


default search action
2nd ICISSP 2016: Rome, Italy
- Olivier Camp, Steven Furnell, Paolo Mori:

Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, Rome, Italy, February 19-21, 2016. SciTePress 2016, ISBN 978-989-758-167-0
Invited Speakers
Keynote Speakers
- Jason I. Hong:

Privacy, Ethics and Big Data. ICISSP 2016: 5 - Hans-Joachim Lenz:

Tax Fraud and Investigation Procedures - Everybody, Every Where, Every Time. ICISSP 2016: 7-8 - Edgar R. Weippl:

Ethics in Security Research. ICISSP 2016: 9
Papers
Full Papers
- Christoph Kerschbaumer, Sid Stamm, Stefan Brunthaler

:
Injecting CSP for Fun and Security. 15-25 - Dominik Teubert, Fred Grossmann, Ulrike Meyer:

Anomaly-based Mobile Malware Detection: System Calls as Source for Features. 26-36 - Sylvestre Uwizeyemungu, Placide Poba-Nzaou:

Security and Privacy Practices in Healthcare Information Systems: A Cluster Analysis of European Hospitals. 37-45 - Nilakantha Paudel, Marco Querini, Giuseppe F. Italiano:

Handwritten Signature Verification for Mobile Phones. 46-52 - Toru Nakamura, Shinsaku Kiyomoto, Welderufael B. Tesfay, Jetzabel M. Serna:

Personalised Privacy by Default Preferences - Experiment and Analysis. 53-62 - Ana Ferreira, Gabriele Lenzini

:
Comparing and Integrating Break-the-Glass and Delegation in Role-based Access Control for Healthcare. 63-73 - Kexin Qiao, Lei Hu, Siwei Sun:

Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques. 74-84 - Sebastian Bittl, Karsten Roscher:

Efficient Authorization Authority Certificate Distribution in VANETs. 85-96 - C. Shao, H. Li, G. Xu:

Quantitative Evaluation of Security on Cryptographic ICs against Fault Injection Attacks. 97-104 - Giuseppe Settanni, Florian Skopik

, Yegor Shovgenya, Roman Fiedler:
A Collaborative Analysis System for Cross-organization Cyber Incident Handling. 105-116 - Simone Bossi, Tea Anselmo, Guido Bertoni

:
On TLS 1.3 - Early Performance Analysis in the IoT Field. 117-125 - Ammar Abuelgasim, Anne V. D. M. Kayem:

An Approach to Personalized Privacy Policy Recommendations on Online Social Networks. 126-137 - Tim Wambach, Katharina Bräunlich:

Retrospective Study of Third-party Web Tracking. 138-145 - Wenting Li, Qingni Shen, Chuntao Dong, Yahui Yang, Zhonghai Wu:

DDHCS: Distributed Denial-of-service Threat to YARN Clusters based on Health Check Service. 146-156 - Cristina-Loredana Duta, Laura Gheorghe, Nicolae Tapus:

Performance Analysis of Real Time Implementations of Voice Encryption Algorithms using Blackfin Processors. 157-166 - Rafiullah Khan, Kieran McLaughlin, David M. Laverty

, Sakir Sezer:
IEEE C37.118-2 Synchrophasor Communication Framework - Overview, Cyber Vulnerabilities Analysis and Performance Evaluation. 167-178 - Carsten Büttner, Sorin A. Huss:

An Anonymous Geocast Scheme for ITS Applications. 179-189
Short Papers
- Francesco Di Tria, Ezio Lefons, Filippo Tangorra:

Improving Database Security in Web-based Environments. 193-200 - Muhammad Imran Tariq

, Vito Santarcangelo:
Analysis of ISO 27001: 2013 Controls Effectiveness for Cloud Computing. 201-208 - Nils Ulltveit-Moe, Steffen Pfrang, László Erdödi, Héctor Nebot:

Mitigating Local Attacks Against a City Traffic Controller. 209-218 - Gencer Erdogan, Ketil Stølen, Jan Øyvind Aagedal:

Evaluation of the CORAL Approach for Risk-driven Security Testing based on an Industrial Case Study. 219-226 - Daniela Pöhn

:
Risk Management for Dynamic Metadata Exchange via a Trusted Third Party. 227-234 - Nobuyuki Sugio, Yasutaka Igarashi, Toshinobu Kaneko, Kenichi Higuchi:

A Practical-time Attack on Reduced-round MISTY1. 235-242 - Marius Georgescu, Hiroaki Hazeyama, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:

The STRIDE Towards IPv6: A Comprehensive Threat Model for IPv6 Transition Technologies. 243-254 - Simon Broenner, Hans Höfken, Marko Schuba:

Streamlining Extraction and Analysis of Android RAM Images. 255-264 - Izzat Alsmadi

, Dianxiang Xu, Jin-Hee Cho:
Interaction-based Reputation Model in Online Social Networks. 265-272 - Hiroya Susuki, Rie Shigetomi Yamaguchi, Shizuo Sakamoto:

Multi-factor Authentication Updating System Evaluation Dynamically for Service Continuity. 273-281 - Germain Jolly, Sylvain Vernois, Christophe Rosenberger

:
An Observe-and-Detect Methodology for the Security and Functional Testing of Smart Card Applications. 282-289 - M. Lisa Mathews, Anupam Joshi

, Tim Finin:
Detecting Botnets using a Collaborative Situational-aware IDPS. 290-298 - Radek Hranicky

, Petr Matousek, Ondrej Rysavý, Vladimír Veselý:
Experimental Evaluation of Password Recovery in Encrypted Documents. 299-306 - Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet:

