An Anti-Phishing Kit Scheme for Secure Web Transactions
Rest in Protection - A Kernel-level Approach to Mitigate RIP Tampering
SELint: An SEAndroid Policy Analysis Tool
Gamification of Information Security Awareness and Training
Outsourcing Scheme of ABE Encryption Secure against Malicious Adversary
User Feedback Analysis for Mobile Malware Detection
Attribute Permutation Steganography Detection using Attribute Position Changes Count
Towards an Understanding of the Misclassification Rates of Machine Learning-based Malware Detection Systems
System for Executing Encrypted Java Programs
Characterization of Tor Traffic using Time based Features
White-box Implementation of Stream Cipher
Traffic Statistics of a High-Bandwidth Tor Exit Node
There’s Wally! Location Tracking in Android without Permissions
Hypervisor based Memory Introspection: Challenges, Problems and Limitations
SitAC – A System for Situation-aware Access Control - Controlling Access to Sensor Data
Quantification of De-anonymization Risks in Social Networks
A Methodology of Security Pattern Classification and of Attack-Defense Tree Generation
A Technique for Extraction and Analysis of Application Heap Objects within Android Runtime (ART)
Improved Greedy Nonrandomness Detectors for Stream Ciphers
A Design of Secure and ReliableWireless Transmission Channel for Implantable Medical Devices
Macro Malware Detection using Machine Learning Techniques - A New Approach
Batch-verifiable Secret Sharing with Unconditional Privacy
Assessing Information Security Risks using Pairwise Weighting
Towards Confidentiality-strengthened Personalized Genomic Medicine Embedding Homomorphic Cryptography
Analysis and Assessment of Situational Awareness Models for National Cyber Security Centers
Longkit - A Universal Framework for BIOS/UEFI Rootkits in System Management Mode
Privacy Preserving Transparent Mobile Authentication
Non-interactive Privacy-preserving k-NN Classifier
Network and Topology Models to Support IDS Event Processing
Enhancing Accuracy of Android Malware Detection using Intent Instrumentation
A Review of Risk Identification Approaches in the Telecommunication Domain
Fingerprint Class Recognition for Securing EMV Transaction
Stealth Address and Key Management Techniques in Blockchain Systems
A Collaborative Tool for Modelling Multi-stage Attacks
Design of an Anomaly-based Threat Detection & Explication System
Improving the Automatic Identification of Malicious Android Apps in Unofficial Stores through Logo Analysis
Identity Deception Detection on Social Media Platforms
Breaking a Hitag2 Protocol with Low Cost Technology
Towards a Privacy Scorecard – Initial Design Exemplified on an Intelligent Transport Systems Service
Exploration of the Potential of Process Mining for Intrusion Detection in Smart Metering
CyTrONE: An Integrated Cybersecurity Training Framework
Towards Optimized Security-aware (O-Sec) VM Placement Algorithms
Privacy Preserving Data Classification using Inner-product Functional Encryption
Why Snoopy Loves Online Services: An Analysis of (Lack of) Privacy in Online Services
Analysis of Data Sharing Agreements
Real-time DSP Implementations of Voice Encryption Algorithms
Limited Use Cryptographic Tokens in Securing Ephemeral Cloud Servers
Tracking Dependent Information Flows
Malware Detection based on Graph Classification
On Usage Control in Relational Database Management Systems - Obligations and Their Enforcement in Joining Datasets
Extending the Same Origin Policy with Origin Attributes
Distance-bounding Identification
From Situation Awareness to Action: An Information Security Management Toolkit for Socio-technical Security Retrospective and Prospective Analysis
Platform-agnostic Low-intrusion Optical Data Exfiltration
Memory Forensics of Insecure Android Inter-app Communications
Machine Learning Meets iOS Malware: Identifying Malicious Applications on Apple Environment
On the Security of Safety-critical Embedded Systems: Who Watches the Watchers? Who Reprograms the Watchers?
