Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Aratrika Ray, Daqing Hou, Stephanie Schuckers, Abbie Barbir |
Continuous Authentication based on Hand Micro-movement during Smartphone Form Filling by Seated Human Subjects. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Roman Pilipchuk, Robert Heinrich, Ralf H. Reussner |
Automatically Extracting Business Level Access Control Requirements from BPMN Models to Align RBAC Policies. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Yixiong Wu, Jianwei Zhuge, Tingting Yin, Tianyi Li, Junmin Zhu, Guannan Guo, Yue Liu, Jianju Hu |
From Exposed to Exploited: Drawing the Picture of Industrial Control Systems Security Status in the Internet Age. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Åvald Åslaugson Sommervoll |
Dreaming of Keys: Introducing the Phantom Gradient Attack. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Bon Sy |
Linking Biometric Voice Identity with Self-monitoring Health Data as a Temporal-spatial Event Stored in a Mobile Device. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Wassnaa Al-Mawee, Steve Carr 0001, Jean Mayo |
Admonita: A Recommendation-based Trust Model for Dynamic Data Integrity. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Gencer Erdogan, Antonio Álvarez Romero, Niccolò Zazzeri, Anze Zitnik, Mariano Basile, Giorgio Aprile, Mafalda Osório, Claudia Pani, Ioannis Kechaoglou |
Developing Cyber-risk Centric Courses and Training Material for Cyber Ranges: A Systematic Approach. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Srijita Basu, Sandip Karmakar, Debasish Bera |
Blockchain based Secured Virtual Machine Image Monitor. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Florian Patzer, Jürgen Beyerer |
Efficient Semantic Representation of Network Access Control Configuration for Ontology-based Security Analysis. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Lu Zhang 0046, Reginald Cushing, Ralph Koning, Cees de Laat, Paola Grosso |
Profiling and Discriminating of Containerized ML Applications in Digital Data Marketplaces (DDM). |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Lukás Kotlaba, Simona Buchovecká, Róbert Lórencz |
Active Directory Kerberoasting Attack: Detection using Machine Learning Techniques. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Christoph Haar, Erik Buchmann |
Securing Orchestrated Containers with BSI Module SYS.1.6. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Özgür Ural, Cengiz Acartürk |
Automatic Detection of Cyber Security Events from Turkish Twitter Stream and Newspaper Data. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Helmar Hutschenreuter, Salva Daneshgadeh Çakmakçi, Christian Maeder, Thomas Kemmerich |
Ontology-based Cybersecurity and Resilience Framework. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Anagreh, Eero Vainikko, Peeter Laud |
Parallel Privacy-preserving Computation of Minimum Spanning Trees. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Ryotaro Nakata, Akira Otsuka |
Evaluation of Vulnerability Reproducibility in Container-based Cyber Range. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Debashis Mandal, Chandan Mazumdar |
Towards an Ontology for Enterprise Level Information Security Policy Analysis. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Paolo Mori, Gabriele Lenzini, Steven Furnell (eds.) |
Proceedings of the 7th International Conference on Information Systems Security and Privacy, ICISSP 2021, Online Streaming, February 11-13, 2021. |
ICISSP |
2021 |
DBLP BibTeX RDF |
|
1 | Hoang Viet Nguyen, Songpon Teerakanok, Atsuo Inomata, Tetsutaro Uehara |
The Proposal of Double Agent Architecture using Actor-critic Algorithm for Penetration Testing. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Michael Kiperberg, Nezer J. Zaidenberg |
HyperPass: Secure Password Input Platform. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Sabrina Kall, Slim Trabelsi |
An Asynchronous Federated Learning Approach for a Security Source Code Scanner. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Hiba Hnaini, Luka Le Roux, Joël Champeau, Ciprian Teodorov |
Security Property Modeling. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Eric Filiol |
Unconventional Attack against Voting Machines Enlarging the Scope of Cybersecurity Risk Analysis. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Yulexis Pacheco, Weiqing Sun |
Adversarial Machine Learning: A Comparative Study on Contemporary Intrusion Detection Datasets. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Michael Sonntag, René Mayrhofer |
