


default search action
6th ICISSP 2020: Prague, Czech Republic
- Steven Furnell, Paolo Mori, Edgar R. Weippl, Olivier Camp:

Proceedings of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, Valletta, Malta, February 25-27, 2020. SCITEPRESS 2020, ISBN 978-989-758-399-5
Invited Speakers
- Sokratis K. Katsikas:

Leveraging Blockchain Technology to Enhance Security and Privacy in the Internet of Things. ICISSP 2020: 5 - Utz Nisslmueller, Klaus-Tycho Foerster, Stefan Schmid

, Christian Decker:
Toward Active and Passive Confidentiality Attacks on Cryptocurrency Off-chain Networks. 7-14 - Mauro Barni:

Backdooring Deep Learning Architectures: Threats and (some) Opportunities. ICISSP 2020: 15-16
Papers
- Christoph Stach, Corinna Giebler, Manuela Wagner, Christian Weber, Bernhard Mitschang:

AMNESIA: A Technical Solution towards GDPR-compliant Machine Learning. 21-32 - Martin Gunnarsson, Christian Gehrmann:

Secure Ownership Transfer for the Internet of Things. 33-44 - Ezio Lefons, Sebastiano Pizzutilo, Filippo Tangorra:

Host Fingerprinting for Web Servers Authentication. 45-51 - Lara Mauri

, Stelvio Cimato, Ernesto Damiani
:
A Formal Approach for the Analysis of the XRP Ledger Consensus Protocol. 52-63 - Giacomo Giorgi, Andrea Saracino, Fabio Martinelli:

Email Spoofing Attack Detection through an End to End Authorship Attribution System. 64-74 - Simona Buchovecká, Róbert Lórencz, Jirí Bucek, Filip Kodýtek

:
Lightweight Authentication and Secure Communication Suitable for IoT Devices. 75-83 - Aïda Diop, Maryline Laurent

, Jean Leneutre, Jacques Traoré:
CoRA: A Scalable Collective Remote Attestation Protocol for Sensor Networks. 84-95 - Timo Malderle, Sven Knauer, Martin Lang, Matthias Wübbeling, Michael Meier

:
Track Down Identity Leaks using Threat Intelligence. 96-106 - Said Daoudagh

, Francesca Lonetti, Eda Marchetti
:
Assessing Testing Strategies for Access Control Systems: A Controlled Experiment. 107-118 - Hans Hüttel

, Vilim Staroveski:
Secrecy and Authenticity Properties of the Lightning Network Protocol. 119-130 - Sylvestre Uwizeyemungu, Placide Poba-Nzaou:

Privacy with Health Information Technologies: What Story Do Data Breaches in US Tell Us? 131-141 - Vanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay, Shinsaku Kiyomoto:

Evaluating the Effect of Justification and Confidence Information on User Perception of a Privacy Policy Summarization Tool. 142-151 - Mirja Nitschke

, Christian Roth, Christian Hoyer, Dogan Kesdogan:
Harmonized Group Mix for ITS. 152-163 - Hervé Debar, Razvan Beuran, Yasuo Tan:

A Quantitative Study of Vulnerabilities in the Internet of Medical Things. 164-175 - Mohammad Anagreh, Eero Vainikko, Peeter Laud

:
Speeding Up the Computation of Elliptic Curve Scalar Multiplication based on CRT and DRM. 176-184 - Dirk Snyman

, Hennie A. Kruger:
External Contextual Factors in Information Security Behaviour. 185-194 - Shuaijianni Xu, Liang Feng Zhang:

A Homomorphic Proxy Re-authenticators based Efficient Multi-client Non-interactive Verifiable Computation Scheme. 195-206 - Alejandro Guerra-Manzanares

, Jorge Medina-Galindo, Hayretdin Bahsi, Sven Nõmm
:
MedBIoT: Generation of an IoT Botnet Dataset in a Medium-sized IoT Network. 207-218 - Wojciech Wodo, Damian Stygar:

Security of Digital Banking Systems in Poland: Users Study 2019. 221-231 - Fabian Knirsch, Andreas Unterweger, Maximilian Unterrainer, Dominik Engel:

Comparison of the Paillier and ElGamal Cryptosystems for Smart Grid Aggregation Protocols. 232-239 - William Bowditch, Will Abramson, William J. Buchanan

, Nikolaos Pitropakis
, Adam J. Hall:
Privacy-preserving Surveillance Methods using Homomorphic Encryption. 240-248 - Grethe Østby, Basel Katt:

Maturity Modelling to Prepare for Cyber Crisis Escalation and Management. 249-256 - Ralf Kneuper

:
Translating Data Protection into Software Requirements. 257-264 - Houssem Maghrebi, Davide Alessio:

Revisiting Higher-order Computational Attacks against White-box Implementations. 265-272 - Siri Bromander, Morton Swimmer, Martin Eian, Geir Skjøtskift, Fredrik Borg:

Modeling Cyber Threat Intelligence. 273-280 - Agnes Åkerlund, Christine Große:

Integration of Data Envelopment Analysis in Business Process Models: A Novel Approach to Measure Information Security. 281-288 - Orestis Christou, Nikolaos Pitropakis

, Pavlos Papadopoulos
, Sean McKeown, William J. Buchanan
:
Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach. 289-298 - Stefanie Jasser, Jonas Kelbert:

An Approach to Secure Legacy Software Systems. 299-309 - Jason Orender

, Ravi Mukkamala, Mohammad Zubair:
Is Ethereum's ProgPoW ASIC Resistant? 310-316 - Phitchayaphong Tantikul, Sudsanguan Ngamsuriyaroj:

Exploring Vulnerabilities in Solidity Smart Contract. 317-324 - Otgonpurev Mendsaikhan

, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada:
Quantifying the Significance of Cybersecurity Text through Semantic Similarity and Named Entity Recognition. 325-332 - Clemens Brunner

, Fabian Knirsch, Andreas Unterweger, Dominik Engel:
A Comparison of Blockchain-based PKI Implementations. 333-340 - Tithnara Nicolas Sun, Bastien Drouot, Fahad Rafique Golra

, Joël Champeau, Sylvain Guérin
, Luka Le Roux, Raúl Mazo, Ciprian Teodorov
, Lionel Van Aertryck, Bernard L'Hostis:
A Domain-specific Modeling Framework for Attack Surface Modeling. 341-348 - Max Landauer, Florian Skopik, Markus Wurzenberger, Wolfgang Hotwagner, Andreas Rauber:

Visualizing Syscalls using Self-organizing Maps for System Intrusion Detection. 349-360 - Lorenzo Bracciale, Pierpaolo Loreti, Emanuele Raso

, Maurizio Naldi, Giuseppe Bianchi:
CoProtect: Collaborative Management of Cryptographic Keys for Data Security in Cloud Systems. 361-368 - Robert Lagerström, Wenjun Xiong

, Mathias Ekstedt:
Threat Modeling and Attack Simulations of Smart Cities: A Literature Review and Explorative Study. 369-376 - Hsiao-Ying Lin, Chengfang Fang, Jie Shi:

Bident Structure for Neural Network Model Protection. 377-384 - Roman Wirtz, Maritta Heisel:

Risk Identification: From Requirements to Threat Models. 385-396 - Arghavan Hosseinzadeh, Andreas Eitel

, Christian Jung:
A Systematic Approach toward Extracting Technically Enforceable Policies from Data Usage Control Requirements. 397-405 - Nikolai Gladychev

:
Computer Viruses: The Abstract Theory Revisited. 406-414 - Paul Plessing, Olamide Omolola:

Revisiting Privacy-aware Blockchain Public Key Infrastructure. 415-423 - Fredrik Heiding, Mohammad-Ali Omer, Andreas Wallström, Robert Lagerström:

Securing IoT Devices using Geographic and Continuous Login Blocking: A Honeypot Study. 424-431 - Lukás Kotlaba