Distributed Protocols at the Rescue for Trustworthy Online Voting
Enhanced Identification of Sensitive User Inputs in Mobile Applications
A Formal Model of Web Security Showing Malicious Cross Origin Requests and Its Mitigation using CORP
Brute Force Cryptanalysis of MIFARE Classic Cards on GPU
Cyber-interdependency in Smart Energy Systems
Health Information Exchange and Related IT-security Practices in European Hospitals
Security Issues with BACnet Value Handling
Secure APIs for Applications in Microkernel-based Systems
Hacking of the AES with Boolean Functions
Glassbox: Dynamic Analysis Platform for Malware Android Applications on Real Devices
Mathematical Backdoors in Symmetric Encryption Systems - Proposal for a Backdoored AES-like Block Cipher
Sequitur-based Inference and Analysis Framework for Malicious System Behavior
Static and Dynamic Analysis of Android Malware
“Mirror, Mirror on the Wall, Who is the Fairest One of All?” - Machine Learning versus Model Checking: A Comparison between Two Static Techniques for Malware Family Identification
Internal Network Monitoring and Anomaly Detection through Host Clustering
Verifying Data Secure Flow in AUTOSAR Models by Static Analysis
Extracting Android Malicious Behaviors
Identifying Mobile Repackaged Applications through Formal Methods
On the Detection of Replay Attacks in Industrial Automation Networks Operated with Profinet IO
Freeze & Crypt: Linux Kernel Support for Main Memory Encryption
A Lightweight Integrity Protection Scheme for Fast Communications in Smart Grid
Forensic Analysis of Communication Records of Web-based Messaging Applications from Physical Memory
Formally Verifying Flow Properties in Industrial Systems
Attribute based Encryption for Multi-level Access Control Policies
Mobile Silent and Continuous Authentication using Apps Sequence
The Efficient Randomness Testing using Boolean Functions
First Practical Side-channel Attack to Defeat Point Randomization in Secure Implementations of Pairing-based Cryptography
Analysis of Intrusion Detection Systems in Industrial Ecosystems
Face Recognition-based Presentation Attack Detection in a Two-step Segregated Automated Border Control e-Gate - Results of a Pilot Experience at Adolfo Suárez Madrid-Barajas Airport
Privacy-Preserving Verifiability - A Case for an Electronic Exam Protocol
Accelerating Square Root Computations Over Large GF (2m)
SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition
On Obfuscating Compilation for Encrypted Computing
Privacy-preserving Regression on Partially Encrypted Data
Mining Encrypted Software Logs using Alpha Algorithm
Differential and Rotational Cryptanalysis of Round-reduced MORUS
The Semantic Discrimination Rate Metric for Privacy Measurements which Questions the Benefit of t-closeness over l-diversity
One Random Jump and One Permutation: Sufficient Conditions to Chaotic, Statistically Faultless, and Large Throughput PRNG for FPGA
(In) Security in Graph Databases - Analysis and Data Leaks
PB-PKI: A Privacy-aware Blockchain-based PKI
RmPerm: A Tool for Android Permissions Removal
HAIT: Heap Analyzer with Input Tracing
Evaluating Credit Card Transactions in the Frequency Domain for a Proactive Fraud Detection Approach
On the Relation Between SIM and IND-RoR Security Models for PAKEs
SLAP: Secure Lightweight Authentication Protocol for Resource-constrained Devices
Some Remarks about Tracing Digital Cameras – Faster Method and Usable Countermeasure
Adding Privacy Protection to Distributed Software Systems
Using a History-based Profile to Detect and Respond to DDoS Attacks
LOCALPKI: A User-Centric Formally Proven Alternative to PKIX
Practical Passive Leakage-abuse Attacks Against Symmetric Searchable Encryption
Cryptographic Service Providers in Current Device Landscapes: An Inconvenient Truth
Constant-size Threshold Attribute based SignCryption for Cloud Applications
The Net Rat - Rethinking Connected Services for Increased Security
Efficient Heuristic Safety Analysis of Core-based Security Policies
Short Paper: Industrial Feasibility of Private Information Retrieval
Vector Quantization based Steganography for Secure Speech Communication System
GLITCH: A Discrete Gaussian Testing Suite for Lattice-based Cryptography
Program Execution Analysis using UserAssist Key in Modern Windows
Capturing the Effects of Attribute based Correlation on Privacy in Micro-databases
Improving Throughput in BB84 Quantum Key Distribution
A Review of PROFIBUS Protocol Vulnerabilities - Considerations for Implementing Authentication and Authorization Controls
FlowSlicer - A Hybrid Approach to Detect and Avoid Sensitive Information Leaks in Android Applications using Program Slicing and Instrumentation
A Card-less TEE-based Solution for Trusted Access Control
s2ipt: A Lightweight Network Intrusion Detection/Prevention System based on IPtables
Reputation Management in Online Social Networks - A New Clustering-based Approach
Interaction Platform for Improving Detection Capability of Dynamic Application Security Testing
Strong Authentication for e-Banking: A Survey on European Regulations and Implementations
A Lightweight Online Advertising Classification System using Lexical-based Features
Formal Analyze of a Private Access Control Protocol to a Cloud Storage
Differential-linear and Impossible Differential Cryptanalysis of Round-reduced Scream
Experimental Assessment of Private Information Disclosure in LTE Mobile Networks
Towards a Self-adaptive Trust Management Model for VANETs
PAnTHErS: A Prototyping and Analysis Tool for Homomorphic Encryption Schemes
On Efficient Access Control Mechanisms in Hierarchy using Unidirectional and Transitive Proxy Re-encryption Schemes
Privacy-preserving Disease Susceptibility Test with Shamir’s Secret Sharing
Anonymous Credentials with Practical Revocation using Elliptic Curves
On the Application of Fuzzy Set Theory for Access Control Enforcement
Clustering-based Approach for Anomaly Detection in XACML Policies
Scenario-based Vulnerability Analysis in IoT-based Patient Monitoring System
Fair and Accountable Anonymity for the Tor Network
Context-based Encryption Applied to Data Leakage Prevention Solutions
Exploring USB Connection Vulnerabilities on Android Devices - Breaches using the Android Debug Bridge
Information Flows at OS Level Unmask Sophisticated Android Malware
Privacy as a Currency: Un-regulated?
