default search action
2nd ICISSP 2016: Rome, Italy
- Olivier Camp, Steven Furnell, Paolo Mori:
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, Rome, Italy, February 19-21, 2016. SciTePress 2016, ISBN 978-989-758-167-0
Invited Speakers
Keynote Speakers
- Jason I. Hong:
Privacy, Ethics and Big Data. ICISSP 2016: 5 - Hans-Joachim Lenz:
Tax Fraud and Investigation Procedures - Everybody, Every Where, Every Time. ICISSP 2016: 7-8 - Edgar R. Weippl:
Ethics in Security Research. ICISSP 2016: 9
Papers
Full Papers
- Christoph Kerschbaumer, Sid Stamm, Stefan Brunthaler:
Injecting CSP for Fun and Security. 15-25 - Dominik Teubert, Fred Grossmann, Ulrike Meyer:
Anomaly-based Mobile Malware Detection: System Calls as Source for Features. 26-36 - Sylvestre Uwizeyemungu, Placide Poba-Nzaou:
Security and Privacy Practices in Healthcare Information Systems: A Cluster Analysis of European Hospitals. 37-45 - Nilakantha Paudel, Marco Querini, Giuseppe F. Italiano:
Handwritten Signature Verification for Mobile Phones. 46-52 - Toru Nakamura, Shinsaku Kiyomoto, Welderufael B. Tesfay, Jetzabel M. Serna:
Personalised Privacy by Default Preferences - Experiment and Analysis. 53-62 - Ana Ferreira, Gabriele Lenzini:
Comparing and Integrating Break-the-Glass and Delegation in Role-based Access Control for Healthcare. 63-73 - Kexin Qiao, Lei Hu, Siwei Sun:
Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques. 74-84 - Sebastian Bittl, Karsten Roscher:
Efficient Authorization Authority Certificate Distribution in VANETs. 85-96 - C. Shao, H. Li, G. Xu:
Quantitative Evaluation of Security on Cryptographic ICs against Fault Injection Attacks. 97-104 - Giuseppe Settanni, Florian Skopik, Yegor Shovgenya, Roman Fiedler:
A Collaborative Analysis System for Cross-organization Cyber Incident Handling. 105-116 - Simone Bossi, Tea Anselmo, Guido Bertoni:
On TLS 1.3 - Early Performance Analysis in the IoT Field. 117-125 - Ammar Abuelgasim, Anne Kayem:
An Approach to Personalized Privacy Policy Recommendations on Online Social Networks. 126-137 - Tim Wambach, Katharina Bräunlich:
Retrospective Study of Third-party Web Tracking. 138-145 - Wenting Li, Qingni Shen, Chuntao Dong, Yahui Yang, Zhonghai Wu:
DDHCS: Distributed Denial-of-service Threat to YARN Clusters based on Health Check Service. 146-156 - Cristina-Loredana Duta, Laura Gheorghe, Nicolae Tapus:
Performance Analysis of Real Time Implementations of Voice Encryption Algorithms using Blackfin Processors. 157-166 - Rafiullah Khan, Kieran McLaughlin, David M. Laverty, Sakir Sezer:
IEEE C37.118-2 Synchrophasor Communication Framework - Overview, Cyber Vulnerabilities Analysis and Performance Evaluation. 167-178 - Carsten Büttner, Sorin A. Huss:
An Anonymous Geocast Scheme for ITS Applications. 179-189
Short Papers
- Francesco Di Tria, Ezio Lefons, Filippo Tangorra:
Improving Database Security in Web-based Environments. 193-200 - Muhammad Imran Tariq, Vito Santarcangelo:
Analysis of ISO 27001: 2013 Controls Effectiveness for Cloud Computing. 201-208 - Nils Ulltveit-Moe, Steffen Pfrang, László Erdödi, Héctor Nebot:
Mitigating Local Attacks Against a City Traffic Controller. 209-218 - Gencer Erdogan, Ketil Stølen, Jan Øyvind Aagedal:
Evaluation of the CORAL Approach for Risk-driven Security Testing based on an Industrial Case Study. 219-226 - Daniela Pöhn:
Risk Management for Dynamic Metadata Exchange via a Trusted Third Party. 227-234 - Nobuyuki Sugio, Yasutaka Igarashi, Toshinobu Kaneko, Kenichi Higuchi:
A Practical-time Attack on Reduced-round MISTY1. 235-242 - Marius Georgescu, Hiroaki Hazeyama, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
The STRIDE Towards IPv6: A Comprehensive Threat Model for IPv6 Transition Technologies. 243-254 - Simon Broenner, Hans Höfken, Marko Schuba:
Streamlining Extraction and Analysis of Android RAM Images. 255-264 - Izzat Alsmadi, Dianxiang Xu, Jin-Hee Cho:
Interaction-based Reputation Model in Online Social Networks. 265-272 - Hiroya Susuki, Rie Shigetomi Yamaguchi, Shizuo Sakamoto:
Multi-factor Authentication Updating System Evaluation Dynamically for Service Continuity. 273-281 - Germain Jolly, Sylvain Vernois, Christophe Rosenberger:
An Observe-and-Detect Methodology for the Security and Functional Testing of Smart Card Applications. 282-289 - M. Lisa Mathews, Anupam Joshi, Tim Finin:
Detecting Botnets using a Collaborative Situational-aware IDPS. 290-298 - Radek Hranicky, Petr Matousek, Ondrej Rysavý, Vladimír Veselý:
Experimental Evaluation of Password Recovery in Encrypted Documents. 299-306 - Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet:
Tracking Explicit and Control Flows in Java and Native Android Apps Code. 307-316 - Tamir Lavi, Ehud Gudes:
Trust-based Dynamic RBAC. 317-324 - Cihangir Tezcan:
Truncated, Impossible, and Improbable Differential Analysis of ASCON. 325-332 - Phiwa Mzila:
Review Analysis of Properties for an Ideal Secure Biometric Template Scheme. 333-339 - Edwin T. L. Rampine, Cynthia H. Ngejane:
A Brief Overview of Hybrid Schemes for Biometric Fingerprint Template Security. 340-346 - Roman Graf, Sergiu Gordea, Heather M. Ryan, Tibaut Houzanme:
An Expert System for Facilitating an Institutional Risk Profile Definition for Cyber Situational Awareness. 347-354 - Julien Hatin, Estelle Cherrier, Jean-Jacques Schwartzmann, Vincent Frey, Christophe Rosenberger:
A Continuous LoA Compliant Trust Evaluation Method. 355-363 - Danping Shi, Lei Hu, Siwei Sun, Ling Song:
Linear(hull) Cryptanalysis of Round-reduced Versions of KATAN. 364-371 - Feno Heriniaina R.:
A Privacy Threat for Internet Users in Internet-censoring Countries. 372-379 - Cong Li, Qingni Shen, Kang Chen, Yahui Yang, Zhonghai Wu:
Whispers in the Cloud - A Covert Channel using the Result of Creating a Virtual Machine. 380-387 - Jaya Bhattacharjee, Anirban Sengupta, Chandan Mazumdar:
A Quantitative Methodology for Security Risk Assessment of Enterprise Business Processes. 388-399 - Ching-Nung Yang, Stelvio Cimato, Jihi-Han Wu, Song-Ruei Cai:
3-Out-of-n Cheating Prevention Visual Cryptographic Schemes. 400-406 - Gerard Draper-Gil, Arash Habibi Lashkari, Mohammad Saiful Islam Mamun, Ali A. Ghorbani:
Characterization of Encrypted and VPN Traffic using Time-related Features. 407-414 - Md. Selim Hossain, Ehsan Saeedi, Yinan Kong:
High-Performance FPGA Implementation of Elliptic Curve Cryptography Processor over Binary Field GF(2^163). 415-422 - Kang Chen, Qingni Shen, Cong Li, Yang Luo, Yahui Yang, Zhonghai Wu:
Sift - An Efficient Method for Co-residency Detection on Amazon EC2. 423-431 - Masahiro Ishii, Atsuo Inomata, Kazutoshi Fujikawa:
A Construction of a Twisted Ate Pairing on a Family of Kawazoe-Takahashi Curves at 192-bit Security Level and Its Cost Estimate. 432-439 - Gianluca Lax, Francesco Buccafurri, Serena Nicolazzo, Antonino Nocera, Lidia Fotia:
A New Approach for Electronic Signature. 440-447 - Anesu M. C. Marufu, Anne V. D. M. Kayem, Stephen D. Wolthusen:
Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids. 448-456 - Abdullah Al Balushi, Kieran McLaughlin, Sakir Sezer:
Contextual Intrusion Alerts for Scada Networks - An Ontology based Approach for Intrusion Alerts Post Processing. 457-464 - Peter Maynard, Kieran McLaughlin, Sakir Sezer:
Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction. 465-472 - Asim K. Pal, Subrata Bose, Arpita Maitra:
Collaborative Information Service - Privacy Algebra for User Defined Security. 473-481 - Elena Reshetova, Filippo Bonazzi, Thomas Nyman, Ravishankar Borgaonkar, N. Asokan:
Characterizing SEAndroid Policies in the Wild. 482-489 - Kurt Stenzel, Kuzman Katkalov, Marian Borek, Wolfgang Reif:
Declassification of Information with Complex Filter Functions. 490-497 - Nadia Jemil Abdu, Ulrike Lechner:
A Threat Analysis Model for Identity and Access Management. 498-502 - Jassim Happa, Graham Fairclough, Jason R. C. Nurse, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
A Pragmatic System-failure Assessment and Response Model. 503-508 - Christine Izuakor:
Understanding the Impact of Cyber Security Risks on Safety. 509-513 - Alessio Botta, Aniello Avallone, Mauro Garofalo, Giorgio Ventre:
Internet Streaming and Network Neutrality: Comparing the Performance of Video Hosting Services. 514-521 - Iman Sedeeq, Frans Coenen, Alexei Lisitsa:
A Statistical Approach to the Detection of HTML Attribute Permutation Steganography. 522-527 - Yogesh Bhanu, Sebastian Dännart, Henning von Kielpinski, Alexander Laux, Ulrike Lechner, Tobias Lehmann, Andreas Rieb, Martin Riedl, Florian Wolf:
A Cyberthreat Search Process and Service. 528-535 - Iraklis Symeonidis, Pagona Tsormpatzoudi, Bart Preneel:
Collateral Damage of Online Social Network Applications. 536-541 - Pasquale Battista, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio:
Identification of Android Malware Families with Model Checking. 542-547 - Hela Maddar, Wafa Kammoun, Omar Cheikhrouhou, Habib Youssef:
Lightweight Trust Model with High Longevity for Wireless Sensor Networks. 548-553 - Daniel D. Hein, Hossein Saiedian:
Predicting Attack Prone Software Components using Repository Mined Change Metrics. 554-563
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.