, Simona Buchovecká, Róbert Lórencz:
Active Directory Kerberoasting Attack: Monitoring and Detection Techniques. 432-439 - Anass Sbai, Cyril Drocourt

, Gilles Dequen
:
CCA Secure Unidirectional PRE with Key Pair in the Standard Model without Pairings. 440-447 - Budi Arief

, Andy Periam, Orçun Çetin
, Julio C. Hernandez-Castro:
Using Eyetracker to Find Ways to Mitigate Ransomware. 448-456 - Vít Listík, Jan Sedivý, Václav Hlavác:

Email Image Spam Classification based on ResNet Convolutional Neural Network. 457-464 - Jiaxing Zhou, Miyuki Hirose, Yoshio Kakizaki, Atsuo Inomata:

Evaluation to Classify Ransomware Variants based on Correlations between APIs. 465-472 - Sandra Domenique Zinsmaier, Hanno Langweg, Marcel Waldvogel:

A Practical Approach to Stakeholder-driven Determination of Security Requirements based on the GDPR and Common Criteria. 473-480 - Eduardo Magalhães De Lacerda Filho, Vinícius P. Gonçalves

:
Achieving Privacy, Security, and Interoperability among Biometric Networks using Symmetric Encryption. 481-489 - Ryosuke Terado, Morihiro Hayashida:

Improving Accuracy and Speed of Network-based Intrusion Detection using Gradient Boosting Trees. 490-497 - Hubert Schölnast

, Paul Tavolato, Philipp Kreimel:
Anomaly Detection in Communication Networks of Cyber-physical Systems using Cross-over Data Compression. 498-505 - Shizra Sultan, Christian Damsgaard Jensen:

Privacy-preserving Measures in Smart City Video Surveillance Systems. 506-514 - Aymen Boudguiga, Oana Stan, Hichem Sedjelmaci, Sergiu Carpov:

Homomorphic Encryption at Work for Private Analysis of Security Logs. 515-523 - Álvaro de Pablo, Oscar Araque, Carlos Angel Iglesias:

Radical Text Detection based on Stylometry. 524-531 - Alfonso Guarino, Delfina Malandrino, Rocco Zaccagnino, Federico Cozza, Antonio Rapuano:

On Analyzing Third-party Tracking via Machine Learning. 532-539 - Philip Nyblom, Gaute Wangen, Mazaher Kianpour, Grethe Østby:

The Root Causes of Compromised Accounts at the University. 540-551 - Rafael Almeida, Pedro Vieira-Marques

, Ana Ferreira:
Patients to Mobilize Their Data: Secure and Flexible mHealth Delegation. 552-560 - David Jost, Mathias Fischer:

Accountant: Protection of Data Integrity and Identification of Malicious Nodes in In-network Data Processing. 561-568 - Tapiwa Gundu, Nthabiseng Modiba

:
Building Competitive Advantage from Ubuntu: An African Information Security Awareness Model. 569-576 - Julian Lindenhofer, Rene Offenthaler, Martin Pirker

:
A Curious Exploration of Malicious PDF Documents. 577-584 - Ziya Alper Genç, Gabriele Lenzini:

Dual-use Research in Ransomware Attacks: A Discussion on Ransomware Defence Intelligence. 585-592 - Iraklis Symeonidis

, Gabriele Lenzini:
Systematization of Threats and Requirements for Private Messaging with Untrusted Servers: The Case of e-Mailing and Instant Messaging. 593-602 - Mohammad Qbea'h

, Saed Alrabaee, Djedjiga Mouheb:
An Analytical Scanning Technique to Detect and Prevent the Transformed SQL Injection and XSS Attacks. 603-610 - Linda Guiga, A. W. Roscoe:

Neural Network Security: Hiding CNN Parameters with Guided Grad-CAM. 611-618 - Andikan Otung

, Andrew P. Martin:
Distributed Defence of Service (DiDoS): A Network-layer Reputation-based DDoS Mitigation Architecture. 619-630 - Robert Hegarty, John Haggerty:

Presence Metadata in the Internet of Things: Challenges and Opportunities. 631-638 - Masahiro Ishii, Satoshi Matsuura, Kento Mori, Masahiko Tomoishi, Yong Jin, Yoshiaki Kitaguchi:

A Study of Classification of Texts into Categories of Cybersecurity Incident and Attack with Topic Models. 639-646 - Kouya Tochikubo:

New General Secret Sharing Scheme using Hierarchical Threshold Scheme: Improvement of Information Rates for Specified Participants. 647-654 - Giray Havur, Miel Vander Sande, Sabrina Kirrane:

Greater Control and Transparency in Personal Data Processing. 655-662 - Andrew Sundstrom

, Damas W. Limoge, Vadim Pinskiy, Matthew Putman:
Securing Industrial Production from Sophisticated Cyberattacks. 663-670 - Steffen Pfrang, David Meier, Andreas Fleig, Jürgen Beyerer:

A Meta Model for a Comprehensive Description of Network Protocols Improving Security Tests. 671-682 - Piotr Krasnowski, Jérôme Lebrun

, Bruno Martin
:
Introducing a Verified Authenticated Key Exchange Protocol over Voice Channels for Secure Voice Communication. 683-690 - Jesse Daniels, Sajal Bhatia:

Legislation and the Negative Impact on Cybersecurity in Healthcare. 691-697 - Wataru Fujii, Keiichi Iwamura, Masaki Inamura:

Secure Comparison and Interval Test Protocols based on Three-party MPC. 698-704 - Simone Facchini, Giacomo Giorgi, Andrea Saracino, Gianluca Dini:

Multi-level Distributed Intrusion Detection System for an IoT based Smart Home Environment. 705-712 - Ge Chu, Alexei Lisitsa:

Ontology-based Automation of Penetration Testing. 713-720 - Seira Hidano, Shinsaku Kiyomoto:

Recommender Systems Robust to Data Poisoning using Trim Learning. 721-724 - Martin Jurecek

, Róbert Lórencz:
Distance Metric Learning using Particle Swarm Optimization to Improve Static Malware Detection. 725-732 - Ismail Butun, Alexios Lekidis

, Daniel Ricardo dos Santos:
Security and Privacy in Smart Grids: Challenges, Current Solutions and Future Opportunities. 733-741 - Andreas Thompson, Gencer Erdogan:

Tool Support for Risk-driven Planning of Trustworthy Smart IoT Systems within DevOps. 742-753 - Christophe Ponsard, Jeremy Grandclaudon, Nicolas Point:

Methodology and Feedback about Systematic Cybersecurity Experts Auditing in Belgium. 754-759
4th International Workshop on FORmal methods for Security Engineering
- Christian Colombo, Mark Vella:

Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification. 765-774 - Maxence Delong, Baptiste David, Eric Filiol

:
Detection of Crawler Traps: Formalization and Implementation Defeating Protection on Internet and on the TOR Network. 775-783 - Sophie Lathouwers

, Maarten H. Everts, Marieke Huisman
:
Verifying Sanitizer Correctness through Black-Box Learning: A Symbolic Finite Transducer Approach. 784-795 - Joanna Moubarak, Eric Filiol

, Maroun Chamoun:
The Blockchain Potential in Computer Virology. 796-803 - Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:

Android Run-time Permission Exploitation User Awareness by Means of Formal Methods. 804-814 - Cinzia Bernardeschi

, Gianluca Dini, Maurizio Palmieri
, Francesco Racciatti:
Analysis of Security Attacks in Wireless Sensor Networks: From UPPAAL to Castalia. 815-824 - Madalina G. Ciobanu

, Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:
Accidental Sensitive Data Leaks Prevention via Formal Verification. 825-834 - Fabio Martinelli, Francesco Mercaldo, Domenico Raucci, Antonella Santone:

Bank Credit Risk Management based on Data Mining Techniques. 837-843 - Joanna Moubarak, Tony Feghali:

Comparing Machine Learning Techniques for Malware Detection. 844-851

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














