default search action
SEC 2019: Lisbon, Portugal
- Gurpreet Dhillon, Fredrik Karlsson, Karin Hedström, André Zúquete:
ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings. IFIP Advances in Information and Communication Technology 562, Springer 2019, ISBN 978-3-030-22311-3
Intrusion Detection
- Tran Phuong Thao, Yukiko Sawaya, Hoang-Quoc Nguyen-Son, Akira Yamada, Kazumasa Omote, Ayumu Kubota:
Hunting Brand Domain Forgery: A Scalable Classification for Homograph Attack. 3-18 - Guanxiong Liu, Issa Khalil, Abdallah Khreishah:
GanDef: A GAN Based Adversarial Training Defense for Neural Network Classifier. 19-32 - Hyunguk Yoo, Irfan Ahmed:
Control Logic Injection Attacks on Industrial Control Systems. 33-48 - David Lanoë, Michel Hurfin, Eric Totel, Carlos Maziero:
An Efficient and Scalable Intrusion Detection System on Logs of Distributed Applications. 49-63
Access Control
- Mathieu Valois, Patrick Lacharme, Jean-Marie Le Bars:
Performance of Password Guessing Enumerators Under Cracking Conditions. 67-80 - José Becerra, Peter Y. A. Ryan, Petra Sala, Marjan Skrobot:
An Offline Dictionary Attack Against zkPAKE Protocol. 81-90 - Dominik Ziegler, Josef Sabongui, Gerald Palfinger:
Fine-Grained Access Control in Industrial Internet of Things - Evaluating Outsourced Attribute-Based Encryption. 91-104 - Manar Alohaly, Hassan Takabi, Eduardo Blanco:
Towards an Automated Extraction of ABAC Constraints from Natural Language Policies. 105-119 - Zheng Cheng, Jean-Claude Royer, Massimo Tisi:
Removing Problems in Rule-Based Policies. 120-133 - Stephan Wiefling, Luigi Lo Iacono, Markus Dürmuth:
Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild. 134-148
Organizational and Behavioral Security
- Lorenzo Frigerio, Anderson Santana de Oliveira, Laurent Gomez, Patrick Duverger:
Differentially Private Generative Adversarial Networks for Time Series, Continuous, and Discrete Open Data. 151-164 - Majid Hatamian, Sebastian Pape, Kai Rannenberg:
ESARA: A Framework for Enterprise Smartphone Apps Risk Assessment. 165-179 - Weizhi Meng, Wenjuan Li, Lijun Jiang, Jianying Zhou:
SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking Applications. 180-193 - Joëlle Simonet, Stephanie Teufel:
The Influence of Organizational, Social and Personal Factors on Cybersecurity Awareness and Behavior of Home Computer Users. 194-208 - Patrick Murmann, Delphine Reinhardt, Simone Fischer-Hübner:
To Be, or Not to Be Notified - Eliciting Privacy Notification Preferences for Online mHealth Services. 209-222 - Michael Schmid, Sebastian Pape:
A Structured Comparison of the Corporate Information Security Maturity Level. 223-237 - Ali Farooq, Debora Jeske, Jouni Isoaho:
Predicting Students' Security Behavior Using Information-Motivation-Behavioral Skills Model. 238-252 - David Harborth, Xinyuan Cai, Sebastian Pape:
Why Do People Pay for Privacy-Enhancing Technologies? The Case of Tor and JonDonym. 253-267
Crypto and Encryption
- Anirudh Narasimman, Qiaozhi Wang, Fengjun Li, Dongwon Lee, Bo Luo:
Arcana: Enabling Private Posts on Public Microblog Platforms. 271-285 - Jan Camenisch, Manu Drijvers, Petr Dzurenda, Jan Hajny:
Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards. 286-298 - Yazan Boshmaf, Husam Al Jawaheri, Mashael Al Sabah:
BlockTag: Design and Applications of a Tagging System for Blockchain Analysis. 299-313 - Hankyung Ko, Gweonho Jeong, Jongho Kim, Jihye Kim, Hyunok Oh:
Forward Secure Identity-Based Signature Scheme with RSA. 314-327
Integrity
- Sarwar Sayeed, Hector Marco-Gisbert:
On the Effectiveness of Control-Flow Integrity Against Modern Attack Techniques. 331-344 - Kai Bavendiek, Tobias Mueller, Florian Wittner, Thea Schwaneberg, Christian-Alexander Behrendt, Wolfgang Schulz, Hannes Federrath, Sibylle Schupp:
Automatically Proving Purpose Limitation in Software Architectures. 345-358 - Sangat Vaidya, Santiago Torres-Arias, Reza Curtmola, Justin Cappos:
Commit Signatures for Centralized Version Control Systems. 359-373 - Theodor Schnitzler, Markus Dürmuth, Christina Pöpper:
Towards Contractual Agreements for Revocation of Online Data. 374-387
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.