Search dblp for Publications

export results for "ICISSP"

 download as .bib file

@inproceedings{DBLP:conf/icissp/AbomharaKOH18,
  author    = {Mohamed Abomhara and
               Geir M. K{\o}ien and
               Vladimir A. Oleshchuk and
               Mohamed Hamid},
  title     = {Towards Risk-aware Access Control Framework for Healthcare Information
               Sharing},
  booktitle = {{ICISSP}},
  pages     = {312--321},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/AburawiLC18,
  author    = {Nahla Aburawi and
               Alexei Lisitsa and
               Frans Coenen},
  title     = {Querying Encrypted Graph Databases},
  booktitle = {{ICISSP}},
  pages     = {447--451},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/AlpersPOR18,
  author    = {Sascha Alpers and
               Roman Pilipchuk and
               Andreas Oberweis and
               Ralf H. Reussner},
  title     = {Identifying Needs for a Holistic Modelling Approach to Privacy Aspects
               in Enterprise Software Systems},
  booktitle = {{ICISSP}},
  pages     = {74--82},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/AlqahtaniCHG18,
  author    = {Ohud Alqahtani and
               Zhiyuan Chen and
               Qiong Huang and
               Karthik Gottipati},
  title     = {Is Bigger Safer? Analyzing Factors Related to Data Breaches using
               Publicly Available Information},
  booktitle = {{ICISSP}},
  pages     = {373--378},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/AlshehriCB18,
  author    = {Abdullah Alshehri and
               Frans Coenen and
               Danushka Bollegala},
  title     = {Spectral Analysis of Keystroke Streams: Towards Effective Real-time
               Continuous User Authentication},
  booktitle = {{ICISSP}},
  pages     = {62--73},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/AlvesM18,
  author    = {Thiago Alves and
               Thomas Morris},
  title     = {Hardware-based Cyber Threats},
  booktitle = {{ICISSP}},
  pages     = {259--266},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/Anderson18,
  author    = {Ross Anderson},
  title     = {Sustainable Security - an Internet of Durable Goods},
  booktitle = {{ICISSP}},
  pages     = {7},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/BacciBMMMV18,
  author    = {Alessandro Bacci and
               Alberto Bartoli and
               Fabio Martinelli and
               Eric Medvet and
               Francesco Mercaldo and
               Corrado Aaron Visaggio},
  title     = {Impact of Code Obfuscation on Android Malware Detection based on Static
               and Dynamic Analysis},
  booktitle = {{ICISSP}},
  pages     = {379--385},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/BacciMMM18,
  author    = {Alessandro Bacci and
               Fabio Martinelli and
               Eric Medvet and
               Francesco Mercaldo},
  title     = {VizMal: {A} Visualization Tool for Analyzing the Behavior of Android
               Malware},
  booktitle = {{ICISSP}},
  pages     = {517--525},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/BadjiD18,
  author    = {Radja Badji and
               Fida Kamal Dankar},
  title     = {A Risk-aware Access Control Model for Biomedical Research Platforms},
  booktitle = {{ICISSP}},
  pages     = {322--328},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/BarrosL18,
  author    = {Martina J. Zucule de Barros and
               Horst Lazarek},
  title     = {A Cyber Safety Model for Schools in Mozambique},
  booktitle = {{ICISSP}},
  pages     = {251--258},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/CalderonHYS18,
  author    = {Paul Calderon and
               Hirokazu Hasegawa and
               Yukiko Yamaguchi and
               Hajime Shimada},
  title     = {Malware Detection based on {HTTPS} Characteristic via Machine Learning},
  booktitle = {{ICISSP}},
  pages     = {410--417},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/DagherMMM18,
  author    = {Gaby G. Dagher and
               Praneeth Babu Marella and
               Matea Milojkovic and
               Jordan Mohler},
  title     = {BroncoVote: Secure Voting System using Ethereum's Blockchain},
  booktitle = {{ICISSP}},
  pages     = {96--107},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/DeyBS18,
  author    = {Alexandre Dey and
               Loic Beheshti and
               Marie{-}Kerguelen Sido},
  title     = {Health State of Google's PlayStore - Finding Malware in Large Sets
               of Applications from the Android Market},
  booktitle = {{ICISSP}},
  pages     = {538--544},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/DieschPK18,
  author    = {Rainer Diesch and
               Matthias Pfaff and
               Helmut Krcmar},
  title     = {Prerequisite to Measure Information Security - {A} State of the Art
               Literature Review},
  booktitle = {{ICISSP}},
  pages     = {207--215},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/EiblBE18,
  author    = {G{\"{u}}nther Eibl and
               Sebastian Burkhart and
               Dominik Engel},
  title     = {Unsupervised Holiday Detection from Low-resolution Smart Metering
               Data},
  booktitle = {{ICISSP}},
  pages     = {477--486},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/EignerKT18,
  author    = {Oliver Eigner and
               Philipp Kreimel and
               Paul Tavolato},
  title     = {Attacks on Industrial Control Systems - Modeling and Anomaly Detection},
  booktitle = {{ICISSP}},
  pages     = {581--588},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/EreminK18,
  author    = {Aleksandr Eremin and
               Konstantin Kogos},
  title     = {Incoming Call Implicit User Authentication - User Authentication via
               Hand Movement Pattern},
  booktitle = {{ICISSP}},
  pages     = {24--29},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/FerreiraM18,
  author    = {Ana Margarida Ferreira and
               Pedro Manuel Vieira Marques},
  title     = {Phishing Through Time: {A} Ten Year Story based on Abstracts},
  booktitle = {{ICISSP}},
  pages     = {225--232},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/FiliolJD18,
  author    = {Eric Filiol and
               Nicolas J. and
               Maxence Delong},
  title     = {Statistical and Combinatorial Analysis of the {TOR} Routing Protocol
               - Structural Weaknesses Identified in the {TOR} Network},
  booktitle = {{ICISSP}},
  pages     = {507--516},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/Fortuna0B18,
  author    = {Pedro Fortuna and
               Nuno Pereira and
               Ismail Butun},
  title     = {A Framework for Web Application Integrity},
  booktitle = {{ICISSP}},
  pages     = {487--493},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/FredjLC18,
  author    = {Feten Ben Fredj and
               Nadira Lammari and
               Isabelle Comyn{-}Wattiau},
  title     = {Relational Database Anonymization - {A} Model-driven Guiding Approach},
  booktitle = {{ICISSP}},
  pages     = {161--170},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/GaoW18,
  author    = {Yuanyuan Gao and
               Kunpeng Wang},
  title     = {Probability Preservation Property with Relative Error and Its Applications},
  booktitle = {{ICISSP}},
  pages     = {461--468},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/GencLRS18,
  author    = {Ziya Alper Gen{\c{c}} and
               Gabriele Lenzini and
               Peter Y. A. Ryan and
               Itzel V{\'{a}}zquez Sandoval},
  title     = {A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System},
  booktitle = {{ICISSP}},
  pages     = {83--95},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/GougeonL18,
  author    = {Thomas Gougeon and
               Patrick Lacharme},
  title     = {How to Break CaptchaStar},
  booktitle = {{ICISSP}},
  pages     = {41--51},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/GrafK18,
  author    = {Roman Graf and
               Ross King},
  title     = {Cyber Threat Information Classification and Life Cycle Management
               using Smart Contracts},
  booktitle = {{ICISSP}},
  pages     = {304--311},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/HakbilenPEU18,
  author    = {Onur Hakbilen and
               Piraveen Perinparajan and
               Michael Eikeland and
               Nils Ulltveit{-}Moe},
  title     = {{SAFEPASS} - Presenting a Convenient, Portable and Secure Password
               Manager},
  booktitle = {{ICISSP}},
  pages     = {292--303},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/HamidiSM18,
  author    = {Mona Hamidi and
               Mina Sheikhalishahi and
               Fabio Martinelli},
  title     = {Secure Two-party Agglomerative Hierarchical Clustering Construction},
  booktitle = {{ICISSP}},
  pages     = {432--437},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/HaupertM18,
  author    = {Vincent Haupert and
               Tilo M{\"{u}}ller},
  title     = {On App-based Matrix Code Authentication in Online Banking},
  booktitle = {{ICISSP}},
  pages     = {149--160},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/HerwonoE18,
  author    = {Ian Herwono and
               Fadi Ali El{-}Moussa},
  title     = {Automated Detection of the Early Stages of Cyber Kill Chain},
  booktitle = {{ICISSP}},
  pages     = {182--189},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/HuangTS18,
  author    = {Jasper Huang and
               Fabio Di Troia and
               Mark Stamp},
  title     = {Acoustic Gait Analysis using Support Vector Machines},
  booktitle = {{ICISSP}},
  pages     = {545--552},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/HummerGKFP18,
  author    = {Matthias Hummer and
               Sebastian Groll and
               Michael Kunz and
               Ludwig Fuchs and
               G{\"{u}}nther Pernul},
  title     = {Measuring Identity and Access Management Performance - An Expert Survey
               on Possible Performance Indicators},
  booktitle = {{ICISSP}},
  pages     = {233--240},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/HunterW18,
  author    = {Aaron Hunter and
               Ken Wong},
  title     = {Decoy Systems with Low Energy Bluetooth Communication},
  booktitle = {{ICISSP}},
