default search action
4th ICISSP 2018: Funchal, Portugal
- Paolo Mori, Steven Furnell, Olivier Camp:
Proceedings of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, Funchal, Madeira - Portugal, January 22-24, 2018. SciTePress 2018, ISBN 978-989-758-282-0
Invited Speakers
- David Jacoby:
Hacking the Security Industry for Fun and Profit and Humanity. ICISSP 2018: 5 - Ross Anderson:
Sustainable Security - an Internet of Durable Goods. ICISSP 2018: 7
Papers
- Christoph Stach:
Big Brother is Smart Watching You - Privacy Concerns about Health and Fitness Applications. 13-23 - Aleksandr Eremin, Konstantin Kogos:
Incoming Call Implicit User Authentication - User Authentication via Hand Movement Pattern. 24-29 - Christoph Stach, Bernhard Mitschang:
ACCESSORS - A Data-Centric Permission Model for the Internet of Things. 30-40 - Thomas Gougeon, Patrick Lacharme:
How to Break CaptchaStar. 41-51 - Constantinos Patsakis, Efthimios Alepis:
Knock-Knock: The Unbearable Lightness of Android Notifications. 52-61 - Abdullah Alshehri, Frans Coenen, Danushka Bollegala:
Spectral Analysis of Keystroke Streams: Towards Effective Real-time Continuous User Authentication. 62-73 - Sascha Alpers, Roman Pilipchuk, Andreas Oberweis, Ralf H. Reussner:
Identifying Needs for a Holistic Modelling Approach to Privacy Aspects in Enterprise Software Systems. 74-82 - Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan, Itzel Vázquez Sandoval:
A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System. 83-95 - Gaby G. Dagher, Praneeth Babu Marella, Matea Milojkovic, Jordan Mohler:
BroncoVote: Secure Voting System using Ethereum's Blockchain. 96-107 - Iman Sharafaldin, Arash Habibi Lashkari, Ali A. Ghorbani:
Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. 108-116 - Charles Morisset, David Sanchez:
VisABAC: A Tool for Visualising ABAC Policies. 117-126 - Lara Mauri, Stelvio Cimato, Ernesto Damiani:
A Comparative Analysis of Current Cryptocurrencies. 127-138 - Wei-Han Lee, Jorge Ortiz, Bongjun Ko, Ruby B. Lee:
Inferring Smartphone Users' Handwritten Patterns by using Motion Sensors. 139-148 - Vincent Haupert, Tilo Müller:
On App-based Matrix Code Authentication in Online Banking. 149-160 - Feten Ben Fredj, Nadira Lammari, Isabelle Comyn-Wattiau:
Relational Database Anonymization - A Model-driven Guiding Approach. 161-170 - Alexandre Ninassi, Sylvain Vernois, Christophe Rosenberger:
Privacy Compliant Multi-biometric Authentication on Smartphones. 173-181 - Ian Herwono, Fadi Ali El-Moussa:
Automated Detection of the Early Stages of Cyber Kill Chain. 182-189 - Wenbo Wang, Tianning Zang, Yuqing Lan:
The Rapid Extraction of Suspicious Traffic from Passive DNS. 190-198 - Marco Silva, António Nogueira, Paulo Salvador:
Modular Platform for Customer-Side Detection of BGP Redirection Attacks. 199-206 - Rainer Diesch, Matthias Pfaff, Helmut Krcmar:
Prerequisite to Measure Information Security - A State of the Art Literature Review. 207-215 - Christophe Rosenberger:
Evaluation of Biometric Template Protection Schemes based on a Transformation. 216-224 - Ana Ferreira, Pedro Manuel Vieira Marques:
Phishing Through Time: A Ten Year Story based on Abstracts. 225-232 - Matthias Hummer, Sebastian Groll, Michael Kunz, Ludwig Fuchs, Günther Pernul:
Measuring Identity and Access Management Performance - An Expert Survey on Possible Performance Indicators. 233-240 - Michael Meinig, Christoph Meinel:
Securing the Flow - Data Flow Analysis with Operational Node Structures. 241-250 - Martina J. Zucule de Barros, Horst Lazarek:
A Cyber Safety Model for Schools in Mozambique. 251-258 - Thiago Alves, Thomas H. Morris:
Hardware-based Cyber Threats. 259-266 - Denis Migdal, Christophe Rosenberger:
Towards a Personal Identity Code Respecting Privacy. 267-274 - Henrik Waagsnes, Nils Ulltveit-Moe:
Intrusion Detection System Test Framework for SCADA Systems. 275-285 - Kim Trong Nguyen, Cathel Zitzmann, Florent Retraint, Agnès Delahaies, Frédéric Morain-Nicolier, Hoai Phuong Nguyen:
Face Spoofing Detection for Smartphones using a 3D Reconstruction and the Motion Sensors. 286-291 - Onur Hakbilen, Piraveen Perinparajan, Michael Eikeland, Nils Ulltveit-Moe:
SAFEPASS - Presenting a Convenient, Portable and Secure Password Manager. 292-303 - Roman Graf, Ross King:
Cyber Threat Information Classification and Life Cycle Management using Smart Contracts. 304-311 - Mohamed Abomhara, Geir M. Køien, Vladimir A. Oleshchuk, Mohamed Hamid:
Towards Risk-aware Access Control Framework for Healthcare Information Sharing. 312-321 - Radja Badji, Fida Kamal Dankar:
A Risk-aware Access Control Model for Biomedical Research Platforms. 322-328 - Benoît Vibert, Christophe Charrier, Jean-Marie Le Bars, Christophe Rosenberger:
Towards an Optimal Template Reduction for Securing Embedded Fingerprint Devices. 329-336 - José Torres, Sergio de los Santos:
