Search dblp for Publications

export results for "ICISSP 2018"

 download as .bib file

@proceedings{DBLP:conf/icissp/2018s,
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Information Systems Security and Privacy - 4th International Conference,
                  {ICISSP} 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/icissp/AbomharaKOH18,
  author       = {Mohamed Abomhara and
                  Geir M. K{\o}ien and
                  Vladimir A. Oleshchuk and
                  Mohamed Hamid},
  title        = {Towards Risk-aware Access Control Framework for Healthcare Information
                  Sharing},
  booktitle    = {{ICISSP}},
  pages        = {312--321},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/AburawiLC18,
  author       = {Nahla Aburawi and
                  Alexei Lisitsa and
                  Frans Coenen},
  title        = {Querying Encrypted Graph Databases},
  booktitle    = {{ICISSP}},
  pages        = {447--451},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/Alepis18,
  author       = {Efthimios Alepis},
  title        = {Notify This: Exploiting Android Notifications for Fun and Profit},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {86--108},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/AlpersPOR18,
  author       = {Sascha Alpers and
                  Roman Pilipchuk and
                  Andreas Oberweis and
                  Ralf H. Reussner},
  title        = {Identifying Needs for a Holistic Modelling Approach to Privacy Aspects
                  in Enterprise Software Systems},
  booktitle    = {{ICISSP}},
  pages        = {74--82},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/AlpersPOR18a,
  author       = {Sascha Alpers and
                  Roman Pilipchuk and
                  Andreas Oberweis and
                  Ralf H. Reussner},
  title        = {The Current State of the Holistic Privacy and Security Modelling Approach
                  in Business Process and Software Architecture Modelling},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {109--124},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/AlqahtaniCHG18,
  author       = {Ohud Alqahtani and
                  Zhiyuan Chen and
                  Qiong Huang and
                  Karthik Gottipati},
  title        = {Is Bigger Safer? Analyzing Factors Related to Data Breaches using
                  Publicly Available Information},
  booktitle    = {{ICISSP}},
  pages        = {373--378},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/AlshehriCB18,
  author       = {Abdullah Alshehri and
                  Frans Coenen and
                  Danushka Bollegala},
  title        = {Spectral Analysis of Keystroke Streams: Towards Effective Real-time
                  Continuous User Authentication},
  booktitle    = {{ICISSP}},
  pages        = {62--73},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/AlvesM18,
  author       = {Thiago Alves and
                  Thomas H. Morris},
  title        = {Hardware-based Cyber Threats},
  booktitle    = {{ICISSP}},
  pages        = {259--266},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/Anderson18,
  author       = {Ross Anderson},
  title        = {Sustainable Security - an Internet of Durable Goods},
  booktitle    = {{ICISSP}},
  pages        = {7},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/BacciBMMMV18,
  author       = {Alessandro Bacci and
                  Alberto Bartoli and
                  Fabio Martinelli and
                  Eric Medvet and
                  Francesco Mercaldo and
                  Corrado Aaron Visaggio},
  title        = {Impact of Code Obfuscation on Android Malware Detection based on Static
                  and Dynamic Analysis},
  booktitle    = {{ICISSP}},
  pages        = {379--385},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/BacciMMM18,
  author       = {Alessandro Bacci and
                  Fabio Martinelli and
                  Eric Medvet and
                  Francesco Mercaldo},
  title        = {VizMal: {A} Visualization Tool for Analyzing the Behavior of Android
                  Malware},
  booktitle    = {{ICISSP}},
  pages        = {517--525},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/BadjiD18,
  author       = {Radja Badji and
                  Fida Kamal Dankar},
  title        = {A Risk-aware Access Control Model for Biomedical Research Platforms},
  booktitle    = {{ICISSP}},
  pages        = {322--328},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/BarrosL18,
  author       = {Martina J. Zucule de Barros and
                  Horst Lazarek},
  title        = {A Cyber Safety Model for Schools in Mozambique},
  booktitle    = {{ICISSP}},
  pages        = {251--258},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/CalderonHYS18,
  author       = {Paul Calderon and
