Sign in
ICISSP
2015
2018
2020
2023
2015
2023
Keyphrases
Publications
2023
Ashish Neupane
,
Weiqing Sun
Exploring False Demand Attacks in Power Grids with High PV Penetration.
ICISSP
(2023)
Daniel Reti
,
Karina Elzer
,
Hans Dieter Schotten
SCANTRAP: Protecting Content Management Systems from Vulnerability Scanners with Cyber Deception and Obfuscation.
ICISSP
(2023)
Ciarán Bryce
An Analysis of Cybersecurity Awareness Efforts for Swiss SMEs.
ICISSP
(2023)
Francisco Blas Izquierdo Riera
,
Magnus Almgren
,
Pablo Picazo-Sanchez
,
Christian Rohner
Clipaha: A Scheme to Perform Password Stretching on the Client.
ICISSP
(2023)
Jens Leicht
,
Maritta Heisel
P2BAC: Privacy Policy Based Access Control Using P-LPL.
ICISSP
(2023)
Hanwen Zhang
,
Wenyong Wang
,
Lisheng Huang
,
Junrui Wu
,
Fengjun Zhang
,
Kai Shi
Correlating Intrusion Detection with Attack Graph on Virtual Computer Networkings.
ICISSP
(2023)
Melanie Volkamer
Usable Security: Security 'Warnings' 2.0.
ICISSP
(2023)
Hiroki Okada
,
Kazuhide Fukushima
Revisiting the DFT Test in the NIST SP 800-22 Randomness Test Suite.
ICISSP
(2023)
Michael Kiperberg
,
Aleksei Rozman
,
Aleksei Kuraev
,
Nezer Zaidenberg
PDIFT: A Practical Dynamic Information-Flow Tracker.
ICISSP
(2023)
Maria Leitner
A Scenario-Driven Cyber Security Awareness Exercise Utilizing Dynamic Polling: Methodology and Lessons Learned.
ICISSP
(2023)
Günther R. Drevin
,
Dirk P. Snyman
,
Lynette Drevin
,
Hennie A. Kruger
,
Johann Allers
The Story of Safety Snail and Her e-Mail: A Digital Wellness and Cybersecurity Serious Game for Pre-School Children.
ICISSP
(2023)
Filip Lauterbach
,
Libor Michalek
,
Piotr Rydlichowski
,
Patrik Burdiak
,
Jaroslav Zdralek
,
Miroslav Voznák
Measurements of Cross-Border Quantum Key Distribution Link.
ICISSP
(2023)
Tomás Rabas
,
Jirí Bucek
,
Róbert Lórencz
SPA Attack on NTRU Protected Implementation with Sparse Representation of Private Key.
ICISSP
(2023)
Thorsten Stremlau
Protecting IoT Ecosystems and AI Leveraging TCG Standards.
ICISSP
(2023)
César Vásquez Flores
,
José Gonzales
,
Miranda Kajtazi
,
Joseph Bugeja
,
Bahtijar Vogel
Human Factors for Cybersecurity Awareness in a Remote Work Environment.
ICISSP
(2023)
Shaojie Chen
,
Bo Lang
,
Chong Xie
Fast-Flux Malicious Domain Name Detection Method Based on Domain Resolution Spatial Features.
ICISSP
(2023)
Ahmed Khoumsi
Automata-Based Study of Dynamic Access Control Policies.
ICISSP
(2023)
Alexandra Rocha
,
Rui Alves
,
Tiago Pedrosa
Query Log Analysis for SQL Injection Detection.
ICISSP
(2023)
Jonas Röckl
,
Adam Wagenhäuser
,
Tilo Müller
Veto: Prohibit Outdated Edge System Software from Booting.
ICISSP
(2023)
Yichao Wang
,
Budi Arief
,
Julio C. Hernandez-Castro
Dark Ending: What Happens when a Dark Web Market Closes down.
ICISSP
(2023)
Andreas Eipper
,
Daniela Pöhn
How to Design a Blue Team Scenario for Beginners on the Example of Brute-Force Attacks on Authentications.
ICISSP
(2023)
Filippo Galli
,
Sayan Biswas
,
Kangsoo Jung
,
Tommaso Cucinotta
,
Catuscia Palamidessi
Group Privacy for Personalized Federated Learning.
ICISSP
(2023)
Kaiying Luan
,
Ragnhild Halvorsrud
,
Costas Boletsis
Evaluation of a Tool to Increase Cybersecurity Awareness Among Non-experts (SME Employees).
ICISSP
(2023)
António Marques
,
Bruno Sousa
CHARRA-PM: An Attestation Approach Relying on the Passport Model.
ICISSP
(2023)
Philipp Hofer
,
Michael Roland
,
Philipp Schwarz
,
René Mayrhofer
Efficient Aggregation of Face Embeddings for Decentralized Face Recognition Deployments.
ICISSP
(2023)
Vanessa Bracamonte
,
Sebastian Pape
,
Sascha Löbner
Comparing the Effect of Privacy and Non-Privacy Social Media Photo Tools on Factors of Privacy Concern.
