The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICISSP"( http://dblp.L3S.de/Venues/ICISSP )

URL (DBLP): http://dblp.uni-trier.de/db/conf/icissp

Publication years (Num. hits)
2015 (44) 2016 (67) 2017 (81) 2018 (70) 2019 (84) 2020 (94) 2021 (89) 2022 (76) 2023 (91) 2024 (101)
Publication types (Num. hits)
inproceedings(787) proceedings(10)
Venues (Conferences, Journals, ...)
ICISSP(797)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 797 publication records. Showing 797 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Alia Umrani, Apurva K. Vangujar, Paolo Palmieri 0001 Anonymous Multi-Receiver Certificateless Hybrid Signcryption for Broadcast Communication. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Evangelia Vanezi, Georgia M. Kapitsaki, Anna Philippou What's Your Purpose? An Approach to Incorporating GDPR Purposes into Requirements Analysis. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Claudia Lanza, Abdelkader Lahmadi, Fabian Osmond An Empirical Study of Ransomware Vulnerabilities Descriptions. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Vimal Kumar, Juliette Mayo, Khadija Bahiss ADMIn: Attacks on Dataset, Model and Input: A Threat Model for AI Based Software. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Stefano Ribes, Fabio Malatesta, Grazia Garzo, Alessandro Palumbo Machine Learning-Based Classification of Hardware Trojans in FPGAs Implementing RISC-V Cores. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Chun-Shien Lu, Chao-Hsuan Lin Robust Image Deepfake Detection with Perceptual Hashing. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Beatrix Koltai, András Gazdag, Gergely Ács Supporting CAN Bus Anomaly Detection with Correlation Data. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Newton Carlos Will, Carlos Alberto Maziero Enclave Management Models for Safe Execution of Software Components. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Fatema Rashid, Ali Miri, Atefeh Mashatan PETRIoT - A Privacy Enhancing Technology Recommendation Framework for IoT Computing. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Bernard McWeeney, Ilya Mudritskiy, Renaat Verbruggen Analysis of Payload Confidentiality for the IoT/ LPWAN Technology 'Lora'. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Farida Eleshin, Patrick Iradukunda, David Ishimwe Ruberamitwe, Eric Ishimwe Your Robot Might Be Inadvertently or Deliberately Spying on You: A Critical Analysis of Privacy Practices in the Robotics Industry. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Jackson Barreto, Paulina Rutecka, Karina Cicha, Pedro Pinto 0001 The Status and Management of Web-Related Security at Higher Education Institutions in Poland. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Kagan Özgün, Ayse Tosun, Mehmet Tahir Sandikkaya A Recommender System to Detect Distributed Denial of Service Attacks with Network and Transport Layer Features. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Sylvain Guérin, Joël Champeau, Salvador Martínez 0001, Raúl Mazo Security Contracts a Property-Based Approach to Support Security Patterns. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Amir Zarei, Staal Amund Vinterbo Secure Multiparty Computation of the Laplace Mechanism. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Cédrick De Pauw, Jan Tobias Mühlberg, Jean-Michel Dricot An Improved PUF-Based Privacy-Preserving IoT Protocol for Cloud Storage. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Luca Pöhler, Marko Schuba, Tim Hoener, Sacha Hack, Georg Neugebauer An Open-Source Approach to OT Asset Management in Industrial Environments. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Michele Guerra, Roberto Milanese, Michele Deodato, Vittorio Perozzi, Fausto Fasano Visual Attention and Privacy Indicators in Android: Insights from Eye Tracking. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Paul R. B. Houssel, Luis A. Leiva User Re-Authentication via Mouse Movements and Recurrent Neural Networks. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Andrea Migliore, Stelvio Cimato, Gabriella Trucco Efficient Secure Computation of Edit Distance on Genomic Data. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Antonio Maci, Giuseppe Urbano, Antonio Coscia Deep Q-Networks for Imbalanced Multi-Class Malware Classification. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Elias Seid, Oliver Popov, Fredrik Blix An Automated Adaptive Security Framework for Cyber-Physical Systems. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Pavel Chikul, Hayretdin Bahsi, Olaf Maennel The Design and Implementation of a Semantic Web Framework for the Event-Centric Digital Forensics Analysis. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Arghavan Hosseinzadeh, Jessica Chwalek, Robin Brandstädter Policy-Driven XACML-Based Architecture for Dynamic Enforcement of Multiparty Computation. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Amitesh Singh Rajput, Arnav Agrawal Blockchain for Privacy-Preserving Data Distribution in Healthcare. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Ryo Meguro, Hiroya Kato, Shintaro Narisada, Seira Hidano, Kazuhide Fukushima, Takuo Suganuma, Masahiro Hiji Gradient-Based Clean Label Backdoor Attack to Graph Neural Networks. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Fabrizia Marrucco, Mosabbah Mushir Ahmed, Bechir Bouali, Alieeldin Mady EMplifier: Hybrid Electromagnetic Probe for Side Channel and Fault Injection Analysis. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Tiago Heinrich, Newton Carlos Will, Rafael R. Obelheiro, Carlos Alberto Maziero Anywhere on Earth: A Look at Regional Characteristics of DRDoS Attacks. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Andre Büttner, Nils Gruschka Evaluating the Influence of Multi-Factor Authentication and Recovery Settings on the Security and Accessibility of User Accounts. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Luca Patzelt, Georg Neugebauer, Meik Döll, Sacha Hack, Tim Hoener, Marko Schuba A Framework for E2E Audit Trails in System Architectures of Different Enterprise Classes. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Shusaku Uemura, Kazuhide Fukushima Feasibility of Random Forest with Fully Homomorphic Encryption Applied to Network Data. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Josefin Andersson, Elias Seid The Classification and Impact of Cyber Attacks Targeting Critical Service Providers. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Martin Pirker, Robert Haas A Brief Reflection on Trusted Platform Module Support. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Anjali Pare, Prasad A. Kulkarni Exploring Errors in Binary-Level CFG Recovery. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Dakouri Gazo, Asma Patel, Mohammad Hasan Effectiveness of Malware Incident Management in Security Operations Centres: Trends, Challenges and Research Directions. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Ali Dogan, Kemal Bicakci KAIME: Central Bank Digital Currency with Realistic and Modular Privacy. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Md. Mahbubur Rahman, Md Delwar Hossain, Hideya Ochiai, Youki Kadobayashi, Tanjim Sakib, Syed Taha Yeasin Ramadan Vision Based Malware Classification Using Deep Neural Network with Hybrid Data Augmentation. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Antoine Stevan, Thomas Lavaur, Jérôme Lacan, Jonathan Detchart, Tanguy Pérennou Performance Evaluation of Polynomial Commitments for Erasure Code Based Information Dispersal. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Luca Petrillo, Antonella Santone Cybersecurity-Related Tweet Classification by Explainable Deep Learning. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Daniel Köhler, Christoph Meinel The Right Tool for the Job: Contextualization of Cybersecurity Education and Assessment Methods. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Narges Alipourjeddi, Ali Miri Preserving Privacy in High-Dimensional Data Publishing. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Spyros Kokolakis Security, Privacy and the "Human Factor": Making Sense of the Paradoxes of Security and Privacy Behaviour. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Seo-Yi Kim, Il-Gu Lee LSTM Autoencoder-Based Insider Abnormal Behavior Detection Using De-Identified Data. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Majid Lotfian Delouee, Victoria Degeler, Peter Amthor 0001, Boris Koldehofe APP-CEP: Adaptive Pattern-Level Privacy Protection in Complex Event Processing Systems. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Mohammed Jawed, Sriram Parameshwaran, Nitesh Kumar, Anand Handa, Sandeep K. Shukla ArkThor: Threat Categorization Based on Malware's C2 Communication. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Mariam Moustafa, Arto Niemi, Philip Ginzboorg, Jan-Erik Ekberg Attestation with Constrained Relying Party. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Lukas Brodschelm, Marcus Gelderie Using ILP to Learn AppArmor Policies. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Eliana Stavrou, Andriani Piki, Panayiotis Varnava Merging Policy and Practice: Crafting Effective Social Engineering Awareness-Raising Policies. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Arunab Singh, Maryam Tanha, Yashsvi Girdhar, Aaron Hunter 0001 Interpretable Android Malware Detection Based on Dynamic Analysis. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1William J. Buchanan, Sam Grierson, Daniel Uribe Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Philipp Jakubeit, Andreas Peter, Maarten van Steen RoomKey: Extracting a Volatile Key with Information from the Local WiFi Environment Reconstructable Within a Designated Area. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1George Teseleanu Security Analysis of an Image Encryption Scheme Based on a New Secure Variant of Hill Cipher and 1D Chaotic Maps. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Ryosuke Kobayashi, Rie Shigetomi Yamaguchi Forgery Resistance of User Authentication Methods Using Location, Wi-Fi and Their Correlation. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Cristina Alcaraz Safeguarding Industry 5.0 Ecosystems Through Digital Twins. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  BibTeX  RDF
1Gabriel A. Morales, Farhan Tajwar Romit, Adam Bienek-Parrish, Patrick Jenkins, Rocky Slavin IoT Device Classification Using Link-Level Features for Traditional Machine Learning and Large Language Models. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Ahmet Aksoy, Sundeep Varma, Ganesha Moorthy, Enya Pan, Gorkem Kar Comparative Analysis of Feature Selection Algorithms for Automated IoT Device Fingerprinting. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Ryousuke Wakabayashi, Lihua Wang 0001, Ryo Nojima, Atsushi Waseda Security Evaluation of Decision Tree Meets Data Anonymization. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Justine Paillet, Olive Chakraborty, Marina Checri Pure Multi Key BGV Implementation. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Ariane Trammell, Benjamin Gehring, Marco Isele, Yvo Spielmann, Valentin Zahnd Towards Automated Information Security Governance. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Cihangir Tezcan GPU-Based Brute Force Cryptanalysis of KLEIN. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Gabriele Lenzini, Paolo Mori, Steven Furnell (eds.) Proceedings of the 10th International Conference on Information Systems Security and Privacy, ICISSP 2024, Rome, Italy, February 26-28, 2024. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Thorsten P. Stremlau Integrating Post-Quantum Cryptography into Trusted Computing Group Standards. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  BibTeX  RDF
1Visakh K. Vijayan, Maria Francis, Kotaro Kataoka Off-Chaining Approaches for Cost-Efficiency in Threshold-Based Elliptic Curve Systems over Blockchains. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Kunlong Liu, Trinabh Gupta Federated Learning with Differential Privacy and an Untrusted Aggregator. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Brian Goncalves, Atefeh Mashatan Towards Generalized Diffie-Hellman-esque Key Agreement via Generic Split KEM Construction. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Kento Hasegawa, Katsutoshi Hanahara, Hiroshi Sugisaki, Minoru Kozu, Kazuhide Fukushima, Yosuke Murakami, Shinsaku Kiyomoto Vulnerability Information Sharing Platform for Securing Hardware Supply Chains. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Dmitry Levshun, Dmitry Vesnin Exploring BERT for Predicting Vulnerability Categories in Device Configurations. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Aseel Aldabjan, Steven Furnell, Xavier Carpent, Maria Papadaki Cybersecurity Incident Response Readiness in Organisations. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Stephan Spitz, Alexander Lawall Silicon-Integrated Security Solutions Driving IoT Security. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Changwei Liu, Louis DiValentin, Aolin Ding, Malek Ben Salem Build a Computationally Efficient Strong Defense Against Adversarial Example Attacks. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Ali Ahmed 0001, Victor Ungureanu, Tarek Gaber, Craig A. Watterson, Fatma Masmoudi Smart Home Privacy: A Scoping Review. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  BibTeX  RDF
1Rauli Kaksonen, Kimmo Halunen, Marko Laakso, Juha Röning Automating IoT Security Standard Testing by Common Security Tools. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Jackie Scott, Yair Levy, Wei Li 0025, Ajoy Kumar Comparing Phishing Training and Campaign Methods for Mitigating Malicious Emails in Organizations. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Andreas Rüedlinger, Rebecca Klauser, Pavlos Lamprakis, Markus Happe, Bernhard Tellenbach, Onur Veyisoglu, Ariane Trammell FeedMeter: Evaluating the Quality of Community-Driven Threat Intelligence. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1John McConnell, Yair Levy, Marti Snyder, Ling Wang The Role of Heuristics and Biases in Linux Server Administrators' Information Security Policy Compliance at Healthcare Organizations. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Paul Tavolato, Robert Luh, Sebastian Eresheim, Simon Gmeiner, Sebastian Schrittwieser Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Ophelia Prillard, Costas Boletsis, Shukun Tokas Ethical Design for Data Privacy and User Privacy Awareness in the Metaverse. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Eirik Lien, Karl Magnus Grønning Bergh, Sokratis K. Katsikas Perceptions of Cyber Security Risk of the Norwegian Advanced Metering Infrastructure. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Wanyu Hu, Vrizlynn L. L. Thing CPE-Identifier: Automated CPE Identification and CVE Summaries Annotation with Deep Learning and NLP. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Thanawat Tejapijaya, Prarinya Siritanawan, Karin Sumongkayothin, Kazunori Kotani Botnet Detection by Integrating Multiple Machine Learning Models. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Tiago Heinrich, Newton Carlos Will, Rafael R. Obelheiro, Carlos Alberto Maziero A Categorical Data Approach for Anomaly Detection in WebAssembly Applications. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Nahid Ferdous Aurna, Md Delwar Hossain, Hideya Ochiai, Yuzo Taenaka, Latifur Khan, Youki Kadobayashi Banking Malware Detection: Leveraging Federated Learning with Conditional Model Updates and Client Data Heterogeneity. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Olive Chakraborty, Aymen Boudguiga A Decentralized Federated Learning Using Reputation. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Huynh Phuong Thanh Nguyen, Zhi Chen, Kento Hasegawa, Kazuhide Fukushima, Razvan Beuran PenGym: Pentesting Training Framework for Reinforcement Learning Agents. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1George Teseleanu Security Analysis of an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Nezer Jacob Zaidenberg, Michael Kiperberg, Eliav Menachi, Asaf Eitani Detecting eBPF Rootkits Using Virtualization and Memory Forensics. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Muhammad Ali Farooq, Syed Muhammad Fasih Ul Hassan, Muhammad Umer Farooq, Abid Rafique High Throughput Neural Network for Network Intrusion Detection on FPGAs: An Algorithm-Architecture Interaction. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  BibTeX  RDF
1Ye-Sol Oh, Yeon-Ji Lee, Jiwon Jang, Hyunwoo Choi, Il-Gu Lee Implementation and Analysis of Covert Channel Using iBeacon. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Marcello Maugeri Fuzzing Matter(s): A White Paper for Fuzzing the Matter Protocol. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Julia Mader, Thomas Lorünser Feasibility of Privacy Preserving Minutiae-Based Fingerprint Matching. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Mario Raciti Conceptualising an Anti-Digital Forensics Kill Chain for Smart Homes. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Jan Hintz, Jacob Rühe, Ingo Siegert AnonEmoFace: Emotion Preserving Facial Anonymization. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Tony Delvecchio, Sander Zeijlemaker, Giancarlo De Bernardis, Michael Siegel Revolutionizing Board Cyber-Risk Management Using Collaborative Gaming. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Sally Bagheri, Andreas Jacobsson, Paul Davidsson Smart Homes as Digital Ecosystems: Exploring Privacy in IoT Contexts. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Philippe Valoggia, Anastasia Sergeeva, Arianna Rossi, Marietjie Botes Learning from the Dark Side About How (not) to Engineer Privacy: Analysis of Dark Patterns Taxonomies from an ISO 29100 Perspective. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Katerina Macková, Dominik Benk, Martin Srotýr Enhancing Cybersecurity Through Comparative Analysis of Deep Learning Models for Anomaly Detection. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  BibTeX  RDF
1Marcus Gelderie, Maximilian Luff, Lukas Brodschelm Differential Privacy for Distributed Traffic Monitoring in Smart Cities. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1David Debono, Aleandro Sultana Desktop Crypto Wallets: A Digital Forensic Investigation and Analysis of Remnants and Traces on end-User Machines. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Borna Kalhor, Sanchari Das Evaluating the Security and Privacy Risk Postures of Virtual Assistants. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Mauro Conti Covert & Side Stories: Threats Evolution in Traditional and Modern Technologies. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  BibTeX  RDF
Displaying result #1 - #100 of 797 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license