  pages     = {404--409},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/Jacoby18,
  author    = {David Jacoby},
  title     = {Hacking the Security Industry for Fun and Profit and Humanity},
  booktitle = {{ICISSP}},
  pages     = {5},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/JasserTSR18,
  author    = {Stefanie Jasser and
               Katja Tuma and
               Riccardo Scandariato and
               Matthias Riebisch},
  title     = {Back to the Drawing Board - Bringing Security Constraints in an Architecture-centric
               Software Development Process},
  booktitle = {{ICISSP}},
  pages     = {438--446},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/KandoussiB18,
  author    = {Asmaa El Kandoussi and
               Hanan El Bakkali},
  title     = {Novel Access Control Approach for Inter-organizational Workflows},
  booktitle = {{ICISSP}},
  pages     = {345--352},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/KarlzenBH18,
  author    = {Henrik Karlz{\'{e}}n and
               Johan E. Bengtsson and
               Jonas Hallberg},
  title     = {A Test of Structured Threat Descriptions for Information Security
               Risk Assessments},
  booktitle = {{ICISSP}},
  pages     = {469--476},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/LeeOKL18,
  author    = {Wei{-}Han Lee and
               Jorge Ortiz and
               Bongjun Ko and
               Ruby B. Lee},
  title     = {Inferring Smartphone Users' Handwritten Patterns by using Motion Sensors},
  booktitle = {{ICISSP}},
  pages     = {139--148},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/LuhTTS18,
  author    = {Robert Luh and
               Marlies Temper and
               Simon Tjoa and
               Sebastian Schrittwieser},
  title     = {{APT} {RPG:} Design of a Gamified Attacker/Defender Meta Model},
  booktitle = {{ICISSP}},
  pages     = {526--537},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/MartinelliMN18,
  author    = {Fabio Martinelli and
               Francesco Mercaldo and
               Vittoria Nardone},
  title     = {Identifying Insecure Features in Android Applications using Model
               Checking},
  booktitle = {{ICISSP}},
  pages     = {589--596},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/MartinelliMNOS18,
  author    = {Fabio Martinelli and
               Francesco Mercaldo and
               Vittoria Nardone and
               Albina Orlando and
               Antonella Santone},
  title     = {Who's Driving My Car? {A} Machine Learning based Approach to Driver
               Identification},
  booktitle = {{ICISSP}},
  pages     = {367--372},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/MartinelliMNOS18a,
  author    = {Fabio Martinelli and
               Francesco Mercaldo and
               Vittoria Nardone and
               Albina Orlando and
               Antonella Santone},
  title     = {Cluster Analysis for Driver Aggressiveness Identification},
  booktitle = {{ICISSP}},
  pages     = {562--569},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/MauriCD18,
  author    = {Lara Mauri and
               Stelvio Cimato and
               Ernesto Damiani},
  title     = {A Comparative Analysis of Current Cryptocurrencies},
  booktitle = {{ICISSP}},
  pages     = {127--138},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/MaynardMS18,
  author    = {Peter Maynard and
               Kieran McLaughlin and
               Sakir Sezer},
  title     = {Using Application Layer Metrics to Detect Advanced {SCADA} Attacks},
  booktitle = {{ICISSP}},
  pages     = {418--425},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/MeinigM18,
  author    = {Michael Meinig and
               Christoph Meinel},
  title     = {Securing the Flow - Data Flow Analysis with Operational Node Structures},
  booktitle = {{ICISSP}},
  pages     = {241--250},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/MigdalR18,
  author    = {Denis Migdal and
               Christophe Rosenberger},
  title     = {Towards a Personal Identity Code Respecting Privacy},
  booktitle = {{ICISSP}},
  pages     = {267--274},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/MorissetS18,
  author    = {Charles Morisset and
               David Sanchez},
  title     = {VisABAC: {A} Tool for Visualising {ABAC} Policies},
  booktitle = {{ICISSP}},
  pages     = {117--126},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/NagarajanTAS18,
  author    = {Prathiba Nagarajan and
               Fabio Di Troia and
               Thomas H. Austin and
               Mark Stamp},
  title     = {Autocorrelation Analysis of Financial Botnet Traffic},
  booktitle = {{ICISSP}},
  pages     = {599--606},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/Nazmul0C18,
  author    = {Rumana Nazmul and
               Md. Rafiqul Islam and
               Ahsan Raja Chowdhury},
  title     = {Alignment-free Cancellable Template Generation for Fingerprint based
               Authentication},
  booktitle = {{ICISSP}},
  pages     = {361--366},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/NguyenZRDMN18,
  author    = {Kim Trong Nguyen and
               Cathel Zitzmann and
               Florent Retraint and
               Agn{\`{e}}s Delahaies and
               Fr{\'{e}}d{\'{e}}ric Morain{-}Nicolier and
               Hoai Phuong Nguyen},
  title     = {Face Spoofing Detection for Smartphones using a 3D Reconstruction
               and the Motion Sensors},
  booktitle = {{ICISSP}},
  pages     = {286--291},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/NinassiVR18,
  author    = {Alexandre Ninassi and
               Sylvain Vernois and
               Christophe Rosenberger},
  title     = {Privacy Compliant Multi-biometric Authentication on Smartphones},
  booktitle = {{ICISSP}},
  pages     = {173--181},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/PatsakisA18,
  author    = {Constantinos Patsakis and
               Efthimios Alepis},
  title     = {Knock-Knock: The Unbearable Lightness of Android Notifications},
  booktitle = {{ICISSP}},
  pages     = {52--61},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/PfrangMFB18,
  author    = {Steffen Pfrang and
               David Meier and
               Michael Friedrich and
               J{\"{u}}rgen Beyerer},
  title     = {Advancing Protocol Fuzzing for Industrial Automation and Control Systems},
  booktitle = {{ICISSP}},
  pages     = {570--580},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/PonsardGD18,
  author    = {Christophe Ponsard and
               Jeremy Grandclaudon and
               Gautier Dallons},
  title     = {Towards a Cyber Security Label for SMEs: {A} European Perspective
               -},
  booktitle = {{ICISSP}},
  pages     = {426--431},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/Rosenberger18,
  author    = {Christophe Rosenberger},
  title     = {Evaluation of Biometric Template Protection Schemes based on a Transformation},
  booktitle = {{ICISSP}},
  pages     = {216--224},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/SharafaldinLG18,
  author    = {Iman Sharafaldin and
               Arash Habibi Lashkari and
               Ali A. Ghorbani},
  title     = {Toward Generating a New Intrusion Detection Dataset and Intrusion
               Traffic Characterization},
  booktitle = {{ICISSP}},
  pages     = {108--116},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/SilvaNS18,
  author    = {Marco Silva and
               Ant{\'{o}}nio Nogueira and
               Paulo Salvador},
  title     = {Modular Platform for Customer-Side Detection of {BGP} Redirection
               Attacks},
  booktitle = {{ICISSP}},
  pages     = {199--206},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/SinghRS18,
  author    = {Dilpreet Singh and
               Ron Ruhl and
               Hamman Samuel},
  title     = {Attack Tree for Modelling Unauthorized {EMV} Card Transactions at
               {POS} Terminals},
  booktitle = {{ICISSP}},
  pages     = {494--502},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/Stach18,
  author    = {Christoph Stach},
  title     = {Big Brother is Smart Watching You - Privacy Concerns about Health
               and Fitness Applications},
  booktitle = {{ICISSP}},
  pages     = {13--23},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/StachM18,
  author    = {Christoph Stach and
               Bernhard Mitschang},
  title     = {{ACCESSORS} - {A} Data-Centric Permission Model for the Internet of
               Things},
  booktitle = {{ICISSP}},
  pages     = {30--40},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/ToliP18,
  author    = {Christina{-}Angeliki Toli and
               Bart Preneel},
  title     = {Privacy-preserving Biometric Authentication Model for e-Finance Applications},
  booktitle = {{ICISSP}},
  pages     = {353--360},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/TorresS18,
  author    = {Jos{\'{e}} Torres and
               Sergio de los Santos},
  title     = {Malicious {PDF} Documents Detection using Machine Learning Techniques
               - {A} Practical Approach with Cloud Computing Applications},
  booktitle = {{ICISSP}},
  pages     = {337--344},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/VasileiouF18,
  author    = {Ismini Vasileiou and
               Steven Furnell},
  title     = {Enhancing Security Education - Recognising Threshold Concepts and
               Other Influencing Factors},
  booktitle = {{ICISSP}},
  pages     = {398--403},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/VibertCBR18,
  author    = {Beno{\^{\i}}t Vibert and
               Christophe Charrier and
               Jean{-}Marie Le Bars and
               Christophe Rosenberger},
  title     = {Towards an Optimal Template Reduction for Securing Embedded Fingerprint
               Devices},
  booktitle = {{ICISSP}},
  pages     = {329--336},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/WaagsnesU18,
  author    = {Henrik Waagsnes and
               Nils Ulltveit{-}Moe},
  title     = {Intrusion Detection System Test Framework for {SCADA} Systems},
  booktitle = {{ICISSP}},
  pages     = {275--285},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/WangZL18,
  author    = {Wenbo Wang and
               Tianning Zang and
               Yuqing Lan},
  title     = {The Rapid Extraction of Suspicious Traffic from Passive {DNS}},