Malicious PDF Documents Detection using Machine Learning Techniques - A Practical Approach with Cloud Computing Applications. 337-344 - Asmaa El Kandoussi, Hanan El Bakkali:
Novel Access Control Approach for Inter-organizational Workflows. ICISSP 2018: 345-352 - Christina-Angeliki Toli, Bart Preneel:
Privacy-preserving Biometric Authentication Model for e-Finance Applications. 353-360 - Rumana Nazmul, Md. Rafiqul Islam, Ahsan Raja Chowdhury:
Alignment-free Cancellable Template Generation for Fingerprint based Authentication. 361-366 - Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Albina Orlando, Antonella Santone:
Who's Driving My Car? A Machine Learning based Approach to Driver Identification. 367-372 - Ohud Alqahtani, Zhiyuan Chen, Qiong Huang, Karthik Gottipati:
Is Bigger Safer? Analyzing Factors Related to Data Breaches using Publicly Available Information. ICISSP 2018: 373-378 - Alessandro Bacci, Alberto Bartoli, Fabio Martinelli, Eric Medvet, Francesco Mercaldo, Corrado Aaron Visaggio:
Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis. 379-385 - Markus Wurzenberger, Florian Skopik, Giuseppe Settanni, Roman Fiedler:
AECID: A Self-learning Anomaly Detection Approach based on Light-weight Log Parser Models. 386-397 - Ismini Vasileiou, Steven Furnell:
Enhancing Security Education - Recognising Threshold Concepts and Other Influencing Factors. 398-403 - Aaron Hunter, Ken Wong:
Decoy Systems with Low Energy Bluetooth Communication. 404-409 - Paul Calderon, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada:
Malware Detection based on HTTPS Characteristic via Machine Learning. 410-417 - Peter Maynard, Kieran McLaughlin, Sakir Sezer:
Using Application Layer Metrics to Detect Advanced SCADA Attacks. 418-425 - Christophe Ponsard, Jeremy Grandclaudon, Gautier Dallons:
Towards a Cyber Security Label for SMEs: A European Perspective -. 426-431 - Mona Hamidi, Mina Sheikhalishahi, Fabio Martinelli:
Secure Two-party Agglomerative Hierarchical Clustering Construction. 432-437 - Stefanie Jasser, Katja Tuma, Riccardo Scandariato, Matthias Riebisch:
Back to the Drawing Board - Bringing Security Constraints in an Architecture-centric Software Development Process. 438-446 - Nahla Aburawi, Alexei Lisitsa, Frans Coenen:
Querying Encrypted Graph Databases. 447-451 - Kaiyan Zheng, Peng Wang:
Encryption Schemes based on a Single Permutation: PCBC, POFB, PCFB and PCTR. 452-460 - Yuanyuan Gao, Kunpeng Wang:
Probability Preservation Property with Relative Error and Its Applications. 461-468 - Henrik Karlzén, Johan E. Bengtsson, Jonas Hallberg:
A Test of Structured Threat Descriptions for Information Security Risk Assessments. 469-476 - Günther Eibl, Sebastian Burkhart, Dominik Engel:
Unsupervised Holiday Detection from Low-resolution Smart Metering Data. 477-486 - Pedro Fortuna, Nuno Pereira, Ismail Butun:
A Framework for Web Application Integrity. 487-493 - Dilpreet Singh, Ron Ruhl, Hamman Samuel:
Attack Tree for Modelling Unauthorized EMV Card Transactions at POS Terminals. 494-502
2nd International Workshop on FORmal methods for Security Engineering
- Eric Filiol, J. Nicolas, Maxence Delong:
Statistical and Combinatorial Analysis of the TOR Routing Protocol - Structural Weaknesses Identified in the TOR Network. 507-516 - Alessandro Bacci, Fabio Martinelli, Eric Medvet, Francesco Mercaldo:
VizMal: A Visualization Tool for Analyzing the Behavior of Android Malware. 517-525 - Robert Luh, Marlies Temper, Simon Tjoa, Sebastian Schrittwieser:
APT RPG: Design of a Gamified Attacker/Defender Meta Model. 526-537 - Alexandre Dey, Loic Beheshti, Marie-Kerguelen Sido:
Health State of Google's PlayStore - Finding Malware in Large Sets of Applications from the Android Market. 538-544 - Jasper Huang, Fabio Di Troia, Mark Stamp:
Acoustic Gait Analysis using Support Vector Machines. 545-552 - Sravani Yajamanam, Vikash Raja Samuel Selvin, Fabio Di Troia, Mark Stamp:
Deep Learning versus Gist Descriptors for Image-based Malware Classification. 553-561 - Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Albina Orlando, Antonella Santone:
Cluster Analysis for Driver Aggressiveness Identification. 562-569 - Steffen Pfrang, David Meier, Michael Friedrich, Jürgen Beyerer:
Advancing Protocol Fuzzing for Industrial Automation and Control Systems. 570-580 - Oliver Eigner, Philipp Kreimel, Paul Tavolato:
Attacks on Industrial Control Systems - Modeling and Anomaly Detection. 581-588 - Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone:
Identifying Insecure Features in Android Applications using Model Checking. 589-596 - Prathiba Nagarajan, Fabio Di Troia, Thomas H. Austin, Mark Stamp:
Autocorrelation Analysis of Financial Botnet Traffic. 599-606
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.