Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "ICISSP 2018"
@proceedings{DBLP:conf/icissp/2018s, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Information Systems Security and Privacy - 4th International Conference, {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {977}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/icissp/AbomharaKOH18, author = {Mohamed Abomhara and Geir M. K{\o}ien and Vladimir A. Oleshchuk and Mohamed Hamid}, title = {Towards Risk-aware Access Control Framework for Healthcare Information Sharing}, booktitle = {{ICISSP}}, pages = {312--321}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/AburawiLC18, author = {Nahla Aburawi and Alexei Lisitsa and Frans Coenen}, title = {Querying Encrypted Graph Databases}, booktitle = {{ICISSP}}, pages = {447--451}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/Alepis18, author = {Efthimios Alepis}, title = {Notify This: Exploiting Android Notifications for Fun and Profit}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {86--108}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icissp/AlpersPOR18, author = {Sascha Alpers and Roman Pilipchuk and Andreas Oberweis and Ralf H. Reussner}, title = {Identifying Needs for a Holistic Modelling Approach to Privacy Aspects in Enterprise Software Systems}, booktitle = {{ICISSP}}, pages = {74--82}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/AlpersPOR18a, author = {Sascha Alpers and Roman Pilipchuk and Andreas Oberweis and Ralf H. Reussner}, title = {The Current State of the Holistic Privacy and Security Modelling Approach in Business Process and Software Architecture Modelling}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {109--124}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icissp/AlqahtaniCHG18, author = {Ohud Alqahtani and Zhiyuan Chen and Qiong Huang and Karthik Gottipati}, title = {Is Bigger Safer? Analyzing Factors Related to Data Breaches using Publicly Available Information}, booktitle = {{ICISSP}}, pages = {373--378}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/AlshehriCB18, author = {Abdullah Alshehri and Frans Coenen and Danushka Bollegala}, title = {Spectral Analysis of Keystroke Streams: Towards Effective Real-time Continuous User Authentication}, booktitle = {{ICISSP}}, pages = {62--73}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/AlvesM18, author = {Thiago Alves and Thomas H. Morris}, title = {Hardware-based Cyber Threats}, booktitle = {{ICISSP}}, pages = {259--266}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/Anderson18, author = {Ross Anderson}, title = {Sustainable Security - an Internet of Durable Goods}, booktitle = {{ICISSP}}, pages = {7}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/BacciBMMMV18, author = {Alessandro Bacci and Alberto Bartoli and Fabio Martinelli and Eric Medvet and Francesco Mercaldo and Corrado Aaron Visaggio}, title = {Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis}, booktitle = {{ICISSP}}, pages = {379--385}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/BacciMMM18, author = {Alessandro Bacci and Fabio Martinelli and Eric Medvet and Francesco Mercaldo}, title = {VizMal: {A} Visualization Tool for Analyzing the Behavior of Android Malware}, booktitle = {{ICISSP}}, pages = {517--525}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/BadjiD18, author = {Radja Badji and Fida Kamal Dankar}, title = {A Risk-aware Access Control Model for Biomedical Research Platforms}, booktitle = {{ICISSP}}, pages = {322--328}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/BarrosL18, author = {Martina J. Zucule de Barros and Horst Lazarek}, title = {A Cyber Safety Model for Schools in Mozambique}, booktitle = {{ICISSP}}, pages = {251--258}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/CalderonHYS18, author = {Paul Calderon and Hirokazu Hasegawa and Yukiko Yamaguchi and Hajime Shimada}, title = {Malware Detection based on {HTTPS} Characteristic via Machine Learning}, booktitle = {{ICISSP}}, pages = {410--417}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/DagherMMM18, author = {Gaby G. Dagher and Praneeth Babu Marella and Matea Milojkovic and Jordan Mohler}, title = {BroncoVote: Secure Voting System using Ethereum's Blockchain}, booktitle = {{ICISSP}}, pages = {96--107}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/DeyBS18, author = {Alexandre Dey and Loic Beheshti and Marie{-}Kerguelen Sido}, title = {Health State of Google's PlayStore - Finding Malware in Large Sets of Applications from the Android Market}, booktitle = {{ICISSP}}, pages = {538--544}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/DieschPK18, author = {Rainer Diesch and Matthias Pfaff and Helmut Krcmar}, title = {Prerequisite to Measure Information Security - {A} State of the Art Literature Review}, booktitle = {{ICISSP}}, pages = {207--215}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/EiblBE18, author = {G{\"{u}}nther Eibl and Sebastian Burkhart and Dominik Engel}, title = {Unsupervised Holiday Detection from Low-resolution Smart Metering Data}, booktitle = {{ICISSP}}, pages = {477--486}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/EiblBE18a, author = {G{\"{u}}nther Eibl and Sebastian Burkhart and Dominik Engel}, title = {Insights into Unsupervised Holiday Detection from Low-Resolution Smart Metering Data}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {281--302}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icissp/EignerKT18, author = {Oliver Eigner and Philipp Kreimel and Paul Tavolato}, title = {Attacks on Industrial Control Systems - Modeling and Anomaly Detection}, booktitle = {{ICISSP}}, pages = {581--588}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/EreminK18, author = {Aleksandr Eremin and Konstantin Kogos}, title = {Incoming Call Implicit User Authentication - User Authentication via Hand Movement Pattern}, booktitle = {{ICISSP}}, pages = {24--29}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/EreminKV18, author = {Aleksandr Eremin and Konstantin Kogos and Yana Valatskayte}, title = {Touch and Move: Incoming Call User Authentication}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {26--39}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icissp/FerreiraM18, author = {Ana Ferreira and Pedro Manuel Vieira Marques}, title = {Phishing Through Time: {A} Ten Year Story based on Abstracts}, booktitle = {{ICISSP}}, pages = {225--232}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/FiliolJD18, author = {Eric Filiol and J. Nicolas and Maxence Delong}, title = {Statistical and Combinatorial Analysis of the {TOR} Routing Protocol - Structural Weaknesses Identified in the {TOR} Network}, booktitle = {{ICISSP}}, pages = {507--516}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/Fortuna0B18, author = {Pedro Fortuna and Nuno Pereira and Ismail Butun}, title = {A Framework for Web Application Integrity}, booktitle = {{ICISSP}}, pages = {487--493}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/FredjLC18, author = {Feten Ben Fredj and Nadira Lammari and Isabelle Comyn{-}Wattiau}, title = {Relational Database Anonymization - {A} Model-driven Guiding Approach}, booktitle = {{ICISSP}}, pages = {161--170}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/GaoW18, author = {Yuanyuan Gao and Kunpeng Wang}, title = {Probability Preservation Property with Relative Error and Its Applications}, booktitle = {{ICISSP}}, pages = {461--468}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/GencLRS18, author = {Ziya Alper Gen{\c{c}} and Gabriele Lenzini and Peter Y. A. Ryan and Itzel V{\'{a}}zquez Sandoval}, title = {A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System}, booktitle = {{ICISSP}}, pages = {83--95}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/GencLRS18a, author = {Ziya Alper Gen{\c{c}} and Gabriele Lenzini and Peter Y. A. Ryan and Itzel V{\'{a}}zquez Sandoval}, title = {A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {125--151}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icissp/GougeonL18, author = {Thomas Gougeon and Patrick Lacharme}, title = {How to Break CaptchaStar}, booktitle = {{ICISSP}}, pages = {41--51}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/GougeonL18a, author = {Thomas Gougeon and Patrick Lacharme}, title = {A Simple Attack on CaptchaStar}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {66--85}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icissp/GrafK18, author = {Roman Graf and Ross King}, title = {Cyber Threat Information Classification and Life Cycle Management using Smart Contracts}, booktitle = {{ICISSP}}, pages = {304--311}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/HakbilenPEU18, author = {Onur Hakbilen and Piraveen Perinparajan and Michael Eikeland and Nils Ulltveit{-}Moe}, title = {{SAFEPASS} - Presenting a Convenient, Portable and Secure Password Manager}, booktitle = {{ICISSP}}, pages = {292--303}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/HamidiSM18, author = {Mona Hamidi and Mina Sheikhalishahi and Fabio Martinelli}, title = {Secure Two-party Agglomerative Hierarchical Clustering Construction}, booktitle = {{ICISSP}}, pages = {432--437}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/HaupertM18, author = {Vincent Haupert and Tilo M{\"{u}}ller}, title = {On App-based Matrix Code Authentication in Online Banking}, booktitle = {{ICISSP}}, pages = {149--160}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/HerwonoE18, author = {Ian Herwono and Fadi Ali El{-}Moussa}, title = {Automated Detection of the Early Stages of Cyber Kill Chain}, booktitle = {{ICISSP}}, pages = {182--189}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/HuangTS18, author = {Jasper Huang and Fabio Di Troia and Mark Stamp}, title = {Acoustic Gait Analysis using Support Vector Machines}, booktitle = {{ICISSP}}, pages = {545--552}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/HummerGKFP18, author = {Matthias Hummer and Sebastian Groll and Michael Kunz and Ludwig Fuchs and G{\"{u}}nther Pernul}, title = {Measuring Identity and Access Management Performance - An Expert Survey on Possible Performance Indicators}, booktitle = {{ICISSP}}, pages = {233--240}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/HunterW18, author = {Aaron Hunter and Ken Wong}, title = {Decoy Systems with Low Energy Bluetooth Communication}, booktitle = {{ICISSP}}, pages = {404--409}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/Jacoby18, author = {David Jacoby}, title = {Hacking the Security Industry for Fun and Profit and Humanity}, booktitle = {{ICISSP}}, pages = {5}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/JasserTSR18, author = {Stefanie Jasser and Katja Tuma and Riccardo Scandariato and Matthias Riebisch}, title = {Back to the Drawing Board - Bringing Security Constraints in an Architecture-centric Software Development Process}, booktitle = {{ICISSP}}, pages = {438--446}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/KandoussiB18, author = {Asmaa El Kandoussi and Hanan El Bakkali}, title = {Novel Access Control Approach for Inter-organizational Workflows}, booktitle = {{ICISSP}}, pages = {345--352}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/KarlzenBH18, author = {Henrik Karlz{\'{e}}n and Johan E. Bengtsson and Jonas Hallberg}, title = {A Test of Structured Threat Descriptions for Information Security Risk Assessments}, booktitle = {{ICISSP}}, pages = {469--476}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/LeeOKL18, author = {Wei{-}Han Lee and Jorge Ortiz and Bongjun Ko and Ruby B. Lee}, title = {Inferring Smartphone Users' Handwritten Patterns by using Motion Sensors}, booktitle = {{ICISSP}}, pages = {139--148}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/LuhTTS18, author = {Robert Luh and Marlies Temper and Simon Tjoa and Sebastian Schrittwieser}, title = {{APT} {RPG:} Design of a Gamified Attacker/Defender Meta Model}, booktitle = {{ICISSP}}, pages = {526--537}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/MarellaMMD18, author = {Praneeth Babu Marella and Matea Milojkovic and Jordan Mohler and Gaby G. Dagher}, title = {GenVote: Blockchain-Based Customizable and Secure Voting Platform}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {152--171}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icissp/MartinelliMN18, author = {Fabio Martinelli and Francesco Mercaldo and Vittoria Nardone}, title = {Identifying Insecure Features in Android Applications using Model Checking}, booktitle = {{ICISSP}}, pages = {589--596}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/MartinelliMNOS18, author = {Fabio Martinelli and Francesco Mercaldo and Vittoria Nardone and Albina Orlando and Antonella Santone}, title = {Who's Driving My Car? {A} Machine Learning based Approach to Driver Identification}, booktitle = {{ICISSP}}, pages = {367--372}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/MartinelliMNOS18a, author = {Fabio Martinelli and Francesco Mercaldo and Vittoria Nardone and Albina Orlando and Antonella Santone}, title = {Cluster Analysis for Driver Aggressiveness Identification}, booktitle = {{ICISSP}}, pages = {562--569}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/MauriCD18, author = {Lara Mauri and Stelvio Cimato and Ernesto Damiani}, title = {A Comparative Analysis of Current Cryptocurrencies}, booktitle = {{ICISSP}}, pages = {127--138}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/MaynardMS18, author = {Peter Maynard and Kieran McLaughlin and Sakir Sezer}, title = {Using Application Layer Metrics to Detect Advanced {SCADA} Attacks}, booktitle = {{ICISSP}}, pages = {418--425}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/MeinigM18, author = {Michael Meinig and Christoph Meinel}, title = {Securing the Flow - Data Flow Analysis with Operational Node Structures}, booktitle = {{ICISSP}}, pages = {241--250}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/MigdalR18, author = {Denis Migdal and Christophe Rosenberger}, title = {Towards a Personal Identity Code Respecting Privacy}, booktitle = {{ICISSP}}, pages = {267--274}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/MorissetS18, author = {Charles Morisset and David Sanchez}, title = {VisABAC: {A} Tool for Visualising {ABAC} Policies}, booktitle = {{ICISSP}}, pages = {117--126}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/MorissetS18a, author = {Charles Morisset and David Sanchez}, title = {On Building a Visualisation Tool for Access Control Policies}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {215--239}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icissp/NagarajanTAS18, author = {Prathiba Nagarajan and Fabio Di Troia and Thomas H. Austin and Mark Stamp}, title = {Autocorrelation Analysis of Financial Botnet Traffic}, booktitle = {{ICISSP}}, pages = {599--606}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/Nazmul0C18, author = {Rumana Nazmul and Md. Rafiqul Islam and Ahsan Raja Chowdhury}, title = {Alignment-free Cancellable Template Generation for Fingerprint based Authentication}, booktitle = {{ICISSP}}, pages = {361--366}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/NguyenZRDMN18, author = {Kim Trong Nguyen and Cathel Zitzmann and Florent Retraint and Agn{\`{e}}s Delahaies and Fr{\'{e}}d{\'{e}}ric Morain{-}Nicolier and Hoai Phuong Nguyen}, title = {Face Spoofing Detection for Smartphones using a 3D Reconstruction and the Motion Sensors}, booktitle = {{ICISSP}}, pages = {286--291}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/NinassiVR18, author = {Alexandre Ninassi and Sylvain Vernois and Christophe Rosenberger}, title = {Privacy Compliant Multi-biometric Authentication on Smartphones}, booktitle = {{ICISSP}}, pages = {173--181}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/PatsakisA18, author = {Constantinos Patsakis and Efthimios Alepis}, title = {Knock-Knock: The Unbearable Lightness of Android Notifications}, booktitle = {{ICISSP}}, pages = {52--61}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/PfrangMFB18, author = {Steffen Pfrang and David Meier and Michael Friedrich and J{\"{u}}rgen Beyerer}, title = {Advancing Protocol Fuzzing for Industrial Automation and Control Systems}, booktitle = {{ICISSP}}, pages = {570--580}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/PonsardG18, author = {Christophe Ponsard and Jeremy Grandclaudon}, title = {Survey and Guidelines for the Design and Deployment of a Cyber Security Label for SMEs}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {240--260}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icissp/PonsardGD18, author = {Christophe Ponsard and Jeremy Grandclaudon and Gautier Dallons}, title = {Towards a Cyber Security Label for SMEs: {A} European Perspective -}, booktitle = {{ICISSP}}, pages = {426--431}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/Rosenberger18, author = {Christophe Rosenberger}, title = {Evaluation of Biometric Template Protection Schemes based on a Transformation}, booktitle = {{ICISSP}}, pages = {216--224}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/SharafaldinLG18, author = {Iman Sharafaldin and Arash Habibi Lashkari and Ali A. Ghorbani}, title = {Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization}, booktitle = {{ICISSP}}, pages = {108--116}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/SharafaldinLG18a, author = {Iman Sharafaldin and Arash Habibi Lashkari and Ali A. Ghorbani}, title = {A Detailed Analysis of the {CICIDS2017} Data Set}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {172--188}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icissp/SheikhalishahiH18, author = {Mina Sheikhalishahi and Mona Hamidi and Fabio Martinelli}, title = {Privacy Preserving Collaborative Agglomerative Hierarchical Clustering Construction}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {261--280}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icissp/SilvaNS18, author = {Marco Silva and Ant{\'{o}}nio Nogueira and Paulo Salvador}, title = {Modular Platform for Customer-Side Detection of {BGP} Redirection Attacks}, booktitle = {{ICISSP}}, pages = {199--206}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/SinghRS18, author = {Dilpreet Singh and Ron Ruhl and Hamman Samuel}, title = {Attack