  booktitle = {{ICISSP}},
  pages     = {190--198},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/WurzenbergerSSF18,
  author    = {Markus Wurzenberger and
               Florian Skopik and
               Giuseppe Settanni and
               Roman Fiedler},
  title     = {{AECID:} {A} Self-learning Anomaly Detection Approach based on Light-weight
               Log Parser Models},
  booktitle = {{ICISSP}},
  pages     = {386--397},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/YajamanamSTS18,
  author    = {Sravani Yajamanam and
               Vikash Raja Samuel Selvin and
               Fabio Di Troia and
               Mark Stamp},
  title     = {Deep Learning versus Gist Descriptors for Image-based Malware Classification},
  booktitle = {{ICISSP}},
  pages     = {553--561},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/ZhengW18,
  author    = {Kaiyan Zheng and
               Peng Wang},
  title     = {Encryption Schemes based on a Single Permutation: PCBC, POFB, {PCFB}
               and {PCTR}},
  booktitle = {{ICISSP}},
  pages     = {452--460},
  publisher = {SciTePress},
  year      = {2018}
}
@proceedings{DBLP:conf/icissp/2018,
  editor    = {Paolo Mori and
               Steven Furnell and
               Olivier Camp},
  title     = {Proceedings of the 4th International Conference on Information Systems
               Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
               January 22-24, 2018},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/icissp/AhmadiS17,
  author    = {Ahmad Ahmadi and
               Reihaneh Safavi{-}Naini},
  title     = {Distance-bounding Identification},
  booktitle = {{ICISSP}},
  pages     = {202--212},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/AldayelA17,
  author    = {Mashael Aldayel and
               Mohammad Alhussain},
  title     = {Enhanced Identification of Sensitive User Inputs in Mobile Applications},
  booktitle = {{ICISSP}},
  pages     = {506--515},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/AlepisP17,
  author    = {Efthimios Alepis and
               Constantinos Patsakis},
  title     = {There's Wally! Location Tracking in Android without Permissions},
  booktitle = {{ICISSP}},
  pages     = {278--284},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/AlruhailyBC17,
  author    = {Nada Alruhaily and
               Behzad Bordbar and
               Tom Chothia},
  title     = {Towards an Understanding of the Misclassification Rates of Machine
               Learning-based Malware Detection Systems},
  booktitle = {{ICISSP}},
  pages     = {101--112},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/BannierF17,
  author    = {Arnaud Bannier and
               Eric Filiol},
  title     = {Mathematical Backdoors in Symmetric Encryption Systems - Proposal
               for a Backdoored AES-like Block Cipher},
  booktitle = {{ICISSP}},
  pages     = {622--631},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/BarghVC17,
  author    = {Mortaza S. Bargh and
               Marco Vink and
               Sunil Choenni},
  title     = {On Usage Control in Relational Database Management Systems - Obligations
               and Their Enforcement in Joining Datasets},
  booktitle = {{ICISSP}},
  pages     = {190--201},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/BernardeschiNDP17,
  author    = {Cinzia Bernardeschi and
               Marco Di Natale and
               Gianluca Dini and
               Maurizio Palmieri},
  title     = {Verifying Data Secure Flow in {AUTOSAR} Models by Static Analysis},
  booktitle = {{ICISSP}},
  pages     = {704--713},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/Bertino17,
  author    = {Elisa Bertino},
  title     = {Security and Privacy in the IoT},
  booktitle = {{ICISSP}},
  pages     = {5},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/BeukemaAS17,
  author    = {W. J. B. Beukema and
               T. Attema and
               H. A. Schotanus},
  title     = {Internal Network Monitoring and Anomaly Detection through Host Clustering},
  booktitle = {{ICISSP}},
  pages     = {694--703},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/BeuranPTCTS17,
  author    = {Razvan Beuran and
               Cuong Pham and
               Dat Tang and
               Ken{-}ichi Chinen and
               Yasuo Tan and
               Yoichi Shinoda},
  title     = {CyTrONE: An Integrated Cybersecurity Training Framework},
  booktitle = {{ICISSP}},
  pages     = {157--166},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/BuK17,
  author    = {Lake Bu and
               Mark G. Karpovsky},
  title     = {A Design of Secure and ReliableWireless Transmission Channel for Implantable
               Medical Devices},
  booktitle = {{ICISSP}},
  pages     = {233--242},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/Cam-Winget17,
  author    = {Nancy Cam{-}Winget},
  title     = {Sensor Networks as the new Attack Target},
  booktitle = {{ICISSP}},
  pages     = {7},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/CiminoV17,
  author    = {Mario Giovanni C. A. Cimino and
               Gigliola Vaglini},
  title     = {Localization and Inhibition of Malicious Behaviors through a Model
               Checking based Methodology},
  booktitle = {{ICISSP}},
  pages     = {644--652},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/CimitileMM17,
  author    = {Aniello Cimitile and
               Fabio Martinelli and
               Francesco Mercaldo},
  title     = {Machine Learning Meets iOS Malware: Identifying Malicious Applications
               on Apple Environment},
  booktitle = {{ICISSP}},
  pages     = {487--492},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/CostantinoMMP17,
  author    = {Gianpiero Costantino and
               Fabio Martinelli and
               Ilaria Matteucci and
               Marinella Petrocchi},
  title     = {Analysis of Data Sharing Agreements},
  booktitle = {{ICISSP}},
  pages     = {167--178},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/CourtoisM17,
  author    = {Nicolas T. Courtois and
               Rebekah Mercer},
  title     = {Stealth Address and Key Management Techniques in Blockchain Systems},
  booktitle = {{ICISSP}},
  pages     = {559--566},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/CozzaTCK17,
  author    = {Vittoria Cozza and
               Zisis Tsiatsikas and
               Mauro Conti and
               Georgios Kambourakis},
  title     = {Why Snoopy Loves Online Services: An Analysis of (Lack of) Privacy
               in Online Services},
  booktitle = {{ICISSP}},
  pages     = {431--438},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/DamT17,
  author    = {Khanh{-}Huu{-}The Dam and
               Tayssir Touili},
  title     = {Malware Detection based on Graph Classification},
  booktitle = {{ICISSP}},
  pages     = {455--463},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/DamT17a,
  author    = {Khanh{-}Huu{-}The Dam and
               Tayssir Touili},
  title     = {Extracting Android Malicious Behaviors},
  booktitle = {{ICISSP}},
  pages     = {714--723},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/DuboisF17,
  author    = {Michel Dubois and
               Eric Filiol},
  title     = {Hacking of the {AES} with Boolean Functions},
  booktitle = {{ICISSP}},
  pages     = {599--609},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/DutaGT17,
  author    = {Cristina{-}Loredana Duta and
               Laura Gheorghe and
               Nicolae Tapus},
  title     = {Real-time {DSP} Implementations of Voice Encryption Algorithms},
  booktitle = {{ICISSP}},
  pages     = {439--446},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/EbrahimyP17,
  author    = {Razgar Ebrahimy and
               Zoya Pourmirza},
  title     = {Cyber-interdependency in Smart Energy Systems},
  booktitle = {{ICISSP}},
  pages     = {529--537},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/EiblFHSBRE17,
  author    = {G{\"{u}}nther Eibl and
               Cornelia Ferner and
               Tobias Hildebrandt and
               Florian Stertz and
               Sebastian Burkhart and
               Stefanie Rinderle{-}Ma and
               Dominik Engel},
  title     = {Exploration of the Potential of Process Mining for Intrusion Detection
               in Smart Metering},
  booktitle = {{ICISSP}},
  pages     = {38--46},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/FukushimaHK17,
  author    = {Kazuhide Fukushima and
               Seira Hidano and
               Shinsaku Kiyomoto},
  title     = {White-box Implementation of Stream Cipher},
  booktitle = {{ICISSP}},
  pages     = {263--269},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/GjertsenGBF17,
  author    = {Eyvind Garder B. Gjertsen and
               Erlend Andreas Gj{\ae}re and
               Maria Bartnes and
               Waldo Rocha Flores},
  title     = {Gamification of Information Security Awareness and Training},
  booktitle = {{ICISSP}},
  pages     = {59--70},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/HadadSOPR17,
  author    = {Tal Hadad and
               Bronislav Sidik and
               Nir Ofek and
               Rami Puzis and
               Lior Rokach},
  title     = {User Feedback Analysis for Mobile Malware Detection},
  booktitle = {{ICISSP}},
  pages     = {83--94},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/HamadP17,
  author    = {Mohammad Hamad and
               Vassilis Prevelakis},
  title     = {Secure APIs for Applications in Microkernel-based Systems},
  booktitle = {{ICISSP}},
  pages     = {553--558},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/HatinCSR17,
  author    = {Julien Hatin and
               Estelle Cherrier and
               Jean{-}Jacques Schwartzmann and
               Christophe Rosenberger},
  title     = {Privacy Preserving Transparent Mobile Authentication},
  booktitle = {{ICISSP}},
  pages     = {354--361},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/HaupertM17,
  author    = {Vincent Haupert and
               Tilo M{\"{u}}ller},
  title     = {Rest in Protection - {A} Kernel-level Approach to Mitigate {RIP} Tampering},
  booktitle = {{ICISSP}},
  pages     = {25--37},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/HerwonoE17,
  author    = {Ian Herwono and
               Fadi Ali El{-}Moussa},
