default search action
5th ICISSP 2019: Prague, Czech Republic
- Paolo Mori, Steven Furnell, Olivier Camp:
Proceedings of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019. SciTePress 2019, ISBN 978-989-758-359-9
Invited Speakers
- Bill Buchanan:
Building the Future: Tokenization, Blockchain and Citizen-focused Systems. ICISSP 2019: 5 - Roberto Di Pietro:
Next Generation Information Warfare: Challenges and Research Directions. ICISSP 2019: 7-8 - Gerald Quirchmayr:
Challenges of GDPR and the NIS Directive. ICISSP 2019: 9
Papers
- Clemens Brunner, Fabian Knirsch, Dominik Engel:
SPROOF: A Platform for Issuing and Verifying Documents in a Public Blockchain. 15-25 - Maja Nyman, Christine Große:
Are You Ready When It Counts? IT Consulting Firm's Information Security Incident Management. 26-37 - Jiahao Cai, Zihao Wei, Yingjie Zhang, Siwei Sun, Lei Hu:
Zero-sum Distinguishers for Round-reduced GIMLI Permutation. 38-43 - Gaurav Sharma, Soultana Ellinidou, Tristan Vanspouwen, Théo Rigas, Jean-Michel Dricot, Olivier Markowitch:
Identity-based TLS for Cloud of Chips. 44-54 - Lorenz Schwittmann, Matthäus Wander, Torben Weis:
Mobile Devices as Digital Sextants for Zero-Permission Geolocation. 55-66 - Kazuhide Fukushima, Damien Marion, Yuto Nakano, Adrien Facon, Shinsaku Kiyomoto, Sylvain Guilley:
Experiment on Side-Channel Key-Recovery using a Real LPWA End-device. 67-74 - Mary K. Bispham, Ioannis Agrafiotis, Michael Goldsmith:
Nonsense Attacks on Google Assistant and Missense Attacks on Amazon Alexa. 75-87 - Bernhards Blumbergs:
Remote Exploit Development for Cyber Red Team Computer Network Operations Targeting Industrial Control Systems. 88-99 - Thomas Ulz, Markus Feldbacher, Thomas W. Pieber, Christian Steger:
Sensing Danger: Exploiting Sensors to Build Covert Channels. 100-113 - Dayana Spagnuelo, Ana Ferreira, Gabriele Lenzini:
Accomplishing Transparency within the General Data Protection Regulation. 114-125 - Said Daoudagh, Francesca Lonetti, Eda Marchetti:
A Decentralized Solution for Combinatorial Testing of Access Control Engine. 126-135 - Szilvia Lestyan, Gergely Ács, Gergely Biczók, Zsolt Szalay:
Extracting Vehicle Sensor Signals from CAN Logs for Driver Re-identification. 136-145 - José Torres, Sergio de los Santos, Efthimios Alepis, Constantinos Patsakis:
Behavioral Biometric Authentication in Android Unlock Patterns through Machine Learning. 146-154 - Michael Kiperberg, Roee Leon, Amit Resh, Asaf Algawi, Nezer Zaidenberg:
Hypervisor-assisted Atomic Memory Acquisition in Modern Systems. 155-162 - Akash Madhusudan, Iraklis Symeonidis, Mustafa A. Mustafa, Ren Zhang, Bart Preneel:
SC2Share: Smart Contract for Secure Car Sharing. 163-171 - Sotirios Katsikeas, Pontus Johnson, Simon Hacks, Robert Lagerström:
Probabilistic Modeling and Simulation of Vehicular Cyber Attacks: An Application of the Meta Attack Language. 175-182 - Oluwafemi Olukoya, Lewis Mackenzie, Inah Omoronyia:
Permission-based Risk Signals for App Behaviour Characterization in Android Apps. 183-192 - Ilan Ben-Bassat, Erez Rokah:
Locality-Sensitive Hashing for Efficient Web Application Security Testing. 193-204 - Dirk Snyman, Hennie A. Kruger:
Theorising on Information Cascades and Sequential Decision-making for Analysing Security Behaviour. 205-212 - Partha Sarathi Roy, Kirill Morozov, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Security Analysis and Efficient Implementation of Code-based Signature Schemes. 213-220 - Takafumi Mori, Hiroaki Kikuchi:
Robust Person Identification based on DTW Distance of Multiple-Joint Gait Pattern. 221-229 - Alaa Mohasseb, Benjamin Aziz, Jeyong Jung, Julak Lee:
Predicting CyberSecurity Incidents using Machine Learning Algorithms: A Case Study of Korean SMEs. 230-237 - Mohammad Anagreh, Eero Vainikko, Peeter Laud:
