default search action
15th CRiSIS 2020: Paris, France
- Joaquín García-Alfaro, Jean Leneutre, Nora Cuppens, Reda Yaich:
Risks and Security of Internet and Systems - 15th International Conference, CRiSIS 2020, Paris, France, November 4-6, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12528, Springer 2021, ISBN 978-3-030-68886-8
Keynote Talk
- Maurantonio Caprolu, Stefano Cresci, Simone Raponi, Roberto Di Pietro:
New Dimensions of Information Warfare: The Economic Pillar - Fintech and Cryptocurrencies. 3-27
Vulnerabilities, Attacks and Intrusion Detection
- Lucas Miranda, Daniel Vieira, Mateus Schulz Nogueira, Leonardo Ventura, Miguel Angelo Bicudo, Matheus Martins, Lucas Senos, Leandro Pfleger de Aguiar, Enrico Lovat, Daniel S. Menasché:
Measuring and Modeling Software Vulnerability Security Advisory Platforms. 31-48 - Karim Lounis, Mohammad Zulkernine:
Frequency Hopping Spread Spectrum to Counter Relay Attacks in PKESs. 49-66 - Mohamed Amine Merzouk, Frédéric Cuppens, Nora Boulahia-Cuppens, Reda Yaich:
A Deeper Analysis of Adversarial Examples in Intrusion Detection. 67-84
TLS, Openness and Security Control
- Olivier Levillain:
Implementation Flaws in TLS Stacks: Lessons Learned and Study of TLS 1.3 Benefits. 87-104 - Ivo Emanuilov:
Security Through Transparency and Openness in Computer Design. 105-116 - Noureddine Amraoui, Belhassen Zouari:
An ML Behavior-Based Security Control for Smart Home Systems. 117-130
Access Control, Risk Assessment and Security Knowledge
- Farah Dernaika, Nora Cuppens-Boulahia, Frédéric Cuppens, Olivier Raynaud:
A Posteriori Analysis of Policy Temporal Compliance. 133-148 - Salim Chehida, Abdelhakim Baouya, Diego Fernández Alonso, Paul-Emmanuel Brun, Guillemette Massot, Marius Bozga, Saddek Bensalem:
Asset-Driven Approach for Security Risk Assessment in IoT Systems. 149-163 - Alexandre Dey, Eric Totel, Sylvain Navers:
Heterogeneous Security Events Prioritization Using Auto-encoders. 164-180 - Fabien Patrick Viertel, Wasja Brunotte, Yannick Evers, Kurt Schneider:
Community Knowledge About Security: - Identification and Classification of User Contributions. 181-197
Risk Analysis, Neural Networks and Web Protection
- Nasser Al-Hadhrami, Matthew Collinson, Nir Oren:
Modelling Security Risk Scenarios Using Subjective Attack Trees. 201-218 - Julien Bringer, Hervé Chabanne, Linda Guiga:
Premium Access to Convolutional Neural Networks. 219-234 - Ouissem Ben Fredj, Omar Cheikhrouhou, Moez Krichen, Habib Hamam, Abdelouahid Derhab:
An OWASP Top Ten Driven Survey on Web Application Protection Methods. 235-252
Infrastructure Security and Malware Detection
- Siham Bouchelaghem, Abdelmadjid Bouabdallah, Mawloud Omar:
Autonomous Vehicle Security: Literature Review of Real Attack Experiments. 255-272 - Salwa Alem, David Espes, Eric Martin, Laurent Nana, Florent de Lamotte:
New Dataset for Industry 4.0 to Address the Change in Threat Landscape. 273-288 - Souad El Hatib, Loïc Ricaud, Josée Desharnais, Nadia Tawbi:
Toward Semantic-Based Android Malware Detection Using Model Checking and Machine Learning. 289-307
Short Papers
- Hervé Chabanne, Emmanuelle Dottax, Denis Dumont:
Augmented Voting Reality. 311-316 - Ines Jemal, Mohamed Amine Haddar, Omar Cheikhrouhou, Adel Mahfoudhi:
Malicious Http Request Detection Using Code-Level Convolutional Neural Network. 317-324 - Zakariya Kamagaté, Jacques Simonin, Yvon Kermarrec:
Enhancement of a Business Model with a Business Contextual Risk Model. 325-334 - Walid Arabi, Reda Yaich, Aymen Boudguiga, Mawloud Omar:
Secure Data Processing for Industrial Remote Diagnosis and Maintenance. 335-346 - Elena Doynikova, Evgenia Novikova, Diana Gaifulina, Igor V. Kotenko:
Towards Attacker Attribution for Risk Analysis. 347-353 - Inna Vistbakka, Elena Troubitsyna:
Modelling and Verification of Safety of Access Control in SCADA Systems. 354-364 - Samir Ouchani, Abdelaziz Khaled:
Security Assessment and Hardening of Autonomous Vehicles. 365-375
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.