Meyer}, title = {Anomaly-based Mobile Malware Detection: System Calls as Source for Features}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {26--36}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005652900260036}, doi = {10.5220/0005652900260036}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TeubertGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Tezcan16, author = {Cihangir Tezcan}, title = {Truncated, Impossible, and Improbable Differential Analysis of {ASCON}}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {325--332}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005689903250332}, doi = {10.5220/0005689903250332}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Tezcan16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TriaLT16, author = {Francesco Di Tria and Ezio Lefons and Filippo Tangorra}, title = {Improving Database Security in Web-based Environments}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {193--200}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005646901930200}, doi = {10.5220/0005646901930200}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TriaLT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Ulltveit-MoePEN16, author = {Nils Ulltveit{-}Moe and Steffen Pfrang and L{\'{a}}szl{\'{o}} Erd{\"{o}}di and H{\'{e}}ctor Nebot}, title = {Mitigating Local Attacks Against a City Traffic Controller}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {209--218}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005649802090218}, doi = {10.5220/0005649802090218}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Ulltveit-MoePEN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/UwizeyemunguP16, author = {Sylvestre Uwizeyemungu and Placide Poba{-}Nzaou}, title = {Security and Privacy Practices in Healthcare Information Systems: {A} Cluster Analysis of European Hospitals}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {37--45}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005654800370045}, doi = {10.5220/0005654800370045}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/UwizeyemunguP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WambachB16, author = {Tim Wambach and Katharina Br{\"{a}}unlich}, title = {Retrospective Study of Third-party Web Tracking}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {138--145}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005741301380145}, doi = {10.5220/0005741301380145}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WambachB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WambachB16a, author = {Tim Wambach and Katharina Br{\"{a}}unlich}, title = {The Evolution of Third-Party Web Tracking}, booktitle = {Information Systems Security and Privacy - Second International Conference, {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers}, pages = {130--147}, year = {2016}, crossref = {DBLP:conf/icissp/2016s}, url = {https://doi.org/10.1007/978-3-319-54433-5\_8}, doi = {10.1007/978-3-319-54433-5\_8}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WambachB16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Weippl16, author = {Edgar R. Weippl}, title = {Ethics in Security Research}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {9}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, timestamp = {Fri, 22 Jul 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Weippl16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WeipplSR16, author = {Edgar R. Weippl and Sebastian Schrittwieser and Sylvi Rennert}, title = {Empirical Research and Research Ethics in Information Security}, booktitle = {Information Systems Security and Privacy - Second International Conference, {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers}, pages = {14--22}, year = {2016}, crossref = {DBLP:conf/icissp/2016s}, url = {https://doi.org/10.1007/978-3-319-54433-5\_2}, doi = {10.1007/978-3-319-54433-5\_2}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WeipplSR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/YangCWC16, author = {Ching{-}Nung Yang and Stelvio Cimato and Jihi{-}Han Wu and Song{-}Ruei Cai}, title = {3-Out-of-n Cheating Prevention Visual Cryptographic Schemes}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {400--406}, year = {2016}, crossref = {DBLP:conf/icissp/2016}, url = {https://doi.org/10.5220/0005740504000406}, doi = {10.5220/0005740504000406}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/YangCWC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2016, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, publisher = {SciTePress}, year = {2016}, isbn = {978-989-758-167-0}, timestamp = {Wed, 22 Mar 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AblizZ15, author = {Mehmud Abliz and Taieb F. Znati}, title = {Defeating DDoS using Productive Puzzles}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {114--123}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://ieeexplore.ieee.org/document/7509937/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AblizZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Accorsi15, author = {Rafael Accorsi}, title = {A Posteriori Process Security Control}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {IS--5}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://ieeexplore.ieee.org/document/7509905/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Accorsi15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AlishahiMT15, author = {Mina Sheikh Alishahi and Mohamed Mejri and Nadia Tawbi}, title = {Clustering Spam Emails into Campaigns}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {90--97}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005244500900097}, doi = {10.5220/0005244500900097}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AlishahiMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AnjumRPF15, author = {Bushra Anjum and Manish Rajangam and Harry G. Perros and Wenjuan Fan}, title = {Filtering Unfair Users - {A} Hidden Markov Model Approach}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {147--154}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://ieeexplore.ieee.org/document/7509945/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AnjumRPF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ArakalaHDH15, author = {Arathi Arakala and Hao Hao and Stephen A. Davis and Kathy J. Horadam}, title = {The Palm Vein Graph - Feature Extraction and Matching}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {295--303}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005239102950303}, doi = {10.5220/0005239102950303}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ArakalaHDH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ArakalaHDH15a, author = {Arathi Arakala and Hao Hao and Stephen A. Davis and Kathy J. Horadam}, title = {The Palm Vein Graph for Biometric Authentication}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, pages = {199--218}, year = {2015}, crossref = {DBLP:conf/icissp/2015s}, url = {https://doi.org/10.1007/978-3-319-27668-7\_12}, doi = {10.1007/978-3-319-27668-7\_12}, timestamp = {Fri, 20 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/ArakalaHDH15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BonneyHPS15, author = {Gregor Bonney and Hans H{\"{o}}fken and Benedikt Paffen and Marko Schuba}, title = {{ICS/SCADA} Security - Analysis of a Beckhoff {CX5020} {PLC}}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {137--142}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005330101370142}, doi = {10.5220/0005330101370142}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BonneyHPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ButtnerH15, author = {Carsten B{\"{u}}ttner and Sorin A. Huss}, title = {A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {259--269}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005238902590269}, doi = {10.5220/0005238902590269}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ButtnerH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ButtnerH15a, author = {Carsten B{\"{u}}ttner and Sorin A. Huss}, title = {An Efficient Anonymous Authenticated Key Agreement Protocol for Vehicular Ad-Hoc Networks Based on Ring Signatures and the Elliptic Curve Integrated Encryption Scheme}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, pages = {139--159}, year = {2015}, crossref = {DBLP:conf/icissp/2015s}, url = {https://doi.org/10.1007/978-3-319-27668-7\_9}, doi = {10.1007/978-3-319-27668-7\_9}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ButtnerH15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CourtoisEW15, author = {Nicolas T. Courtois and Pinar Emirdag and Zhouyixing Wang}, title = {On Detection of Bitcoin Mining Redirection Attacks}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {98--105}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005245600980105}, doi = {10.5220/0005245600980105}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/CourtoisEW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Desfray15, author = {Philippe Desfray}, title = {Model Repositories at the Enterprises and Systems Scale - The Modelio Constellation Solution}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {IS--17}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://ieeexplore.ieee.org/document/7509917/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Desfray15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FavrePBC15, author = {M{\'{e}}lanie Favre and Sylvaine Picard and Julien Bringer and Herv{\'{e}} Chabanne}, title = {Balancing is the Key - Performing Finger Vein Template Protection using Fuzzy Commitment}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {304--311}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005241403040311}, doi = {10.5220/0005241403040311}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FavrePBC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Ford15, author = {Bryan Ford}, title = {Hiding in a Panopticon - Grand Challenges in Internet Anonymity}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {IS--9}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://ieeexplore.ieee.org/document/7509909/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Ford15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Furnell15, author = {Steven Furnell}, title = {From Passwords to Biometrics - In Pursuit of a Panacea}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {IS--7}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://ieeexplore.ieee.org/document/7509907/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Furnell15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Furnell15a, author = {Steven M. Furnell}, title = {From Passwords to Biometrics: In Pursuit of a Panacea}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, pages = {3--15}, year = {2015}, crossref = {DBLP:conf/icissp/2015s}, url = {https://doi.org/10.1007/978-3-319-27668-7\_1}, doi = {10.1007/978-3-319-27668-7\_1}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Furnell15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HossainZ15, author = {Al Amin Hossain and Weining Zhang}, title = {Privacy and Security Concern of Online Social Networks from User