• An Anti-Phishing Kit Scheme for Secure Web Transactions
  • Rest in Protection - A Kernel-level Approach to Mitigate RIP Tampering
  • SELint: An SEAndroid Policy Analysis Tool
  • Gamification of Information Security Awareness and Training
  • Outsourcing Scheme of ABE Encryption Secure against Malicious Adversary
  • User Feedback Analysis for Mobile Malware Detection
  • Attribute Permutation Steganography Detection using Attribute Position Changes Count
  • Towards an Understanding of the Misclassification Rates of Machine Learning-based Malware Detection Systems
  • System for Executing Encrypted Java Programs
  • Characterization of Tor Traffic using Time based Features
  • White-box Implementation of Stream Cipher
  • Traffic Statistics of a High-Bandwidth Tor Exit Node
  • There’s Wally! Location Tracking in Android without Permissions
  • Hypervisor based Memory Introspection: Challenges, Problems and Limitations
  • SitAC – A System for Situation-aware Access Control - Controlling Access to Sensor Data
  • Quantification of De-anonymization Risks in Social Networks
  • A Methodology of Security Pattern Classification and of Attack-Defense Tree Generation
  • A Technique for Extraction and Analysis of Application Heap Objects within Android Runtime (ART)
  • Improved Greedy Nonrandomness Detectors for Stream Ciphers
  • A Design of Secure and ReliableWireless Transmission Channel for Implantable Medical Devices
  • Macro Malware Detection using Machine Learning Techniques - A New Approach
  • Batch-verifiable Secret Sharing with Unconditional Privacy
  • Assessing Information Security Risks using Pairwise Weighting
  • Towards Confidentiality-strengthened Personalized Genomic Medicine Embedding Homomorphic Cryptography
  • Analysis and Assessment of Situational Awareness Models for National Cyber Security Centers
  • Longkit - A Universal Framework for BIOS/UEFI Rootkits in System Management Mode
  • Privacy Preserving Transparent Mobile Authentication
  • Non-interactive Privacy-preserving k-NN Classifier
  • Network and Topology Models to Support IDS Event Processing
  • Enhancing Accuracy of Android Malware Detection using Intent Instrumentation
  • A Review of Risk Identification Approaches in the Telecommunication Domain
  • Fingerprint Class Recognition for Securing EMV Transaction
  • Stealth Address and Key Management Techniques in Blockchain Systems
  • A Collaborative Tool for Modelling Multi-stage Attacks
  • Design of an Anomaly-based Threat Detection & Explication System
  • Improving the Automatic Identification of Malicious Android Apps in Unofficial Stores through Logo Analysis
  • Identity Deception Detection on Social Media Platforms
  • Breaking a Hitag2 Protocol with Low Cost Technology
  • Towards a Privacy Scorecard – Initial Design Exemplified on an Intelligent Transport Systems Service
  • Exploration of the Potential of Process Mining for Intrusion Detection in Smart Metering
  • CyTrONE: An Integrated Cybersecurity Training Framework
  • Towards Optimized Security-aware (O-Sec) VM Placement Algorithms
  • Privacy Preserving Data Classification using Inner-product Functional Encryption
  • Why Snoopy Loves Online Services: An Analysis of (Lack of) Privacy in Online Services
  • Analysis of Data Sharing Agreements
  • Real-time DSP Implementations of Voice Encryption Algorithms
  • Limited Use Cryptographic Tokens in Securing Ephemeral Cloud Servers
  • Tracking Dependent Information Flows
  • Malware Detection based on Graph Classification
  • On Usage Control in Relational Database Management Systems - Obligations and Their Enforcement in Joining Datasets
  • Extending the Same Origin Policy with Origin Attributes
  • Distance-bounding Identification
  • From Situation Awareness to Action: An Information Security Management Toolkit for Socio-technical Security Retrospective and Prospective Analysis
  • Platform-agnostic Low-intrusion Optical Data Exfiltration
  • Memory Forensics of Insecure Android Inter-app Communications
  • Machine Learning Meets iOS Malware: Identifying Malicious Applications on Apple Environment
  • On the Security of Safety-critical Embedded Systems: Who Watches the Watchers? Who Reprograms the Watchers?
