default search action
9th ICISSP 2024: Rome, Italy
- Gabriele Lenzini, Paolo Mori, Steven Furnell:
Proceedings of the 10th International Conference on Information Systems Security and Privacy, ICISSP 2024, Rome, Italy, February 26-28, 2024. SCITEPRESS 2024, ISBN 978-989-758-683-5
Invited Speakers
- Cristina Alcaraz:
Safeguarding Industry 5.0 Ecosystems Through Digital Twins. ICISSP 2024: 5 - Mauro Conti:
Covert & Side Stories: Threats Evolution in Traditional and Modern Technologies. ICISSP 2024: 7 - Spyros Kokolakis:
Security, Privacy and the "Human Factor": Making Sense of the Paradoxes of Security and Privacy Behaviour. 9-11 - Thorsten P. Stremlau:
Integrating Post-Quantum Cryptography into Trusted Computing Group Standards. ICISSP 2024: 15
Management and Operations
- Tiago Heinrich, Newton Carlos Will, Rafael R. Obelheiro, Carlos Alberto Maziero:
Anywhere on Earth: A Look at Regional Characteristics of DRDoS Attacks. 21-29 - John McConnell, Yair Levy, Marti Snyder, Ling Wang:
The Role of Heuristics and Biases in Linux Server Administrators' Information Security Policy Compliance at Healthcare Organizations. 30-41 - Rauli Kaksonen, Kimmo Halunen, Marko Laakso, Juha Röning:
Automating IoT Security Standard Testing by Common Security Tools. 42-53 - Andreas Rüedlinger, Rebecca Klauser, Pavlos Lamprakis, Markus Happe, Bernhard Tellenbach, Onur Veyisoglu, Ariane Trammell:
FeedMeter: Evaluating the Quality of Community-Driven Threat Intelligence. 54-66 - Wanyu Hu, Vrizlynn L. L. Thing:
CPE-Identifier: Automated CPE Identification and CVE Summaries Annotation with Deep Learning and NLP. 67-78 - Arghavan Hosseinzadeh, Jessica Chwalek, Robin Brandstädter:
Policy-Driven XACML-Based Architecture for Dynamic Enforcement of Multiparty Computation. 81-89 - Bernard McWeeney, Ilya Mudritskiy, Renaat Verbruggen:
Analysis of Payload Confidentiality for the IoT/ LPWAN Technology 'Lora'. 90-102 - Sylvain Guérin, Joël Champeau, Salvador Martínez, Raúl Mazo:
Security Contracts a Property-Based Approach to Support Security Patterns. 103-111 - Tony Delvecchio, Sander Zeijlemaker, Giancarlo De Bernardis, Michael Siegel:
Revolutionizing Board Cyber-Risk Management Using Collaborative Gaming. 112-119 - Ariane Trammell, Benjamin Gehring, Marco Isele, Yvo Spielmann, Valentin Zahnd:
Towards Automated Information Security Governance. 120-127 - Luca Pöhler, Marko Schuba, Tim Hoener, Sacha Hack, Georg Neugebauer:
An Open-Source Approach to OT Asset Management in Industrial Environments. 128-136 - Josefin Andersson, Elias Seid:
The Classification and Impact of Cyber Attacks Targeting Critical Service Providers. 137-145 - Claudia Lanza, Abdelkader Lahmadi, Fabian Osmond:
An Empirical Study of Ransomware Vulnerabilities Descriptions. 146-153 - Borna Kalhor, Sanchari Das:
Evaluating the Security and Privacy Risk Postures of Virtual Assistants. 154-161 - Dakouri Gazo, Asma Patel, Mohammad Hasan:
Effectiveness of Malware Incident Management in Security Operations Centres: Trends, Challenges and Research Directions. 162-169 - Vimal Kumar, Juliette Mayo, Khadija Bahiss:
ADMIn: Attacks on Dataset, Model and Input: A Threat Model for AI Based Software. 170-178 - Eliana Stavrou, Andriani Piki, Panayiotis Varnava:
Merging Policy and Practice: Crafting Effective Social Engineering Awareness-Raising Policies. 179-186 - Eirik Lien, Karl Magnus Grønning Bergh, Sokratis K. Katsikas:
Perceptions of Cyber Security Risk of the Norwegian Advanced Metering Infrastructure. 187-194 - Arunab Singh, Maryam Tanha, Yashsvi Girdhar, Aaron Hunter:
Interpretable Android Malware Detection Based on Dynamic Analysis. 195-202 - Mohammed Jawed, Sriram Parameshwaran, Nitesh Kumar, Anand Handa, Sandeep K. Shukla:
ArkThor: Threat Categorization Based on Malware's C2 Communication. 203-210 - Paul Tavolato, Robert Luh, Sebastian Eresheim, Simon Gmeiner, Sebastian Schrittwieser:
Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process. 211-218 - Farida Eleshin, Patrick Iradukunda, David Ishimwe Ruberamitwe, Eric Ishimwe:
Your Robot Might Be Inadvertently or Deliberately Spying on You: A Critical Analysis of Privacy Practices in the Robotics Industry. 219-225 - William J. Buchanan, Sam Grierson, Daniel Uribe:
Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode. 226-233 - Daniel Köhler, Christoph Meinel:
The Right Tool for the Job: Contextualization of Cybersecurity Education and Assessment Methods. 234-241 - Elias Seid, Oliver Popov, Fredrik Blix:
An Automated Adaptive Security Framework for Cyber-Physical Systems. 242-253 - Nezer Jacob Zaidenberg, Michael Kiperberg, Eliav Menachi, Asaf Eitani:
Detecting eBPF Rootkits Using Virtualization and Memory Forensics. 254-261 - Aseel Aldabjan, Steven Furnell, Xavier Carpent, Maria Papadaki:
Cybersecurity Incident Response Readiness in Organisations. 262-269
Applications and Services
- Tiago Heinrich, Newton Carlos Will, Rafael R. Obelheiro, Carlos Alberto Maziero:
A Categorical Data Approach for Anomaly Detection in WebAssembly Applications. 275-284 - Beatrix Koltai, András Gazdag, Gergely Ács:
Supporting CAN Bus Anomaly Detection with Correlation Data. 285-296 - Gabriel A. Morales, Farhan Tajwar Romit, Adam Bienek-Parrish, Patrick Jenkins, Rocky Slavin:
IoT Device Classification Using Link-Level Features for Traditional Machine Learning and Large Language Models. 297-308 - Nahid Ferdous Aurna, Md Delwar Hossain, Hideya Ochiai, Yuzo Taenaka, Latifur Khan, Youki Kadobayashi:
Banking Malware Detection: Leveraging Federated Learning with Conditional Model Updates and Client Data Heterogeneity. 309-319 - Michele Guerra, Roberto Milanese, Michele Deodato, Vittorio Perozzi, Fausto Fasano:
Visual Attention and Privacy Indicators in Android: Insights from Eye Tracking. 320-329 - Ophelia Prillard, Costas Boletsis, Shukun Tokas:
Ethical Design for Data Privacy and User Privacy Awareness in the Metaverse. 333-341 - Antonio Maci, Giuseppe Urbano, Antonio Coscia:
Deep Q-Networks for Imbalanced Multi-Class Malware Classification. 342-349 - David Debono, Aleandro Sultana:
Desktop Crypto Wallets: A Digital Forensic Investigation and Analysis of Remnants and Traces on end-User Machines. 350-357 - Changwei Liu, Louis DiValentin, Aolin Ding, Malek Ben Salem:
Build a Computationally Efficient Strong Defense Against Adversarial Example Attacks. 358-365 - Thanawat Tejapijaya, Prarinya Siritanawan, Karin Sumongkayothin, Kazunori Kotani:
Botnet Detection by Integrating Multiple Machine Learning Models. 366-373 - Chun-Shien Lu, Chao-Hsuan Lin:
Robust Image Deepfake Detection with Perceptual Hashing. 374-378 - Kunlong Liu, Trinabh Gupta:
Federated Learning with Differential Privacy and an Untrusted Aggregator. 379-389 - Kagan Özgün, Ayse Tosun, Mehmet Tahir Sandikkaya:
A Recommender System to Detect Distributed Denial of Service Attacks with Network and Transport Layer Features. 390-397 - Stephan Spitz, Alexander Lawall:
Silicon-Integrated Security Solutions Driving IoT Security. 398-402 - Kento Hasegawa, Katsutoshi Hanahara, Hiroshi Sugisaki, Minoru Kozu, Kazuhide Fukushima, Yosuke Murakami, Shinsaku Kiyomoto:
Vulnerability Information Sharing Platform for Securing Hardware Supply Chains. 403-410 - Visakh K. Vijayan, Maria Francis, Kotaro Kataoka:
Off-Chaining Approaches for Cost-Efficiency in Threshold-Based Elliptic Curve Systems over Blockchains. 411-422 - Muhammad Ali Farooq, Syed Muhammad Fasih Ul Hassan, Muhammad Umer Farooq, Abid Rafique:
