


default search action
5th ICISSP 2019: Prague, Czech Republic
- Paolo Mori, Steven Furnell, Olivier Camp:

Proceedings of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019. SciTePress 2019, ISBN 978-989-758-359-9
Invited Speakers
- Bill Buchanan:

Building the Future: Tokenization, Blockchain and Citizen-focused Systems. ICISSP 2019: 5 - Roberto Di Pietro:

Next Generation Information Warfare: Challenges and Research Directions. ICISSP 2019: 7-8 - Gerald Quirchmayr:

Challenges of GDPR and the NIS Directive. ICISSP 2019: 9
Papers
- Clemens Brunner

, Fabian Knirsch, Dominik Engel:
SPROOF: A Platform for Issuing and Verifying Documents in a Public Blockchain. 15-25 - Maja Nyman, Christine Große:

Are You Ready When It Counts? IT Consulting Firm's Information Security Incident Management. 26-37 - Jiahao Cai, Zihao Wei, Yingjie Zhang

, Siwei Sun, Lei Hu:
Zero-sum Distinguishers for Round-reduced GIMLI Permutation. 38-43 - Gaurav Sharma, Soultana Ellinidou, Tristan Vanspouwen, Théo Rigas, Jean-Michel Dricot, Olivier Markowitch:

Identity-based TLS for Cloud of Chips. 44-54 - Lorenz Schwittmann, Matthäus Wander, Torben Weis

:
Mobile Devices as Digital Sextants for Zero-Permission Geolocation. 55-66 - Kazuhide Fukushima

, Damien Marion
, Yuto Nakano, Adrien Facon, Shinsaku Kiyomoto, Sylvain Guilley:
Experiment on Side-Channel Key-Recovery using a Real LPWA End-device. 67-74 - Mary K. Bispham, Ioannis Agrafiotis, Michael Goldsmith:

Nonsense Attacks on Google Assistant and Missense Attacks on Amazon Alexa. 75-87 - Bernhards Blumbergs

:
Remote Exploit Development for Cyber Red Team Computer Network Operations Targeting Industrial Control Systems. 88-99 - Thomas Ulz, Markus Feldbacher, Thomas Pieber, Christian Steger:

Sensing Danger: Exploiting Sensors to Build Covert Channels. 100-113 - Dayana Spagnuelo

, Ana Ferreira, Gabriele Lenzini:
Accomplishing Transparency within the General Data Protection Regulation. 114-125 - Said Daoudagh

, Francesca Lonetti
, Eda Marchetti:
A Decentralized Solution for Combinatorial Testing of Access Control Engine. 126-135 - Szilvia Lestyan, Gergely Ács, Gergely Biczók

, Zsolt Szalay
:
Extracting Vehicle Sensor Signals from CAN Logs for Driver Re-identification. 136-145 - José Torres, Sergio de los Santos, Efthimios Alepis, Constantinos Patsakis:

Behavioral Biometric Authentication in Android Unlock Patterns through Machine Learning. 146-154 - Michael Kiperberg, Roee Leon, Amit Resh, Asaf Algawi, Nezer Zaidenberg

:
Hypervisor-assisted Atomic Memory Acquisition in Modern Systems. 155-162 - Akash Madhusudan

, Iraklis Symeonidis
, Mustafa A. Mustafa
, Ren Zhang
, Bart Preneel:
SC2Share: Smart Contract for Secure Car Sharing. 163-171 - Sotirios Katsikeas, Pontus Johnson, Simon Hacks

, Robert Lagerström:
Probabilistic Modeling and Simulation of Vehicular Cyber Attacks: An Application of the Meta Attack Language. 175-182 - Oluwafemi Olukoya

, Lewis Mackenzie, Inah Omoronyia:
Permission-based Risk Signals for App Behaviour Characterization in Android Apps. 183-192 - Ilan Ben-Bassat, Erez Rokah:

Locality-Sensitive Hashing for Efficient Web Application Security Testing. 193-204 - Dirk Snyman

, Hennie A. Kruger
:
Theorising on Information Cascades and Sequential Decision-making for Analysing Security Behaviour. 205-212 - Partha Sarathi Roy

, Kirill Morozov, Kazuhide Fukushima
, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Security Analysis and Efficient Implementation of Code-based Signature Schemes. 213-220 - Takafumi Mori, Hiroaki Kikuchi:

Robust Person Identification based on DTW Distance of Multiple-Joint Gait Pattern. 221-229 - Alaa Mohasseb, Benjamin Aziz, Jeyong Jung, Julak Lee:

Predicting CyberSecurity Incidents using Machine Learning Algorithms: A Case Study of Korean SMEs. 230-237 - Mohammad Anagreh