Perspective}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {246--253}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005318202460253}, doi = {10.5220/0005318202460253}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HossainZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HusztiK15, author = {Andrea Huszti and Zita Kov{\'{a}}cs}, title = {Bilinear Pairing-based Hybrid Mixnet with Anonymity Revocation}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {238--245}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005273002380245}, doi = {10.5220/0005273002380245}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HusztiK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Inamura15, author = {Masaki Inamura}, title = {Expansions of {CHAP} - Modificationless on Its Structures of Packet and Data Exchange}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {213--220}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005228002130220}, doi = {10.5220/0005228002130220}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Inamura15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Jacobs15, author = {Stuart Jacobs}, title = {Optimizing Cryptographically based Security in Wireless Networks}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {39--45}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://ieeexplore.ieee.org/document/7509928/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Jacobs15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KangGK15, author = {Bolam Kang and Sung Cheol Goh and Myungsun Kim}, title = {Private Web Search with Constant Round Efficiency}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {205--212}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005225602050212}, doi = {10.5220/0005225602050212}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KangGK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KimHKSPP15, author = {Taegyu Kim and Woomin Hwang and Chulmin Kim and Dong{-}Jae Shin and Ki{-}Woong Park and Kyu Ho Park}, title = {Malfinder: Accelerated Malware Classification System through Filtering on Manycore System}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {17--26}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005227500170026}, doi = {10.5220/0005227500170026}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KimHKSPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KimP15, author = {Taegyu Kim and Ki{-}Woong Park}, title = {MalCore: Toward a Practical Malware Identification System Enhanced with Manycore Technology}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, pages = {31--48}, year = {2015}, crossref = {DBLP:conf/icissp/2015s}, url = {https://doi.org/10.1007/978-3-319-27668-7\_3}, doi = {10.1007/978-3-319-27668-7\_3}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KimP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KnirschENFP15, author = {Fabian Knirsch and Dominik Engel and Christian Neureiter and Marc Fr{\^{\i}}ncu and Viktor K. Prasanna}, title = {Model-driven Privacy Assessment in the Smart Grid}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {173--181}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005229601730181}, doi = {10.5220/0005229601730181}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KnirschENFP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KnirschENFP15a, author = {Fabian Knirsch and Dominik Engel and Christian Neureiter and Marc Fr{\^{\i}}ncu and Viktor K. Prasanna}, title = {Privacy Assessment of Data Flow Graphs for an Advanced Recommender System in the Smart Grid}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, pages = {89--106}, year = {2015}, crossref = {DBLP:conf/icissp/2015s}, url = {https://doi.org/10.1007/978-3-319-27668-7\_6}, doi = {10.1007/978-3-319-27668-7\_6}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KnirschENFP15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KoenePCSAORM15, author = {Ansgar R. Koene and Elvira Perez and Christopher James Carter and Ramona Statache and Svenja Adolphs and Claire O'Malley and Tom Rodden and Derek McAuley}, title = {Research Ethics and Public Trust, Preconditions for Continued Growth of Internet Mediated Research - Public Confidence in Internet Mediate Research}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {163--168}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005331501630168}, doi = {10.5220/0005331501630168}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KoenePCSAORM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KrishnamachariN15, author = {Sriram Krishnamachari and Mehrdad Nojoumian and Kemal Akkaya}, title = {Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational vs Unconditional Security}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {106--113}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005258501060113}, doi = {10.5220/0005258501060113}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KrishnamachariN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KunzFNP15, author = {Michael Kunz and Ludwig Fuchs and Michael Netter and G{\"{u}}nther Pernul}, title = {Analyzing Quality Criteria in Role-based Identity and Access Management}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {64--72}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005232100640072}, doi = {10.5220/0005232100640072}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KunzFNP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KunzFNP15a, author = {Michael Kunz and Ludwig Fuchs and Michael Netter and G{\"{u}}nther Pernul}, title = {How to Discover High-Quality Roles? {A} Survey and Dependency Analysis of Quality Criteria in Role