High Throughput Neural Network for Network Intrusion Detection on FPGAs: An Algorithm-Architecture Interaction. ICISSP 2024: 423-429 - Ahmet Aksoy, Sundeep Varma, Ganesha Moorthy, Enya Pan, Gorkem Kar:
Comparative Analysis of Feature Selection Algorithms for Automated IoT Device Fingerprinting. 430-437 - Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Luca Petrillo, Antonella Santone:
Cybersecurity-Related Tweet Classification by Explainable Deep Learning. 438-445 - Marcello Maugeri:
Fuzzing Matter(s): A White Paper for Fuzzing the Matter Protocol. 446-451 - Dmitry Levshun, Dmitry Vesnin:
Exploring BERT for Predicting Vulnerability Categories in Device Configurations. 452-461
Technologies and Foundations
- George Teseleanu:
Security Analysis of an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map. 467-473 - Newton Carlos Will, Carlos Alberto Maziero:
Enclave Management Models for Safe Execution of Software Components. 474-485 - Majid Lotfian Delouee, Victoria Degeler, Peter Amthor, Boris Koldehofe:
APP-CEP: Adaptive Pattern-Level Privacy Protection in Complex Event Processing Systems. 486-497 - Huynh Phuong Thanh Nguyen, Zhi Chen, Kento Hasegawa, Kazuhide Fukushima, Razvan Beuran:
PenGym: Pentesting Training Framework for Reinforcement Learning Agents. 498-509 - Ryo Meguro, Hiroya Kato, Shintaro Narisada, Seira Hidano, Kazuhide Fukushima, Takuo Suganuma, Masahiro Hiji:
Gradient-Based Clean Label Backdoor Attack to Graph Neural Networks. 510-521 - Antoine Stevan, Thomas Lavaur, Jérôme Lacan, Jonathan Detchart, Tanguy Pérennou:
Performance Evaluation of Polynomial Commitments for Erasure Code Based Information Dispersal. 522-533 - Shusaku Uemura, Kazuhide Fukushima:
Feasibility of Random Forest with Fully Homomorphic Encryption Applied to Network Data. 534-545 - Anjali Pare, Prasad A. Kulkarni:
Exploring Errors in Binary-Level CFG Recovery. 546-557 - Philipp Jakubeit, Andreas Peter, Maarten van Steen:
RoomKey: Extracting a Volatile Key with Information from the Local WiFi Environment Reconstructable Within a Designated Area. 558-569 - Pavel Chikul, Hayretdin Bahsi, Olaf Maennel:
The Design and Implementation of a Semantic Web Framework for the Event-Centric Digital Forensics Analysis. 570-581 - Amir Zarei, Staal Amund Vinterbo:
Secure Multiparty Computation of the Laplace Mechanism. 582-593 - Brian Goncalves, Atefeh Mashatan:
Towards Generalized Diffie-Hellman-esque Key Agreement via Generic Split KEM Construction. 594-608 - Seo-Yi Kim, Il-Gu Lee:
LSTM Autoencoder-Based Insider Abnormal Behavior Detection Using De-Identified Data. 609-620 - Amitesh Singh Rajput, Arnav Agrawal:
Blockchain for Privacy-Preserving Data Distribution in Healthcare. 621-631 - Ali Ahmed, Victor Ungureanu, Tarek Gaber, Craig A. Watterson, Fatma Masmoudi:
Smart Home Privacy: A Scoping Review. ICISSP 2024: 635-642 - Jackie Scott, Yair Levy, Wei Li, Ajoy Kumar:
Comparing Phishing Training and Campaign Methods for Mitigating Malicious Emails in Organizations. 643-651 - Paul R. B. Houssel, Luis A. Leiva:
User Re-Authentication via Mouse Movements and Recurrent Neural Networks. 652-659 - Arastoo Bozorgi, Mahya Soleimani Jadidi, Jonathan Anderson:
UPSS: A Global, Least-Privileged Storage System with Stronger Security and Better Performance. 660-671 - Ali Dogan, Kemal Bicakci:
KAIME: Central Bank Digital Currency with Realistic and Modular Privacy. 672-681 - Katerina Macková, Dominik Benk, Martin Srotýr:
Enhancing Cybersecurity Through Comparative Analysis of Deep Learning Models for Anomaly Detection. ICISSP 2024: 682-690 - Andre Büttner, Nils Gruschka:
Evaluating the Influence of Multi-Factor Authentication and Recovery Settings on the Security and Accessibility of User Accounts. 691-700 - Mariam Moustafa, Arto Niemi, Philip Ginzboorg, Jan-Erik Ekberg:
Attestation with Constrained Relying Party. 701-708 - Ryosuke Kobayashi, Rie Shigetomi Yamaguchi:
Forgery Resistance of User Authentication Methods Using Location, Wi-Fi and Their Correlation. 709-716 - Stefano Ribes, Fabio Malatesta, Grazia Garzo, Alessandro Palumbo:
Machine Learning-Based Classification of Hardware Trojans in FPGAs Implementing RISC-V Cores. 717-724 - Cédrick De Pauw, Jan Tobias Mühlberg, Jean-Michel Dricot:
An Improved PUF-Based Privacy-Preserving IoT Protocol for Cloud Storage. 725-732 - Alia Umrani, Apurva K. Vangujar, Paolo Palmieri:
Anonymous Multi-Receiver Certificateless Hybrid Signcryption for Broadcast Communication. 733-744 - George Teseleanu:
Security Analysis of an Image Encryption Scheme Based on a New Secure Variant of Hill Cipher and 1D Chaotic Maps. 745-749 - Luca Patzelt, Georg Neugebauer, Meik Döll, Sacha Hack, Tim Hoener, Marko Schuba:
A Framework for E2E Audit Trails in System Architectures of Different Enterprise Classes. 750-757 - Marcus Gelderie, Maximilian Luff, Lukas Brodschelm:
Differential Privacy for Distributed Traffic Monitoring in Smart Cities. 758-765 - Lukas Brodschelm, Marcus Gelderie:
Using ILP to Learn AppArmor Policies. 766-773 - Philippe Valoggia, Anastasia Sergeeva, Arianna Rossi, Marietjie Botes:
Learning from the Dark Side About How (not) to Engineer Privacy: Analysis of Dark Patterns Taxonomies from an ISO 29100 Perspective. 774-784 - Jan Hintz, Jacob Rühe, Ingo Siegert:
AnonEmoFace: Emotion Preserving Facial Anonymization. 785-788 - Jackson Barreto, Paulina Rutecka, Karina Cicha, Pedro Pinto:
The Status and Management of Web-Related Security at Higher Education Institutions in Poland. 789-798 - Olive Chakraborty, Aymen Boudguiga:
A Decentralized Federated Learning Using Reputation. 799-806 - Justine Paillet, Olive Chakraborty, Marina Checri:
Pure Multi Key BGV Implementation. 807-814 - Fabrizia Marrucco, Mosabbah Mushir Ahmed, Bechir Bouali, Alieeldin Mady:
EMplifier: Hybrid Electromagnetic Probe for Side Channel and Fault Injection Analysis. 815-822 - Md. Mahbubur Rahman, Md Delwar Hossain, Hideya Ochiai, Youki Kadobayashi, Tanjim Sakib, Syed Taha Yeasin Ramadan:
Vision Based Malware Classification Using Deep Neural Network with Hybrid Data Augmentation. 823-830 - Mario Raciti:
Conceptualising an Anti-Digital Forensics Kill Chain for Smart Homes. 831-837 - Fatema Rashid, Ali Miri, Atefeh Mashatan:
PETRIoT - A Privacy Enhancing Technology Recommendation Framework for IoT Computing. 838-844 - Narges Alipourjeddi, Ali Miri:
Preserving Privacy in High-Dimensional Data Publishing. 845-852 - Ryousuke Wakabayashi, Lihua Wang, Ryo Nojima, Atsushi Waseda:
Security Evaluation of Decision Tree Meets Data Anonymization. 853-860 - Ye-Sol Oh, Yeon-Ji Lee, Jiwon Jang, Hyunwoo Choi, Il-Gu Lee:
Implementation and Analysis of Covert Channel Using iBeacon. 861-868 - Sally Bagheri, Andreas Jacobsson, Paul Davidsson:
Smart Homes as Digital Ecosystems: Exploring Privacy in IoT Contexts. 869-877 - Andrea Migliore, Stelvio Cimato, Gabriella Trucco:
Efficient Secure Computation of Edit Distance on Genomic Data. 878-883 - Cihangir Tezcan:
GPU-Based Brute Force Cryptanalysis of KLEIN. 884-889 - Martin Pirker, Robert Haas:
A Brief Reflection on Trusted Platform Module Support. 890-898 - Julia Mader, Thomas Lorünser:
Feasibility of Privacy Preserving Minutiae-Based Fingerprint Matching. 899-906 - Evangelia Vanezi, Georgia M. Kapitsaki, Anna Philippou:
What's Your Purpose? An Approach to Incorporating GDPR Purposes into Requirements Analysis. 907-914
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.