- Jan Hintz, Jacob Rühe, Ingo Siegert:
AnonEmoFace: Emotion Preserving Facial Anonymization. ICISSP 2024: 785-788 - Arghavan Hosseinzadeh, Jessica Chwalek, Robin Brandstädter:
Policy-Driven XACML-Based Architecture for Dynamic Enforcement of Multiparty Computation. ICISSP 2024: 81-89 - Paul R. B. Houssel, Luis A. Leiva:
User Re-Authentication via Mouse Movements and Recurrent Neural Networks. ICISSP 2024: 652-659 - Wanyu Hu, Vrizlynn L. L. Thing:
CPE-Identifier: Automated CPE Identification and CVE Summaries Annotation with Deep Learning and NLP. ICISSP 2024: 67-78 - Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Luca Petrillo, Antonella Santone:
Cybersecurity-Related Tweet Classification by Explainable Deep Learning. ICISSP 2024: 438-445 - Philipp Jakubeit, Andreas Peter, Maarten van Steen:
RoomKey: Extracting a Volatile Key with Information from the Local WiFi Environment Reconstructable Within a Designated Area. ICISSP 2024: 558-569 - Mohammed Jawed, Sriram Parameshwaran, Nitesh Kumar, Anand Handa, Sandeep K. Shukla:
ArkThor: Threat Categorization Based on Malware's C2 Communication. ICISSP 2024: 203-210 - Rauli Kaksonen, Kimmo Halunen, Marko Laakso, Juha Röning:
Automating IoT Security Standard Testing by Common Security Tools. ICISSP 2024: 42-53 - Borna Kalhor, Sanchari Das:
Evaluating the Security and Privacy Risk Postures of Virtual Assistants. ICISSP 2024: 154-161 - Seo-Yi Kim, Il-Gu Lee:
LSTM Autoencoder-Based Insider Abnormal Behavior Detection Using De-Identified Data. ICISSP 2024: 609-620 - Ryosuke Kobayashi, Rie Shigetomi Yamaguchi:
Forgery Resistance of User Authentication Methods Using Location, Wi-Fi and Their Correlation. ICISSP 2024: 709-716 - Daniel Köhler, Christoph Meinel:
The Right Tool for the Job: Contextualization of Cybersecurity Education and Assessment Methods. ICISSP 2024: 234-241 - Spyros Kokolakis:
Security, Privacy and the "Human Factor": Making Sense of the Paradoxes of Security and Privacy Behaviour. ICISSP 2024: 9-11 - Beatrix Koltai, András Gazdag, Gergely Ács:
Supporting CAN Bus Anomaly Detection with Correlation Data. ICISSP 2024: 285-296 - Vimal Kumar, Juliette Mayo, Khadija Bahiss:
ADMIn: Attacks on Dataset, Model and Input: A Threat Model for AI Based Software. ICISSP 2024: 170-178 - Claudia Lanza, Abdelkader Lahmadi, Fabian Osmond:
An Empirical Study of Ransomware Vulnerabilities Descriptions. ICISSP 2024: 146-153 - Dmitry Levshun, Dmitry Vesnin:
Exploring BERT for Predicting Vulnerability Categories in Device Configurations. ICISSP 2024: 452-461 - Eirik Lien, Karl Magnus Grønning Bergh, Sokratis K. Katsikas:
Perceptions of Cyber Security Risk of the Norwegian Advanced Metering Infrastructure. ICISSP 2024: 187-194 - Changwei Liu, Louis DiValentin, Aolin Ding, Malek Ben Salem:
Build a Computationally Efficient Strong Defense Against Adversarial Example Attacks. ICISSP 2024: 358-365 - Kunlong Liu, Trinabh Gupta:
Federated Learning with Differential Privacy and an Untrusted Aggregator. ICISSP 2024: 379-389 - Chun-Shien Lu, Chao-Hsuan Lin:
Robust Image Deepfake Detection with Perceptual Hashing. ICISSP 2024: 374-378 - Antonio Maci, Giuseppe Urbano, Antonio Coscia:
Deep Q-Networks for Imbalanced Multi-Class Malware Classification. ICISSP 2024: 342-349 - Katerina Macková, Dominik Benk, Martin Srotýr:
Enhancing Cybersecurity Through Comparative Analysis of Deep Learning Models for Anomaly Detection. ICISSP 2024: 682-690 - Julia Mader, Thomas Lorünser:
Feasibility of Privacy Preserving Minutiae-Based Fingerprint Matching. ICISSP 2024: 899-906 - Fabrizia Marrucco, Mosabbah Mushir Ahmed, Bechir Bouali, Alieeldin Mady:
EMplifier: Hybrid Electromagnetic Probe for Side Channel and Fault Injection Analysis. ICISSP 2024: 815-822 - Marcello Maugeri:
Fuzzing Matter(s): A White Paper for Fuzzing the Matter Protocol. ICISSP 2024: 446-451 - John McConnell, Yair Levy, Marti Snyder, Ling Wang:
The Role of Heuristics and Biases in Linux Server Administrators' Information Security Policy Compliance at Healthcare Organizations. ICISSP 2024: 30-41 - Bernard McWeeney, Ilya Mudritskiy, Renaat Verbruggen:
Analysis of Payload Confidentiality for the IoT/ LPWAN Technology 'Lora'. ICISSP 2024: 90-102 - Ryo Meguro, Hiroya Kato, Shintaro Narisada, Seira Hidano, Kazuhide Fukushima, Takuo Suganuma, Masahiro Hiji:
Gradient-Based Clean Label Backdoor Attack to Graph Neural Networks. ICISSP 2024: 510-521 - Andrea Migliore, Stelvio Cimato, Gabriella Trucco:
Efficient Secure Computation of Edit Distance on Genomic Data. ICISSP 2024: 878-883