default search action
17th CRiSIS 2022: Sousse, Tunisia
- Slim Kallel, Mohamed Jmaiel, Mohammad Zulkernine, Ahmed Hadj Kacem, Frédéric Cuppens, Nora Cuppens:
Risks and Security of Internet and Systems - 17th International Conference, CRiSIS 2022, Sousse, Tunisia, December 7-9, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13857, Springer 2023, ISBN 978-3-031-31107-9 - Kris Heid, Jens Heider:
Context Correlation for Automated Dynamic Android App Analysis to Improve Impact Rating of Privacy and Security Flaws. 1-17 - Maxime Lanvin, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic Mé, Eric Totel:
Errors in the CICIDS2017 Dataset and the Significant Differences in Detection Performances It Makes. 18-33 - Ahmed Burhan Mohammed, Lamia Chaari Fourati, Ahmed Fakhrudeen:
A Comparative Study of Attribute Selection Algorithms on Intrusion Detection System in UAVs: A Case Study of UKM-IDS20 Dataset. 34-46 - Abdel Mlak Said, Aymen Yahyaoui, Takoua Abdellatif:
PRIAH: Private Alerts in Healthcare. 47-61 - Charles-Henry Bertrand Van Ouytsel, Christophe Crochet, Khanh-Huu-The Dam, Axel Legay:
Tool Paper - SEMA: Symbolic Execution Toolchain for Malware Analysis. 62-68 - Maher Boughdiri, Takoua Abdellatif, Tesnim Abdellatif:
Blockchain Survey for Security and Privacy in the e-Health Ecosystem. 69-84 - Mohamed Amin Hammami, Mariam Lahami, Afef Jmal Maâlej:
Towards a Dynamic Testing Approach for Checking the Correctness of Ethereum Smart Contracts. 85-100 - Tarek Frikha, Jalel Ktari, Habib Hamam:
Blockchain Olive Oil Supply Chain. 101-113 - Salah Gontara, Amine Boufaied, Ouajdi Korbaa:
Impact of EIP-1559 on Transactions in the Ethereum Blockchain and Its Rollups. 114-126 - Rawya Mars, Saoussen Cheikhrouhou, Slim Kallel, Mohamed Sellami, Ahmed Hadj Kacem:
Towards a Secure Cross-Blockchain Smart Contract Architecture. 127-132 - Bastien Drouot, Valery Monthe, Sylvain Guérin, Joël Champeau:
Security Analysis: From Model to System Analysis. 133-152 - Racem Bougacha, Régine Laleau, Philippe Bon, Simon Collart Dutilleul, Rahma Ben Ayed:
Modeling Train Systems: From High-Level Architecture Graphical Models to Formal Specifications. 153-168 - Benjamin Somers, Fabien Dagnat, Jean-Christophe Bach:
How IT Infrastructures Break: Better Modeling for Better Risk Management. 169-184 - Johannes Beckert, Teo Blazevic, Alexander Dobhan:
IoT Security Within Small and Medium-Sized Manufacturing Companies. 185-190 - Liang Chen, Cheng Zeng, Stilianos Vidalis:
An Incentive Mechanism for Managing Obligation Delegation. 191-206 - Rahma Trabelsi, Ghofrane Fersi, Mohamed Jmaiel:
Virtual Private Network Blockchain-based Dynamic Access Control Solution for Inter-organisational Large Scale IoT Networks. 207-222 - Hannes Salin:
Pseudonym Swapping with Secure Accumulators and Double Diffie-Hellman Rounds in Cooperative Intelligent Transport Systems. 223-238 - Randy Kuang, Maria Perepechaenko, Ryan Toth, Michel Barbeau:
Benchmark Performance of the Multivariate Polynomial Public Key Encapsulation Mechanism. 239-255
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.