Mining}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, pages = {49--67}, year = {2015}, crossref = {DBLP:conf/icissp/2015s}, url = {https://doi.org/10.1007/978-3-319-27668-7\_4}, doi = {10.1007/978-3-319-27668-7\_4}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KunzFNP15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LeeL15, author = {Wei{-}Han Lee and Ruby B. Lee}, title = {Multi-sensor Authentication to Improve Smartphone Security}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {270--280}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005239802700280}, doi = {10.5220/0005239802700280}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LeeL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LeeL15a, author = {Wei{-}Han Lee and Ruby B. Lee}, title = {Implicit Authentication for Smartphone Security}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, pages = {160--176}, year = {2015}, crossref = {DBLP:conf/icissp/2015s}, url = {https://doi.org/10.1007/978-3-319-27668-7\_10}, doi = {10.1007/978-3-319-27668-7\_10}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LeeL15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LehnhardtRSC15, author = {Jan Lehnhardt and Tobias Rho and Adrian Spalka and Armin B. Cremers}, title = {Performance-optimized Indexes for Inequality Searches on Encrypted Data in Practice}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {221--229}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005231702210229}, doi = {10.5220/0005231702210229}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LehnhardtRSC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LimYST15, author = {Hyoyoung Lim and Yukiko Yamaguchi and Hajime Shimada and Hiroki Takakura}, title = {Malware Classification Method Based on Sequence of Traffic Flow}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {230--237}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005235002300237}, doi = {10.5220/0005235002300237}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LimYST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MaiorcaACG15, author = {Davide Maiorca and Davide Ariu and Igino Corona and Giorgio Giacinto}, title = {A Structural and Content-based Approach for a Precise and Robust Detection of Malicious {PDF} Files}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {27--36}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005264400270036}, doi = {10.5220/0005264400270036}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MaiorcaACG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MaiorcaACG15a, author = {Davide Maiorca and Davide Ariu and Igino Corona and Giorgio Giacinto}, title = {An Evasion Resilient Approach to the Detection of Malicious {PDF} Files}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, pages = {68--85}, year = {2015}, crossref = {DBLP:conf/icissp/2015s}, url = {https://doi.org/10.1007/978-3-319-27668-7\_5}, doi = {10.1007/978-3-319-27668-7\_5}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MaiorcaACG15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/McDaniel15, author = {Patrick D. McDaniel}, title = {A New Science of Security Decision Making}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {IS--13}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://ieeexplore.ieee.org/document/7509913/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/McDaniel15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MoingS15, author = {Josselyn Le Moing and Ingo Stengel}, title = {The Smartphone as a Gait Recognition Device - Impact of Selected Parameters on Gait Recognition}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {322--328}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005243003220328}, doi = {10.5220/0005243003220328}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MoingS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MoingS15a, author = {Josselyn Le Moing and Ingo Stengel}, title = {Impact of External Parameters on the Gait Recognition Using a Smartphone}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, pages = {219--233}, year = {2015}, crossref = {DBLP:conf/icissp/2015s}, url = {https://doi.org/10.1007/978-3-319-27668-7\_13}, doi = {10.1007/978-3-319-27668-7\_13}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MoingS15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MukherjeeM15, author = {Preetam Mukherjee and Chandan Mazumdar}, title = {A Novel Model of Security Policies and Requirements}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {73--82}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005239400730082}, doi = {10.5220/0005239400730082}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MukherjeeM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NarayanaswamySS15, author = {Jayagopal Narayanaswamy and Raghav V. Sampangi and Srinivas Sampalli}, title = {{HIDE:} Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {124--131}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005273901240131}, doi = {10.5220/0005273901240131}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NarayanaswamySS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NergaardUG15, author = {Henrik Nergaard and Nils Ulltveit{-}Moe and Terje Gj{\o}s{\ae}ter}, title = {A Scratch-based Graphical Policy Editor for {XACML}}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {182--190}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005240101820190}, doi = {10.5220/0005240101820190}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NergaardUG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NergaardUG15a, author = {Henrik Nergaard and Nils