A Probabilistic Baby-step Giant-step Algorithm
A Generic, Extensible Data Model for Trajectory Determination Systems
Geographical Information System Applications for Pipeline Right of Way Aerial Surveillance
Data Density Considerations for Crowd Sourced Population Estimations from Social Media
Sentinel-1 for Urban Areas - Comparison between Automatically Derived Settlement Layers from Sentinel-1 Data and Copernicus High Resolution Information Layers
Multi-labelled Image Segmentation in Irregular, Weighted Networks: A Spatial Autocorrelation Approach
Modelling Urban Thermal Comfort: Evaluating the Impact of the Urban Requalification Project of Praça Duque De Saldanha and Avenida Da República in Lisbon
Urban Indicator for Database Updating - A Decision Tool to Help Stakeholders and Map Producers
Taming the Evolution of Big Data and its Technologies in BigGIS - A Conceptual Architectural Framework for Spatio-Temporal Analytics at Scale
A Web Platform for the Systematic Monitoring of Coastal Structures
Global-Detector - GIS- and Knowledge-based Tool for a Global Detection of the Potential for Production, Supply and Demand
GIS Open Source Application as a Support to a Hospital Morbidity Database - Hospital GIS
Hex-utils: A Tool Set Supporting HexASCII Hexagonal rasters
Assessing the Vulnerability of Agricultural Crops to Riverine Floods in Kalibo, Philippines using Composite Index Method
Study of the Floodflow Dynamics in the Pantanal of Cáceres/MT
Model Validation of an Open-source Framework for Post-processing INS/GNSS Systems
Quantity Distribution Search using Sparse Representation Generated with Kernel-based Regression
Modeling Standards and File Formats for Indoor Mapping
Application of SensorML in the Description of the Prototype Air Monitoring Network
Forecasting Asthma Hospital Admissions from Remotely Sensed Environmental Data
Landslide Risk Assessment of the Santorini Volcanic Group
Morphotectonic Analysis between Crete and Kasos
GIS-based Evacuation Routing using Capacity Aware Shortest Path Evacuation Routing Algorithm and Analytic Hierarchy Process for Flood Prone Communities
Extending Land Administration Domain Models with a Goal Perspective
First Experiences with Google Earth Engine
Polygon-based Technique for Image Fusion and Land Cover Monitoring; Case Study World Islands/UAE
Development of Mapping Design for Agricultural Features Extracted from LiDAR Datasets
Adaptive Bootstrapping for Crowdsourced Indoor Maps
Land Use Planning for Sustainable Development of Coastal Regions
Flood Modeling using Gis and LiDAR of Padada River in Southeastern Philippines
Future Land Use Change Dynamics in Natural Protected Areas - Madrid Region Case Study
Cartographic Scale and Minimum Mapping Unit Influence on LULC Modelling
Mapping Socio-biodiversity: Do Old Modelling Tools Suit New Challenges?
Modeling Land Change using One or Two Time Points based Calibration - A Comparison of Factors
Land Change Modeling Handling with Various Training Dates
Modelling Transport-based Land-use Scenarios in Bogota
Using Constraint Cellular Automata to Simulate Urban Development in a Cross-border Area
Improving SLEUTH Calibration with a Genetic Algorithm
The Computational Research on the Ancient near East (CRANE) Project: An Archaeological Data Integration, Simulation and Data Mining
Solid Waste Collection Routing Optimization using Hybridized Modified Discrete Firefly Algorithm and Simulated Annealing - A Case Study in Davao City, Philippines
New Needs and New Tools for Marine Management