Tree for Modelling Unauthorized {EMV} Card Transactions at {POS} Terminals}, booktitle = {{ICISSP}}, pages = {494--502}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/Stach18, author = {Christoph Stach}, title = {Big Brother is Smart Watching You - Privacy Concerns about Health and Fitness Applications}, booktitle = {{ICISSP}}, pages = {13--23}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/Stach18a, author = {Christoph Stach}, title = {Fine-Grained Privacy Control for Fitness and Health Applications Using the Privacy Management Platform}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {1--25}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icissp/StachM18, author = {Christoph Stach and Bernhard Mitschang}, title = {{ACCESSORS} - {A} Data-Centric Permission Model for the Internet of Things}, booktitle = {{ICISSP}}, pages = {30--40}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/StachM18a, author = {Christoph Stach and Bernhard Mitschang}, title = {Elicitation of Privacy Requirements for the Internet of Things Using {ACCESSORS}}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {40--65}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icissp/ToliP18, author = {Christina{-}Angeliki Toli and Bart Preneel}, title = {Privacy-preserving Biometric Authentication Model for e-Finance Applications}, booktitle = {{ICISSP}}, pages = {353--360}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/TorresS18, author = {Jos{\'{e}} Torres and Sergio de los Santos}, title = {Malicious {PDF} Documents Detection using Machine Learning Techniques - {A} Practical Approach with Cloud Computing Applications}, booktitle = {{ICISSP}}, pages = {337--344}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/VasileiouF18, author = {Ismini Vasileiou and Steven Furnell}, title = {Enhancing Security Education - Recognising Threshold Concepts and Other Influencing Factors}, booktitle = {{ICISSP}}, pages = {398--403}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/VasileiouF18a, author = {Ismini Vasileiou and Steven Furnell}, title = {Personalising Security Education: Factors Influencing Individual Awareness and Compliance}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {189--200}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icissp/VibertCBR18, author = {Beno{\^{\i}}t Vibert and Christophe Charrier and Jean{-}Marie Le Bars and Christophe Rosenberger}, title = {Towards an Optimal Template Reduction for Securing Embedded Fingerprint Devices}, booktitle = {{ICISSP}}, pages = {329--336}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/WaagsnesU18, author = {Henrik Waagsnes and Nils Ulltveit{-}Moe}, title = {Intrusion Detection System Test Framework for {SCADA} Systems}, booktitle = {{ICISSP}}, pages = {275--285}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/WangZL18, author = {Wenbo Wang and Tianning Zang and Yuqing Lan}, title = {The Rapid Extraction of Suspicious Traffic from Passive {DNS}}, booktitle = {{ICISSP}}, pages = {190--198}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/WongH18, author = {Kenneth C. K. Wong and Aaron Hunter}, title = {Managing Cybersecurity Break-ins Using Bluetooth Low Energy Devices to Verify Attackers: {A} Practical Study}, booktitle = {{ICISSP} (Revised Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {977}, pages = {201--214}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icissp/WurzenbergerSSF18, author = {Markus Wurzenberger and Florian Skopik and Giuseppe Settanni and Roman Fiedler}, title = {{AECID:} {A} Self-learning Anomaly Detection Approach based on Light-weight Log Parser Models}, booktitle = {{ICISSP}}, pages = {386--397}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/YajamanamSTS18, author = {Sravani Yajamanam and Vikash Raja Samuel Selvin and Fabio Di Troia and Mark Stamp}, title = {Deep Learning versus Gist Descriptors for Image-based Malware Classification}, booktitle = {{ICISSP}}, pages = {553--561}, publisher = {SciTePress}, year = {2018} }
@inproceedings{DBLP:conf/icissp/ZhengW18, author = {Kaiyan Zheng and Peng Wang}, title = {Encryption Schemes based on a Single Permutation: PCBC, POFB, {PCFB} and {PCTR}}, booktitle = {{ICISSP}}, pages = {452--460}, publisher = {SciTePress}, year = {2018} }
@proceedings{DBLP:conf/icissp/2017s, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, publisher = {Springer}, year = {2018} }
@proceedings{DBLP:conf/icissp/2018, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, publisher = {SciTePress}, year = {2018} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.