Tracking Explicit and Control Flows in Java and Native Android Apps Code. 307-316 - Tamir Lavi, Ehud Gudes:

Trust-based Dynamic RBAC. 317-324 - Cihangir Tezcan:

Truncated, Impossible, and Improbable Differential Analysis of ASCON. 325-332 - Phiwa Mzila:

Review Analysis of Properties for an Ideal Secure Biometric Template Scheme. 333-339 - Edwin T. L. Rampine, Cynthia H. Ngejane:

A Brief Overview of Hybrid Schemes for Biometric Fingerprint Template Security. 340-346 - Roman Graf, Sergiu Gordea, Heather M. Ryan, Tibaut Houzanme:

An Expert System for Facilitating an Institutional Risk Profile Definition for Cyber Situational Awareness. 347-354 - Julien Hatin, Estelle Cherrier, Jean-Jacques Schwartzmann, Vincent Frey, Christophe Rosenberger

:
A Continuous LoA Compliant Trust Evaluation Method. 355-363 - Danping Shi, Lei Hu, Siwei Sun

, Ling Song:
Linear(hull) Cryptanalysis of Round-reduced Versions of KATAN. 364-371 - Feno Heriniaina R.:

A Privacy Threat for Internet Users in Internet-censoring Countries. 372-379 - Cong Li, Qingni Shen, Kang Chen, Yahui Yang, Zhonghai Wu:

Whispers in the Cloud - A Covert Channel using the Result of Creating a Virtual Machine. 380-387 - Jaya Bhattacharjee, Anirban Sengupta

, Chandan Mazumdar:
A Quantitative Methodology for Security Risk Assessment of Enterprise Business Processes. 388-399 - Ching-Nung Yang, Stelvio Cimato, Jihi-Han Wu, Song-Ruei Cai:

3-Out-of-n Cheating Prevention Visual Cryptographic Schemes. 400-406 - Gerard Draper-Gil, Arash Habibi Lashkari

, Mohammad Saiful Islam Mamun, Ali A. Ghorbani:
Characterization of Encrypted and VPN Traffic using Time-related Features. 407-414 - Md. Selim Hossain, Ehsan Saeedi, Yinan Kong:

High-Performance FPGA Implementation of Elliptic Curve Cryptography Processor over Binary Field GF(2^163). 415-422 - Kang Chen, Qingni Shen, Cong Li, Yang Luo, Yahui Yang, Zhonghai Wu:

Sift - An Efficient Method for Co-residency Detection on Amazon EC2. 423-431 - Masahiro Ishii, Atsuo Inomata, Kazutoshi Fujikawa:

A Construction of a Twisted Ate Pairing on a Family of Kawazoe-Takahashi Curves at 192-bit Security Level and Its Cost Estimate. 432-439 - Gianluca Lax, Francesco Buccafurri, Serena Nicolazzo

, Antonino Nocera
, Lidia Fotia
:
A New Approach for Electronic Signature. 440-447 - Anesu M. C. Marufu, Anne V. D. M. Kayem, Stephen D. Wolthusen:

Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids. 448-456 - Abdullah Al Balushi, Kieran McLaughlin, Sakir Sezer:

Contextual Intrusion Alerts for Scada Networks - An Ontology based Approach for Intrusion Alerts Post Processing. 457-464 - Peter Maynard

, Kieran McLaughlin, Sakir Sezer:
Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction. 465-472 - Asim K. Pal, Subrata Bose, Arpita Maitra:

Collaborative Information Service - Privacy Algebra for User Defined Security. 473-481 - Elena Reshetova, Filippo Bonazzi, Thomas Nyman

, Ravishankar Borgaonkar, N. Asokan:
Characterizing SEAndroid Policies in the Wild. 482-489 - Kurt Stenzel, Kuzman Katkalov, Marian Borek, Wolfgang Reif:

Declassification of Information with Complex Filter Functions. 490-497 - Nadia Jemil Abdu, Ulrike Lechner:

A Threat Analysis Model for Identity and Access Management. 498-502 - Jassim Happa, Graham Fairclough, Jason R. C. Nurse, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:

A Pragmatic System-failure Assessment and Response Model. 503-508 - Christine Izuakor:

Understanding the Impact of Cyber Security Risks on Safety. 509-513 - Alessio Botta, Aniello Avallone, Mauro Garofalo, Giorgio Ventre:

Internet Streaming and Network Neutrality: Comparing the Performance of Video Hosting Services. 514-521 - Iman Sedeeq, Frans Coenen

, Alexei Lisitsa:
A Statistical Approach to the Detection of HTML Attribute Permutation Steganography. 522-527 - Yogesh Bhanu, Sebastian Dännart, Henning von Kielpinski, Alexander Laux, Ulrike Lechner, Tobias Lehmann, Andreas Rieb, Martin Riedl, Florian Wolf:

A Cyberthreat Search Process and Service. 528-535 - Iraklis Symeonidis

, Pagona Tsormpatzoudi, Bart Preneel:
Collateral Damage of Online Social Network Applications. 536-541 - Pasquale Battista, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio:

Identification of Android Malware Families with Model Checking. 542-547 - Hela Maddar, Wafa Kammoun, Omar Cheikhrouhou, Habib Youssef:

Lightweight Trust Model with High Longevity for Wireless Sensor Networks. 548-553 - Daniel D. Hein, Hossein Saiedian

:
Predicting Attack Prone Software Components using Repository Mined Change Metrics. 554-563

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