  • Distributed Protocols at the Rescue for Trustworthy Online Voting
  • Enhanced Identification of Sensitive User Inputs in Mobile Applications
  • A Formal Model of Web Security Showing Malicious Cross Origin Requests and Its Mitigation using CORP
  • Brute Force Cryptanalysis of MIFARE Classic Cards on GPU
  • Cyber-interdependency in Smart Energy Systems
  • Health Information Exchange and Related IT-security Practices in European Hospitals
  • Security Issues with BACnet Value Handling
  • Secure APIs for Applications in Microkernel-based Systems
  • Hacking of the AES with Boolean Functions
  • Glassbox: Dynamic Analysis Platform for Malware Android Applications on Real Devices
  • Mathematical Backdoors in Symmetric Encryption Systems - Proposal for a Backdoored AES-like Block Cipher
  • Sequitur-based Inference and Analysis Framework for Malicious System Behavior
  • Static and Dynamic Analysis of Android Malware
  • “Mirror, Mirror on the Wall, Who is the Fairest One of All?” - Machine Learning versus Model Checking: A Comparison between Two Static Techniques for Malware Family Identification
  • Internal Network Monitoring and Anomaly Detection through Host Clustering
  • Verifying Data Secure Flow in AUTOSAR Models by Static Analysis
  • Extracting Android Malicious Behaviors
  • Identifying Mobile Repackaged Applications through Formal Methods
  • On the Detection of Replay Attacks in Industrial Automation Networks Operated with Profinet IO
  • Freeze & Crypt: Linux Kernel Support for Main Memory Encryption
  • A Lightweight Integrity Protection Scheme for Fast Communications in Smart Grid
  • Forensic Analysis of Communication Records of Web-based Messaging Applications from Physical Memory
  • Formally Verifying Flow Properties in Industrial Systems
  • Attribute based Encryption for Multi-level Access Control Policies
  • Mobile Silent and Continuous Authentication using Apps Sequence
  • The Efficient Randomness Testing using Boolean Functions
  • First Practical Side-channel Attack to Defeat Point Randomization in Secure Implementations of Pairing-based Cryptography
  • Analysis of Intrusion Detection Systems in Industrial Ecosystems
  • Face Recognition-based Presentation Attack Detection in a Two-step Segregated Automated Border Control e-Gate - Results of a Pilot Experience at Adolfo Suárez Madrid-Barajas Airport
  • Privacy-Preserving Verifiability - A Case for an Electronic Exam Protocol
  • Accelerating Square Root Computations Over Large GF (2m)
  • SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition
  • On Obfuscating Compilation for Encrypted Computing
  • Privacy-preserving Regression on Partially Encrypted Data
  • Mining Encrypted Software Logs using Alpha Algorithm
  • Differential and Rotational Cryptanalysis of Round-reduced MORUS
  • The Semantic Discrimination Rate Metric for Privacy Measurements which Questions the Benefit of t-closeness over l-diversity
  • One Random Jump and One Permutation: Sufficient Conditions to Chaotic, Statistically Faultless, and Large Throughput PRNG for FPGA
  • (In) Security in Graph Databases - Analysis and Data Leaks
  • PB-PKI: A Privacy-aware Blockchain-based PKI
  • RmPerm: A Tool for Android Permissions Removal
  • HAIT: Heap Analyzer with Input Tracing
  • Evaluating Credit Card Transactions in the Frequency Domain for a Proactive Fraud Detection Approach
  • On the Relation Between SIM and IND-RoR Security Models for PAKEs
  • SLAP: Secure Lightweight Authentication Protocol for Resource-constrained Devices
  • Some Remarks about Tracing Digital Cameras – Faster Method and Usable Countermeasure
  • Adding Privacy Protection to Distributed Software Systems
  • Using a History-based Profile to Detect and Respond to DDoS Attacks
  • LOCALPKI: A User-Centric Formally Proven Alternative to PKIX
  • Practical Passive Leakage-abuse Attacks Against Symmetric Searchable Encryption
  • Cryptographic Service Providers in Current Device Landscapes: An Inconvenient Truth
  • Constant-size Threshold Attribute based SignCryption for Cloud Applications
  • The Net Rat - Rethinking Connected Services for Increased Security
  • Efficient Heuristic Safety Analysis of Core-based Security Policies
  • Short Paper: Industrial Feasibility of Private Information Retrieval
  • Vector Quantization based Steganography for Secure Speech Communication System
  • GLITCH: A Discrete Gaussian Testing Suite for Lattice-based Cryptography
  • Program Execution Analysis using UserAssist Key in Modern Windows
  • Capturing the Effects of Attribute based Correlation on Privacy in Micro-databases
  • Improving Throughput in BB84 Quantum Key Distribution
  • A Review of PROFIBUS Protocol Vulnerabilities - Considerations for Implementing Authentication and Authorization Controls
  • FlowSlicer - A Hybrid Approach to Detect and Avoid Sensitive Information Leaks in Android Applications using Program Slicing and Instrumentation
  • A Card-less TEE-based Solution for Trusted Access Control
  • s2ipt: A Lightweight Network Intrusion Detection/Prevention System based on IPtables
  • Reputation Management in Online Social Networks - A New Clustering-based Approach
  • Interaction Platform for Improving Detection Capability of Dynamic Application Security Testing
  • Strong Authentication for e-Banking: A Survey on European Regulations and Implementations
  • A Lightweight Online Advertising Classification System using Lexical-based Features
  • Formal Analyze of a Private Access Control Protocol to a Cloud Storage
  • Differential-linear and Impossible Differential Cryptanalysis of Round-reduced Scream
  • Experimental Assessment of Private Information Disclosure in LTE Mobile Networks
  • Towards a Self-adaptive Trust Management Model for VANETs
  • PAnTHErS: A Prototyping and Analysis Tool for Homomorphic Encryption Schemes
  • On Efficient Access Control Mechanisms in Hierarchy using Unidirectional and Transitive Proxy Re-encryption Schemes
  • Privacy-preserving Disease Susceptibility Test with Shamir’s Secret Sharing
  • Anonymous Credentials with Practical Revocation using Elliptic Curves
  • On the Application of Fuzzy Set Theory for Access Control Enforcement
  • Clustering-based Approach for Anomaly Detection in XACML Policies
  • Scenario-based Vulnerability Analysis in IoT-based Patient Monitoring System
  • Fair and Accountable Anonymity for the Tor Network
  • Context-based Encryption Applied to Data Leakage Prevention Solutions
  • Exploring USB Connection Vulnerabilities on Android Devices - Breaches using the Android Debug Bridge
  • Information Flows at OS Level Unmask Sophisticated Android Malware
  • Privacy as a Currency: Un-regulated?