Experiences and Recommendations from Operating a Tor Exit Node at a University. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Nozomi Nagashima, Masaki Inamura, Keiichi Iwamura |
Implementation of Secondary Available Digital Content Protection Schemes using Identity-based Signatures. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Sylvain Guilley, Michel Le Rolland, Damien Quenson |
Implementing Secure Applications Thanks to an Integrated Secure Element. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Hervé Chabanne, Vincent Despiegel, Linda Guiga |
A Protection against the Extraction of Neural Network Models. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Ryotaro Nakata, Akira Otsuka |
CyExec*: Automatic Generation of Randomized Cyber Range Scenarios. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Ilker Özçelik, Sai Medury, Justin T. Broaddus, Anthony Skjellum |
An Overview of Cryptographic Accumulators. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Robert Flood, Sheung Shi Chan, Wei Chen 0023, David Aspinall 0001 |
Checking Contact Tracing App Implementations. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Martin Jurecek, Matous Kozák |
Representation of PE Files using LSTM Networks. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Christoffer Olsson, Mohsen Toorani |
A Permissioned Blockchain-based System for Collaborative Drug Discovery. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Karen Renaud |
Accessible Cyber Security: The Next Frontier? |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Witold Klaudel, Artur Rataj |
Towards a Formalisation of Expert's Knowledge for an Automatic Construction of a Vulnerability Model of a Cyberphysical System. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Musab A. Alturki, Tajana Ban Kirigin, Max I. Kanovich, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott |
On Security Analysis of Periodic Systems: Expressiveness and Complexity. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Fabian Böhm, Manfred Vielberth, Günther Pernul |
Bridging Knowledge Gaps in Security Analytics. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Esmeralda Kadena, Huu Phuoc Dai Nguyen, Lourdes Ruiz |
Mobile Robots: An Overview of Data and Security. |
ICISSP |
2021 |
DBLP BibTeX RDF |
|
1 | Aymen Boudguiga, Oana Stan, Abdessamad Fazzat, Houda Labiod, Pierre-Emmanuel Clet |
Privacy Preserving Services for Intelligent Transportation Systems with Homomorphic Encryption. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Hai Ngoc Nguyen, Songpon Teerakanok, Atsuo Inomata, Tetsutaro Uehara |
The Comparison of Word Embedding Techniques in RNNs for Vulnerability Detection. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Jack McClary, Sid Stamm |
Understanding How People Weigh the Costs and Benefits of using Facebook. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Elliu Huang, Fabio Di Troia, Mark Stamp 0001, Preethi Sundaravaradhan |
A New Dataset for Smartphone Gesture-based Authentication. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Jakob Hagl, Oliver Mann, Martin Pirker |
Securing the Linux Boot Process: From Start to Finish. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Rosangela Casolare, Fabio Martinelli, Francesco Mercaldo, Antonella Santone |
Colluding Covert Channel for Malicious Information Exfiltration in Android Environment. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Lucas Cadalzo, Christopher H. Todd, Banjo Obayomi, W. Brad Moore, Anthony C. Wong |
Canopy: A Learning-based Approach for Automatic Low-and-Slow DDoS Mitigation. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Vaibhav Garg |
A Lemon by Any Other Label. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Paul Wagner, Kris Heid, Jens Heider |
Remote WebAuthn: FIDO2 Authentication for Less Accessible Devices. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Yan Yan 0018, Elisabeth Oswald, Srinivas Vivek 0001 |
An Analytic Attack against ARX Addition Exploiting Standard Side-channel Leakage. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Alexander O. Akande, Vu N. Tran |
Predicting Security Program Effectiveness in Bring-Your-Own-Device Deployment in Organizations. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Stefanie Pham, Matthias Schopp, Lars Stiemert, Sebastian Seeber, Daniela Pöhn, Wolfgang Hommel |
Field Studies on the Impact of Cryptographic Signatures and Encryption on Phishing Emails. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Avi Shaked, Yoram Reich |