Accelerate Performance for Elliptic Curve Scalar Multiplication based on NAF by Parallel Computing. 238-245 - Saud Alotaibi, Abdulrahman Alruban, Steven Furnell, Nathan L. Clarke:
A Novel Behaviour Profiling Approach to Continuous Authentication for Mobile Applications. 246-251 - Vít Listík, Simon Let, Jan Sedivý, Václav Hlavác:
Phishing Email Detection based on Named Entity Recognition. 252-256 - Wassnaa Al-Mawee, Paul J. Bonamy, Steve Carr, Jean Mayo:
Maia: A Language for Mandatory Integrity Controls of Structured Data. 257-265 - Heider A. M. Wahsheh, Flaminia L. Luccio:
Evaluating Security, Privacy and Usability Features of QR Code Readers. 266-273 - Alejandro Guerra-Manzanares, Sven Nõmm, Hayretdin Bahsi:
In-depth Feature Selection and Ranking for Automated Detection of Mobile Malware. 274-283 - Michael Meinig, Peter Tröger, Christoph Meinel:
Finding Classification Zone Violations with Anonymized Message Flow Analysis. 284-292 - Masayuki Yoshino, Takayuki Suzuki, Ken Naganuma, Hisayoshi Sato:
Definition and Efficient Construction of Encrypted k-anonymization Scheme. 293-300 - Stephanie Weinhardt, Olamide Omolola:
Usability of Policy Authoring Tools: A Layered Approach. 301-308 - Takuya Ezure, Masaki Inamura:
An Order-specified Aggregate Authority-transfer Signature. 309-318 - Florian Patzer, Ankush Meshram, Maximilian Heß:
Automated Incident Response for Industrial Control Systems Leveraging Software-defined Networking. 319-327 - Sein Coray, Iwen Coisel, Ignacio Sanchez:
Improved Forensic Recovery of PKZIP Stream Cipher Passwords. 328-335 - Ricardo Hormann, Eric Fischer:
Detecting Anomalies by using Self-Organizing Maps in Industrial Environments. 336-344 - Zhi Guan, Abba Garba, Anran Li, Zhong Chen, Nesrine Kaaniche:
AuthLedger: A Novel Blockchain-based Domain Name Authentication Scheme. 345-352 - Michihiro Yamada, Hiroaki Kikuchi, Naoki Matsuyama, Koji Inui:
Mathematical Model to Estimate Loss by Cyber Incident in Japan. 353-360 - Daniele Mucci, Bernhards Blumbergs:
TED: A Container based Tool to Perform Security Risk Assessment for ELF Binaries. 361-369 - Vanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay, Shinsaku Kiyomoto:
Evaluating Privacy Policy Summarization: An Experimental Study among Japanese Users. 370-377 - Pierre-Marie Bajan, Christophe Kiennert, Hervé Debar:
Methodology of a Network Simulation in the Context of an Evaluation: Application to an IDS. 378-388 - Meiko Jensen, Sahil Kapila, Nils Gruschka:
Towards Aligning GDPR Compliance with Software Development: A Research Agenda. 389-396 - Hussein Oudah, Bogdan V. Ghita, Taimur Bakhshi:
A Novel Features Set for Internet Traffic Classification using Burstiness. 397-404 - Doudou Fall, Youki Kadobayashi:
The Common Vulnerability Scoring System vs. Rock Star Vulnerabilities: Why the Discrepancy? 405-411 - Khondker Jahid Reza, Md Zahidul Islam, Vladimir Estivill-Castro:
Privacy Preservation of Social Network Users Against Attribute Inference Attacks via Malicious Data Mining. 412-420 - Cesare Bartolini, Antonello Calabrò, Eda Marchetti:
Enhancing Business Process Modelling with Data Protection Compliance: An Ontology-based Proposal. 421-428 - Fred N. Kiwanuka, Ja'far Alqatawna, Anang Hudaya Muhamad Amin, Sujni Paul, Hossam Faris:
Towards Automated Comprehensive Feature Engineering for Spam Detection. 429-437 - Shahlaa Mashhadani, Nathan L. Clarke, Fudong Li:
Identification and Extraction of Digital Forensic Evidence from Multimedia Data Sources using Multi-algorithmic Fusion. 438-448 - Mouiad Al-Wahah, Csilla Farkas:
Monotonic and Non-monotonic Context Delegation. 449-460 - Ahmed Saaudi, Yan Tong, Csilla Farkas:
Probabilistic Graphical Model on Detecting Insiders: Modeling with SGD-HMM. 461-470 - Shun Yonamine, Youki Kadobayashi, Daisuke Miyamoto, Yuzo Taenaka:
Towards Automated Characterization of Malware's High-level Mechanism using Virtual Machine Introspection. 471-478 - Wenjun Xiong, Fredrik Krantz, Robert Lagerström:
Threat Modeling and Attack Simulations of Connected Vehicles: A Research Outlook. 479-486 - Hoai Phuong Nguyen, Florent Retraint, Frédéric Morain-Nicolier, Agnès Delahaies:
An Image Forgery Detection Solution based on DCT Coefficient Analysis. 487-494 - Enrico Frumento, Carlo Dambra:
The HERMENEUT Project: Enterprises Intangible Risk Management via Economic Models based on Simulation of Modern Cyber Attacks. 495-502 - Hervé Chabanne, Emmanuelle Dottax, Franck Rondepierre:
Smart-card Deployment of an Electronic Voting Protocol. 503-510 - Daniel Augot, Hervé Chabanne, William George:
Practical Solutions to Save Bitcoins Applied to an Identity System Proposal. 511-518 - Mary K. Bispham, Ioannis Agrafiotis, Michael Goldsmith:
Attack and Defence Modelling for Attacks via the Speech Interface. 519-527 - Sherif Saad, William Briguglio, Haytham Elmiligi:
The Curious Case of Machine Learning in Malware Detection. 528-535 - Michael Sonntag:
Malicious DNS Traffic in Tor: Analysis and Countermeasures. 536-543 - Ilias Chamatidis, Georgios P. Spathoulas:
Machine Learning for All: A More Robust Federated Learning Framework. 544-551 - Yuya Sato, Hirokazu Hasegawa, Hiroki Takakura:
Construction of Secure Internal Networks with Communication Classifying System. 552-557 - Christophe Ponsard, Jeremy Grandclaudon, Sébastien Bal:
Survey and Lessons Learned on Raising SME Awareness about Cybersecurity. 558-563 - Nadir Khan, Sven Nitzsche, Jürgen Becker:
A Secure Framework with Remote Configuration of Intellectual Property. 564-571 - Chiara Bodei, Letterio Galletta:
Tracking Data Trajectories in IoT. 572-579 - Ijlal Loutfi:
SMMDecoy: Detecting GPU Keyloggers using Security by Deception Techniques. 580-587 - Luigi Catuogno, Clemente Galdi:
A Fine-grained General Purpose Secure Storage Facility for Trusted Execution Environment. 588-595 - Carlos Moreno, Sebastian Fischmeister:
Sender Authentication for Automotive In-Vehicle Networks through Dual Analog Measurements to Determine the Location of the Transmitter. 596-605 - Maryam Almarwani, Boris Konev, Alexei Lisitsa:
Flexible Access Control and Confidentiality over Encrypted Data for Document-based Database. 606-614 - Luís Costa, João Paulo Barros, Miguel Tavares:
Vulnerabilities in IoT Devices for Smart Home Environment. 615-622 - Ismail Butun, Mikael Gidlund:
Location Privacy Assured Internet of Things. 623-630
3rd International Workshop on FORmal methods for Security Engineering
- Eric Filiol, Abhilash Hota:
Solving a Hard Instance of Suspicious Behaviour Detection with Sparse Binary Vectors Clustering. 635-644 - Paul Irolla:
Systematic Characterization of a Sequence Group. 645-656 - Abhilash Hota, Paul Irolla:
Deep Neural Networks for Android Malware Detection. 657-663 - Neeraj Chavan, Fabio Di Troia, Mark Stamp:
A Comparative Analysis of Android Malware. 664-673 - Gulsum Akkuzu, Benjamin Aziz, Mo Adda:
Fuzzy Logic Decision based Collaborative Privacy Management Framework for Online Social Networks. 674-684 - Paul Tavolato, Christina Tavolato-Wötzl:
Analytical Modelling of Cyber-physical Systems. 685-689 - Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone:
Spyware Detection using Temporal Logic. 690-699 - Cinzia Bernardeschi, Andrea Domenici, Maurizio Palmieri:
Modeling and Simulation of Attacks on Cyber-physical Systems. 700-708 - Antonello Venditti, Fausto Fasano:
A Systematic Approach to Choose the Data Warehouse Architecture. 711-718 - Niket Bhodia, Pratikkumar Prajapati, Fabio Di Troia, Mark Stamp:
Transfer Learning for Image-based Malware Classification. 719-726 - Steffen Pfrang, Mark Giraud, Anne Borcherding, David Meier, Jürgen Beyerer:
Design of an Example Network Protocol for Security Tests Targeting Industrial Automation Systems. 727-738
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.