The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICISSP"( http://dblp.L3S.de/Venues/ICISSP )

URL (DBLP): http://dblp.uni-trier.de/db/conf/icissp

Publication years (Num. hits)
2015 (44) 2016 (67) 2017 (81) 2018 (70) 2019 (84) 2020 (94) 2021 (89) 2022 (76) 2023 (91) 2024 (101)
Publication types (Num. hits)
inproceedings(787) proceedings(10)
Venues (Conferences, Journals, ...)
ICISSP(797)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 797 publication records. Showing 797 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Aratrika Ray, Daqing Hou, Stephanie Schuckers, Abbie Barbir Continuous Authentication based on Hand Micro-movement during Smartphone Form Filling by Seated Human Subjects. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Roman Pilipchuk, Robert Heinrich, Ralf H. Reussner Automatically Extracting Business Level Access Control Requirements from BPMN Models to Align RBAC Policies. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Yixiong Wu, Jianwei Zhuge, Tingting Yin, Tianyi Li, Junmin Zhu, Guannan Guo, Yue Liu, Jianju Hu From Exposed to Exploited: Drawing the Picture of Industrial Control Systems Security Status in the Internet Age. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Åvald Åslaugson Sommervoll Dreaming of Keys: Introducing the Phantom Gradient Attack. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Bon Sy Linking Biometric Voice Identity with Self-monitoring Health Data as a Temporal-spatial Event Stored in a Mobile Device. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Wassnaa Al-Mawee, Steve Carr 0001, Jean Mayo Admonita: A Recommendation-based Trust Model for Dynamic Data Integrity. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Gencer Erdogan, Antonio Álvarez Romero, Niccolò Zazzeri, Anze Zitnik, Mariano Basile, Giorgio Aprile, Mafalda Osório, Claudia Pani, Ioannis Kechaoglou Developing Cyber-risk Centric Courses and Training Material for Cyber Ranges: A Systematic Approach. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Srijita Basu, Sandip Karmakar, Debasish Bera Blockchain based Secured Virtual Machine Image Monitor. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Florian Patzer, Jürgen Beyerer Efficient Semantic Representation of Network Access Control Configuration for Ontology-based Security Analysis. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Lu Zhang 0046, Reginald Cushing, Ralph Koning, Cees de Laat, Paola Grosso Profiling and Discriminating of Containerized ML Applications in Digital Data Marketplaces (DDM). Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Lukás Kotlaba, Simona Buchovecká, Róbert Lórencz Active Directory Kerberoasting Attack: Detection using Machine Learning Techniques. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Christoph Haar, Erik Buchmann Securing Orchestrated Containers with BSI Module SYS.1.6. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Özgür Ural, Cengiz Acartürk Automatic Detection of Cyber Security Events from Turkish Twitter Stream and Newspaper Data. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Helmar Hutschenreuter, Salva Daneshgadeh Çakmakçi, Christian Maeder, Thomas Kemmerich Ontology-based Cybersecurity and Resilience Framework. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Mohammad Anagreh, Eero Vainikko, Peeter Laud Parallel Privacy-preserving Computation of Minimum Spanning Trees. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Ryotaro Nakata, Akira Otsuka Evaluation of Vulnerability Reproducibility in Container-based Cyber Range. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Debashis Mandal, Chandan Mazumdar Towards an Ontology for Enterprise Level Information Security Policy Analysis. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Paolo Mori, Gabriele Lenzini, Steven Furnell (eds.) Proceedings of the 7th International Conference on Information Systems Security and Privacy, ICISSP 2021, Online Streaming, February 11-13, 2021. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  BibTeX  RDF