                  Hirokazu Hasegawa and
                  Yukiko Yamaguchi and
                  Hajime Shimada},
  title        = {Malware Detection based on {HTTPS} Characteristic via Machine Learning},
  booktitle    = {{ICISSP}},
  pages        = {410--417},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/DagherMMM18,
  author       = {Gaby G. Dagher and
                  Praneeth Babu Marella and
                  Matea Milojkovic and
                  Jordan Mohler},
  title        = {BroncoVote: Secure Voting System using Ethereum's Blockchain},
  booktitle    = {{ICISSP}},
  pages        = {96--107},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/DeyBS18,
  author       = {Alexandre Dey and
                  Loic Beheshti and
                  Marie{-}Kerguelen Sido},
  title        = {Health State of Google's PlayStore - Finding Malware in Large Sets
                  of Applications from the Android Market},
  booktitle    = {{ICISSP}},
  pages        = {538--544},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/DieschPK18,
  author       = {Rainer Diesch and
                  Matthias Pfaff and
                  Helmut Krcmar},
  title        = {Prerequisite to Measure Information Security - {A} State of the Art
                  Literature Review},
  booktitle    = {{ICISSP}},
  pages        = {207--215},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/EiblBE18,
  author       = {G{\"{u}}nther Eibl and
                  Sebastian Burkhart and
                  Dominik Engel},
  title        = {Unsupervised Holiday Detection from Low-resolution Smart Metering
                  Data},
  booktitle    = {{ICISSP}},
  pages        = {477--486},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/EiblBE18a,
  author       = {G{\"{u}}nther Eibl and
                  Sebastian Burkhart and
                  Dominik Engel},
  title        = {Insights into Unsupervised Holiday Detection from Low-Resolution Smart
                  Metering Data},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {281--302},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/EignerKT18,
  author       = {Oliver Eigner and
                  Philipp Kreimel and
                  Paul Tavolato},
  title        = {Attacks on Industrial Control Systems - Modeling and Anomaly Detection},
  booktitle    = {{ICISSP}},
  pages        = {581--588},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/EreminK18,
  author       = {Aleksandr Eremin and
                  Konstantin Kogos},
  title        = {Incoming Call Implicit User Authentication - User Authentication via
                  Hand Movement Pattern},
  booktitle    = {{ICISSP}},
  pages        = {24--29},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/EreminKV18,
  author       = {Aleksandr Eremin and
                  Konstantin Kogos and
                  Yana Valatskayte},
  title        = {Touch and Move: Incoming Call User Authentication},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {26--39},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/FerreiraM18,
  author       = {Ana Ferreira and
                  Pedro Manuel Vieira Marques},
  title        = {Phishing Through Time: {A} Ten Year Story based on Abstracts},
  booktitle    = {{ICISSP}},
  pages        = {225--232},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/FiliolJD18,
  author       = {Eric Filiol and
                  J. Nicolas and
                  Maxence Delong},
  title        = {Statistical and Combinatorial Analysis of the {TOR} Routing Protocol
                  - Structural Weaknesses Identified in the {TOR} Network},
  booktitle    = {{ICISSP}},
  pages        = {507--516},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/Fortuna0B18,
  author       = {Pedro Fortuna and
                  Nuno Pereira and
                  Ismail Butun},
  title        = {A Framework for Web Application Integrity},
  booktitle    = {{ICISSP}},
  pages        = {487--493},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/FredjLC18,
  author       = {Feten Ben Fredj and
                  Nadira Lammari and
                  Isabelle Comyn{-}Wattiau},
  title        = {Relational Database Anonymization - {A} Model-driven Guiding Approach},
  booktitle    = {{ICISSP}},
  pages        = {161--170},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/GaoW18,
  author       = {Yuanyuan Gao and
                  Kunpeng Wang},
  title        = {Probability Preservation Property with Relative Error and Its Applications},
  booktitle    = {{ICISSP}},
  pages        = {461--468},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/GencLRS18,
  author       = {Ziya Alper Gen{\c{c}} and
                  Gabriele Lenzini and
                  Peter Y. A. Ryan and
                  Itzel V{\'{a}}zquez Sandoval},
  title        = {A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System},