  • A Probabilistic Baby-step Giant-step Algorithm
  • A Generic, Extensible Data Model for Trajectory Determination Systems
  • Geographical Information System Applications for Pipeline Right of Way Aerial Surveillance
  • Data Density Considerations for Crowd Sourced Population Estimations from Social Media
  • Sentinel-1 for Urban Areas - Comparison between Automatically Derived Settlement Layers from Sentinel-1 Data and Copernicus High Resolution Information Layers
  • Multi-labelled Image Segmentation in Irregular, Weighted Networks: A Spatial Autocorrelation Approach
  • Modelling Urban Thermal Comfort: Evaluating the Impact of the Urban Requalification Project of Praça Duque De Saldanha and Avenida Da República in Lisbon
  • Urban Indicator for Database Updating - A Decision Tool to Help Stakeholders and Map Producers
  • Taming the Evolution of Big Data and its Technologies in BigGIS - A Conceptual Architectural Framework for Spatio-Temporal Analytics at Scale
  • A Web Platform for the Systematic Monitoring of Coastal Structures
  • Global-Detector - GIS- and Knowledge-based Tool for a Global Detection of the Potential for Production, Supply and Demand
  • GIS Open Source Application as a Support to a Hospital Morbidity Database - Hospital GIS
  • Hex-utils: A Tool Set Supporting HexASCII Hexagonal rasters
  • Assessing the Vulnerability of Agricultural Crops to Riverine Floods in Kalibo, Philippines using Composite Index Method
  • Study of the Floodflow Dynamics in the Pantanal of Cáceres/MT
  • Model Validation of an Open-source Framework for Post-processing INS/GNSS Systems
  • Quantity Distribution Search using Sparse Representation Generated with Kernel-based Regression
  • Modeling Standards and File Formats for Indoor Mapping
  • Application of SensorML in the Description of the Prototype Air Monitoring Network
  • Forecasting Asthma Hospital Admissions from Remotely Sensed Environmental Data
  • Landslide Risk Assessment of the Santorini Volcanic Group
  • Morphotectonic Analysis between Crete and Kasos
  • GIS-based Evacuation Routing using Capacity Aware Shortest Path Evacuation Routing Algorithm and Analytic Hierarchy Process for Flood Prone Communities
  • Extending Land Administration Domain Models with a Goal Perspective
  • First Experiences with Google Earth Engine
  • Polygon-based Technique for Image Fusion and Land Cover Monitoring; Case Study World Islands/UAE
  • Development of Mapping Design for Agricultural Features Extracted from LiDAR Datasets
  • Adaptive Bootstrapping for Crowdsourced Indoor Maps
  • Land Use Planning for Sustainable Development of Coastal Regions
  • Flood Modeling using Gis and LiDAR of Padada River in Southeastern Philippines
  • Future Land Use Change Dynamics in Natural Protected Areas - Madrid Region Case Study
  • Cartographic Scale and Minimum Mapping Unit Influence on LULC Modelling
  • Mapping Socio-biodiversity: Do Old Modelling Tools Suit New Challenges?
  • Modeling Land Change using One or Two Time Points based Calibration - A Comparison of Factors
  • Land Change Modeling Handling with Various Training Dates
  • Modelling Transport-based Land-use Scenarios in Bogota
  • Using Constraint Cellular Automata to Simulate Urban Development in a Cross-border Area
  • Improving SLEUTH Calibration with a Genetic Algorithm
  • The Computational Research on the Ancient near East (CRANE) Project: An Archaeological Data Integration, Simulation and Data Mining
  • Solid Waste Collection Routing Optimization using Hybridized Modified Discrete Firefly Algorithm and Simulated Annealing - A Case Study in Davao City, Philippines
  • New Needs and New Tools for Marine Management