  title     = {A Collaborative Tool for Modelling Multi-stage Attacks},
  booktitle = {{ICISSP}},
  pages     = {312--317},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/HuffmeyerHMSW17,
  author    = {Marc H{\"{u}}ffmeyer and
               Pascal Hirmer and
               Bernhard Mitschang and
               Ulf Schreier and
               Matthias Wieland},
  title     = {SitAC - {A} System for Situation-aware Access Control - Controlling
               Access to Sensor Data},
  booktitle = {{ICISSP}},
  pages     = {113--125},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/HuynenL17,
  author    = {Jean{-}Louis Huynen and
               Gabriele Lenzini},
  title     = {From Situation Awareness to Action: An Information Security Management
               Toolkit for Socio-technical Security Retrospective and Prospective
               Analysis},
  booktitle = {{ICISSP}},
  pages     = {213--224},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/IrollaF17,
  author    = {Paul Irolla and
               Eric Filiol},
  title     = {Glassbox: Dynamic Analysis Platform for Malware Android Applications
               on Real Devices},
  booktitle = {{ICISSP}},
  pages     = {610--621},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/KapratwarTS17,
  author    = {Ankita Kapratwar and
               Fabio Di Troia and
               Mark Stamp},
  title     = {Static and Dynamic Analysis of Android Malware},
  booktitle = {{ICISSP}},
  pages     = {653--662},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/KarlssonHS17,
  author    = {Linus Karlsson and
               Martin Hell and
               Paul Stankovski},
  title     = {Improved Greedy Nonrandomness Detectors for Stream Ciphers},
  booktitle = {{ICISSP}},
  pages     = {225--232},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/KarlzenBH17,
  author    = {Henrik Karlz{\'{e}}n and
               Johan E. Bengtsson and
               Jonas Hallberg},
  title     = {Assessing Information Security Risks using Pairwise Weighting},
  booktitle = {{ICISSP}},
  pages     = {318--324},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/KiperbergRAZ17,
  author    = {Michael Kiperberg and
               Amit Resh and
               Asaf Algawi and
               Nezer Jacob Zaidenberg},
  title     = {System for Executing Encrypted Java Programs},
  booktitle = {{ICISSP}},
  pages     = {245--252},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/KippeP17,
  author    = {J{\"{o}}rg Kippe and
               Steffen Pfrang},
  title     = {Network and Topology Models to Support {IDS} Event Processing},
  booktitle = {{ICISSP}},
  pages     = {372--379},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/KrennLS17,
  author    = {Stephan Krenn and
               Thomas Lor{\"{u}}nser and
               Christoph Striecks},
  title     = {Batch-verifiable Secret Sharing with Unconditional Privacy},
  booktitle = {{ICISSP}},
  pages     = {303--311},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/KumarL17,
  author    = {Gautam Kumar and
               Brent Lagesse},
  title     = {Limited Use Cryptographic Tokens in Securing Ephemeral Cloud Servers},
  booktitle = {{ICISSP}},
  pages     = {447--454},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/LashkariDMG17,
  author    = {Arash Habibi Lashkari and
               Gerard Draper{-}Gil and
               Mohammad Saiful Islam Mamun and
               Ali A. Ghorbani},
  title     = {Characterization of Tor Traffic using Time based Features},
  booktitle = {{ICISSP}},
  pages     = {253--262},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/LeeLJML17,
  author    = {Wei{-}Han Lee and
               Changchang Liu and
               Shouling Ji and
               Prateek Mittal and
               Ruby B. Lee},
  title     = {Quantification of De-anonymization Risks in Social Networks},
  booktitle = {{ICISSP}},
  pages     = {126--135},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/LigierCFS17,
  author    = {Damien Ligier and
               Sergiu Carpov and
               Caroline Fontaine and
               Renaud Sirdey},
  title     = {Privacy Preserving Data Classification using Inner-product Functional
               Encryption},
  booktitle = {{ICISSP}},
  pages     = {423--430},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/LopesA17,
  author    = {Arthur Costa Lopes and
               Diego F. Aranha},
  title     = {Platform-agnostic Low-intrusion Optical Data Exfiltration},
  booktitle = {{ICISSP}},
  pages     = {474--480},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/LuhS0S17,
  author    = {Robert Luh and
               Gregor Schramm and
               Markus Wagner and
               Sebastian Schrittwieser},
  title     = {Sequitur-based Inference and Analysis Framework for Malicious System
               Behavior},
  booktitle = {{ICISSP}},
  pages     = {632--643},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/LuhSMJ17,
  author    = {Robert Luh and
               Sebastian Schrittwieser and
               Stefan Marschalek and
               Helge Janicke},
  title     = {Design of an Anomaly-based Threat Detection {\&}amp; Explication
               System},
  booktitle = {{ICISSP}},
  pages     = {397--402},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/LutasTC17,
  author    = {Andrei Lutas and
               Daniel Ticle and
               Octavian Cret},
  title     = {Hypervisor based Memory Introspection: Challenges, Problems and Limitations},
  booktitle = {{ICISSP}},
  pages     = {285--294},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/MartinelliMNSV17,
  author    = {Fabio Martinelli and
               Francesco Mercaldo and
               Vittoria Nardone and
               Antonella Santone and
               Corrado Aaron Visaggio},
  title     = {Identifying Mobile Repackaged Applications through Formal Methods},
  booktitle = {{ICISSP}},
  pages     = {673--682},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/MartinezEMZ17,
  author    = {V. Gayoso Mart{\'{\i}}nez and
               Luis Hern{\'{a}}ndez Encinas and
               Agust{\'{\i}}n Mart{\'{\i}}n Mu{\~{n}}oz and
               J. Zhang},
  title     = {Breaking a Hitag2 Protocol with Low Cost Technology},
  booktitle = {{ICISSP}},
  pages     = {579--584},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/MorenoF17,
  author    = {Carlos Moreno and
               Sebastian Fischmeister},
  title     = {On the Security of Safety-critical Embedded Systems: Who Watches the
               Watchers? Who Reprograms the Watchers?},
  booktitle = {{ICISSP}},
  pages     = {493--498},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/NardoneV17,
  author    = {Vittoria Nardone and
               Corrado Aaron Visaggio},
  title     = {"Mirror, Mirror on the Wall, Who is the Fairest One of All?" - Machine
               Learning versus Model Checking: {A} Comparison between Two Static
               Techniques for Malware Family Identification},
  booktitle = {{ICISSP}},
  pages     = {663--672},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/OhtakeSZ17,
  author    = {Go Ohtake and
               Reihaneh Safavi{-}Naini and
               Liang Feng Zhang},
  title     = {Outsourcing Scheme of {ABE} Encryption Secure against Malicious Adversary},
  booktitle = {{ICISSP}},
  pages     = {71--82},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/OmerovicNT17,
  author    = {Aida Omerovic and
               Marit Kj{\o}snes Natvig and
               Isabelle C. R. Tardy},
  title     = {Towards a Privacy Scorecard - Initial Design Exemplified on an Intelligent
               Transport Systems Service},
  booktitle = {{ICISSP}},
  pages     = {585--593},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/OrunsoluS17,
  author    = {Abdul A. Orunsolu and
               Adesina Simon Sodiya},
  title     = {An Anti-Phishing Kit Scheme for Secure Web Transactions},
  booktitle = {{ICISSP}},
  pages     = {15--24},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/PahiLS17,
  author    = {Timea Pahi and
               Maria Leitner and
               Florian Skopik},
  title     = {Analysis and Assessment of Situational Awareness Models for National
               Cyber Security Centers},
  booktitle = {{ICISSP}},
  pages     = {334--345},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/PeacockJV17,
  author    = {Matthew Peacock and
               Michael N. Johnstone and
               Craig Valli},
  title     = {Security Issues with BACnet Value Handling},
  booktitle = {{ICISSP}},
  pages     = {546--552},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/PereiraA17,
  author    = {Hilder V. L. Pereira and
               Diego F. Aranha},
  title     = {Non-interactive Privacy-preserving k-NN Classifier},
  booktitle = {{ICISSP}},
  pages     = {362--371},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/PfrangM17,
  author    = {Steffen Pfrang and
               David Meier},
  title     = {On the Detection of Replay Attacks in Industrial Automation Networks
               Operated with Profinet {IO}},
  booktitle = {{ICISSP}},
  pages     = {683--693},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/PooryousefA17,
  author    = {Shahrooz Pooryousef and
               Morteza Amini},
  title     = {Enhancing Accuracy of Android Malware Detection using Intent Instrumentation},
  booktitle = {{ICISSP}},
  pages     = {380--388},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/Preneel17,
  author    = {Bart Preneel},
  title     = {The Future of Information Security},
  booktitle = {{ICISSP}},
  pages     = {9},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/RauchbergerLS17,
  author    = {Julian Rauchberger and
               Robert Luh and
               Sebastian Schrittwieser},
  title     = {Longkit - {A} Universal Framework for {BIOS/UEFI} Rootkits in System
               Management Mode},
  booktitle = {{ICISSP}},
  pages     = {346--353},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/RegainiaS17,
  author    = {Loukmen Regainia and
               S{\'{e}}bastien Salva},
  title     = {A Methodology of Security Pattern Classification and of Attack-Defense
               Tree Generation},
  booktitle = {{ICISSP}},
  pages     = {136--146},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/ReshetovaBA17,
