


default search action
11th ICISSP 2025: Porto, Portugal - Volume 1
- Roberto Di Pietro, Karen Renaud, Paolo Mori:

Proceedings of the 11th International Conference on Information Systems Security and Privacy, ICISSP 2025 - Volume 1, Porto, Portugal, February 20-22, 2025. SCITEPRESS 2025, ISBN 978-989-758-735-1
Invited Speakers
- Wenjing Lou:

Rethinking Privacy Protection in Federated Learning in the Face of Model Inversion Attacks. ICISSP 2025: 5 - Awais Rashid:

Securing Ultra-Large Scale Infrastructures: Challenges and Opportunities. ICISSP 2025: 7 - Ahmad-Reza Sadeghi:

Turing's Echo on Deceptive Machines: The Challenge of Distinguishing Human and AI Creations. ICISSP 2025: 9
Management and Operations
- Kentaro Kita, Yuta Gempei, Tomoaki Mimoto, Takamasa Isohara, Shinsaku Kiyomoto, Toshiaki Tanaka:

Prioritization of Exploit Codes on GitHub for Better Vulnerability Triage. 27-38 - Kris Heid, Elena Julia Sonntag, Jens Heider:

Revisiting Permission Piggybacking of Third-Party Libraries in Android Apps. 39-46 - Rajesh Kalakoti

, Risto Vaarandi
, Hayretdin Bahsi, Sven Nõmm:
Evaluating Explainable AI for Deep Learning-Based Network Intrusion Detection System Alert Classification. 47-58 - Aftab Akram, Clémentine Gritti, Mohd Hazali Mohamed Halip

, Nur Diyana Kamarudin, Marini Mansor, Syarifah Bahiyah Rahayu, Melek Önen:
Robust Blockchain-Based Federated Learning. 59-70 - Dave McKay, Matthew Bush, Marko Kovacevic, Atefeh Mashatan:

ConCERTS: An IoT Cybersecurity Research Range for Education, Experimentation, and Security Research. 71-82 - Ghadeer I. Yassin

, Lakshmish Macheeri Ramaswamy:
CDAC: Content-Driven Access Control Architecture for Smart Farms. 83-94 - Laura Schuiki, Christoph Stach, Corinna Giebler, Eva Hoos, Bernhard Mitschang:

Enabling Trusted Data Sharing in Data Spaces: PROTON - A Privacy-by-Design Approach to Data Products. 95-106 - Andrea Fieschi, Pascal Hirmer, Christoph Stach, Bernhard Mitschang:

Characterising and Categorising Anonymization Techniques: A Literature-Based Approach. ICISSP (1) 2025: 107-118 - Mofareh Waqdan

, Habib Louafi, Malek Mouhoub:
A Customizable Security Risk Assessment Framework Using Multi-Attribute Decision Making for IoT Systems. 121-132 - Paul van Schaik, Karen Renaud

:
A Value-Driven Approach to the Online Consent Conundrum: A Study with the Unemployed. 133-140 - Daniela Pöhn

, Heiner Lüken:
Got Ya!: Sensors for Identity Management Specific Security Situational Awareness. 141-148 - Daniela Pöhn

, Nils Gruschka:
Qualitative In-Depth Analysis of GDPR Data Subject Access Requests and Responses from Major Online Services. 149-156 - Michael Steinert

, Anna Maria Schleimer, Marcel Altendeitering, David Hick:
Designing Data Trustees: A Prototype in the Building Sector. 157-166 - Xiaofei Wang, Andy Meneely

, Daqing Hou:
Evaluating Keystroke Dynamics Performance in e-Commerce. 167-175 - Walid Messahel, Tayssir Touili:

Analyzing a Concurrent Self-Modifying Program: Application to Malware Detection. 176-182 - Andreas Stenwreth, Simon Täng, Victor Morel:

To Be or Not to Be (in the EU): Measurement of Discrepancies Presented in Cookie Paywalls. 183-190 - Akira Kanaoka, Shu Hiura:

Real-Time Detection of Multi-File DOM-Based XSS Vulnerabilities Using Static Analysis: A Developer-Oriented Approach for Securing Web Applications. 191-198 - Anton Holmström:

Managing a Ransomware Attack: The Resilience of a Swedish Municipality - A Case Study. 199-208 - Nike Henriksén, Isak Lexert, Jakob Bergquist Dahn, Simon Hacks:

Assessing Sweden's Current Cybersecurity Landscape: Implications of NATO Membership. 209-216 - Sebastian Eresheim

