default search action
6th ICISSP 2020: Prague, Czech Republic
- Steven Furnell, Paolo Mori, Edgar R. Weippl, Olivier Camp:
Proceedings of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, Valletta, Malta, February 25-27, 2020. SCITEPRESS 2020, ISBN 978-989-758-399-5
Invited Speakers
- Sokratis K. Katsikas:
Leveraging Blockchain Technology to Enhance Security and Privacy in the Internet of Things. ICISSP 2020: 5 - Utz Nisslmueller, Klaus-Tycho Foerster, Stefan Schmid, Christian Decker:
Toward Active and Passive Confidentiality Attacks on Cryptocurrency Off-chain Networks. 7-14 - Mauro Barni:
Backdooring Deep Learning Architectures: Threats and (some) Opportunities. ICISSP 2020: 15-16
Papers
- Christoph Stach, Corinna Giebler, Manuela Wagner, Christian Weber, Bernhard Mitschang:
AMNESIA: A Technical Solution towards GDPR-compliant Machine Learning. 21-32 - Martin Gunnarsson, Christian Gehrmann:
Secure Ownership Transfer for the Internet of Things. 33-44 - Ezio Lefons, Sebastiano Pizzutilo, Filippo Tangorra:
Host Fingerprinting for Web Servers Authentication. 45-51 - Lara Mauri, Stelvio Cimato, Ernesto Damiani:
A Formal Approach for the Analysis of the XRP Ledger Consensus Protocol. 52-63 - Giacomo Giorgi, Andrea Saracino, Fabio Martinelli:
Email Spoofing Attack Detection through an End to End Authorship Attribution System. 64-74 - Simona Buchovecká, Róbert Lórencz, Jirí Bucek, Filip Kodýtek:
Lightweight Authentication and Secure Communication Suitable for IoT Devices. 75-83 - Aïda Diop, Maryline Laurent, Jean Leneutre, Jacques Traoré:
CoRA: A Scalable Collective Remote Attestation Protocol for Sensor Networks. 84-95 - Timo Malderle, Sven Knauer, Martin Lang, Matthias Wübbeling, Michael Meier:
Track Down Identity Leaks using Threat Intelligence. 96-106 - Said Daoudagh, Francesca Lonetti, Eda Marchetti:
Assessing Testing Strategies for Access Control Systems: A Controlled Experiment. 107-118 - Hans Hüttel, Vilim Staroveski:
Secrecy and Authenticity Properties of the Lightning Network Protocol. 119-130 - Sylvestre Uwizeyemungu, Placide Poba-Nzaou:
Privacy with Health Information Technologies: What Story Do Data Breaches in US Tell Us? 131-141 - Vanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay, Shinsaku Kiyomoto:
Evaluating the Effect of Justification and Confidence Information on User Perception of a Privacy Policy Summarization Tool. 142-151 - Mirja Nitschke, Christian Roth, Christian Hoyer, Dogan Kesdogan:
Harmonized Group Mix for ITS. 152-163 - Hervé Debar, Razvan Beuran, Yasuo Tan:
A Quantitative Study of Vulnerabilities in the Internet of Medical Things. 164-175 - Mohammad Anagreh, Eero Vainikko, Peeter Laud:
Speeding Up the Computation of Elliptic Curve Scalar Multiplication based on CRT and DRM. 176-184 - Dirk Snyman, Hennie A. Kruger:
External Contextual Factors in Information Security Behaviour. 185-194 - Shuaijianni Xu, Liang Feng Zhang:
A Homomorphic Proxy Re-authenticators based Efficient Multi-client Non-interactive Verifiable Computation Scheme. 195-206 - Alejandro Guerra-Manzanares, Jorge Medina-Galindo, Hayretdin Bahsi, Sven Nõmm:
MedBIoT: Generation of an IoT Botnet Dataset in a Medium-sized IoT Network. 207-218 - Wojciech Wodo, Damian Stygar:
Security of Digital Banking Systems in Poland: Users Study 2019. 221-231 - Fabian Knirsch, Andreas Unterweger, Maximilian Unterrainer, Dominik Engel:
Comparison of the Paillier and ElGamal Cryptosystems for Smart Grid Aggregation Protocols. 232-239 - William Bowditch, Will Abramson, William J. Buchanan, Nikolaos Pitropakis, Adam J. Hall:
Privacy-preserving Surveillance Methods using Homomorphic Encryption. 240-248 - Grethe Østby, Basel Katt:
Maturity Modelling to Prepare for Cyber Crisis Escalation and Management. 249-256 - Ralf Kneuper:
Translating Data Protection into Software Requirements. 257-264 - Houssem Maghrebi, Davide Alessio:
Revisiting Higher-order Computational Attacks against White-box Implementations. 265-272 - Siri Bromander, Morton Swimmer, Martin Eian, Geir Skjotskift, Fredrik Borg:
Modeling Cyber Threat Intelligence. 273-280 - Agnes Åkerlund, Christine Große:
Integration of Data Envelopment Analysis in Business Process Models: A Novel Approach to Measure Information Security. 281-288 - Orestis Christou, Nikolaos Pitropakis, Pavlos Papadopoulos, Sean McKeown, William J. Buchanan:
Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach. 289-298 - Stefanie Jasser, Jonas Kelbert:
An Approach to Secure Legacy Software Systems. 299-309 - Jason Orender, Ravi Mukkamala, Mohammad Zubair:
Is Ethereum's ProgPoW ASIC Resistant? 310-316 - Phitchayaphong Tantikul, Sudsanguan Ngamsuriyaroj:
Exploring Vulnerabilities in Solidity Smart Contract. 317-324 - Otgonpurev Mendsaikhan, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada:
Quantifying the Significance of Cybersecurity Text through Semantic Similarity and Named Entity Recognition. 325-332 - Clemens Brunner, Fabian Knirsch, Andreas Unterweger, Dominik Engel:
A Comparison of Blockchain-based PKI Implementations. 333-340 - Tithnara Nicolas Sun, Bastien Drouot, Fahad Rafique Golra, Joël Champeau, Sylvain Guérin, Luka Le Roux, Raúl Mazo, Ciprian Teodorov, Lionel Van Aertryck, Bernard L'Hostis:
A Domain-specific Modeling Framework for Attack Surface Modeling. 341-348 - Max Landauer, Florian Skopik, Markus Wurzenberger, Wolfgang Hotwagner, Andreas Rauber:
Visualizing Syscalls using Self-organizing Maps for System Intrusion Detection. 349-360 - Lorenzo Bracciale, Pierpaolo Loreti, Emanuele Raso, Maurizio Naldi, Giuseppe Bianchi:
CoProtect: Collaborative Management of Cryptographic Keys for Data Security in Cloud Systems. 361-368 - Robert Lagerström, Wenjun Xiong, Mathias Ekstedt:
Threat Modeling and Attack Simulations of Smart Cities: A Literature Review and Explorative Study. 369-376 - Hsiao-Ying Lin, Chengfang Fang, Jie Shi:
Bident Structure for Neural Network Model Protection. 377-384 - Roman Wirtz, Maritta Heisel:
Risk Identification: From Requirements to Threat Models. 385-396 - Arghavan Hosseinzadeh, Andreas Eitel, Christian Jung:
A Systematic Approach toward Extracting Technically Enforceable Policies from Data Usage Control Requirements. 397-405 - Nikolai Gladychev:
Computer Viruses: The Abstract Theory Revisited. 406-414 - Paul Plessing, Olamide Omolola:
Revisiting Privacy-aware Blockchain Public Key Infrastructure. 415-423 - Fredrik Heiding, Mohammad-Ali Omer, Andreas Wallström, Robert Lagerström:
Securing IoT Devices using Geographic and Continuous Login Blocking: A Honeypot Study. 424-431 - Lukás Kotlaba, Simona Buchovecká, Róbert Lórencz:
Active Directory Kerberoasting Attack: Monitoring and Detection Techniques. 432-439 - Anass Sbai, Cyril Drocourt, Gilles Dequen:
CCA Secure Unidirectional PRE with Key Pair in the Standard Model without Pairings. 440-447 - Budi Arief, Andy Periam, Orçun Çetin, Julio C. Hernandez-Castro:
Using Eyetracker to Find Ways to Mitigate Ransomware. 448-456 - Vít Listík, Jan Sedivý, Václav Hlavác:
Email Image Spam Classification based on ResNet Convolutional Neural Network. 457-464 - Jiaxing Zhou, Miyuki Hirose, Yoshio Kakizaki, Atsuo Inomata:
Evaluation to Classify Ransomware Variants based on Correlations between APIs. 465-472 - Sandra Domenique Zinsmaier, Hanno Langweg, Marcel Waldvogel:
A Practical Approach to Stakeholder-driven Determination of Security Requirements based on the GDPR and Common Criteria. 473-480 - Eduardo Magalhães De Lacerda Filho, Vinícius P. Gonçalves:
Achieving Privacy, Security, and Interoperability among Biometric Networks using Symmetric Encryption. 481-489 - Ryosuke Terado, Morihiro Hayashida:
Improving Accuracy and Speed of Network-based Intrusion Detection using Gradient Boosting Trees. 490-497 - Hubert Schölnast, Paul Tavolato, Philipp Kreimel:
Anomaly Detection in Communication Networks of Cyber-physical Systems using Cross-over Data Compression. 498-505 - Shizra Sultan, Christian Damsgaard Jensen:
Privacy-preserving Measures in Smart City Video Surveillance Systems. 506-514 - Aymen Boudguiga, Oana Stan, Hichem Sedjelmaci, Sergiu Carpov:
Homomorphic Encryption at Work for Private Analysis of Security Logs. 515-523 - Álvaro de Pablo, Oscar Araque, Carlos Angel Iglesias:
Radical Text Detection based on Stylometry. 524-531 - Alfonso Guarino, Delfina Malandrino, Rocco Zaccagnino, Federico Cozza, Antonio Rapuano:
On Analyzing Third-party Tracking via Machine Learning. 532-539 - Philip Nyblom, Gaute Wangen, Mazaher Kianpour, Grethe Østby:
The Root Causes of Compromised Accounts at the University. 540-551 - Rafael Almeida, Pedro Vieira-Marques, Ana Ferreira:
Patients to Mobilize Their Data: Secure and Flexible mHealth Delegation. 552-560 - David Jost, Mathias Fischer:
Accountant: Protection of Data Integrity and Identification of Malicious Nodes in In-network Data Processing. 561-568 - Tapiwa Gundu, Nthabiseng Modiba:
Building Competitive Advantage from Ubuntu: An African Information Security Awareness Model. 569-576 - Julian Lindenhofer, Rene Offenthaler, Martin Pirker:
A Curious Exploration of Malicious PDF Documents. 577-584 - Ziya Alper Genç, Gabriele Lenzini:
Dual-use Research in Ransomware Attacks: A Discussion on Ransomware Defence Intelligence. 585-592 - Iraklis Symeonidis, Gabriele Lenzini:
Systematization of Threats and Requirements for Private Messaging with Untrusted Servers: The Case of e-Mailing and Instant Messaging. 593-602 - Mohammad Qbea'h, Saed Alrabaee, Djedjiga Mouheb:
An Analytical Scanning Technique to Detect and Prevent the Transformed SQL Injection and XSS Attacks. 603-610 - Linda Guiga, A. W. Roscoe:
Neural Network Security: Hiding CNN Parameters with Guided Grad-CAM. 611-618 - Andikan Otung, Andrew P. Martin:
Distributed Defence of Service (DiDoS): A Network-layer Reputation-based DDoS Mitigation Architecture. 619-630 - Robert Hegarty, John Haggerty:
Presence Metadata in the Internet of Things: Challenges and Opportunities. 631-638 - Masahiro Ishii, Satoshi Matsuura, Kento Mori, Masahiko Tomoishi, Yong Jin, Yoshiaki Kitaguchi:
A Study of Classification of Texts into Categories of Cybersecurity Incident and Attack with Topic Models. 639-646 - Kouya Tochikubo:
New General Secret Sharing Scheme using Hierarchical Threshold Scheme: Improvement of Information Rates for Specified Participants. 647-654 - Giray Havur, Miel Vander Sande, Sabrina Kirrane:
Greater Control and Transparency in Personal Data Processing. 655-662 - Andrew Sundstrom, Damas W. Limoge, Vadim Pinskiy, Matthew Putman:
Securing Industrial Production from Sophisticated Cyberattacks. 663-670 - Steffen Pfrang, David Meier, Andreas Fleig, Jürgen Beyerer:
A Meta Model for a Comprehensive Description of Network Protocols Improving Security Tests. 671-682 - Piotr Krasnowski, Jérôme Lebrun, Bruno Martin:
Introducing a Verified Authenticated Key Exchange Protocol over Voice Channels for Secure Voice Communication. 683-690 - Jesse Daniels, Sajal Bhatia:
Legislation and the Negative Impact on Cybersecurity in Healthcare. 691-697 - Wataru Fujii, Keiichi Iwamura, Masaki Inamura:
Secure Comparison and Interval Test Protocols based on Three-party MPC. 698-704 - Simone Facchini, Giacomo Giorgi, Andrea Saracino, Gianluca Dini:
Multi-level Distributed Intrusion Detection System for an IoT based Smart Home Environment. 705-712 - Ge Chu, Alexei Lisitsa:
Ontology-based Automation of Penetration Testing. 713-720 - Seira Hidano, Shinsaku Kiyomoto:
Recommender Systems Robust to Data Poisoning using Trim Learning. 721-724 - Martin Jurecek, Róbert Lórencz:
Distance Metric Learning using Particle Swarm Optimization to Improve Static Malware Detection. 725-732 - Ismail Butun, Alexios Lekidis, Daniel Ricardo dos Santos:
Security and Privacy in Smart Grids: Challenges, Current Solutions and Future Opportunities. 733-741 - Andreas Thompson, Gencer Erdogan:
Tool Support for Risk-driven Planning of Trustworthy Smart IoT Systems within DevOps. 742-753 - Christophe Ponsard, Jeremy Grandclaudon, Nicolas Point:
Methodology and Feedback about Systematic Cybersecurity Experts Auditing in Belgium. 754-759
4th International Workshop on FORmal methods for Security Engineering
- Christian Colombo, Mark Vella:
Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification. 765-774 - Maxence Delong, Baptiste David, Eric Filiol:
Detection of Crawler Traps: Formalization and Implementation Defeating Protection on Internet and on the TOR Network. 775-783 - Sophie Lathouwers, Maarten H. Everts, Marieke Huisman:
Verifying Sanitizer Correctness through Black-Box Learning: A Symbolic Finite Transducer Approach. 784-795 - Joanna Moubarak, Eric Filiol, Maroun Chamoun:
The Blockchain Potential in Computer Virology. 796-803 - Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:
Android Run-time Permission Exploitation User Awareness by Means of Formal Methods. 804-814 - Cinzia Bernardeschi, Gianluca Dini, Maurizio Palmieri, Francesco Racciatti:
Analysis of Security Attacks in Wireless Sensor Networks: From UPPAAL to Castalia. 815-824 - Madalina G. Ciobanu, Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:
Accidental Sensitive Data Leaks Prevention via Formal Verification. 825-834 - Fabio Martinelli, Francesco Mercaldo, Domenico Raucci, Antonella Santone:
Bank Credit Risk Management based on Data Mining Techniques. 837-843 - Joanna Moubarak, Tony Feghali:
Comparing Machine Learning Techniques for Malware Detection. 844-851
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.