  booktitle    = {{ICISSP}},
  pages        = {83--95},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/GencLRS18a,
  author       = {Ziya Alper Gen{\c{c}} and
                  Gabriele Lenzini and
                  Peter Y. A. Ryan and
                  Itzel V{\'{a}}zquez Sandoval},
  title        = {A Critical Security Analysis of the Password-Based Authentication
                  Honeywords System Under Code-Corruption Attack},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {125--151},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/GougeonL18,
  author       = {Thomas Gougeon and
                  Patrick Lacharme},
  title        = {How to Break CaptchaStar},
  booktitle    = {{ICISSP}},
  pages        = {41--51},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/GougeonL18a,
  author       = {Thomas Gougeon and
                  Patrick Lacharme},
  title        = {A Simple Attack on CaptchaStar},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {66--85},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/GrafK18,
  author       = {Roman Graf and
                  Ross King},
  title        = {Cyber Threat Information Classification and Life Cycle Management
                  using Smart Contracts},
  booktitle    = {{ICISSP}},
  pages        = {304--311},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/HakbilenPEU18,
  author       = {Onur Hakbilen and
                  Piraveen Perinparajan and
                  Michael Eikeland and
                  Nils Ulltveit{-}Moe},
  title        = {{SAFEPASS} - Presenting a Convenient, Portable and Secure Password
                  Manager},
  booktitle    = {{ICISSP}},
  pages        = {292--303},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/HamidiSM18,
  author       = {Mona Hamidi and
                  Mina Sheikhalishahi and
                  Fabio Martinelli},
  title        = {Secure Two-party Agglomerative Hierarchical Clustering Construction},
  booktitle    = {{ICISSP}},
  pages        = {432--437},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/HaupertM18,
  author       = {Vincent Haupert and
                  Tilo M{\"{u}}ller},
  title        = {On App-based Matrix Code Authentication in Online Banking},
  booktitle    = {{ICISSP}},
  pages        = {149--160},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/HerwonoE18,
  author       = {Ian Herwono and
                  Fadi Ali El{-}Moussa},
  title        = {Automated Detection of the Early Stages of Cyber Kill Chain},
  booktitle    = {{ICISSP}},
  pages        = {182--189},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/HuangTS18,
  author       = {Jasper Huang and
                  Fabio Di Troia and
                  Mark Stamp},
  title        = {Acoustic Gait Analysis using Support Vector Machines},
  booktitle    = {{ICISSP}},
  pages        = {545--552},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/HummerGKFP18,
  author       = {Matthias Hummer and
                  Sebastian Groll and
                  Michael Kunz and
                  Ludwig Fuchs and
                  G{\"{u}}nther Pernul},
  title        = {Measuring Identity and Access Management Performance - An Expert Survey
                  on Possible Performance Indicators},
  booktitle    = {{ICISSP}},
  pages        = {233--240},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/HunterW18,
  author       = {Aaron Hunter and
                  Ken Wong},
  title        = {Decoy Systems with Low Energy Bluetooth Communication},
  booktitle    = {{ICISSP}},
  pages        = {404--409},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/Jacoby18,
  author       = {David Jacoby},
  title        = {Hacking the Security Industry for Fun and Profit and Humanity},
  booktitle    = {{ICISSP}},
  pages        = {5},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/JasserTSR18,
  author       = {Stefanie Jasser and
                  Katja Tuma and
                  Riccardo Scandariato and
                  Matthias Riebisch},
  title        = {Back to the Drawing Board - Bringing Security Constraints in an Architecture-centric
                  Software Development Process},
  booktitle    = {{ICISSP}},
  pages        = {438--446},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/KandoussiB18,
  author       = {Asmaa El Kandoussi and
                  Hanan El Bakkali},
  title        = {Novel Access Control Approach for Inter-organizational Workflows},
  booktitle    = {{ICISSP}},
  pages        = {345--352},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/KarlzenBH18,
  author       = {Henrik Karlz{\'{e}}n and
                  Johan E. Bengtsson and
                  Jonas Hallberg},
  title        = {A Test of Structured Threat Descriptions for Information Security
                  Risk Assessments},