, Eero Vainikko, Peeter Laud
:
Accelerate Performance for Elliptic Curve Scalar Multiplication based on NAF by Parallel Computing. 238-245 - Saud Alotaibi, Abdulrahman Alruban, Steven Furnell, Nathan L. Clarke

:
A Novel Behaviour Profiling Approach to Continuous Authentication for Mobile Applications. 246-251 - Vít Listík

, Simon Let, Jan Sedivý, Václav Hlavác:
Phishing Email Detection based on Named Entity Recognition. 252-256 - Wassnaa Al-Mawee

, Paul J. Bonamy, Steve Carr
, Jean Mayo:
Maia: A Language for Mandatory Integrity Controls of Structured Data. 257-265 - Heider A. M. Wahsheh, Flaminia L. Luccio

:
Evaluating Security, Privacy and Usability Features of QR Code Readers. 266-273 - Alejandro Guerra-Manzanares

, Sven Nõmm
, Hayretdin Bahsi
:
In-depth Feature Selection and Ranking for Automated Detection of Mobile Malware. 274-283 - Michael Meinig, Peter Tröger, Christoph Meinel:

Finding Classification Zone Violations with Anonymized Message Flow Analysis. 284-292 - Masayuki Yoshino, Takayuki Suzuki, Ken Naganuma, Hisayoshi Sato:

Definition and Efficient Construction of Encrypted k-anonymization Scheme. 293-300 - Stephanie Weinhardt, Olamide Omolola:

Usability of Policy Authoring Tools: A Layered Approach. 301-308 - Takuya Ezure, Masaki Inamura:

An Order-specified Aggregate Authority-transfer Signature. 309-318 - Florian Patzer

, Ankush Meshram
, Maximilian Heß:
Automated Incident Response for Industrial Control Systems Leveraging Software-defined Networking. 319-327 - Sein Coray, Iwen Coisel, Ignacio Sánchez:

Improved Forensic Recovery of PKZIP Stream Cipher Passwords. 328-335 - Ricardo Hormann, Eric Fischer:

Detecting Anomalies by using Self-Organizing Maps in Industrial Environments. 336-344 - Zhi Guan, Abba Garba, Anran Li, Zhong Chen, Nesrine Kaaniche

:
AuthLedger: A Novel Blockchain-based Domain Name Authentication Scheme. 345-352 - Michihiro Yamada, Hiroaki Kikuchi, Naoki Matsuyama, Koji Inui:

Mathematical Model to Estimate Loss by Cyber Incident in Japan. 353-360 - Daniele Mucci, Bernhards Blumbergs

:
TED: A Container based Tool to Perform Security Risk Assessment for ELF Binaries. 361-369 - Vanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay, Shinsaku Kiyomoto:

Evaluating Privacy Policy Summarization: An Experimental Study among Japanese Users. 370-377 - Pierre-Marie Bajan, Christophe Kiennert, Hervé Debar:

Methodology of a Network Simulation in the Context of an Evaluation: Application to an IDS. 378-388 - Meiko Jensen, Sahil Kapila, Nils Gruschka:

Towards Aligning GDPR Compliance with Software Development: A Research Agenda. 389-396 - Hussein Oudah, Bogdan V. Ghita

, Taimur Bakhshi
:
A Novel Features Set for Internet Traffic Classification using Burstiness. 397-404 - Doudou Fall, Youki Kadobayashi:

The Common Vulnerability Scoring System vs. Rock Star Vulnerabilities: Why the Discrepancy? 405-411 - Khondker Jahid Reza, Md Zahidul Islam

, Vladimir Estivill-Castro:
Privacy Preservation of Social Network Users Against Attribute Inference Attacks via Malicious Data Mining. 412-420 - Cesare Bartolini, Antonello Calabrò

, Eda Marchetti:
Enhancing Business Process Modelling with Data Protection Compliance: An Ontology-based Proposal. 421-428 - Fred N. Kiwanuka, Ja'far Alqatawna, Anang Hudaya Muhamad Amin

, Sujni Paul
, Hossam Faris:
Towards Automated Comprehensive Feature Engineering for Spam Detection. 429-437 - Shahlaa Mashhadani

, Nathan L. Clarke
, Fudong Li:
Identification and Extraction of Digital Forensic Evidence from Multimedia Data Sources using Multi-algorithmic Fusion. 438-448 - Mouiad Al-Wahah

, Csilla Farkas:
Monotonic and Non-monotonic Context Delegation. 449-460 - Ahmed Saaudi

, Yan Tong, Csilla Farkas:
Probabilistic Graphical Model on Detecting Insiders: Modeling with SGD-HMM. 461-470 - Shun Yonamine, Youki Kadobayashi, Daisuke Miyamoto, Yuzo Taenaka:

Towards Automated Characterization of Malware's High-level Mechanism using Virtual Machine Introspection. 471-478 - Wenjun Xiong

, Fredrik Krantz, Robert Lagerström:
Threat Modeling and Attack Simulations of Connected Vehicles: A Research Outlook. 479-486 - Hoai Phuong Nguyen, Florent Retraint, Frédéric Morain-Nicolier, Agnès Delahaies:

An Image Forgery Detection Solution based on DCT Coefficient Analysis. 487-494 - Enrico Frumento, Carlo Dambra:

The HERMENEUT Project: Enterprises Intangible Risk Management via Economic Models based on Simulation of Modern Cyber Attacks. 495-502 - Hervé Chabanne

, Emmanuelle Dottax
, Franck Rondepierre:
Smart-card Deployment of an Electronic Voting Protocol. 503-510 - Daniel Augot, Hervé Chabanne

, William George
:
Practical Solutions to Save Bitcoins Applied to an Identity System Proposal. 511-518 - Mary K. Bispham, Ioannis Agrafiotis, Michael Goldsmith:

Attack and Defence Modelling for Attacks via the Speech Interface. 519-527 - Sherif Saad, William Briguglio, Haytham Elmiligi:

The Curious Case of Machine Learning in Malware Detection. 528-535 - Michael Sonntag:

Malicious DNS Traffic in Tor: Analysis and Countermeasures. 536-543 - Ilias Chamatidis, Georgios P. Spathoulas:

Machine Learning for All: A More Robust Federated Learning Framework. 544-551 - Yuya Sato, Hirokazu Hasegawa, Hiroki Takakura:

Construction of Secure Internal Networks with Communication Classifying System. 552-557 - Christophe Ponsard, Jeremy Grandclaudon, Sébastien Bal:

Survey and Lessons Learned on Raising SME Awareness about Cybersecurity. 558-563 - Nadir Khan, Sven Nitzsche

, Jürgen Becker:
A Secure Framework with Remote Configuration of Intellectual Property. 564-571 - Chiara Bodei, Letterio Galletta:

Tracking Data Trajectories in IoT. 572-579 - Ijlal Loutfi:

SMMDecoy: Detecting GPU Keyloggers using Security by Deception Techniques. 580-587 - Luigi Catuogno, Clemente Galdi:

A Fine-grained General Purpose Secure Storage Facility for Trusted Execution Environment. 588-595 - Carlos Moreno, Sebastian Fischmeister:

Sender Authentication for Automotive In-Vehicle Networks through Dual Analog Measurements to Determine the Location of the Transmitter. 596-605 - Maryam Almarwani, Boris Konev

, Alexei Lisitsa:
Flexible Access Control and Confidentiality over Encrypted Data for Document-based Database. 606-614 - Luís Costa, João Paulo Barros

, Miguel Tavares
:
Vulnerabilities in IoT Devices for Smart Home Environment. 615-622 - Ismail Butun

, Mikael Gidlund
:
Location Privacy Assured Internet of Things. 623-630
3rd International Workshop on FORmal methods for Security Engineering
- Eric Filiol

, Abhilash Hota
:
Solving a Hard Instance of Suspicious Behaviour Detection with Sparse Binary Vectors Clustering. 635-644 - Paul Irolla:

Systematic Characterization of a Sequence Group. 645-656 - Abhilash Hota

, Paul Irolla:
Deep Neural Networks for Android Malware Detection. 657-663 - Neeraj Chavan, Fabio Di Troia, Mark Stamp

:
A Comparative Analysis of Android Malware. 664-673 - Gulsum Akkuzu, Benjamin Aziz, Mo Adda

:
Fuzzy Logic Decision based Collaborative Privacy Management Framework for Online Social Networks. 674-684 - Paul Tavolato, Christina Tavolato-Wötzl:

Analytical Modelling of Cyber-physical Systems. 685-689 - Fausto Fasano

, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone:
Spyware Detection using Temporal Logic. 690-699 - Cinzia Bernardeschi

, Andrea Domenici
, Maurizio Palmieri
:
Modeling and Simulation of Attacks on Cyber-physical Systems. 700-708 - Antonello Venditti, Fausto Fasano

:
A Systematic Approach to Choose the Data Warehouse Architecture. 711-718 - Niket Bhodia, Pratikkumar Prajapati, Fabio Di Troia, Mark Stamp

:
Transfer Learning for Image-based Malware Classification. 719-726 - Steffen Pfrang, Mark Giraud, Anne Borcherding, David Meier, Jürgen Beyerer:

Design of an Example Network Protocol for Security Tests Targeting Industrial Automation Systems. 727-738

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