1Hoang Viet Nguyen, Songpon Teerakanok, Atsuo Inomata, Tetsutaro Uehara The Proposal of Double Agent Architecture using Actor-critic Algorithm for Penetration Testing. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Michael Kiperberg, Nezer J. Zaidenberg HyperPass: Secure Password Input Platform. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Sabrina Kall, Slim Trabelsi An Asynchronous Federated Learning Approach for a Security Source Code Scanner. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Hiba Hnaini, Luka Le Roux, Joël Champeau, Ciprian Teodorov Security Property Modeling. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Eric Filiol Unconventional Attack against Voting Machines Enlarging the Scope of Cybersecurity Risk Analysis. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Yulexis Pacheco, Weiqing Sun Adversarial Machine Learning: A Comparative Study on Contemporary Intrusion Detection Datasets. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Michael Sonntag, René Mayrhofer Experiences and Recommendations from Operating a Tor Exit Node at a University. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Nozomi Nagashima, Masaki Inamura, Keiichi Iwamura Implementation of Secondary Available Digital Content Protection Schemes using Identity-based Signatures. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Sylvain Guilley, Michel Le Rolland, Damien Quenson Implementing Secure Applications Thanks to an Integrated Secure Element. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Hervé Chabanne, Vincent Despiegel, Linda Guiga A Protection against the Extraction of Neural Network Models. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Ryotaro Nakata, Akira Otsuka CyExec*: Automatic Generation of Randomized Cyber Range Scenarios. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Ilker Özçelik, Sai Medury, Justin T. Broaddus, Anthony Skjellum An Overview of Cryptographic Accumulators. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Robert Flood, Sheung Shi Chan, Wei Chen 0023, David Aspinall 0001 Checking Contact Tracing App Implementations. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Martin Jurecek, Matous Kozák Representation of PE Files using LSTM Networks. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Christoffer Olsson, Mohsen Toorani A Permissioned Blockchain-based System for Collaborative Drug Discovery. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Karen Renaud Accessible Cyber Security: The Next Frontier? Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Witold Klaudel, Artur Rataj Towards a Formalisation of Expert's Knowledge for an Automatic Construction of a Vulnerability Model of a Cyberphysical System. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Musab A. Alturki, Tajana Ban Kirigin, Max I. Kanovich, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott On Security Analysis of Periodic Systems: Expressiveness and Complexity. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Fabian Böhm, Manfred Vielberth, Günther Pernul Bridging Knowledge Gaps in Security Analytics. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Esmeralda Kadena, Huu Phuoc Dai Nguyen, Lourdes Ruiz Mobile Robots: An Overview of Data and Security. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  BibTeX  RDF
1Aymen Boudguiga, Oana Stan, Abdessamad Fazzat, Houda Labiod, Pierre-Emmanuel Clet Privacy Preserving Services for Intelligent Transportation Systems with Homomorphic Encryption. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Hai Ngoc Nguyen, Songpon Teerakanok, Atsuo Inomata, Tetsutaro Uehara The Comparison of Word Embedding Techniques in RNNs for Vulnerability Detection. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Jack McClary, Sid Stamm Understanding How People Weigh the Costs and Benefits of using Facebook. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Elliu Huang, Fabio Di Troia, Mark Stamp 0001, Preethi Sundaravaradhan A New Dataset for Smartphone Gesture-based Authentication. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Jakob Hagl, Oliver Mann, Martin Pirker Securing the Linux Boot Process: From Start to Finish. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Rosangela Casolare, Fabio Martinelli, Francesco Mercaldo, Antonella Santone Colluding Covert Channel for Malicious Information Exfiltration in Android Environment. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Lucas Cadalzo, Christopher H. Todd, Banjo Obayomi, W. Brad Moore, Anthony C. Wong Canopy: A Learning-based Approach for Automatic Low-and-Slow DDoS Mitigation. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Vaibhav Garg A Lemon by Any Other Label. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Paul Wagner, Kris Heid, Jens Heider Remote WebAuthn: FIDO2 Authentication for Less Accessible Devices. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Yan Yan 0018, Elisabeth Oswald, Srinivas Vivek 0001 An Analytic Attack against ARX Addition Exploiting Standard Side-channel Leakage. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Alexander O. Akande, Vu N. Tran Predicting Security Program Effectiveness in Bring-Your-Own-Device Deployment in Organizations. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Stefanie Pham, Matthias Schopp, Lars Stiemert, Sebastian Seeber, Daniela Pöhn, Wolfgang Hommel Field Studies on the Impact of Cryptographic Signatures and Encryption on Phishing Emails. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Avi Shaked, Yoram Reich Model-based Threat and Risk Assessment for Systems Design. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Malte Kushnir, Olivier Favre, Marc Rennhard, Damiano Esposito, Valentin Zahnd Automated Black Box Detection of HTTP GET Request-based Access Control Vulnerabilities in Web Applications. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Maryam Almarwani, Boris Konev, Alexei Lisitsa 0001 Release-aware In-out Encryption Adjustment in MongoDB Query Processing. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Blaine Ayotte, Mahesh K. Banavar, Daqing Hou, Stephanie Schuckers Study of Intra- and Inter-user Variance in Password Keystroke Dynamics. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Khanh-Huu-The Dam, Tayssir Touili MADLIRA: A Tool for Android Malware Detection. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Alexander Puchta, Sebastian Groll, Günther Pernul Leveraging Dynamic Information for Identity and Access Management: An Extension of Current Enterprise IAM Architecture. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Christophe Ponsard, Denis Darquennes Towards Formal Security Verification of Over-the-Air Update Protocol: Requirements, Survey and UpKit Case Study. Search on Bibsonomy ICISSP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Tithnara Nicolas Sun, Bastien Drouot, Fahad Rafique Golra, Joël Champeau, Sylvain Guérin, Luka Le Roux, Raúl Mazo, Ciprian Teodorov, Lionel Van Aertryck, Bernard L'Hostis A Domain-specific Modeling Framework for Attack Surface Modeling. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Wataru Fujii, Keiichi Iwamura, Masaki Inamura Secure Comparison and Interval Test Protocols based on Three-party MPC. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Clemens Brunner 0002, Fabian Knirsch, Andreas Unterweger, Dominik Engel A Comparison of Blockchain-based PKI Implementations. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Lukás Kotlaba, Simona Buchovecká, Róbert Lórencz Active Directory Kerberoasting Attack: Monitoring and Detection Techniques. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ezio Lefons, Sebastiano Pizzutilo, Filippo Tangorra Host Fingerprinting for Web Servers Authentication. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Aïda Diop, Maryline Laurent, Jean Leneutre, Jacques Traoré CoRA: A Scalable Collective Remote Attestation Protocol for Sensor Networks. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Shizra Sultan, Christian Damsgaard Jensen Privacy-preserving Measures in Smart City Video Surveillance Systems. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hans Hüttel, Vilim Staroveski Secrecy and Authenticity Properties of the Lightning Network Protocol. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Linda Guiga, A. W. Roscoe 0001 Neural Network Security: Hiding CNN Parameters with Guided Grad-CAM. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Fabio Martinelli, Francesco Mercaldo, Domenico Raucci, Antonella Santone Bank Credit Risk Management based on Data Mining Techniques. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Otgonpurev Mendsaikhan, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada Quantifying the Significance of Cybersecurity Text through Semantic Similarity and Named Entity Recognition. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Roman Wirtz, Maritta Heisel Risk Identification: From Requirements to Threat Models. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Joanna Moubarak, Eric Filiol, Maroun Chamoun The Blockchain Potential in Computer Virology. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Stefanie Jasser, Jonas Kelbert An Approach to Secure Legacy Software Systems. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Martin Gunnarsson, Christian Gehrmann Secure Ownership Transfer for the Internet of Things. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Iraklis Symeonidis, Gabriele Lenzini Systematization of Threats and Requirements for Private Messaging with Untrusted Servers: The Case of e-Mailing and Instant Messaging. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Eduardo Magalhães De Lacerda Filho, Vinícius P. Gonçalves 0001 Achieving Privacy, Security, and Interoperability among Biometric Networks using Symmetric Encryption. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Andikan Otung, Andrew P. Martin Distributed Defence of Service (DiDoS): A Network-layer Reputation-based DDoS Mitigation Architecture. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Kouya Tochikubo New General Secret Sharing Scheme using Hierarchical Threshold Scheme: Improvement of Information Rates for Specified Participants. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sophie Lathouwers, Maarten H. Everts, Marieke Huisman Verifying Sanitizer Correctness through Black-Box Learning: A Symbolic Finite Transducer Approach. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Aymen Boudguiga, Oana Stan, Hichem Sedjelmaci, Sergiu Carpov Homomorphic Encryption at Work for Private Analysis of Security Logs. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Lara Mauri, Stelvio Cimato, Ernesto Damiani A Formal Approach for the Analysis of the XRP Ledger Consensus Protocol. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1William Bowditch, Will Abramson, William J. Buchanan, Nikolaos Pitropakis, Adam J. Hall Privacy-preserving Surveillance Methods using Homomorphic Encryption. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Philip Nyblom, Gaute Wangen, Mazaher Kianpour, Grethe Østby The Root Causes of Compromised Accounts at the University. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Christian Colombo 0001, Mark Vella Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Shuaijianni Xu, Liang Feng Zhang A Homomorphic Proxy Re-authenticators based Efficient Multi-client Non-interactive Verifiable Computation Scheme. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Utz Nisslmueller, Klaus-Tycho Foerster, Stefan Schmid 0001, Christian Decker 0002 Toward Active and Passive Confidentiality Attacks on Cryptocurrency Off-chain Networks. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Robert Hegarty, John Haggerty Presence Metadata in the Internet of Things: Challenges and Opportunities. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hervé Debar, Razvan Beuran, Yasuo Tan A Quantitative Study of Vulnerabilities in the Internet of Medical Things. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Budi Arief, Andy Periam, Orçun Çetin, Julio C. Hernandez-Castro Using Eyetracker to Find Ways to Mitigate Ransomware. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Tapiwa Gundu, Nthabiseng Modiba Building Competitive Advantage from Ubuntu: An African Information Security Awareness Model. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sandra Domenique Zinsmaier, Hanno Langweg, Marcel Waldvogel A Practical Approach to Stakeholder-driven Determination of Security Requirements based on the GDPR and Common Criteria. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sokratis K. Katsikas Leveraging Blockchain Technology to Enhance Security and Privacy in the Internet of Things. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  BibTeX  RDF
1Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone Android Run-time Permission Exploitation User Awareness by Means of Formal Methods. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Orestis Christou, Nikolaos Pitropakis, Pavlos Papadopoulos, Sean McKeown, William J. Buchanan Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Alejandro Guerra-Manzanares, Jorge Medina-Galindo, Hayretdin Bahsi, Sven Nõmm MedBIoT: Generation of an IoT Botnet Dataset in a Medium-sized IoT Network. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Fredrik Heiding, Mohammad-Ali Omer, Andreas Wallström, Robert Lagerström Securing IoT Devices using Geographic and Continuous Login Blocking: A Honeypot Study. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Steffen Pfrang, David Meier, Andreas Fleig, Jürgen Beyerer A Meta Model for a Comprehensive Description of Network Protocols Improving Security Tests. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Max Landauer, Florian Skopik, Markus Wurzenberger, Wolfgang Hotwagner, Andreas Rauber Visualizing Syscalls using Self-organizing Maps for System Intrusion Detection. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jesse Daniels, Sajal Bhatia Legislation and the Negative Impact on Cybersecurity in Healthcare. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Said Daoudagh, Francesca Lonetti, Eda Marchetti Assessing Testing Strategies for Access Control Systems: A Controlled Experiment. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ryosuke Terado, Morihiro Hayashida Improving Accuracy and Speed of Network-based Intrusion Detection using Gradient Boosting Trees. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Steven Furnell, Paolo Mori, Edgar R. Weippl, Olivier Camp (eds.) Proceedings of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, Valletta, Malta, February 25-27, 2020. Search on Bibsonomy ICISSP The full citation details ... 2020 DBLP  BibTeX  RDF
Displaying result #301 - #400 of 797 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license