  booktitle    = {{ICISSP}},
  pages        = {469--476},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/LeeOKL18,
  author       = {Wei{-}Han Lee and
                  Jorge Ortiz and
                  Bongjun Ko and
                  Ruby B. Lee},
  title        = {Inferring Smartphone Users' Handwritten Patterns by using Motion Sensors},
  booktitle    = {{ICISSP}},
  pages        = {139--148},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/LuhTTS18,
  author       = {Robert Luh and
                  Marlies Temper and
                  Simon Tjoa and
                  Sebastian Schrittwieser},
  title        = {{APT} {RPG:} Design of a Gamified Attacker/Defender Meta Model},
  booktitle    = {{ICISSP}},
  pages        = {526--537},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/MarellaMMD18,
  author       = {Praneeth Babu Marella and
                  Matea Milojkovic and
                  Jordan Mohler and
                  Gaby G. Dagher},
  title        = {GenVote: Blockchain-Based Customizable and Secure Voting Platform},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {152--171},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/MartinelliMN18,
  author       = {Fabio Martinelli and
                  Francesco Mercaldo and
                  Vittoria Nardone},
  title        = {Identifying Insecure Features in Android Applications using Model
                  Checking},
  booktitle    = {{ICISSP}},
  pages        = {589--596},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/MartinelliMNOS18,
  author       = {Fabio Martinelli and
                  Francesco Mercaldo and
                  Vittoria Nardone and
                  Albina Orlando and
                  Antonella Santone},
  title        = {Who's Driving My Car? {A} Machine Learning based Approach to Driver
                  Identification},
  booktitle    = {{ICISSP}},
  pages        = {367--372},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/MartinelliMNOS18a,
  author       = {Fabio Martinelli and
                  Francesco Mercaldo and
                  Vittoria Nardone and
                  Albina Orlando and
                  Antonella Santone},
  title        = {Cluster Analysis for Driver Aggressiveness Identification},
  booktitle    = {{ICISSP}},
  pages        = {562--569},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/MauriCD18,
  author       = {Lara Mauri and
                  Stelvio Cimato and
                  Ernesto Damiani},
  title        = {A Comparative Analysis of Current Cryptocurrencies},
  booktitle    = {{ICISSP}},
  pages        = {127--138},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/MaynardMS18,
  author       = {Peter Maynard and
                  Kieran McLaughlin and
                  Sakir Sezer},
  title        = {Using Application Layer Metrics to Detect Advanced {SCADA} Attacks},
  booktitle    = {{ICISSP}},
  pages        = {418--425},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/MeinigM18,
  author       = {Michael Meinig and
                  Christoph Meinel},
  title        = {Securing the Flow - Data Flow Analysis with Operational Node Structures},
  booktitle    = {{ICISSP}},
  pages        = {241--250},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/MigdalR18,
  author       = {Denis Migdal and
                  Christophe Rosenberger},
  title        = {Towards a Personal Identity Code Respecting Privacy},
  booktitle    = {{ICISSP}},
  pages        = {267--274},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/MorissetS18,
  author       = {Charles Morisset and
                  David Sanchez},
  title        = {VisABAC: {A} Tool for Visualising {ABAC} Policies},
  booktitle    = {{ICISSP}},
  pages        = {117--126},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/MorissetS18a,
  author       = {Charles Morisset and
                  David Sanchez},
  title        = {On Building a Visualisation Tool for Access Control Policies},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {215--239},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/NagarajanTAS18,
  author       = {Prathiba Nagarajan and
                  Fabio Di Troia and
                  Thomas H. Austin and
                  Mark Stamp},
  title        = {Autocorrelation Analysis of Financial Botnet Traffic},
  booktitle    = {{ICISSP}},
  pages        = {599--606},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/Nazmul0C18,
  author       = {Rumana Nazmul and
                  Md. Rafiqul Islam and
                  Ahsan Raja Chowdhury},
  title        = {Alignment-free Cancellable Template Generation for Fingerprint based
                  Authentication},
  booktitle    = {{ICISSP}},
  pages        = {361--366},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/NguyenZRDMN18,
  author       = {Kim Trong Nguyen and
