default search action
12th CRiSIS 2017: Dinard, France
- Nora Cuppens, Frédéric Cuppens, Jean-Louis Lanet, Axel Legay, Joaquín García-Alfaro:
Risks and Security of Internet and Systems - 12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10694, Springer 2018, ISBN 978-3-319-76686-7
Vulnerability Analysis and Classification
- Marian Gawron, Feng Cheng, Christoph Meinel:
Automatic Vulnerability Classification Using Machine Learning. 3-17 - Muhammad Imran Khan, Barry O'Sullivan, Simon N. Foley:
A Semantic Approach to Frequency Based Anomaly Detection of Insider Access in Database Management Systems. 18-28 - Gustavo Gonzalez Granadillo, José Rubio-Hernán, Joaquín García-Alfaro:
Towards a Security Event Data Taxonomy. 29-45
Apps Security
- Jyoti Gajrani, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Daya Ram Sharma, Akka Zemmari, Mohamed Mosbah, Mauro Conti:
Unraveling Reflection Induced Sensitive Leaks in Android Apps. 49-65 - Alessio Viticchié, Cataldo Basile, Antonio Lioy:
Remotely Assessing Integrity of Software Applications by Monitoring Invariants: Present Limitations and Future Directions. 66-82 - Sébastien Salva, Loukmen Regainia:
Using Data Integration to Help Design More Secure Applications. 83-98
Access Control and Filtering
- Zeineb Ben Yahya, Farah Barika Ktata, Khaled Ghédira:
MA-MOrBAC: A Distributed Access Control Model Based on Mobile Agent for Multi-organizational, Collaborative and Heterogeneous Systems. 101-114 - Bogdan Groza, Cosmin Briceag:
A Vehicle Collision-Warning System Based on Multipeer Connectivity and Off-the-Shelf Smart-Devices. 115-123
Cloud Security
- Khalil Hariss, Hassan Noura, Abed Ellatif Samhat, Maroun Chamoun:
Design and Realization of a Fully Homomorphic Encryption Algorithm for Cloud Applications. 127-139 - Pamela Carvallo, Ana R. Cavalli, Natalia Kushik:
A Study of Threat Detection Systems and Techniques in the Cloud. 140-155
Cyber-Insurance and Cyber Threat Intelligence
- Fabio Martinelli, Albina Orlando, Ganbayar Uuganbayar, Artsiom Yautsiukhin:
Preventing the Drop in Security Investments for Non-competitive Cyber-Insurance Market. 159-174 - Thomas D. Wagner, Esther Palomar, Khaled Mahbub, Ali E. Abdallah:
Towards an Anonymity Supported Platform for Shared Cyber Threat Intelligence. 175-183
Human-Centric Security and Trust
- Hossein Abroshan, Jan Devos, Geert Poels, Eric Laermans:
Phishing Attacks Root Causes. 187-202 - Matthäus Wander, Christopher Boelmann, Torben Weis:
Domain Name System Without Root Servers. 203-216 - Hung-Jr Shiu, Bor-Shing Lin, Bor-Shyh Lin, Po-Yang Huang, Chien-Hung Huang, Chin-Laung Lei:
Data Hiding on Social Media Communications Using Text Steganography. 217-224
Risk Analysis
- Sourya Joyee De, Abdessamad Imine:
Privacy Scoring of Social Network User Profiles Through Risk Analysis. 227-243 - Gencer Erdogan, Atle Refsdal:
A Method for Developing Qualitative Security Risk Assessment Algorithms. 244-259 - Jude Jacob Nsiempba, Fanny Lalonde Lévesque, Nathalie De Marcellis-Warin, José M. Fernandez:
An Empirical Analysis of Risk Aversion in Malware Infections. 260-267
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.