Ulltveit{-}Moe and Terje Gj{\o}s{\ae}ter}, title = {ViSPE: {A} Graphical Policy Editor for {XACML}}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, pages = {107--121}, year = {2015}, crossref = {DBLP:conf/icissp/2015s}, url = {https://doi.org/10.1007/978-3-319-27668-7\_7}, doi = {10.1007/978-3-319-27668-7\_7}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NergaardUG15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NetterPRR15, author = {Michael Netter and G{\"{u}}nther Pernul and Christian Richthammer and Moritz Riesner}, title = {Privacy in Social Networks: Existing Challenges and Proposals for Solutions}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, pages = {16--27}, year = {2015}, crossref = {DBLP:conf/icissp/2015s}, url = {https://doi.org/10.1007/978-3-319-27668-7\_2}, doi = {10.1007/978-3-319-27668-7\_2}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NetterPRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NoorafizaMUKS15, author = {Matrazali Noorafiza and Hiroshi Maeda and Ryuya Uda and Toshiyuki Kinoshita and M. Shiratori}, title = {Vulnerability Analysis using Network Timestamps in Full Virtualization Virtual Machine}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {83--89}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005242000830089}, doi = {10.5220/0005242000830089}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NoorafizaMUKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Pernul15, author = {G{\"{u}}nther Pernul}, title = {Privacy in Social Networks - Existing Challenges and Proposals for Solution}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {IS--11}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://ieeexplore.ieee.org/document/7509911/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Pernul15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PrevelakisH15, author = {Vassilis Prevelakis and Mohammad Hamad}, title = {A Policy-based Communications Architecture for Vehicles}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {155--162}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005325001550162}, doi = {10.5220/0005325001550162}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PrevelakisH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/RoyM15, author = {Puloma Roy and Chandan Mazumdar}, title = {Modelling of Enterprise Insider Threats}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {132--136}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005327901320136}, doi = {10.5220/0005327901320136}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/RoyM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SakpereK15, author = {Aderonke Busayo Sakpere and Anne V. D. M. Kayem}, title = {Adaptive Buffer Resizing for Efficient Anonymization of Streaming Data with Minimal Information Loss}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {191--201}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005288901910201}, doi = {10.5220/0005288901910201}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SakpereK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SakpereK15a, author = {Aderonke Busayo Sakpere and Anne V. D. M. Kayem}, title = {Supporting Streaming Data Anonymization with Expressions of User Privacy Preferences}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, pages = {122--136}, year = {2015}, crossref = {DBLP:conf/icissp/2015s}, url = {https://doi.org/10.1007/978-3-319-27668-7\_8}, doi = {10.1007/978-3-319-27668-7\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SakpereK15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ShoufanAB15, author = {Abdulhadi Shoufan and Hassan Alnoon and Joonsang Baek}, title = {On the Power Consumption of Cryptographic Processors in Civil Microdrones}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {283--290}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005273402830290}, doi = {10.5220/0005273402830290}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ShoufanAB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ShoufanAB15a, author = {Abdulhadi Shoufan and Hassan Alnoon and Joonsang Baek}, title = {Secure Communication in Civil Drones}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, pages = {177--195}, year = {2015}, crossref = {DBLP:conf/icissp/2015s}, url = {https://doi.org/10.1007/978-3-319-27668-7\_11}, doi = {10.1007/978-3-319-27668-7\_11}, timestamp = {Wed, 29 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ShoufanAB15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TimpanaroCCF15, author = {Juan Pablo Timpanaro and Thibault Cholez and Isabelle Chrisment and Olivier Festor}, title = {Evaluation of the Anonymous {I2P} Network's Design Choices Against Performance and Security}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {46--55}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005226600460055}, doi = {10.5220/0005226600460055}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TimpanaroCCF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TondelLJ15, author = {Inger Anne T{\o}ndel and Maria B. Line and Gorm Johansen}, title = {Assessing Information Security Risks of {AMI} - What Makes it so Difficult?