                  Cathel Zitzmann and
                  Florent Retraint and
                  Agn{\`{e}}s Delahaies and
                  Fr{\'{e}}d{\'{e}}ric Morain{-}Nicolier and
                  Hoai Phuong Nguyen},
  title        = {Face Spoofing Detection for Smartphones using a 3D Reconstruction
                  and the Motion Sensors},
  booktitle    = {{ICISSP}},
  pages        = {286--291},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/NinassiVR18,
  author       = {Alexandre Ninassi and
                  Sylvain Vernois and
                  Christophe Rosenberger},
  title        = {Privacy Compliant Multi-biometric Authentication on Smartphones},
  booktitle    = {{ICISSP}},
  pages        = {173--181},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/PatsakisA18,
  author       = {Constantinos Patsakis and
                  Efthimios Alepis},
  title        = {Knock-Knock: The Unbearable Lightness of Android Notifications},
  booktitle    = {{ICISSP}},
  pages        = {52--61},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/PfrangMFB18,
  author       = {Steffen Pfrang and
                  David Meier and
                  Michael Friedrich and
                  J{\"{u}}rgen Beyerer},
  title        = {Advancing Protocol Fuzzing for Industrial Automation and Control Systems},
  booktitle    = {{ICISSP}},
  pages        = {570--580},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/PonsardG18,
  author       = {Christophe Ponsard and
                  Jeremy Grandclaudon},
  title        = {Survey and Guidelines for the Design and Deployment of a Cyber Security
                  Label for SMEs},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {240--260},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/PonsardGD18,
  author       = {Christophe Ponsard and
                  Jeremy Grandclaudon and
                  Gautier Dallons},
  title        = {Towards a Cyber Security Label for SMEs: {A} European Perspective
                  -},
  booktitle    = {{ICISSP}},
  pages        = {426--431},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/Rosenberger18,
  author       = {Christophe Rosenberger},
  title        = {Evaluation of Biometric Template Protection Schemes based on a Transformation},
  booktitle    = {{ICISSP}},
  pages        = {216--224},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/SharafaldinLG18,
  author       = {Iman Sharafaldin and
                  Arash Habibi Lashkari and
                  Ali A. Ghorbani},
  title        = {Toward Generating a New Intrusion Detection Dataset and Intrusion
                  Traffic Characterization},
  booktitle    = {{ICISSP}},
  pages        = {108--116},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/SharafaldinLG18a,
  author       = {Iman Sharafaldin and
                  Arash Habibi Lashkari and
                  Ali A. Ghorbani},
  title        = {A Detailed Analysis of the {CICIDS2017} Data Set},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {172--188},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/SheikhalishahiH18,
  author       = {Mina Sheikhalishahi and
                  Mona Hamidi and
                  Fabio Martinelli},
  title        = {Privacy Preserving Collaborative Agglomerative Hierarchical Clustering
                  Construction},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {261--280},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/SilvaNS18,
  author       = {Marco Silva and
                  Ant{\'{o}}nio Nogueira and
                  Paulo Salvador},
  title        = {Modular Platform for Customer-Side Detection of {BGP} Redirection
                  Attacks},
  booktitle    = {{ICISSP}},
  pages        = {199--206},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/SinghRS18,
  author       = {Dilpreet Singh and
                  Ron Ruhl and
                  Hamman Samuel},
  title        = {Attack Tree for Modelling Unauthorized {EMV} Card Transactions at
                  {POS} Terminals},
  booktitle    = {{ICISSP}},
  pages        = {494--502},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/Stach18,
  author       = {Christoph Stach},
  title        = {Big Brother is Smart Watching You - Privacy Concerns about Health
                  and Fitness Applications},
  booktitle    = {{ICISSP}},
  pages        = {13--23},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/Stach18a,
  author       = {Christoph Stach},
  title        = {Fine-Grained Privacy Control for Fitness and Health Applications Using
                  the Privacy Management Platform},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {1--25},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/StachM18,
  author       = {Christoph Stach and
                  Bernhard Mitschang},
