Login / Signup
ICISSP
2015
2018
2021
2024
2015
2024
Keyphrases
Publications
2024
Martin Pirker
,
Robert Haas
A Brief Reflection on Trusted Platform Module Support.
ICISSP
(2024)
Michele Guerra
,
Roberto Milanese
,
Michele Deodato
,
Vittorio Perozzi
,
Fausto Fasano
Visual Attention and Privacy Indicators in Android: Insights from Eye Tracking.
ICISSP
(2024)
Andrea Migliore
,
Stelvio Cimato
,
Gabriella Trucco
Efficient Secure Computation of Edit Distance on Genomic Data.
ICISSP
(2024)
Daniel Köhler
,
Christoph Meinel
The Right Tool for the Job: Contextualization of Cybersecurity Education and Assessment Methods.
ICISSP
(2024)
Newton Carlos Will
,
Carlos Alberto Maziero
Enclave Management Models for Safe Execution of Software Components.
ICISSP
(2024)
Dakouri Gazo
,
Asma Patel
,
Mohammad Hasan
Effectiveness of Malware Incident Management in Security Operations Centres: Trends, Challenges and Research Directions.
ICISSP
(2024)
Amitesh Singh Rajput
,
Arnav Agrawal
Blockchain for Privacy-Preserving Data Distribution in Healthcare.
ICISSP
(2024)
Arghavan Hosseinzadeh
,
Jessica Chwalek
,
Robin Brandstädter
Policy-Driven XACML-Based Architecture for Dynamic Enforcement of Multiparty Computation.
ICISSP
(2024)
Farida Eleshin
,
Patrick Iradukunda
,
David Ishimwe Ruberamitwe
,
Eric Ishimwe
Your Robot Might Be Inadvertently or Deliberately Spying on You: A Critical Analysis of Privacy Practices in the Robotics Industry.
ICISSP
(2024)
Bernard McWeeney
,
Ilya Mudritskiy
,
Renaat Verbruggen
Analysis of Payload Confidentiality for the IoT/ LPWAN Technology 'Lora'.
ICISSP
(2024)
Seo-Yi Kim
,
Il-Gu Lee
LSTM Autoencoder-Based Insider Abnormal Behavior Detection Using De-Identified Data.
ICISSP
(2024)
Vimal Kumar
,
Juliette Mayo
,
Khadija Bahiss
ADMIn: Attacks on Dataset, Model and Input: A Threat Model for AI Based Software.
ICISSP
(2024)
Spyros Kokolakis
Security, Privacy and the "Human Factor": Making Sense of the Paradoxes of Security and Privacy Behaviour.
ICISSP
(2024)
Ali Dogan
,
Kemal Bicakci
KAIME: Central Bank Digital Currency with Realistic and Modular Privacy.
ICISSP
(2024)
Giacomo Iadarola
,
Fabio Martinelli
,
Francesco Mercaldo
,
Luca Petrillo
,
Antonella Santone
Cybersecurity-Related Tweet Classification by Explainable Deep Learning.
ICISSP
(2024)
Tiago Heinrich
,
Newton Carlos Will
,
Rafael R. Obelheiro
,
Carlos Alberto Maziero
Anywhere on Earth: A Look at Regional Characteristics of DRDoS Attacks.
ICISSP
(2024)
Fabrizia Marrucco
,
Mosabbah Mushir Ahmed
,
Bechir Bouali
,
Alieeldin Mady
EMplifier: Hybrid Electromagnetic Probe for Side Channel and Fault Injection Analysis.
ICISSP
(2024)
Antonio Maci
,
Giuseppe Urbano
,
Antonio Coscia
Deep Q-Networks for Imbalanced Multi-Class Malware Classification.
ICISSP
(2024)
Josefin Andersson
,
Elias Seid
The Classification and Impact of Cyber Attacks Targeting Critical Service Providers.
ICISSP
(2024)
Jackson Barreto
,
Paulina Rutecka
,
Karina Cicha
,
Pedro Pinto
The Status and Management of Web-Related Security at Higher Education Institutions in Poland.
ICISSP
(2024)
Amir Zarei
,
Staal Amund Vinterbo
Secure Multiparty Computation of the Laplace Mechanism.
ICISSP
(2024)
Fatema Rashid
,
Ali Miri
,
Atefeh Mashatan
PETRIoT - A Privacy Enhancing Technology Recommendation Framework for IoT Computing.
ICISSP
(2024)
Cédrick De Pauw
,
Jan Tobias Mühlberg
,
Jean-Michel Dricot
An Improved PUF-Based Privacy-Preserving IoT Protocol for Cloud Storage.
ICISSP
(2024)
Stefano Ribes
,
Fabio Malatesta
,
Grazia Garzo
,
Alessandro Palumbo
Machine Learning-Based Classification of Hardware Trojans in FPGAs Implementing RISC-V Cores.
ICISSP
(2024)
Chun-Shien Lu
,
Chao-Hsuan Lin
Robust Image Deepfake Detection with Perceptual Hashing.