, Simon Gmeiner, Alexander Piglmann, Thomas Petelin, Robert Luh, Paul Tavolato, Sebastian Schrittwieser:
PenQuestEnv: A Reinforcement Learning Environment for Cyber Security. 217-224 - Shivangi Shukla, Sankita J. Patel:

A Novel Pairing-Free ECC-Based Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Secure Cloud Storage. 225-233 - Carlos Eduardo Araújo Cardoso Cidrão, Oskar Hermansson, Simon Hacks:

Defending Against Phishing Attacks on Cloud-Systems: What Has Been Studied? 234-241 - Markus Hornsteiner, Linda Kölbel, Daniel Oberhofer, Stefan Schönig:

A Reflection on Process-Oriented Industrial IoT Security Management. 242-253 - Luca Pöhler, Marko Schuba, Tim Höner, Sacha Hack, Georg Neugebauer:

CampusQuest: Motivating Computer Science Students for Cybersecurity from Day One. 254-262 - Samuel M. Senior

, Laura Carmichael, Steve Taylor
, Mike Surridge
, Xavier Vilalta:
Knowledge Modelling for Automated Risk Assessment of Cybersecurity and Indirect Patient Harms in Medical Contexts. 263-274 - Wesley Murisa, Marijke Coetzee:

A Conceptual SOC Framework for Air Traffic Management Systems. 275-282 - Blake Johnson, Rahul Simha:

CASTL: A Composable Source Code Query Language for Security and Vulnerability Analysis. 283-290 - William Briguglio, Waleed A. Yousef, Issa Traoré, Mohammad Mamun, Sherif Saad:

An Alternative Approach to Federated Learning for Model Security and Data Privacy. 291-301 - Marta Catillo, Antonio Pecchia, Umberto Villano:

USB-IDS-TC: A Flow-Based Intrusion Detection Dataset of DoS Attacks in Different Network Scenarios. 302-309 - Samra Bouakkaz, Luis Carlos Suárez

, Nora Cuppens, Frédéric Cuppens:
Design of an Intelligent Trust Management Architecture for 5G Service Deployment. 310-317 - Yu-Ran Jeon, Il-Gu Lee:

Iterative Learning-Based Intrusion Detection System for Performance Enhancement in Imbalanced Data Environments. 318-324 - Neha Nagaraja, Hayretdin Bahsi:

Cyber Threat Modeling of an LLM-Based Healthcare System. 325-336 - Laura Carmichael, Steve Taylor

, Samuel M. Senior
, Mike Surridge
, Gencer Erdogan, Simeon Tverdal:
Systematisation of Security Risk Knowledge Across Different Domains: A Case Study of Security Implications of Medical Devices. 337-348 - Surabhi Nayak, Sara Nayak:

Exploring the Accuracy and Privacy Tradeoff in AI-Driven Healthcare Through Differential Privacy. 349-354 - Tobias Pfaller

, Florian Skopik
, Lenhard Reuter
, Maria Leitner
:
Data Collection in Cyber Exercises Through Monitoring Points: Observing, Steering, and Scoring. 355-366 - Adenike Adesina, Elias Seid, Fredrik Blix, Oliver Popov:

Compliance Standards and Frameworks and Its Implications on Cybersecurity: A NIS2 Study Within the Swedish Automotive Industries. 367-376 - Hulya Dogan, Anton Setzer

:
SABEC: Secure and Adaptive Blockchain-Enabled Coordination Protocol for Unmanned Aerial Vehicles(UAVs) Network. 377-388 - Narges Alipourjeddi, Ali Miri:

Topology-Driven Defense: Detecting Model Poisoning in Federated Learning with Persistence Diagrams. 389-396 - Eqbal Darraji, Iain Phillips, Asma Adnane:

Secure Opportunistic Routing Protocol in VANETs. 397-404 - Mounika Bonam, Pranathi Rayavaram, Maryam Abbasalizadeh, Claire Seungeun Lee, April Pattavina, Sashank Narain:

Current Research, Challenges, and Future Directions in Stalkerware Detection Techniques for Mobile Ecosystems. 405-415 - Payton Howard, Mark Ferraro, Sajal Bhatia:

CyberWise: Virtual Security Learning Platform. 416-425 - Mounia Zaydi

, Yassine Maleh
:
GAI-Driven Offensive Cybersecurity: Transforming Pentesting for Proactive Defence. 426-433 - Weijie Niu, Alberto Huertas Celdrán, Karoline Siarsky, Burkhard Stiller:

FEST: A Unified Framework for Evaluating Synthetic Tabular Data. 434-444

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