  title        = {{ACCESSORS} - {A} Data-Centric Permission Model for the Internet of
                  Things},
  booktitle    = {{ICISSP}},
  pages        = {30--40},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/StachM18a,
  author       = {Christoph Stach and
                  Bernhard Mitschang},
  title        = {Elicitation of Privacy Requirements for the Internet of Things Using
                  {ACCESSORS}},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {40--65},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/ToliP18,
  author       = {Christina{-}Angeliki Toli and
                  Bart Preneel},
  title        = {Privacy-preserving Biometric Authentication Model for e-Finance Applications},
  booktitle    = {{ICISSP}},
  pages        = {353--360},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/TorresS18,
  author       = {Jos{\'{e}} Torres and
                  Sergio de los Santos},
  title        = {Malicious {PDF} Documents Detection using Machine Learning Techniques
                  - {A} Practical Approach with Cloud Computing Applications},
  booktitle    = {{ICISSP}},
  pages        = {337--344},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/VasileiouF18,
  author       = {Ismini Vasileiou and
                  Steven Furnell},
  title        = {Enhancing Security Education - Recognising Threshold Concepts and
                  Other Influencing Factors},
  booktitle    = {{ICISSP}},
  pages        = {398--403},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/VasileiouF18a,
  author       = {Ismini Vasileiou and
                  Steven Furnell},
  title        = {Personalising Security Education: Factors Influencing Individual Awareness
                  and Compliance},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {189--200},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/VibertCBR18,
  author       = {Beno{\^{\i}}t Vibert and
                  Christophe Charrier and
                  Jean{-}Marie Le Bars and
                  Christophe Rosenberger},
  title        = {Towards an Optimal Template Reduction for Securing Embedded Fingerprint
                  Devices},
  booktitle    = {{ICISSP}},
  pages        = {329--336},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/WaagsnesU18,
  author       = {Henrik Waagsnes and
                  Nils Ulltveit{-}Moe},
  title        = {Intrusion Detection System Test Framework for {SCADA} Systems},
  booktitle    = {{ICISSP}},
  pages        = {275--285},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/WangZL18,
  author       = {Wenbo Wang and
                  Tianning Zang and
                  Yuqing Lan},
  title        = {The Rapid Extraction of Suspicious Traffic from Passive {DNS}},
  booktitle    = {{ICISSP}},
  pages        = {190--198},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/WongH18,
  author       = {Kenneth C. K. Wong and
                  Aaron Hunter},
  title        = {Managing Cybersecurity Break-ins Using Bluetooth Low Energy Devices
                  to Verify Attackers: {A} Practical Study},
  booktitle    = {{ICISSP} (Revised Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {977},
  pages        = {201--214},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/WurzenbergerSSF18,
  author       = {Markus Wurzenberger and
                  Florian Skopik and
                  Giuseppe Settanni and
                  Roman Fiedler},
  title        = {{AECID:} {A} Self-learning Anomaly Detection Approach based on Light-weight
                  Log Parser Models},
  booktitle    = {{ICISSP}},
  pages        = {386--397},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/YajamanamSTS18,
  author       = {Sravani Yajamanam and
                  Vikash Raja Samuel Selvin and
                  Fabio Di Troia and
                  Mark Stamp},
  title        = {Deep Learning versus Gist Descriptors for Image-based Malware Classification},
  booktitle    = {{ICISSP}},
  pages        = {553--561},
  publisher    = {SciTePress},
  year         = {2018}
}
@inproceedings{DBLP:conf/icissp/ZhengW18,
  author       = {Kaiyan Zheng and
                  Peng Wang},
  title        = {Encryption Schemes based on a Single Permutation: PCBC, POFB, {PCFB}
                  and {PCTR}},
  booktitle    = {{ICISSP}},
  pages        = {452--460},
  publisher    = {SciTePress},
  year         = {2018}
}
@proceedings{DBLP:conf/icissp/2017s,
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Information Systems Security and Privacy - Third International Conference,
                  {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  publisher    = {Springer},
  year         = {2018}
}
@proceedings{DBLP:conf/icissp/2018,
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  publisher    = {SciTePress},
  year         = {2018}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics