![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
17th CRiSIS 2022: Sousse, Tunisia
- Slim Kallel
, Mohamed Jmaiel
, Mohammad Zulkernine, Ahmed Hadj Kacem
, Frédéric Cuppens
, Nora Cuppens
:
Risks and Security of Internet and Systems - 17th International Conference, CRiSIS 2022, Sousse, Tunisia, December 7-9, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13857, Springer 2023, ISBN 978-3-031-31107-9 - Kris Heid
, Jens Heider
:
Context Correlation for Automated Dynamic Android App Analysis to Improve Impact Rating of Privacy and Security Flaws. 1-17 - Maxime Lanvin, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic Mé, Eric Totel:
Errors in the CICIDS2017 Dataset and the Significant Differences in Detection Performances It Makes. 18-33 - Ahmed Burhan Mohammed
, Lamia Chaari Fourati
, Ahmed Fakhrudeen
:
A Comparative Study of Attribute Selection Algorithms on Intrusion Detection System in UAVs: A Case Study of UKM-IDS20 Dataset. 34-46 - Abdel Mlak Said
, Aymen Yahyaoui
, Takoua Abdellatif
:
PRIAH: Private Alerts in Healthcare. 47-61 - Charles-Henry Bertrand Van Ouytsel, Christophe Crochet, Khanh-Huu-The Dam, Axel Legay:
Tool Paper - SEMA: Symbolic Execution Toolchain for Malware Analysis. 62-68 - Maher Boughdiri, Takoua Abdellatif, Tesnim Abdellatif:
Blockchain Survey for Security and Privacy in the e-Health Ecosystem. 69-84 - Mohamed Amin Hammami, Mariam Lahami
, Afef Jmal Maâlej:
Towards a Dynamic Testing Approach for Checking the Correctness of Ethereum Smart Contracts. 85-100 - Tarek Frikha
, Jalel Ktari
, Habib Hamam
:
Blockchain Olive Oil Supply Chain. 101-113 - Salah Gontara
, Amine Boufaied, Ouajdi Korbaa
:
Impact of EIP-1559 on Transactions in the Ethereum Blockchain and Its Rollups. 114-126 - Rawya Mars
, Saoussen Cheikhrouhou
, Slim Kallel
, Mohamed Sellami
, Ahmed Hadj Kacem
:
Towards a Secure Cross-Blockchain Smart Contract Architecture. 127-132 - Bastien Drouot, Valery Monthe, Sylvain Guérin, Joël Champeau:
Security Analysis: From Model to System Analysis. 133-152 - Racem Bougacha
, Régine Laleau
, Philippe Bon, Simon Collart Dutilleul, Rahma Ben Ayed:
Modeling Train Systems: From High-Level Architecture Graphical Models to Formal Specifications. 153-168 - Benjamin Somers
, Fabien Dagnat
, Jean-Christophe Bach
:
How IT Infrastructures Break: Better Modeling for Better Risk Management. 169-184 - Johannes Beckert, Teo Blazevic, Alexander Dobhan:
IoT Security Within Small and Medium-Sized Manufacturing Companies. 185-190 - Liang Chen
, Cheng Zeng, Stilianos Vidalis:
An Incentive Mechanism for Managing Obligation Delegation. 191-206 - Rahma Trabelsi
, Ghofrane Fersi
, Mohamed Jmaiel
:
Virtual Private Network Blockchain-based Dynamic Access Control Solution for Inter-organisational Large Scale IoT Networks. 207-222 - Hannes Salin
:
Pseudonym Swapping with Secure Accumulators and Double Diffie-Hellman Rounds in Cooperative Intelligent Transport Systems. 223-238 - Randy Kuang
, Maria Perepechaenko, Ryan Toth, Michel Barbeau
:
Benchmark Performance of the Multivariate Polynomial Public Key Encapsulation Mechanism. 239-255
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.