Model-based Threat and Risk Assessment for Systems Design. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Malte Kushnir, Olivier Favre, Marc Rennhard, Damiano Esposito, Valentin Zahnd |
Automated Black Box Detection of HTTP GET Request-based Access Control Vulnerabilities in Web Applications. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Maryam Almarwani, Boris Konev, Alexei Lisitsa 0001 |
Release-aware In-out Encryption Adjustment in MongoDB Query Processing. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Blaine Ayotte, Mahesh K. Banavar, Daqing Hou, Stephanie Schuckers |
Study of Intra- and Inter-user Variance in Password Keystroke Dynamics. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Khanh-Huu-The Dam, Tayssir Touili |
MADLIRA: A Tool for Android Malware Detection. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Puchta, Sebastian Groll, Günther Pernul |
Leveraging Dynamic Information for Identity and Access Management: An Extension of Current Enterprise IAM Architecture. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Christophe Ponsard, Denis Darquennes |
Towards Formal Security Verification of Over-the-Air Update Protocol: Requirements, Survey and UpKit Case Study. |
ICISSP |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Tithnara Nicolas Sun, Bastien Drouot, Fahad Rafique Golra, Joël Champeau, Sylvain Guérin, Luka Le Roux, Raúl Mazo, Ciprian Teodorov, Lionel Van Aertryck, Bernard L'Hostis |
A Domain-specific Modeling Framework for Attack Surface Modeling. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Wataru Fujii, Keiichi Iwamura, Masaki Inamura |
Secure Comparison and Interval Test Protocols based on Three-party MPC. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Clemens Brunner 0002, Fabian Knirsch, Andreas Unterweger, Dominik Engel |
A Comparison of Blockchain-based PKI Implementations. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Lukás Kotlaba, Simona Buchovecká, Róbert Lórencz |
Active Directory Kerberoasting Attack: Monitoring and Detection Techniques. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Ezio Lefons, Sebastiano Pizzutilo, Filippo Tangorra |
Host Fingerprinting for Web Servers Authentication. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Aïda Diop, Maryline Laurent, Jean Leneutre, Jacques Traoré |
CoRA: A Scalable Collective Remote Attestation Protocol for Sensor Networks. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Shizra Sultan, Christian Damsgaard Jensen |
Privacy-preserving Measures in Smart City Video Surveillance Systems. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Hans Hüttel, Vilim Staroveski |
Secrecy and Authenticity Properties of the Lightning Network Protocol. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Linda Guiga, A. W. Roscoe 0001 |
Neural Network Security: Hiding CNN Parameters with Guided Grad-CAM. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Martinelli, Francesco Mercaldo, Domenico Raucci, Antonella Santone |
Bank Credit Risk Management based on Data Mining Techniques. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Otgonpurev Mendsaikhan, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada |
Quantifying the Significance of Cybersecurity Text through Semantic Similarity and Named Entity Recognition. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Roman Wirtz, Maritta Heisel |
Risk Identification: From Requirements to Threat Models. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Joanna Moubarak, Eric Filiol, Maroun Chamoun |
The Blockchain Potential in Computer Virology. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Stefanie Jasser, Jonas Kelbert |
An Approach to Secure Legacy Software Systems. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Martin Gunnarsson, Christian Gehrmann |
Secure Ownership Transfer for the Internet of Things. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Iraklis Symeonidis, Gabriele Lenzini |
Systematization of Threats and Requirements for Private Messaging with Untrusted Servers: The Case of e-Mailing and Instant Messaging. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Eduardo Magalhães De Lacerda Filho, Vinícius P. Gonçalves 0001 |
Achieving Privacy, Security, and Interoperability among Biometric Networks using Symmetric Encryption. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Andikan Otung, Andrew P. Martin |
Distributed Defence of Service (DiDoS): A Network-layer Reputation-based DDoS Mitigation Architecture. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Kouya Tochikubo |