  author    = {Elena Reshetova and
               Filippo Bonazzi and
               N. Asokan},
  title     = {SELint: An SEAndroid Policy Analysis Tool},
  booktitle = {{ICISSP}},
  pages     = {47--58},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/RiemannG17,
  author    = {Robert Riemann and
               St{\'{e}}phane Grumbach},
  title     = {Distributed Protocols at the Rescue for Trustworthy Online Voting},
  booktitle = {{ICISSP}},
  pages     = {499--505},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/SantosT17,
  author    = {Sergio de los Santos and
               Jos{\'{e}} Torres},
  title     = {Macro Malware Detection using Machine Learning Techniques - {A} New
               Approach},
  booktitle = {{ICISSP}},
  pages     = {295--302},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/SedeeqCL17,
  author    = {Iman Sedeeq and
               Frans Coenen and
               Alexei Lisitsa},
  title     = {Attribute Permutation Steganography Detection using Attribute Position
               Changes Count},
  booktitle = {{ICISSP}},
  pages     = {95--100},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/SinghSACC17,
  author    = {Kalpana Singh and
               Renaud Sirdey and
               Fran{\c{c}}ois Artiguenave and
               David Cohen and
               Sergiu Carpov},
  title     = {Towards Confidentiality-strengthened Personalized Genomic Medicine
               Embedding Homomorphic Cryptography},
  booktitle = {{ICISSP}},
  pages     = {325--333},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/SoaresS17,
  author    = {Alberto Magno Muniz Soares and
               Rafael Tim{\'{o}}teo de Sousa Jr.},
  title     = {A Technique for Extraction and Analysis of Application Heap Objects
               within Android Runtime {(ART)}},
  booktitle = {{ICISSP}},
  pages     = {147--156},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/SonntagM17,
  author    = {Michael Sonntag and
               Ren{\'{e}} Mayrhofer},
  title     = {Traffic Statistics of a High-Bandwidth Tor Exit Node},
  booktitle = {{ICISSP}},
  pages     = {270--277},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/TelikicherlaAC17,
  author    = {Krishna Chaitanya Telikicherla and
               Akash Agrawall and
               Venkatesh Choppella},
  title     = {A Formal Model of Web Security Showing Malicious Cross Origin Requests
               and Its Mitigation using {CORP}},
  booktitle = {{ICISSP}},
  pages     = {516--523},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/Tezcan17,
  author    = {Cihangir Tezcan},
  title     = {Brute Force Cryptanalysis of {MIFARE} Classic Cards on {GPU}},
  booktitle = {{ICISSP}},
  pages     = {524--528},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/ThuloE17,
  author    = {Motlatsi i Isaac Thulo and
               Jan H. P. Eloff},
  title     = {Towards Optimized Security-aware (O-Sec) {VM} Placement Algorithms},
  booktitle = {{ICISSP}},
  pages     = {411--422},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/UwizeyemunguP17,
  author    = {Sylvestre Uwizeyemungu and
               Placide Poba{-}Nzaou},
  title     = {Health Information Exchange and Related IT-security Practices in European
               Hospitals},
  booktitle = {{ICISSP}},
  pages     = {538--545},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/VellaC17,
  author    = {Mark Vella and
               Rachel Cilia},
  title     = {Memory Forensics of Insecure Android Inter-app Communications},
  booktitle = {{ICISSP}},
  pages     = {481--486},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/VibertBRC17,
  author    = {Beno{\^{\i}}t Vibert and
               Jean{-}Marie Le Bars and
               Christophe Rosenberger and
               Christophe Charrier},
  title     = {Fingerprint Class Recognition for Securing {EMV} Transaction},
  booktitle = {{ICISSP}},
  pages     = {403--410},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/VolleroBSBMT17,
  author    = {L. Vollero and
               Daniele Biondo and
               R. Setola and
               Gianluca Bocci and
               Rocco Mammoliti and
               Alessandra Toma},
  title     = {Improving the Automatic Identification of Malicious Android Apps in
               Unofficial Stores through Logo Analysis},
  booktitle = {{ICISSP}},
  pages     = {567--572},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/VyasMK17,
  author    = {Tanvi Vyas and
               Andrea Marchesini and
               Christoph Kerschbaumer},
  title     = {Extending the Same Origin Policy with Origin Attributes},
  booktitle = {{ICISSP}},
  pages     = {464--473},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/WaltE17,
  author    = {Est{\'{e}}e van der Walt and
               Jan H. P. Eloff},
  title     = {Identity Deception Detection on Social Media Platforms},
  booktitle = {{ICISSP}},
  pages     = {573--578},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/Yesuf17,
  author    = {Ahmed Seid Yesuf},
  title     = {A Review of Risk Identification Approaches in the Telecommunication
               Domain},
  booktitle = {{ICISSP}},
  pages     = {389--396},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/ZhiouaRAKS17,
  author    = {Zeineb Zhioua and
               Yves Roudier and
               Rab{\'{e}}a Ameur{-}Boulifa and
               Takoua Kechiche and
               Stuart Short},
  title     = {Tracking Dependent Information Flows},
  booktitle = {{ICISSP}},
  pages     = {179--189},
  publisher = {SciTePress},
  year      = {2017}
}
@proceedings{DBLP:conf/icissp/2017,
  editor    = {Paolo Mori and
               Steven Furnell and
               Olivier Camp},
  title     = {Proceedings of the 3rd International Conference on Information Systems
               Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
               2017},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/icissp/AbduL16,
  author    = {Nadia Jemil Abdu and
               Ulrike Lechner},
  title     = {A Threat Analysis Model for Identity and Access Management},
  booktitle = {{ICISSP}},
  pages     = {498--502},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/AbuelgasimK16,
  author    = {Ammar Abuelgasim and
               Anne Kayem},
  title     = {An Approach to Personalized Privacy Policy Recommendations on Online
               Social Networks},
  booktitle = {{ICISSP}},
  pages     = {126--137},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/AlsmadiXC16,
  author    = {Izzat Alsmadi and
               Dianxiang Xu and
               Jin{-}Hee Cho},
  title     = {Interaction-based Reputation Model in Online Social Networks},
  booktitle = {{ICISSP}},
  pages     = {265--272},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/BalushiMS16,
  author    = {Abdullah Al Balushi and
               Kieran McLaughlin and
               Sakir Sezer},
  title     = {Contextual Intrusion Alerts for Scada Networks - An Ontology based
               Approach for Intrusion Alerts Post Processing},
  booktitle = {{ICISSP}},
  pages     = {457--464},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/BattistaMNSV16,
  author    = {Pasquale Battista and
               Francesco Mercaldo and
               Vittoria Nardone and
               Antonella Santone and
               Corrado Aaron Visaggio},
  title     = {Identification of Android Malware Families with Model Checking},
  booktitle = {{ICISSP}},
  pages     = {542--547},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/BhanuDKLLLRRW16,
  author    = {Yogesh Bhanu and
               Sebastian D{\"{a}}nnart and
               Henning von Kielpinski and
               Alexander Laux and
               Ulrike Lechner and
               Tobias Lehmann and
               Andreas Rieb and
               Martin Riedl and
               Florian Wolf},
  title     = {A Cyberthreat Search Process and Service},
  booktitle = {{ICISSP}},
  pages     = {528--535},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/BhattacharjeeSM16,
  author    = {Jaya Bhattacharjee and
               Anirban Sengupta and
               Chandan Mazumdar},
  title     = {A Quantitative Methodology for Security Risk Assessment of Enterprise
               Business Processes},
  booktitle = {{ICISSP}},
  pages     = {388--399},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/BittlR16,
  author    = {Sebastian Bittl and
               Karsten Roscher},
  title     = {Efficient Authorization Authority Certificate Distribution in VANETs},
  booktitle = {{ICISSP}},
  pages     = {85--96},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/BossiAB16,
  author    = {Simone Bossi and
               Tea Anselmo and
               Guido Bertoni},
  title     = {On {TLS} 1.3 - Early Performance Analysis in the IoT Field},
  booktitle = {{ICISSP}},
  pages     = {117--125},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/BottaAGV16,
  author    = {Alessio Botta and
               Aniello Avallone and
               Mauro Garofalo and
               Giorgio Ventre},
  title     = {Internet Streaming and Network Neutrality: Comparing the Performance
               of Video Hosting Services},
  booktitle = {{ICISSP}},
  pages     = {514--521},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/BroennerHS16,
  author    = {Simon Broenner and
               Hans H{\"{o}}fken and
               Marko Schuba},
  title     = {Streamlining Extraction and Analysis of Android {RAM} Images},
  booktitle = {{ICISSP}},
  pages     = {255--264},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/ButtnerH16,
  author    = {Carsten B{\"{u}}ttner and
               Sorin A. Huss},
  title     = {An Anonymous Geocast Scheme for {ITS} Applications},
  booktitle = {{ICISSP}},
  pages     = {179--189},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/ChenSLLYW16,
  author    = {Kang Chen and
               Qingni Shen and
               Cong Li and
               Yang Luo and
               Yahui Yang and
               Zhonghai Wu},
  title     = {Sift - An Efficient Method for Co-residency Detection on Amazon {EC2}},
  booktitle = {{ICISSP}},
  pages     = {423--431},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/Draper-GilLMG16,
  author    = {Gerard Draper{-}Gil and
               Arash Habibi Lashkari and