}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {56--63}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005228900560063}, doi = {10.5220/0005228900560063}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TondelLJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/UwizeyemunguP15, author = {Sylvestre Uwizeyemungu and Placide Poba{-}Nzaou}, title = {Understanding Information Technology Security Standards Diffusion - An Institutional Perspective}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {5--16}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005227200050016}, doi = {10.5220/0005227200050016}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/UwizeyemunguP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/VibertYVBCR15, author = {Beno{\^{\i}}t Vibert and Zhigang Yao and Sylvain Vernois and Jean{-}Marie Le Bars and Christophe Charrier and Christophe Rosenberger}, title = {EvaBio Platform for the Evaluation Biometric System - Application to the Optimization of the Enrollment Process for Fingerprints Devices}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {329--335}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005244203290335}, doi = {10.5220/0005244203290335}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/VibertYVBCR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/VibertYVBCR15a, author = {Beno{\^{\i}}t Vibert and Zhigang Yao and Sylvain Vernois and Jean{-}Marie Le Bars and Christophe Charrier and Christophe Rosenberger}, title = {EvaBio a New Modular Platform to Evaluate Biometric System}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, pages = {234--250}, year = {2015}, crossref = {DBLP:conf/icissp/2015s}, url = {https://doi.org/10.1007/978-3-319-27668-7\_14}, doi = {10.1007/978-3-319-27668-7\_14}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/VibertYVBCR15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/YaoBCR15, author = {Zhigang Yao and Jean{-}Marie Le Bars and Christophe Charrier and Christophe Rosenberger}, title = {Quality Assessment of Fingerprints with Minutiae Delaunay Triangulation}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {315--321}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005235603150321}, doi = {10.5220/0005235603150321}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/YaoBCR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/YaoBCR15a, author = {Zhigang Yao and Jean{-}Marie Le Bars and Christophe Charrier and Christophe Rosenberger}, title = {Fingerprint Quality Assessment Combining Blind Image Quality, Texture and Minutiae Features}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {336--343}, year = {2015}, crossref = {DBLP:conf/icissp/2015}, url = {https://doi.org/10.5220/0005268403360343}, doi = {10.5220/0005268403360343}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/YaoBCR15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2015, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, publisher = {SciTePress}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7504796/proceeding}, isbn = {978-989-758-081-9}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2015s, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {576}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27668-7}, doi = {10.1007/978-3-319-27668-7}, isbn = {978-3-319-27667-0}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2015s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2024, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0000184400003648}, doi = {10.5220/0000184400003648}, isbn = {978-989-758-683-5}, timestamp = {Wed, 25 Sep 2024 08:39:25 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2023, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0000168400003405}, doi = {10.5220/0000168400003405}, isbn = {978-989-758-624-8}, timestamp = {Wed, 25 Sep 2024 08:39:25 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2022, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0000157000003120}, doi = {10.5220/0000157000003120}, isbn = {978-989-758-553-1}, timestamp = {Wed, 25 Sep 2024 08:39:25 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2021, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, publisher = {{SCITEPRESS}}, year = {2021}, isbn = {978-989-758-491-6}, timestamp = {Wed, 25 Sep 2024 08:39:25 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2020, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, publisher = {{SCITEPRESS}}, year = {2020}, isbn = {978-989-758-399-5}, timestamp = {Wed, 25 Sep 2024 08:39:25 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2019, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, publisher = {SciTePress}, year = {2019}, isbn = {978-989-758-359-9}, timestamp = {Wed, 25 Sep 2024 08:39:25 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2018, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, publisher = {SciTePress}, year = {2018}, isbn = {978-989-758-282-0}, timestamp = {Wed, 25 Sep 2024 08:39:25 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2017, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, publisher = {SciTePress}, year = {2017}, isbn = {978-989-758-209-7}, timestamp = {Wed, 25 Sep 2024 08:39:25 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2016, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, publisher = {SciTePress}, year = {2016}, isbn = {978-989-758-167-0}, timestamp = {Wed, 25 Sep 2024 08:39:25 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2015, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, publisher = {SciTePress}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7504796/proceeding}, isbn = {978-989-758-081-9}, timestamp = {Wed, 25 Sep 2024 08:39:25 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icissp/2015s, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {576}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27668-7}, doi = {10.1007/978-3-319-27668-7}, isbn = {978-3-319-27667-0}, timestamp = {Wed, 25 Sep 2024 08:39:25 +0200}, biburl = {https://dblp.org/rec/conf/icissp/2015s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.