default search action
8th ICISSP 2022
- Paolo Mori, Gabriele Lenzini, Steven Furnell:
Proceedings of the 8th International Conference on Information Systems Security and Privacy, ICISSP 2022, Online Streaming, February 9-11, 2022. SCITEPRESS 2022, ISBN 978-989-758-553-1
Invited Speakers
- Awais Rashid:
Why Rigorous Underpinnings for Cyber Security Education and Training Matter? Experiences from CyBOK: The Cyber Security Body of Knowledge. ICISSP 2022: 5 - Pierangela Samarati:
Data Security and Privacy in Emerging Scenarios. ICISSP 2022: 7 - Norman M. Sadeh:
Why Usability Has Become Privacy's Biggest Challenge and What We Can Do About It. ICISSP 2022: 9
Papers
- Claudio Cilli, Giulio Magnanini, Lorenzo Manduca, Fabrizio Venettoni:
"Fake News Detector": An Automatic System for the Reliability Evaluation of Digital News. 15-24 - Arnaud Rosay, Eloïse Cheval, Florent Carlier, Pascal Leroux:
Network Intrusion Detection: A Comprehensive Analysis of CIC-IDS2017. 25-36 - Mohammad Anagreh, Peeter Laud, Eero Vainikko:
Privacy-preserving Parallel Computation of Shortest Path Algorithms with Low Round Complexity. 37-47 - Amir Naseredini, Stefan Gast, Martin Schwarzl, Pedro Miguel Sousa Bernardo, Amel Smajic, Claudio Canella, Martin Berger, Daniel Gruss:
Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks. 48-59 - Asma AlShuhail, Jianhue Shao:
Semantic Attack on Disassociated Transactions. 60-72 - Julius Hekkala, Kimmo Halunen, Visa Antero Vallivaara:
Implementing Post-quantum Cryptography for Developers. 73-83 - Emil Wåreus, Anton Duppils, Magnus Tullberg, Martin Hell:
Security Issue Classification for Vulnerability Management with Semi-supervised Learning. 84-95 - Engla Rencelj Ling, Mathias Ekstedt:
Estimating the Time-To-Compromise of Exploiting Industrial Control System Vulnerabilities. 96-107 - Per Fahlander, Mathias Ekstedt, Preetam Mukherjee, Ashish Kumar Dwivedi:
Containment Strategy Formalism in a Probabilistic Threat Modelling Framework. 108-120 - Rooya Karimnia, Kaie Maennel, Mahtab Shahin:
Culturally-sensitive Cybersecurity Awareness Program Design for Iranian High-school Students. 121-132 - Charnon Pattiyanon, Toshiaki Aoki:
Analysis and Enhancement of Self-sovereign Identity System Properties Compiling Standards and Regulations. 133-144 - Rohon Kundu, Alessandro De Piccoli, Andrea Visconti:
Public Key Compression and Fast Polynomial Multiplication for NTRU using the Corrected Hybridized NTT-Karatsuba Method. 145-153 - Md. Rashedur Rahman, Elizabeth Miller, Moinul Hossain, Aisha I. Ali-Gombe:
Intent-aware Permission Architecture: A Model for Rethinking Informed Consent for Android Apps. 154-164 - Leonardo Veronese, Francesco Palmarini, Riccardo Focardi, Flaminia L. Luccio:
A Fast and Cost-effective Design for FPGA-based Fuzzy Rainbow Tradeoffs. 165-176 - Tristan Carrier, Princy Victor, Ali Tekeoglu, Arash Habibi Lashkari:
Detecting Obfuscated Malware using Memory Feature Engineering. 177-188 - Héloïse Maurel, Santiago A. Vidal, Tamara Rezk:
Comparing the Detection of XSS Vulnerabilities in Node.js and a Multi-tier JavaScript-based Language via Deep Learning. 189-201 - Aslí Basak Civek, Cihangir Tezcan:
Differential-linear Attacks on Permutation Ciphers Revisited: Experiments on Ascon and DryGASCON. 202-209 - Luigi Catuogno, Clemente Galdi:
On Tracking Ransomware on the File System. 210-219 - Abbass Madi, Oana Stan, Renaud Sirdey, Cédric Gouy-Pailler:
SecTL: Secure and Verifiable Transfer Learning-based inference. 220-229 - David Werden, Matthew Muccioli, Anyi Liu:
TEEm: A Tangle-based Elastic Emulator for Storing Connected Vehicle Data in a Distributed Ledger Technology. 230-241 - Rudra Prasad Baksi, Shambhu J. Upadhyaya:
Game Theoretic Analysis of Ransomware: A Preliminary Study. 242-251 - Agnieszka Rucka, Wojciech Wodo:
On the LPSE Password Meter's Discrepancies among Different Datasets. 255-263 - Mohamad Nabeel, Christine Große:
Classifying COVID-19 Disinformation on Twitter using a Convolutional Neural Network. 264-272 - Jack R. Davies, Jianhua Shao:
Utility of Anonymised Data in Decision Tree Derivation. 273-280 - Paul Tavolato, Robert Luh, Sebastian Eresheim:
Formalizing Real-world Threat Scenarios. 281-289 - Matthew Lee, Joshua Sylvester, Sunjoli Aggarwal, Aviraj Sinha, Michael A. Taylor, Nathan Srirama, Eric C. Larson, Mitchell A. Thornton:
Side Channel Identification using Granger Time Series Clustering with Applications to Control Systems. 290-298 - Tian Wang, Masooda N. Bashir:
An Analysis of Cloud Certifications' Performance on Privacy Protections. 299-306 - Maryam Almarwani, Boris Konev, Alexei Lisitsa:
Efficient and Secure Encryption Adjustment for JSON Data. 307-313 - Anne Borcherding, Lukas Feldmann, Markus Karch, Ankush Meshram, Jürgen Beyerer:
Towards a Better Understanding of Machine Learning based Network Intrusion Detection Systems in Industrial Networks. 314-325 - Mari Aarland, Terje Gjøsæter:
Digital Supply Chain Vulnerabilities in Critical Infrastructure: A Systematic Literature Review on Cybersecurity in the Energy Sector. 326-333 - Anne Borcherding, Philipp Takacs, Jürgen Beyerer:
Cluster Crash: Learning from Recent Vulnerabilities in Communication Stacks. 334-344 - Valentin Kiechle, Matthias Börsig, Sven Nitzsche, Ingmar Baumgart, Jürgen Becker:
PREUNN: Protocol Reverse Engineering using Neural Networks. 345-356 - Shouki A. Ebad:
An Exploratory Study of Why UMLsec Is Not Adopted. 357-364 - Gregor Langner, Florian Skopik, Steven Furnell, Gerald Quirchmayr:
A Tailored Model for Cyber Security Education Utilizing a Cyber Range. 365-377 - Kris Heid, Tobias Tefke, Jens Heider, Ralf C. Staudemeyer:
Android Data Storage Locations and What App Developers Do with It from a Security and Privacy Perspective. 378-387 - Shengyuan Wen, Weiqing Sun:
SpamFender: A Semi-supervised Incremental Spam Classification System across Social Networks. 388-395 - Junhui Xiao, Ashish Neupane, Hiba F. Fayoumi, Weiqing Sun:
A Novel Key Exchange Protocol using Logic Algebra for the Factorization Problem. 396-403 - Melisa Gafic, Simon Tjoa, Peter Kieseberg, Otto Hellwig, Gerald Quirchmayr:
Cyber Exercises in Computer Science Education. 404-411 - Sachiko Kanamori, Hirotsune Sato, Naoya Tabata, Ryo Nojima:
Construction of a Support Tool for User Reading of Privacy Policies and Assessment of its User Impact. 412-419 - Shang-Wen Chen, Jian-Wei Liao, Chia-Wei Tien, Jung-Hsin Hsiao:
Impact of Cross-standard Cell Libraries on Machine Learning based Hardware Trojan Detection. 420-425 - Flora Barber, Steven Furnell:
Benchmarking Consumer Data and Privacy Knowledge in Connected and Autonomous Vehicles. 426-434 - Hesamodin Mohammadian, Arash Habibi Lashkari, Ali A. Ghorbani:
Evaluating Deep Learning-based NIDS in Adversarial Settings. 435-444 - Ghadeer I. Yassin, Lakshmish Ramaswamy:
Effective & Efficient Access Control in Smart Farms: Opportunities, Challenges & Potential Approaches. 445-452 - Adam Talbi, Arthur Viens, Louis-Clément Leroux, Morgane François, Mathias Caillol, Nga Nguyen:
Feature Importance and Deep Learning for Android Malware Detection. 453-462 - Nouf Al-Juaid, Alexei Lisitsa, Sven Schewe:
SMPG: Secure Multi Party Computation on Graph Databases. 463-471 - Joanne L. Hall, Jomin John, Jessica Liebig, Anju Skariah:
Age Bias in Finger Vein Biometric Research. 472-477 - Austris Uljans, Bernhards Blumbergs:
Industrial and Automation Control System Cyber Range Prototype for Offensive Capability Development. 478-490 - David Ott, Dennis Moreau, Manish Gaur:
Planning for Cryptographic Readiness in an Era of Quantum Computing Advancement. 491-498 - Sultan Alasmari, Weichao Wang, Yu Wang:
Incentivisation of Outsourced Network Testing: View from Platform Perspective. 499-506 - Abdullah Albalawi, Vassilios G. Vassilakis, Radu Calinescu:
Protecting Shared Virtualized Environments against Cache Side-channel Attacks. 507-514 - Özgü Can, Murat Osman Ünalir:
Revisiting Ontology Based Access Control: The Case for Ontology Based Data Access. 515-518 - Elsa Serret, Antoine Lesueur, Alban Gabillon:
Linguistic Steganography for Messaging Applications. 519-527 - Pablo Picazo-Sanchez, Maximilian Algehed, Andrei Sabelfeld:
DeDup.js: Discovering Malicious and Vulnerable Extensions by Detecting Duplication. 528-535 - Christophe Ponsard, Philippe Massonet:
Survey and Guidelines about Learning Cyber Security Risk Assessment. 536-543 - Vanessa Bracamonte, Takamasa Isohara:
Comparing Perception of Disclosure of Different Types of Information Related to Automated Tools. 544-550 - Jon Barton, William J. Buchanan, Nikolaos Pitropakis, Sarwar Sayeed, Will Abramson:
Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device. 551-561 - Maryam Issakhani, Princy Victor, Ali Tekeoglu, Arash Habibi Lashkari:
PDF Malware Detection based on Stacking Learning. 562-570 - Said Daoudagh, Eda Marchetti:
The GDPR Compliance and Access Control Systems: Challenges and Research Opportunities. 571-578 - Phil Demetriou, Ingolf Becker, Stephen Hailes:
Who Watches the Watchers: A Multi-Task Benchmark for Anomaly Detection. 579-586 - Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura:
Cyber Attack Stage Tracing System based on Attack Scenario Comparison. 587-594 - Robert Choudhury, Zhiyuan Luo, Khuong An Nguyen:
Malware in Motion. 595-602 - Isa Sertkaya, Öznur Kalkar:
Cryptanalysis of Some Electronic Checkbook Schemes. 603-612 - Dirk P. Snyman, Hennie A. Kruger:
The Role of Information Deserts in Information Security Awareness and Behaviour. 613-620 - Haytham Elmiligi, Sherif Saad:
iProfile: Collecting and Analyzing Keystroke Dynamics from Android Users. 621-628 - Alberto Magno Muniz Soares:
WhatsApp Web Client Live Forensics Technique. 629-636 - Thomas Lorünser, Florian Wohner, Stephan Krenn:
A Privacy-Preserving Auction Platform with Public Verifiability for Smart Manufacturing. 637-647 - Itzel Vázquez Sandoval, Gabriele Lenzini:
Can We Formally Catch Cheating in E-exams? 648-655 - Matan Davidian, Natalia Vanetik, Michael Kiperberg:
Ransomware Detection with Deep Neural Networks. 656-663
6th International Special Session on FORmal methods for Security Engineering
- Francesco Mercaldo, Fabio Martinelli, Antonella Santone, Vinod P.:
On the Influence of Image Settings in Deep Learning-based Malware Detection. 669-676 - Shun Yonamine, Yuzo Taenaka, Youki Kadobayashi:
Tamer: A Sandbox for Facilitating and Automating IoT Malware Analysis with Techniques to Elicit Malicious Behavior. 677-687 - Muhammad Ali, Monem Hamid, Jacob Jasser, Joachim Lerman, Samod Shetty, Fabio Di Troia:
Profile Hidden Markov Model Malware Detection and API Call Obfuscation. 688-695 - Hoseong Asher Lee, Nikhil Prathapani, Rajesh Paturi, Sarp Parmaksiz, Fabio Di Troia:
NLP-based User Authentication through Mouse Dynamics. 696-702
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.