default search action
CSS 2018: Amalfi, Italy
- Arcangelo Castiglione, Florin Pop, Massimo Ficco, Francesco Palmieri:
Cyberspace Safety and Security - 10th International Symposium, CSS 2018, Amalfi, Italy, October 29-31, 2018, Proceedings. Lecture Notes in Computer Science 11161, Springer 2018, ISBN 978-3-030-01688-3
Cybersecurity
- Chedy Missaoui, Safa Bachouch, Ibrahim Abdelkader, Slim Trabelsi:
Who Is Reusing Stolen Passwords? An Empirical Study on Stolen Passwords and Countermeasures. 3-17 - Hugo Sbai, Michael Goldsmith, Samy Meftali, Jassim Happa:
A Survey of Keylogger and Screenlogger Attacks in the Banking Sector and Countermeasures to Them. 18-32 - Munir Geden, Jassim Happa:
Classification of Malware Families Based on Runtime Behaviour. 33-48 - Ivan Letteri, Giuseppe Della Penna, Giovanni De Gasperis:
Botnet Detection in Software Defined Networks by Deep Learning Techniques. 49-62 - Vincenzo Conti, Simone Sante Ruffo, Alessio Merlo, Mauro Migliardi, Salvatore Vitabile:
A Bio-inspired Approach to Attack Graphs Analysis. 63-76 - Tony Quertier:
Confidence Curve for Continuous Authentication. 77-84 - Dragos Ionica, Florin Pop, Nirvana Popescu, Decebal Popescu, Ciprian Dobre:
SCADA Security: Concepts and Recommendations. 85-98 - Thomas Clédel, Simon N. Foley, Nora Cuppens, Frédéric Cuppens, Yvon Kermarrec, Frédéric Dubois, Youssef Laarouchi, Gérard Le Comte:
Towards the Evaluation of End-to-End Resilience Through External Consistency. 99-114 - Ugo Fiore, Adrian Florea, Arpad Gellert, Lucian Vintan, Paolo Zanetti:
Optimal Partitioning of LLC in CAT-enabled CPUs to Prevent Side-Channel Attacks. 115-123 - Walter Balzano, Fabio Vitale:
GER-EN - GNSS Error Reduction Using an Elastic Network Based on V2V and LiDAR. 124-131 - Brij B. Gupta, Megha Quamara:
A Dynamic Security Policies Generation Model for Access Control in Smart Card Based Applications. 132-143 - Flora Amato, Giovanni Cozzolino, Antonino Mazzeo, Francesco Moscato:
An Advanced Methodology to Analyse Data Stored on Mobile Devices. 144-154
Cryptography, Data Security and Biometric Techniques
- Paolo D'Arco, Roberto De Prisco, Alfredo De Santis:
On the Equivalence of 2-Threshold Secret Sharing Schemes and Prefix Codes. 157-167 - Paolo D'Arco, Roberto De Prisco, Angel L. Pérez del Pozo:
An Efficient and Reliable Two-Level Lightweight Authentication Protocol. 168-180 - Katarzyna Kapusta, Gérard Memmi:
Selective All-Or-Nothing Transform: Protecting Outsourced Data Against Key Exposure. 181-193 - Jakub Guziur, Michal Pawlak, Aneta Poniszewska-Maranda, Bartosz Wieczorek:
Light Blockchain Communication Protocol for Secure Data Transfer Integrity. 194-208 - Michal Pawlak, Jakub Guziur, Aneta Poniszewska-Maranda:
Towards the Blockchain Technology for System Voting Process. 209-223 - Ying Qin, Xiao Yang Shen, Zhen Yue Du:
Privacy-Preserving SAT Solving Based on Projection-Equivalence CNF Obfuscation. 224-239 - Ferdinando Di Martino, Salvatore Sessa:
A Fragile Watermarking and Bilinear Fuzzy Equations. 240-253 - Neyire Deniz Sarier:
Privacy Preserving Biometric Identification on the Bitcoin Blockchain. 254-269 - Andrea F. Abate, Silvio Barra, Andrea Casanova, Gianni Fenu, Mirko Marras:
Iris Quality Assessment: A Statistical Approach for Biometric Security Applications. 270-278
Social Security, Ontologies and Smart Applications
- Sunthoshan G. Govender, Marianne Loock, Elmarie Kritzinger:
Enhancing Information Security Culture to Reduce Information Security Cost: A Proposed Framework. 281-290 - Fabio Clarizia, Francesco Colace, Marco Lombardi, Francesco Pascale, Domenico Santaniello:
Chatbot: An Education Support System for Student. 291-302 - Fabio Clarizia, Francesco Colace, Marco Lombardi, Francesco Pascale, Domenico Santaniello:
A Multilevel Graph Approach for Road Accidents Data Interpretation. 303-316 - Elmarie Kritzinger, Marianne Loock, E. N. Mwim:
Cyber Safety Awareness and Culture Planning in South Africa. 317-326
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.