ICISSP
(2023)
Feiyang Tang
,
Bjarte M. Østvold
,
Magiel Bruntink
Identifying Personal Data Processing for Code Review.
ICISSP
(2023)
Francesco Antognazza
,
Alessandro Barenghi
,
Gerardo Pelosi
,
Ruggero Susella
An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes.
ICISSP
(2023)
George Teseleanu
Security Analysis of a Color Image Encryption Scheme Based on Dynamic Substitution and Diffusion Operations.
ICISSP
(2023)
Jace Kline
,
Prasad Kulkarni
A Framework for Assessing Decompiler Inference Accuracy of Source-Level Program Constructs.
ICISSP
(2023)
Yevhen Zolotavkin
,
Yurii Baryshev
,
Vitalii Lukichov
,
Jannik Mähn
,
Stefan Köpsell
Improving Unlinkability in C-ITS: A Methodology For Optimal Obfuscation.
ICISSP
(2023)
Pia Bauspieß
,
Lasse Vad
,
Håvard Myrekrok
,
Anamaria Costache
,
Jascha Kolberg
,
Christian Rathgeb
On the Feasibility of Fully Homomorphic Encryption of Minutiae-Based Fingerprint Representations.
ICISSP
(2023)
James R. Elste
,
David T. Croasdell
Cyber Teaching Hospitals: Developing Cyber Workforce Competence.
ICISSP
(2023)
Shintaro Narisada
,
Shohei Beppu
,
Kazuhide Fukushima
,
Shinsaku Kiyomoto
Concrete Quantum Circuits to Prepare Generalized Dicke States on a Quantum Machine.
ICISSP
(2023)
Zechariah Wolf
,
Eric Larson
,
Mitchell A. Thornton
Data Leakage in Isolated Virtualized Enterprise Computing Systems.
ICISSP
(2023)
Kostas Loumponias
,
Sotiris Raptis
,
Eleni Darra
,
Theodora Tsikrika
,
Stefanos Vrochidis
,
Ioannis Kompatsiaris
Forecasting Cyber-Attacks to Destination Ports Using Machine Learning.
ICISSP
(2023)
Elias Seid
,
Oliver Popov
,
Fredrik Blix
Towards Security Attack Event Monitoring for Cyber Physical-Systems.
ICISSP
(2023)
Anne Borcherding
,
Nikolay Penkov
,
Mark Giraud
,
Jürgen Beyerer
SWaTEval: An Evaluation Framework for Stateful Web Application Testing.
ICISSP
(2023)
Amélie Dieterich
,
Matthias Schopp
,
Lars Stiemert
,
Christoph Steininger
,
Daniela Pöhn
Evaluation of Persistence Methods Used by Malware on Microsoft Windows Systems.
ICISSP
(2023)
Nouf Al-Juaid
,
Alexei Lisitsa
,
Sven Schewe
Secure Joint Querying Over Federated Graph Databases Utilising SMPC Protocols.
ICISSP
(2023)
Alexandros Karakasidis
,
Vassilios Vassalos
On the Design of GDPR Compliant Workflows for Responsible Neuroimage Data Sharing.
ICISSP
(2023)
Lu Li
,
Guanling Zhao
,
Kai Shi
,
Fengjun Zhang
A Stochastic Game Model for Cloud Platform Security.
ICISSP
(2023)
Josef Kokes
,
Róbert Lórencz
On the Use of Multiple Approximations in the Linear Cryptanalysis of Baby Rijndael.
ICISSP
(2023)
Patrik Burdiak
,
Emir Dervisevic
,
Amina Tankovic
,
Filip Lauterbach
,
Jan Rozhon
,
Lukas Kapicak
,
Libor Michalek
,
Dzana Pivac
,
Merima Fehric
,
Enio Kaljic
,
Mirza Hamza
,
Miralem Mehic
,
Miroslav Voznák
Use-Case Denial of Service Attack on Actual Quantum Key Distribution Nodes.
ICISSP
(2023)
Harrison Bullock
,
Matthew Edwards
Temporal Constraints in Online Dating Fraud Classification.
ICISSP
(2023)
Paul Tavolato
,
Robert Luh
,
Sebastian Eresheim
A Game Theoretic Analysis of Cyber Threats.
ICISSP
(2023)
Kento Hasegawa
,
Seira Hidano
,
Kazuhide Fukushima
Automating XSS Vulnerability Testing Using Reinforcement Learning.
ICISSP
(2023)
Marcello Maugeri
,
Cristian Daniele
,
Giampaolo Bella
,
Erik Poll
Evaluating the Fork-Awareness of Coverage-Guided Fuzzers.
ICISSP
(2023)
Thanh Tran
,
Phu Nguyen
,
Gencer Erdogan
A Systematic Review of Secure IoT Data Sharing.
ICISSP
(2023)
Daniele Albanese
,
Rosangela Casolare
,
Giovanni Ciaramella
,
Giacomo Iadarola
,
Fabio Martinelli
,
Francesco Mercaldo
,
Marco Russodivito
,
Antonella Santone
StegWare: A Novel Malware Model Exploiting Payload Steganography and Dynamic Compilation.
ICISSP
(2023)