               Mohammad Saiful Islam Mamun and
               Ali A. Ghorbani},
  title     = {Characterization of Encrypted and {VPN} Traffic using Time-related
               Features},
  booktitle = {{ICISSP}},
  pages     = {407--414},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/DutaGT16,
  author    = {Cristina{-}Loredana Duta and
               Laura Gheorghe and
               Nicolae Tapus},
  title     = {Performance Analysis of Real Time Implementations of Voice Encryption
               Algorithms using Blackfin Processors},
  booktitle = {{ICISSP}},
  pages     = {157--166},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/ErdoganSA16,
  author    = {Gencer Erdogan and
               Ketil St{\o}len and
               Jan {\O}yvind Aagedal},
  title     = {Evaluation of the {CORAL} Approach for Risk-driven Security Testing
               based on an Industrial Case Study},
  booktitle = {{ICISSP}},
  pages     = {219--226},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/FerreiraL16,
  author    = {Ana Ferreira and
               Gabriele Lenzini},
  title     = {Comparing and Integrating Break-the-Glass and Delegation in Role-based
               Access Control for Healthcare},
  booktitle = {{ICISSP}},
  pages     = {63--73},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/GeorgescuHOKY16,
  author    = {Marius Georgescu and
               Hiroaki Hazeyama and
               Takeshi Okuda and
               Youki Kadobayashi and
               S. Yamaguchi},
  title     = {The {STRIDE} Towards IPv6: {A} Comprehensive Threat Model for IPv6
               Transition Technologies},
  booktitle = {{ICISSP}},
  pages     = {243--254},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/GraaCCL16,
  author    = {Mariem Graa and
               Nora Cuppens{-}Boulahia and
               Fr{\'{e}}d{\'{e}}ric Cuppens and
               Jean{-}Louis Lanet},
  title     = {Tracking Explicit and Control Flows in Java and Native Android Apps
               Code},
  booktitle = {{ICISSP}},
  pages     = {307--316},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/GrafGRH16,
  author    = {Roman Graf and
               Sergiu Gordea and
               Heather M. Ryan and
               Tibaut Houzanme},
  title     = {An Expert System for Facilitating an Institutional Risk Profile Definition
               for Cyber Situational Awareness},
  booktitle = {{ICISSP}},
  pages     = {347--354},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/HappaFNAGC16,
  author    = {Jassim Happa and
               Graham Fairclough and
               Jason R. C. Nurse and
               Ioannis Agrafiotis and
               Michael Goldsmith and
               Sadie Creese},
  title     = {A Pragmatic System-failure Assessment and Response Model},
  booktitle = {{ICISSP}},
  pages     = {503--508},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/HatinCSFR16,
  author    = {Julien Hatin and
               Estelle Cherrier and
               Jean{-}Jacques Schwartzmann and
               V. Frey and
               Christophe Rosenberger},
  title     = {A Continuous LoA Compliant Trust Evaluation Method},
  booktitle = {{ICISSP}},
  pages     = {355--363},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/HeinS16,
  author    = {Daniel D. Hein and
               Hossein Saiedian},
  title     = {Predicting Attack Prone Software Components using Repository Mined
               Change Metrics},
  booktitle = {{ICISSP}},
  pages     = {554--563},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/Hong16,
  author    = {Jason Hong},
  title     = {Privacy, Ethics and Big Data},
  booktitle = {{ICISSP}},
  pages     = {5},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/HossainSK16,
  author    = {Md. Selim Hossain and
               Ehsan Saeedi and
               Yinan Kong},
  title     = {High-Performance {FPGA} Implementation of Elliptic Curve Cryptography
               Processor over Binary Field {GF(2163)}},
  booktitle = {{ICISSP}},
  pages     = {415--422},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/HranickyMRV16,
  author    = {Radek Hranicky and
               Petr Matousek and
               Ondrej Rysav{\'{y}} and
               Vladim{\'{\i}}r Vesel{\'{y}}},
  title     = {Experimental Evaluation of Password Recovery in Encrypted Documents},
  booktitle = {{ICISSP}},
  pages     = {299--306},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/IshiiIF16,
  author    = {Masahiro Ishii and
               Atsuo Inomata and
               Kazutoshi Fujikawa},
  title     = {A Construction of a Twisted Ate Pairing on a Family of Kawazoe-Takahashi
               Curves at 192-bit Security Level and Its Cost Estimate},
  booktitle = {{ICISSP}},
  pages     = {432--439},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/Izuakor16,
  author    = {Christine Izuakor},
  title     = {Understanding the Impact of Cyber Security Risks on Safety},
  booktitle = {{ICISSP}},
  pages     = {509--513},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/JollyVR16,
  author    = {Germain Jolly and
               Sylvain Vernois and
               Christophe Rosenberger},
  title     = {An Observe-and-Detect Methodology for the Security and Functional
               Testing of Smart Card Applications},
  booktitle = {{ICISSP}},
  pages     = {282--289},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/KerschbaumerSB16,
  author    = {Christoph Kerschbaumer and
               Sid Stamm and
               Stefan Brunthaler},
  title     = {Injecting {CSP} for Fun and Security},
  booktitle = {{ICISSP}},
  pages     = {15--25},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/KhanMLS16,
  author    = {Rafiullah Khan and
               Kieran McLaughlin and
               David M. Laverty and
               Sakir Sezer},
  title     = {{IEEE} {C37.118-2} Synchrophasor Communication Framework - Overview,
               Cyber Vulnerabilities Analysis and Performance Evaluation},
  booktitle = {{ICISSP}},
  pages     = {167--178},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/LaviG16,
  author    = {Tamir Lavi and
               Ehud Gudes},
  title     = {Trust-based Dynamic {RBAC}},
  booktitle = {{ICISSP}},
  pages     = {317--324},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/LaxBNNF16,
  author    = {Gianluca Lax and
               Francesco Buccafurri and
               Serena Nicolazzo and
               Antonino Nocera and
               Lidia Fotia},
  title     = {A New Approach for Electronic Signature},
  booktitle = {{ICISSP}},
  pages     = {440--447},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/Lenz16,
  author    = {Hans{-}Joachim Lenz},
  title     = {Tax Fraud and Investigation Procedures - Everybody, Every Where, Every
               Time},
  booktitle = {{ICISSP}},
  pages     = {7--8},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/LiSCYW16,
  author    = {Cong Li and
               Qingni Shen and
               Kang Chen and
               Yahui Yang and
               Zhonghai Wu},
  title     = {Whispers in the Cloud - {A} Covert Channel using the Result of Creating
               a Virtual Machine},
  booktitle = {{ICISSP}},
  pages     = {380--387},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/LiSDYW16,
  author    = {Wenting Li and
               Qingni Shen and
               Chuntao Dong and
               Yahui Yang and
               Zhonghai Wu},
  title     = {{DDHCS:} Distributed Denial-of-service Threat to {YARN} Clusters based
               on Health Check Service},
  booktitle = {{ICISSP}},
  pages     = {146--156},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/MaddarKCY16,
  author    = {Hela Maddar and
               Wafa Kammoun and
               Omar Cheikhrouhou and
               Habib Youssef},
  title     = {Lightweight Trust Model with High Longevity for Wireless Sensor Networks},
  booktitle = {{ICISSP}},
  pages     = {548--553},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/MarufuKW16,
  author    = {Anesu M. C. Marufu and
               Anne V. D. M. Kayem and
               Stephen D. Wolthusen},
  title     = {Fault-tolerant Distributed Continuous Double Auctioning on Computationally
               Constrained Microgrids},
  booktitle = {{ICISSP}},
  pages     = {448--456},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/MathewsJF16,
  author    = {M. Lisa Mathews and
               Anupam Joshi and
               Tim Finin},
  title     = {Detecting Botnets using a Collaborative Situational-aware {IDPS}},
  booktitle = {{ICISSP}},
  pages     = {290--298},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/MaynardMS16,
  author    = {Peter Maynard and
               Kieran McLaughlin and
               Sakir Sezer},
  title     = {Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction},
  booktitle = {{ICISSP}},
  pages     = {465--472},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/Mzila16,
  author    = {Phiwa Mzila},
  title     = {Review Analysis of Properties for an Ideal Secure Biometric Template
               Scheme},
  booktitle = {{ICISSP}},
  pages     = {333--339},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/NakamuraKTS16,
  author    = {Toru Nakamura and
               Shinsaku Kiyomoto and
               Welderufael B. Tesfay and
               Jetzabel Serna},
  title     = {Personalised Privacy by Default Preferences - Experiment and Analysis},
  booktitle = {{ICISSP}},
  pages     = {53--62},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/PalBM16,
  author    = {Asim K. Pal and
               Subrata Bose and
               Arpita Maitra},
  title     = {Collaborative Information Service - Privacy Algebra for User Defined
               Security},
  booktitle = {{ICISSP}},
  pages     = {473--481},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/PaudelQI16,
  author    = {Nilakantha Paudel and
               Marco Querini and
               Giuseppe F. Italiano},
  title     = {Handwritten Signature Verification for Mobile Phones},
  booktitle = {{ICISSP}},
  pages     = {46--52},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/Pohn16,
  author    = {Daniela P{\"{o}}hn},
  title     = {Risk Management for Dynamic Metadata Exchange via a Trusted Third
               Party},
  booktitle = {{ICISSP}},
  pages     = {227--234},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/QiaoHS16,