ICISSP
(2024)
Majid Lotfian Delouee
,
Victoria Degeler
,
Peter Amthor
,
Boris Koldehofe
APP-CEP: Adaptive Pattern-Level Privacy Protection in Complex Event Processing Systems.
ICISSP
(2024)
Evangelia Vanezi
,
Georgia M. Kapitsaki
,
Anna Philippou
What's Your Purpose? An Approach to Incorporating GDPR Purposes into Requirements Analysis.
ICISSP
(2024)
Mohammed Jawed
,
Sriram Parameshwaran
,
Nitesh Kumar
,
Anand Handa
,
Sandeep K. Shukla
ArkThor: Threat Categorization Based on Malware's C2 Communication.
ICISSP
(2024)
Narges Alipourjeddi
,
Ali Miri
Preserving Privacy in High-Dimensional Data Publishing.
ICISSP
(2024)
Mariam Moustafa
,
Arto Niemi
,
Philip Ginzboorg
,
Jan-Erik Ekberg
Attestation with Constrained Relying Party.
ICISSP
(2024)
Md. Mahbubur Rahman
,
Md Delwar Hossain
,
Hideya Ochiai
,
Youki Kadobayashi
,
Tanjim Sakib
,
Syed Taha Yeasin Ramadan
Vision Based Malware Classification Using Deep Neural Network with Hybrid Data Augmentation.
ICISSP
(2024)
Antoine Stevan
,
Thomas Lavaur
,
Jérôme Lacan
,
Jonathan Detchart
,
Tanguy Pérennou
Performance Evaluation of Polynomial Commitments for Erasure Code Based Information Dispersal.
ICISSP
(2024)
Anjali Pare
,
Prasad A. Kulkarni
Exploring Errors in Binary-Level CFG Recovery.
ICISSP
(2024)
Lukas Brodschelm
,
Marcus Gelderie
Using ILP to Learn AppArmor Policies.
ICISSP
(2024)
Andre Büttner
,
Nils Gruschka
Evaluating the Influence of Multi-Factor Authentication and Recovery Settings on the Security and Accessibility of User Accounts.
ICISSP
(2024)
Luca Patzelt
,
Georg Neugebauer
,
Meik Döll
,
Sacha Hack
,
Tim Hoener
,
Marko Schuba
A Framework for E2E Audit Trails in System Architectures of Different Enterprise Classes.
ICISSP
(2024)
Ryo Meguro
,
Hiroya Kato
,
Shintaro Narisada
,
Seira Hidano
,
Kazuhide Fukushima
,
Takuo Suganuma
,
Masahiro Hiji
Gradient-Based Clean Label Backdoor Attack to Graph Neural Networks.
ICISSP
(2024)
Shusaku Uemura
,
Kazuhide Fukushima
Feasibility of Random Forest with Fully Homomorphic Encryption Applied to Network Data.
ICISSP
(2024)
Elias Seid
,
Oliver Popov
,
Fredrik Blix
An Automated Adaptive Security Framework for Cyber-Physical Systems.
ICISSP
(2024)
Pavel Chikul
,
Hayretdin Bahsi
,
Olaf Maennel
The Design and Implementation of a Semantic Web Framework for the Event-Centric Digital Forensics Analysis.
ICISSP
(2024)
Paul R. B. Houssel
,
Luis A. Leiva
User Re-Authentication via Mouse Movements and Recurrent Neural Networks.
ICISSP
(2024)
Eliana Stavrou
,
Andriani Piki
,
Panayiotis Varnava
Merging Policy and Practice: Crafting Effective Social Engineering Awareness-Raising Policies.
ICISSP
(2024)
Kagan Özgün
,
Ayse Tosun
,
Mehmet Tahir Sandikkaya
A Recommender System to Detect Distributed Denial of Service Attacks with Network and Transport Layer Features.
ICISSP
(2024)
Sylvain Guérin
,
Joël Champeau
,
Salvador Martínez
,
Raúl Mazo
Security Contracts a Property-Based Approach to Support Security Patterns.
ICISSP
(2024)
William J. Buchanan
,
Sam Grierson
,
Daniel Uribe
Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode.
ICISSP
(2024)
Arunab Singh
,
Maryam Tanha
,
Yashsvi Girdhar
,
Aaron Hunter
Interpretable Android Malware Detection Based on Dynamic Analysis.
ICISSP
(2024)
Luca Pöhler
,
Marko Schuba
,
Tim Hoener
,
Sacha Hack
,
Georg Neugebauer
An Open-Source Approach to OT Asset Management in Industrial Environments.
ICISSP
(2024)
Beatrix Koltai
,
András Gazdag
,
Gergely Ács
Supporting CAN Bus Anomaly Detection with Correlation Data.
ICISSP
(2024)
Claudia Lanza
,
Abdelkader Lahmadi
,
Fabian Osmond
An Empirical Study of Ransomware Vulnerabilities Descriptions.
ICISSP
(2024)
Alia Umrani
,
Apurva K. Vangujar
,
Paolo Palmieri
Anonymous Multi-Receiver Certificateless Hybrid Signcryption for Broadcast Communication.
ICISSP
(2024)