New General Secret Sharing Scheme using Hierarchical Threshold Scheme: Improvement of Information Rates for Specified Participants. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Sophie Lathouwers, Maarten H. Everts, Marieke Huisman |
Verifying Sanitizer Correctness through Black-Box Learning: A Symbolic Finite Transducer Approach. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Aymen Boudguiga, Oana Stan, Hichem Sedjelmaci, Sergiu Carpov |
Homomorphic Encryption at Work for Private Analysis of Security Logs. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Lara Mauri, Stelvio Cimato, Ernesto Damiani |
A Formal Approach for the Analysis of the XRP Ledger Consensus Protocol. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | William Bowditch, Will Abramson, William J. Buchanan, Nikolaos Pitropakis, Adam J. Hall |
Privacy-preserving Surveillance Methods using Homomorphic Encryption. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Philip Nyblom, Gaute Wangen, Mazaher Kianpour, Grethe Østby |
The Root Causes of Compromised Accounts at the University. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Christian Colombo 0001, Mark Vella |
Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Shuaijianni Xu, Liang Feng Zhang |
A Homomorphic Proxy Re-authenticators based Efficient Multi-client Non-interactive Verifiable Computation Scheme. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Utz Nisslmueller, Klaus-Tycho Foerster, Stefan Schmid 0001, Christian Decker 0002 |
Toward Active and Passive Confidentiality Attacks on Cryptocurrency Off-chain Networks. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Robert Hegarty, John Haggerty |
Presence Metadata in the Internet of Things: Challenges and Opportunities. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Hervé Debar, Razvan Beuran, Yasuo Tan |
A Quantitative Study of Vulnerabilities in the Internet of Medical Things. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Budi Arief, Andy Periam, Orçun Çetin, Julio C. Hernandez-Castro |
Using Eyetracker to Find Ways to Mitigate Ransomware. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Tapiwa Gundu, Nthabiseng Modiba |
Building Competitive Advantage from Ubuntu: An African Information Security Awareness Model. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Sandra Domenique Zinsmaier, Hanno Langweg, Marcel Waldvogel |
A Practical Approach to Stakeholder-driven Determination of Security Requirements based on the GDPR and Common Criteria. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Sokratis K. Katsikas |
Leveraging Blockchain Technology to Enhance Security and Privacy in the Internet of Things. |
ICISSP |
2020 |
DBLP BibTeX RDF |
|
1 | Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone |
Android Run-time Permission Exploitation User Awareness by Means of Formal Methods. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Orestis Christou, Nikolaos Pitropakis, Pavlos Papadopoulos, Sean McKeown, William J. Buchanan |
Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Alejandro Guerra-Manzanares, Jorge Medina-Galindo, Hayretdin Bahsi, Sven Nõmm |
MedBIoT: Generation of an IoT Botnet Dataset in a Medium-sized IoT Network. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Fredrik Heiding, Mohammad-Ali Omer, Andreas Wallström, Robert Lagerström |
Securing IoT Devices using Geographic and Continuous Login Blocking: A Honeypot Study. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Steffen Pfrang, David Meier, Andreas Fleig, Jürgen Beyerer |
A Meta Model for a Comprehensive Description of Network Protocols Improving Security Tests. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Max Landauer, Florian Skopik, Markus Wurzenberger, Wolfgang Hotwagner, Andreas Rauber |
Visualizing Syscalls using Self-organizing Maps for System Intrusion Detection. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Jesse Daniels, Sajal Bhatia |
Legislation and the Negative Impact on Cybersecurity in Healthcare. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Said Daoudagh, Francesca Lonetti, Eda Marchetti |
Assessing Testing Strategies for Access Control Systems: A Controlled Experiment. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Ryosuke Terado, Morihiro Hayashida |
Improving Accuracy and Speed of Network-based Intrusion Detection using Gradient Boosting Trees. |
ICISSP |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Steven Furnell, Paolo Mori, Edgar R. Weippl, Olivier Camp (eds.) |
Proceedings of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, Valletta, Malta, February 25-27, 2020. |
ICISSP |
2020 |
DBLP BibTeX RDF |
|