


default search action
9. FPS 2016: Québec City, QC, Canada
- Frédéric Cuppens, Lingyu Wang, Nora Cuppens-Boulahia, Nadia Tawbi

, Joaquín García-Alfaro
:
Foundations and Practice of Security - 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10128, Springer 2017, ISBN 978-3-319-51965-4
Malware and Anomaly Detection
- Antonio La Marra, Fabio Martinelli, Andrea Saracino

, Mina Sheikhalishahi:
MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes. 3-19 - Andrew Bedford

, Sébastien Garvin, Josée Desharnais
, Nadia Tawbi
, Hana Ajakan, Frédéric Audet, Bernard Lebel:
Andrana: Quick and Accurate Malware Detection for Android. 20-35 - Richard E. Harang, Peter Mell:

Micro-signatures: The Effectiveness of Known Bad N-Grams for Network Anomaly Detection. 36-47
Intrusion Response
- Tarek Bouyahia, Nora Cuppens-Boulahia, Frédéric Cuppens, Fabien Autrel:

Multi-Criteria Recommender Approach for Supporting Intrusion Response System. 51-67 - Nadine Herold, Matthias Wachs, Stephan-Alexander Posselt, Georg Carle:

An Optimal Metric-Aware Response Selection Strategy for Intrusion Response Systems. 68-84 - Zhongtian Chen, Hao Han:

Attack Mitigation by Data Structure Randomization. 85-93
Vulnerability Analysis and Security Metrics
- Salaheddine Zerkane

, David Espes
, Philippe Le Parc, Frédéric Cuppens:
Vulnerability Analysis of Software Defined Networking. 97-116 - Mickael Emirkanian-Bouchard, Lingyu Wang:

Towards Metric-Driven, Application-Specific Visualization of Attack Graphs. 117-134 - Sofiene Boulares, Kamel Adi

, Luigi Logrippo:
Insider Threat Likelihood Assessment for Access Control Systems: Quantitative Approach. 135-142
Privacy and Verification
- Tushar Kanti Saha

, Takeshi Koshiba
:
An Enhancement of Privacy-Preserving Wildcards Pattern Matching. 145-160 - Mina Sheikhalishahi, Mohamed Mejri, Nadia Tawbi

, Fabio Martinelli:
Privacy-Aware Data Sharing in a Tree-Based Categorical Clustering Algorithm. 161-178 - Raphaël Khoury, Sébastien Gaboury

, Sylvain Hallé
:
Three Views of Log Trace Triaging. 179-195
Crypto and Communication Security
- Hélène Le Bouder, Ronan Lashermes, Yanis Linge, Gaël Thomas, Jean-Yves Zie:

A Multi-round Side Channel Attack on AES Using Belief Propagation. 199-213 - Olivier Blazy

, Xavier Bultel, Pascal Lafourcade
:
Anonymizable Ring Signature Without Pairing. 214-222 - Lyes Bayou, David Espes

, Nora Cuppens-Boulahia, Frédéric Cuppens:
Security Analysis of WirelessHART Communication Scheme. 223-238
Malware and Antivirus
- Guillaume Bonfante, Julien Oury Nogues:

Function Classification for the Retro-Engineering of Malwares. 241-255 - Saed Alrabaee, Paria Shirani

, Mourad Debbabi
, Lingyu Wang:
On the Feasibility of Malware Authorship Attribution. 256-272 - Erkan Ersan, Lior Malka, Bruce M. Kapron

:
Semantically Non-preserving Transformations for Antivirus Evaluation. 273-281
Web, Cloud, and Delegation
- Deepak Subramanian, Guillaume Hiet

, Christophe Bidan:
A Self-correcting Information Flow Control Model for the Web-Browser. 285-301 - Nawaf Alhebaishi

, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Threat Modeling for Cloud Data Center Infrastructures. 302-319 - Daniel Servos

, Sylvia L. Osborn:
Strategies for Incorporating Delegation into Attribute-Based Access Control (ABAC). 320-328
Physical Security
- Jurek Czyzowicz, Adrian Kosowski, Evangelos Kranakis

, Najmeh Taleb:
Patrolling Trees with Mobile Robots. 331-344 - Oscar M. Guillen, Fabrizio De Santis, Ralf Brederlow

, Georg Sigl:
Towards Side-Channel Secure Firmware Updates - A Minimalist Anomaly Detection Approach. 345-360

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