  author    = {Kexin Qiao and
               Lei Hu and
               Siwei Sun},
  title     = {Differential Security Evaluation of Simeck with Dynamic Key-guessing
               Techniques},
  booktitle = {{ICISSP}},
  pages     = {74--84},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/R16,
  author    = {Feno Heriniaina R.},
  title     = {A Privacy Threat for Internet Users in Internet-censoring Countries},
  booktitle = {{ICISSP}},
  pages     = {372--379},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/RampineN16,
  author    = {Edwin T. L. Rampine and
               Cynthia H. Ngejane},
  title     = {A Brief Overview of Hybrid Schemes for Biometric Fingerprint Template
               Security},
  booktitle = {{ICISSP}},
  pages     = {340--346},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/ReshetovaBNBA16,
  author    = {Elena Reshetova and
               Filippo Bonazzi and
               Thomas Nyman and
               Ravishankar Borgaonkar and
               N. Asokan},
  title     = {Characterizing SEAndroid Policies in the Wild},
  booktitle = {{ICISSP}},
  pages     = {482--489},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/SedeeqCL16,
  author    = {Iman Sedeeq and
               Frans Coenen and
               Alexei Lisitsa},
  title     = {A Statistical Approach to the Detection of {HTML} Attribute Permutation
               Steganography},
  booktitle = {{ICISSP}},
  pages     = {522--527},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/SettanniSSF16,
  author    = {Giuseppe Settanni and
               Florian Skopik and
               Yegor Shovgenya and
               Roman Fiedler},
  title     = {A Collaborative Analysis System for Cross-organization Cyber Incident
               Handling},
  booktitle = {{ICISSP}},
  pages     = {105--116},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/ShaoLX16,
  author    = {C. Shao and
               H. Li and
               G. Xu},
  title     = {Quantitative Evaluation of Security on Cryptographic ICs against Fault
               Injection Attacks},
  booktitle = {{ICISSP}},
  pages     = {97--104},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/ShiHSS16,
  author    = {Danping Shi and
               Lei Hu and
               Siwei Sun and
               Ling Song},
  title     = {Linear(hull) Cryptanalysis of Round-reduced Versions of {KATAN}},
  booktitle = {{ICISSP}},
  pages     = {364--371},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/StenzelKBR16,
  author    = {Kurt Stenzel and
               Kuzman Katkalov and
               Marian Borek and
               Wolfgang Reif},
  title     = {Declassification of Information with Complex Filter Functions},
  booktitle = {{ICISSP}},
  pages     = {490--497},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/SugioIKH16,
  author    = {Nobuyuki Sugio and
               Yasutaka Igarashi and
               Toshinobu Kaneko and
               Kenichi Higuchi},
  title     = {A Practical-time Attack on Reduced-round {MISTY1}},
  booktitle = {{ICISSP}},
  pages     = {235--242},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/SusukiYS16,
  author    = {Hiroya Susuki and
               Rie Shigetomi Yamaguchi and
               Shizuo Sakamoto},
  title     = {Multi-factor Authentication Updating System Evaluation Dynamically
               for Service Continuity},
  booktitle = {{ICISSP}},
  pages     = {273--281},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/SymeonidisTP16,
  author    = {Iraklis Symeonidis and
               Pagona Tsormpatzoudi and
               Bart Preneel},
  title     = {Collateral Damage of Online Social Network Applications},
  booktitle = {{ICISSP}},
  pages     = {536--541},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/TariqS16,
  author    = {Muhammad Imran Tariq and
               Vito Santarcangelo},
  title     = {Analysis of {ISO} 27001: 2013 Controls Effectiveness for Cloud Computing},
  booktitle = {{ICISSP}},
  pages     = {201--208},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/TeubertGM16,
  author    = {Dominik Teubert and
               Fred Grossmann and
               Ulrike Meyer},
  title     = {Anomaly-based Mobile Malware Detection: System Calls as Source for
               Features},
  booktitle = {{ICISSP}},
  pages     = {26--36},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/Tezcan16,
  author    = {Cihangir Tezcan},
  title     = {Truncated, Impossible, and Improbable Differential Analysis of {ASCON}},
  booktitle = {{ICISSP}},
  pages     = {325--332},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/TriaLT16,
  author    = {Francesco Di Tria and
               Ezio Lefons and
               Filippo Tangorra},
  title     = {Improving Database Security in Web-based Environments},
  booktitle = {{ICISSP}},
  pages     = {193--200},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/Ulltveit-MoePEN16,
  author    = {Nils Ulltveit{-}Moe and
               Steffen Pfrang and
               L{\'{a}}szl{\'{o}} Erd{\"{o}}di and
               H{\'{e}}ctor Nebot},
  title     = {Mitigating Local Attacks Against a City Traffic Controller},
  booktitle = {{ICISSP}},
  pages     = {209--218},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/UwizeyemunguP16,
  author    = {Sylvestre Uwizeyemungu and
               Placide Poba{-}Nzaou},
  title     = {Security and Privacy Practices in Healthcare Information Systems:
               {A} Cluster Analysis of European Hospitals},
  booktitle = {{ICISSP}},
  pages     = {37--45},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/WambachB16,
  author    = {Tim Wambach and
               Katharina Br{\"{a}}unlich},
  title     = {Retrospective Study of Third-party Web Tracking},
  booktitle = {{ICISSP}},
  pages     = {138--145},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/Weippl16,
  author    = {Edgar R. Weippl},
  title     = {Ethics in Security Research},
  booktitle = {{ICISSP}},
  pages     = {9},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/YangCWC16,
  author    = {Ching{-}Nung Yang and
               Stelvio Cimato and
               Jihi{-}Han Wu and
               Song{-}Ruei Cai},
  title     = {3-Out-of-n Cheating Prevention Visual Cryptographic Schemes},
  booktitle = {{ICISSP}},
  pages     = {400--406},
  publisher = {SciTePress},
  year      = {2016}
}
@proceedings{DBLP:conf/icissp/2016,
  editor    = {Olivier Camp and
               Steven Furnell and
               Paolo Mori},
  title     = {Proceedings of the 2nd International Conference on Information Systems
               Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
               2016},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/icissp/AblizZ15,
  author    = {Mehmud Abliz and
               Taieb F. Znati},
  title     = {Defeating DDoS using Productive Puzzles},
  booktitle = {{ICISSP}},
  pages     = {114--123},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/Accorsi15,
  author    = {Rafael Accorsi},
  title     = {A Posteriori Process Security Control},
  booktitle = {{ICISSP}},
  pages     = {IS--5},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/AlishahiMT15,
  author    = {Mina Sheikh Alishahi and
               Mohamed Mejri and
               Nadia Tawbi},
  title     = {Clustering Spam Emails into Campaigns},
  booktitle = {{ICISSP}},
  pages     = {90--97},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/AnjumRPF15,
  author    = {Bushra Anjum and
               Manish Rajangam and
               Harry G. Perros and
               Wenjuan Fan},
  title     = {Filtering Unfair Users - {A} Hidden Markov Model Approach},
  booktitle = {{ICISSP}},
  pages     = {147--154},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/ArakalaHDH15,
  author    = {Arathi Arakala and
               Hao Hao and
               Stephen A. Davis and
               Kathy J. Horadam},
  title     = {The Palm Vein Graph - Feature Extraction and Matching},
  booktitle = {{ICISSP}},
  pages     = {295--303},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/BonneyHPS15,
  author    = {Gregor Bonney and
               Hans H{\"{o}}fken and
               Benedikt Paffen and
               Marko Schuba},
  title     = {{ICS/SCADA} Security - Analysis of a Beckhoff {CX5020} {PLC}},
  booktitle = {{ICISSP}},
  pages     = {137--142},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/ButtnerH15,
  author    = {Carsten B{\"{u}}ttner and
               Sorin A. Huss},
  title     = {A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular
               Ad Hoc Networks},
  booktitle = {{ICISSP}},
  pages     = {259--269},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/CourtoisEW15,
  author    = {Nicolas T. Courtois and
               Pinar Emirdag and
               Zhouyixing Wang},
  title     = {On Detection of Bitcoin Mining Redirection Attacks},
  booktitle = {{ICISSP}},
  pages     = {98--105},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/Desfray15,
  author    = {Philippe Desfray},
  title     = {Model Repositories at the Enterprises and Systems Scale - The Modelio
               Constellation Solution},
  booktitle = {{ICISSP}},
  pages     = {IS--17},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/FavrePBC15,
  author    = {M{\'{e}}lanie Favre and
               Sylvaine Picard and
               Julien Bringer and
               Herv{\'{e}} Chabanne},
  title     = {Balancing is the Key - Performing Finger Vein Template Protection
               using Fuzzy Commitment},
  booktitle = {{ICISSP}},
  pages     = {304--311},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/Ford15,
  author    = {Bryan Ford},
  title     = {Hiding in a Panopticon - Grand Challenges in Internet Anonymity},
  booktitle = {{ICISSP}},
  pages     = {IS--9},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/Furnell15,
  author    = {Steven Furnell},
  title     = {From Passwords to Biometrics - In Pursuit of a Panacea},
  booktitle = {{ICISSP}},
  pages     = {IS--7},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/HossainZ15,
  author    = {Al Amin Hossain and
               Weining Zhang},
  title     = {Privacy and Security Concern of Online Social Networks from User Perspective},
  booktitle = {{ICISSP}},
  pages     = {246--253},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/HusztiK15,
  author    = {Andrea Huszti and
               Zita Kovacs},
  title     = {Bilinear Pairing-based Hybrid Mixnet with Anonymity Revocation},
  booktitle = {{ICISSP}},
  pages     = {238--245},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/Inamura15,
  author    = {Masaki Inamura},
  title     = {Expansions of {CHAP} - Modificationless on Its Structures of Packet
               and Data Exchange},
  booktitle = {{ICISSP}},
  pages     = {213--220},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/Jacobs15,
  author    = {Stuart Jacobs},
  title     = {Optimizing Cryptographically based Security in Wireless Networks},
  booktitle = {{ICISSP}},
  pages     = {39--45},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/KangGK15,
  author    = {Bolam Kang and
               Sung Cheol Goh and
               Myungsun Kim},
  title     = {Private Web Search with Constant Round Efficiency},
  booktitle = {{ICISSP}},
  pages     = {205--212},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/KimHKSPP15,
  author    = {Taegyu Kim and
               Woomin Hwang and
               Chulmin Kim and
               Dong{-}Jae Shin and
               Ki{-}Woong Park and
               Kyu Ho Park},
  title     = {Malfinder: Accelerated Malware Classification System through Filtering
               on Manycore System},
  booktitle = {{ICISSP}},
  pages     = {17--26},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/KnirschENFP15,
  author    = {Fabian Knirsch and
               Dominik Engel and
               Christian Neureiter and
               Marc Fr{\^{\i}}ncu and
               Viktor K. Prasanna},
  title     = {Model-driven Privacy Assessment in the Smart Grid},
  booktitle = {{ICISSP}},
  pages     = {173--181},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/KoenePCSAORM15,
  author    = {Ansgar R. Koene and
               Elvira Perez and
               Christopher James Carter and
               Ramona Statache and
               Svenja Adolphs and
               Claire O'Malley and
               Tom Rodden and
               Derek McAuley},
  title     = {Research Ethics and Public Trust, Preconditions for Continued Growth
               of Internet Mediated Research - Public Confidence in Internet Mediate
               Research},
  booktitle = {{ICISSP}},
  pages     = {163--168},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/KrishnamachariN15,
  author    = {Sriram Krishnamachari and
               Mehrdad Nojoumian and
               Kemal Akkaya},
  title     = {Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational
               vs Unconditional Security},
  booktitle = {{ICISSP}},
  pages     = {106--113},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/KunzFNP15,
  author    = {Michael Kunz and
               Ludwig Fuchs and
               Michael Netter and
               G{\"{u}}nther Pernul},
  title     = {Analyzing Quality Criteria in Role-based Identity and Access Management},
  booktitle = {{ICISSP}},
  pages     = {64--72},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/LeeL15,
  author    = {Wei{-}Han Lee and
               Ruby B. Lee},
  title     = {Multi-sensor Authentication to Improve Smartphone Security},
  booktitle = {{ICISSP}},
  pages     = {270--280},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/LehnhardtRSC15,
  author    = {Jan Lehnhardt and
               Tobias Rho and
               Adrian Spalka and
               Armin B. Cremers},
  title     = {Performance-optimized Indexes for Inequality Searches on Encrypted
               Data in Practice},
  booktitle = {{ICISSP}},
  pages     = {221--229},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/LimYST15,
  author    = {Hyoyoung Lim and
               Yukiko Yamaguchi and
               Hajime Shimada and
               Hiroki Takakura},
  title     = {Malware Classification Method Based on Sequence of Traffic Flow},
  booktitle = {{ICISSP}},
  pages     = {230--237},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/MaiorcaACG15,
  author    = {Davide Maiorca and
               Davide Ariu and
               Igino Corona and
               Giorgio Giacinto},
  title     = {A Structural and Content-based Approach for a Precise and Robust Detection
               of Malicious {PDF} Files},
  booktitle = {{ICISSP}},
  pages     = {27--36},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/McDaniel15,
  author    = {Patrick D. McDaniel},
  title     = {A New Science of Security Decision Making},
  booktitle = {{ICISSP}},
  pages     = {IS--13},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/MoingS15,
  author    = {Josselyn Le Moing and
               Ingo Stengel},
  title     = {The Smartphone as a Gait Recognition Device - Impact of Selected Parameters
               on Gait Recognition},
  booktitle = {{ICISSP}},
  pages     = {322--328},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/MukherjeeM15,
  author    = {Preetam Mukherjee and
               Chandan Mazumdar},
  title     = {A Novel Model of Security Policies and Requirements},
  booktitle = {{ICISSP}},
  pages     = {73--82},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/NarayanaswamySS15,
  author    = {Jayagopal Narayanaswamy and
               Raghav V. Sampangi and
               Srinivas Sampalli},
  title     = {{HIDE:} Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic
               Key Generation and Encryption},
  booktitle = {{ICISSP}},
  pages     = {124--131},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/NergaardUG15,
  author    = {Henrik Nergaard and
               Nils Ulltveit{-}Moe and
               Terje Gj{\o}s{\ae}ter},
  title     = {A Scratch-based Graphical Policy Editor for {XACML}},
  booktitle = {{ICISSP}},
  pages     = {182--190},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/NoorafizaMUKS15,
  author    = {Matrazali Noorafiza and
               Hiroshi Maeda and
               Ryuya Uda and
               Toshiyuki Kinoshita and
               M. Shiratori},
  title     = {Vulnerability Analysis using Network Timestamps in Full Virtualization
               Virtual Machine},
  booktitle = {{ICISSP}},
  pages     = {83--89},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/Pernul15,
  author    = {G{\"{u}}nther Pernul},
  title     = {Privacy in Social Networks - Existing Challenges and Proposals for
               Solution},
  booktitle = {{ICISSP}},
  pages     = {IS--11},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/PrevelakisH15,
  author    = {Vassilis Prevelakis and
               Mohammad Hamad},
  title     = {A Policy-based Communications Architecture for Vehicles},
  booktitle = {{ICISSP}},
  pages     = {155--162},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/RoyM15,
  author    = {Puloma Roy and
               Chandan Mazumdar},
  title     = {Modelling of Enterprise Insider Threats},
  booktitle = {{ICISSP}},
  pages     = {132--136},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/SakpereK15,
  author    = {Aderonke Busayo Sakpere and
               Anne V. D. M. Kayem},
  title     = {Adaptive Buffer Resizing for Efficient Anonymization of Streaming
               Data with Minimal Information Loss},
  booktitle = {{ICISSP}},
  pages     = {191--201},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/ShoufanAB15,
  author    = {Abdulhadi Shoufan and
               Hassan Alnoon and
               Joonsang Baek},
  title     = {On the Power Consumption of Cryptographic Processors in Civil Microdrones},
  booktitle = {{ICISSP}},
  pages     = {283--290},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/TimpanaroCCF15,
  author    = {Juan Pablo Timpanaro and
               Thibault Cholez and
               Isabelle Chrisment and
               Olivier Festor},
  title     = {Evaluation of the Anonymous {I2P} Network's Design Choices Against
               Performance and Security},
  booktitle = {{ICISSP}},
  pages     = {46--55},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/TondelLJ15,
  author    = {Inger Anne T{\o}ndel and
               Maria B. Line and
               Gorm Johansen},
  title     = {Assessing Information Security Risks of {AMI} - What Makes it so Difficult?},
  booktitle = {{ICISSP}},
  pages     = {56--63},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/UwizeyemunguP15,
  author    = {Sylvestre Uwizeyemungu and
               Placide Poba{-}Nzaou},
  title     = {Understanding Information Technology Security Standards Diffusion
               - An Institutional Perspective},
  booktitle = {{ICISSP}},
  pages     = {5--16},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/VibertYVBCR15,
  author    = {Beno{\^{\i}}t Vibert and
               Zhigang Yao and
               Sylvain Vernois and
               Jean{-}Marie Le Bars and
               Christophe Charrier and
               Christophe Rosenberger},
  title     = {EvaBio Platform for the Evaluation Biometric System - Application
               to the Optimization of the Enrollment Process for Fingerprints Devices},
  booktitle = {{ICISSP}},
  pages     = {329--335},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/YaoBCR15,
  author    = {Zhigang Yao and
               Jean{-}Marie Le Bars and
               Christophe Charrier and
               Christophe Rosenberger},
  title     = {Quality Assessment of Fingerprints with Minutiae Delaunay Triangulation},
  booktitle = {{ICISSP}},
  pages     = {315--321},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/icissp/YaoBCR15a,
  author    = {Zhigang Yao and
               Jean{-}Marie Le Bars and
               Christophe Charrier and
               Christophe Rosenberger},
  title     = {Fingerprint Quality Assessment Combining Blind Image Quality, Texture
               and Minutiae Features},
  booktitle = {{ICISSP}},
  pages     = {336--343},
  publisher = {SciTePress},
  year      = {2015}
}
@proceedings{DBLP:conf/icissp/2015,
  editor    = {Olivier Camp and
               Edgar R. Weippl and
               Christophe Bidan and
               Esma A{\"{\i}}meur},
  title     = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
               Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
               France, 9-11 February, 2015},
  publisher = {SciTePress},
  year      = {2015}
}
maintained by Schloss Dagstuhl LZI at University of Trier