default search action
13th CRiSIS 2018: Arcachon, France
- Akka Zemmari, Mohamed Mosbah, Nora Cuppens-Boulahia, Frédéric Cuppens:
Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11391, Springer 2019, ISBN 978-3-030-12142-6 - Vetle Volden-Freberg, Gencer Erdogan:
An Empirical Study on the Comprehensibility of Graphical Security Risk Models Based on Sequence Diagrams. 1-17 - Fabien Patrick Viertel, Fabian Kortum, Leif Wagner, Kurt Schneider:
Are Third-Party Libraries Secure? A Software Library Checker for Java. 18-34 - Lyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens:
A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control Systems. 35-40 - Hervé Chabanne, Julien Keuffer, Emmanuel Prouff:
Outsourcing Signatures of Confidential Documents. 41-47 - Wafa Abdelghani, Corinne Amel Zayani, Ikram Amous, Florence Sèdes:
Trust Evaluation Model for Attack Detection in Social Internet of Things. 48-64 - Ivan Marco Lobe Kome, Nora Cuppens-Boulahia, Frédéric Cuppens, Vincent Frey:
A Certificate-Less Key Exchange Protocol for IoT. 65-79 - Alberto Bartoli, Andrea De Lorenzo, Eric Medvet, Fabiano Tarlao:
Personalized, Browser-Based Visual Phishing Detection Based on Deep Learning. 80-85 - Shweta Saharan, Vijay Laxmi, Manoj Singh Gaur, Akka Zemmari:
Privacy Preserving Data Offloading Based on Transformation. 86-92 - Eman Salem Alashwali, Pawel Szalachowski:
DSTC: DNS-Based Strict TLS Configurations. 93-109 - Samet Aytaç, Orhan Ermis, Mehmet Ufuk Çaglayan, Fatih Alagöz:
Authenticated Quality of Service Aware Routing in Software Defined Networks. 110-127 - Sourya Joyee De, Abdessamad Imine:
On Consent in Online Social Networks: Privacy Impacts and Research Directions (Short Paper). 128-135 - Damien Crémilleux, Christophe Bidan, Frédéric Majorczyk, Nicolas Prigent:
Enhancing Collaboration Between Security Analysts in Security Operations Centers. 136-142 - Khaoula Es-Salhi, David Espes, Nora Cuppens:
RIICS: Risk Based IICS Segmentation Method. 143-157 - Manel Smine, Nora Cuppens, Frédéric Cuppens:
Effectiveness and Impact Measurements of a Diversification Based Moving Target Defense. 158-171 - Pal-Stefan Murvay, Bogdan Groza:
Practical Security Exploits of the FlexRay In-Vehicle Communication Protocol. 172-187 - Karim Lounis, Mohammad Zulkernine:
Connection Dumping Vulnerability Affecting Bluetooth Availability. 188-204 - Roman Wirtz, Maritta Heisel:
A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements. 205-221 - Anis Bkakria, Aimilia Tasidou, Nora Cuppens-Boulahia, Frédéric Cuppens, Fatma Bouattour, Feten Ben Fredj:
Optimal Distribution of Privacy Budget in Differential Privacy. 222-236
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.