Risks and Security of Internet and Systems: 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29–31, 2019, Proceedings

The last few decades have entertained a fast digital transformation of our daily activities. This has brought about numerous benefits as well as unanticipated consequences. As such, on the consequences side, information privacy incidents have become prevalent. This has further raised the concern of users and data protection bodies alike. Thus, quantifying and communicating privacy risks plays paramount role in raising user awareness, designing appropriate technical solutions, and enacting legal frameworks. However, previous research in privacy risk quantification has not considered the user’s heterogeneously subjective perceptions of privacy, and her right to informational self determination since, often, the privacy risk analysis and prevention takes place once the data is out of her control. In this paper, we present a user-centered privacy risk quantification framework coupled with granular and usable privacy risk warnings. The framework takes a new approach in that it empowers users to take informed privacy protection decisions prior to unintended data disclosure.

[1]  Scott Craver,et al.  On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.

[2]  Robin van Meteren Using Content-Based Filtering for Recommendation , 2000 .

[3]  Qi Li,et al.  Building accountability into the Internet of Things: the IoT Databox model , 2018, Journal of Reliable Intelligent Environments.

[4]  Jiannan Li,et al.  The Policy Effect of the General Data Protection Regulation (GDPR) on the Digital Public Health Sector in the European Union: An Empirical Investigation , 2019, International journal of environmental research and public health.

[5]  Juan Camilo Vargas,et al.  Blockchain-based consent manager for GDPR compliance , 2019, Open Identity Summit.

[6]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[7]  Jie Gu,et al.  An effective intrusion detection framework based on SVM with feature augmentation , 2017, Knowl. Based Syst..

[8]  Ganthan Narayana Samy,et al.  Security threats categories in healthcare information systems , 2010, Health Informatics J..

[9]  Zhibin Zhou,et al.  Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption , 2015, IEEE Transactions on Computers.

[10]  Hamad Alrimeih,et al.  Fast and Flexible Hardware Support for ECC Over Multiple Standard Prime Fields , 2014, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[11]  Kam-Fai Wong,et al.  Interpreting TF-IDF term weights as making relevance decisions , 2008, TOIS.

[12]  Carol Woody,et al.  Introduction to the OCTAVE ® Approach , 2003 .

[13]  Erik Tews,et al.  Practical attacks against WEP and WPA , 2009, WiSec '09.

[14]  Craig H. Rowland,et al.  Covert Channels in the TCP/IP Protocol Suite , 1997, First Monday.

[15]  Ana Ferreira,et al.  TagUBig - Taming Your Big Data , 2018, 2018 International Carnahan Conference on Security Technology (ICCST).

[16]  Douglas L. Reilly,et al.  Credit card fraud detection with a neural-network , 1994, 1994 Proceedings of the Twenty-Seventh Hawaii International Conference on System Sciences.

[17]  Dawn Xiaodong Song,et al.  TaintEraser: protecting sensitive data leaks using application-level taint tracking , 2011, OPSR.

[18]  John K. Ousterhout,et al.  In Search of an Understandable Consensus Algorithm , 2014, USENIX ATC.

[19]  Bashar Nuseibeh,et al.  Requirements-driven adaptive security: Protecting variable assets at runtime , 2012, 2012 20th IEEE International Requirements Engineering Conference (RE).

[20]  Kenneth G. Paterson,et al.  Plaintext Recovery Attacks Against WPA/TKIP , 2014, FSE.

[21]  Dan Schnackenberg,et al.  Statistical approaches to DDoS attack detection and response , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[22]  Thomas Plantard,et al.  Modular Number Systems: Beyond the Mersenne Family , 2004, Selected Areas in Cryptography.

[23]  John Mylopoulos,et al.  Goal-driven risk assessment in requirements engineering , 2011, Requirements Engineering.

[24]  Frank Piessens,et al.  Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 , 2017, CCS.

[25]  Yajin Zhou,et al.  NDroid: Toward Tracking Information Flows Across Multiple Android Contexts , 2019, IEEE Transactions on Information Forensics and Security.

[26]  Bu-Sung Lee,et al.  Power spectrum entropy based detection and mitigation of low-rate DoS attacks , 2018, Comput. Networks.

[27]  João Paulo Papa,et al.  Internet of Things: A survey on machine learning-based intrusion detection approaches , 2019, Comput. Networks.

[28]  Jun Yang,et al.  Model of Collaborative UAV Swarm Toward Coordination and Control Mechanisms Study , 2015, ICCS.

[29]  Rong Jin,et al.  Understanding bag-of-words model: a statistical framework , 2010, Int. J. Mach. Learn. Cybern..

[30]  Bernhard Rinner,et al.  Communication and Coordination for Drone Networks , 2016, ADHOCNETS.

[31]  Josep Domingo-Ferrer,et al.  Privacy and Data Protection by Design - from policy to engineering , 2014, ArXiv.

[32]  Lalu Banoth,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .

[33]  Michail Maniatakos,et al.  The Cybersecurity Landscape in Industrial Control Systems , 2016, Proceedings of the IEEE.

[34]  Agustí Verde Parera,et al.  General data protection regulation , 2018 .

[35]  Yiyu Yao,et al.  Measuring Retrieval Effectiveness Based on User Preference of Documents , 1995, J. Am. Soc. Inf. Sci..

[36]  Christos Douligeris,et al.  ForChaos: Real Time Application DDoS Detection Using Forecasting and Chaos Theory in Smart Home IoT Network , 2019, Wirel. Commun. Mob. Comput..

[37]  Venizelos Efthymiou,et al.  STRATEGIC RESEARCH AGENDA FOR EUROPE’S ELECTRICITY NETWORKS OF THE FUTURE: European Technology Platform SmartGrids , 2007 .

[38]  Axel van Lamsweerde,et al.  Elaborating security requirements by construction of intentional anti-models , 2004, Proceedings. 26th International Conference on Software Engineering.

[39]  Len Hamey,et al.  A survey of security and privacy issues in the Internet of Things from the layered context , 2019, Trans. Emerg. Telecommun. Technol..

[40]  V. Lim The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice , 2002 .

[41]  Jürgen Beyerer,et al.  The EU General Data Protection Regulation and its Effects on Designing Assistive Environments , 2018, PETRA.

[42]  Bernd Freisleben,et al.  CARDWATCH: a neural network based database mining system for credit card fraud detection , 1997, Proceedings of the IEEE/IAFE 1997 Computational Intelligence for Financial Engineering (CIFEr).

[43]  Judea Pearl,et al.  Bayesian Networks , 1998, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..

[44]  Ramiro Gonçalves,et al.  Intrusion detection systems in Internet of Things: A literature review , 2018, 2018 13th Iberian Conference on Information Systems and Technologies (CISTI).

[45]  Adel M. Alimi,et al.  Age, Gender, Race and Smile Prediction Based on Social Textual and Visual Data Analyzing , 2016, ISDA.

[46]  Vijay Sivaraman,et al.  Real-Time Detection of DNS Exfiltration and Tunneling from Enterprise Networks , 2019, 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).

[47]  Sebastian Zander,et al.  A survey of covert channels and countermeasures in computer network protocols , 2007, IEEE Communications Surveys & Tutorials.

[48]  Barry Smyth,et al.  Case-Based Recommendation , 2007, The Adaptive Web.

[49]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[50]  Thomas Plantard,et al.  Arithmetic operations in the polynomial modular number system , 2005, 17th IEEE Symposium on Computer Arithmetic (ARITH'05).

[51]  Andrea Back,et al.  A new perspective on neutralization and deterrence: Predicting shadow IT usage , 2017, Inf. Manag..

[52]  Robert H. Deng,et al.  HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing , 2012, IEEE Transactions on Information Forensics and Security.

[53]  Gilles Louppe,et al.  Understanding Random Forests: From Theory to Practice , 2014, 1407.7502.

[54]  Shveti Sejpal,et al.  Comparative Performance Analysis of Secured LWT-SVD Based Color Image Watermarking Technique in YUV, YIQ and YCbCr Color Spaces , 2016 .

[55]  Ashok A. Ghatol,et al.  Combined DWT-DCT digital Watermarking Technique Software Used for CTS of Bank , 2014, 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT).

[56]  Pervaiz K. Ahmed,et al.  What Drives Information Security Policy Violations among Banking Employees?: Insights from Neutralization and Social Exchange Theory , 2015, J. Glob. Inf. Manag..

[57]  Hesham Hefny,et al.  Intrusion Detection System Using Machine Learning Approaches , 2018 .

[58]  Yu Chen,et al.  Protection of Database Security via Collaborative Inference Detection , 2008, IEEE Transactions on Knowledge and Data Engineering.

[59]  Kiyoharu Aizawa,et al.  Geometrically Invariant Object-Based Watermarking using SIFT Feature , 2006, 2007 IEEE International Conference on Image Processing.

[60]  P. Biernacki,et al.  Snowball Sampling: Problems and Techniques of Chain Referral Sampling , 1981 .

[61]  Reid A. Johnson,et al.  Calibrating Probability with Undersampling for Unbalanced Classification , 2015, 2015 IEEE Symposium Series on Computational Intelligence.

[62]  Karin Bernsmed,et al.  A Cloud Accountability Policy Representation Framework , 2014, CLOSER.

[63]  Gyungho Lee,et al.  DDoS Attack Detection and Wavelets , 2003, Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712).

[64]  Sven Hartmann,et al.  Efficient Inference Control for Open Relational Queries , 2010, DBSec.

[65]  Saoussen Cheikhrouhou,et al.  The temporal perspective in business process modeling: a survey and research challenges , 2014, Service Oriented Computing and Applications.

[66]  Nick Feamster,et al.  Machine Learning DDoS Detection for Consumer Internet of Things Devices , 2018, 2018 IEEE Security and Privacy Workshops (SPW).

[67]  Claudia Keser,et al.  Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[68]  Zvika Brakerski,et al.  Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP , 2012, CRYPTO.

[69]  S. Mamede,et al.  Innovations in medical internship: benchmarking and application within the King Saud bin Abdulaziz University for Health Sciences. , 2010, Education for health.

[70]  Marlon Dumas,et al.  Optimized Execution of Business Processes on Blockchain , 2016, BPM.

[71]  Susan J. Harrington,et al.  The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions , 1996, MIS Q..

[72]  Asifullah Khan,et al.  Robust image watermarking technique using triangular regions and Zernike moments for quantization based embedding , 2017, Multimedia Tools and Applications.

[73]  Nicolas Gama,et al.  Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds , 2016, ASIACRYPT.

[74]  Allison Bishop,et al.  Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..

[75]  Zhemin Yang,et al.  LeakMiner: Detect Information Leakage on Android with Static Taint Analysis , 2012, 2012 Third World Congress on Software Engineering.

[76]  Zhaohui Wu,et al.  Enterprise Pattern: integrating the business process into a unified enterprise model of modern service company , 2017, Enterp. Inf. Syst..

[77]  Butler W. Lampson,et al.  A note on the confinement problem , 1973, CACM.

[78]  Nick Cercone,et al.  Auditing and Inference Control for Privacy Preservation in Uncertain Environments , 2006, EuroSSC.

[79]  Brent Waters,et al.  Secure attribute-based systems , 2006, CCS '06.

[80]  W. Alec Cram,et al.  Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance , 2019, MIS Q..

[81]  Merrill Warkentin,et al.  Beyond Deterrence: An Expanded View of Employee Computer Abuse , 2013, MIS Q..

[82]  George Danezis,et al.  A pact with the devil , 2006, NSPW '06.

[83]  Mohamed Jmaiel,et al.  Multi-layer coordinated adaptation based on graph refinement for cooperative activities , 2008 .

[84]  Chris Clifton,et al.  Privacy-preserving data integration and sharing , 2004, DMKD '04.

[85]  Rüdiger W. Brause,et al.  Neural data mining for credit card fraud detection , 1999, Proceedings 11th International Conference on Tools with Artificial Intelligence.

[86]  Tao Xie,et al.  WHYPER: Towards Automating Risk Assessment of Mobile Applications , 2013, USENIX Security Symposium.

[87]  Orlenys López-Pintado,et al.  Caterpillar: A Blockchain-Based Business Process Management System , 2017, BPM.

[88]  Rene Meis,et al.  Problem-Based Consideration of Privacy-Relevant Domain Knowledge , 2013, Privacy and Identity Management.

[89]  Jon T. S. Quah,et al.  Real Time Credit Card Fraud Detection using Computational Intelligence , 2007, 2007 International Joint Conference on Neural Networks.

[90]  Paul Benjamin Lowry,et al.  Examining the intended and unintended consequences of organisational privacy safeguards , 2016, Eur. J. Inf. Syst..

[91]  Honggang Wang Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks , 2010, The Journal of Supercomputing.

[92]  Serge Chaumette,et al.  Characterizing Topological Assumptions of Distributed Algorithms in Dynamic Networks , 2009, SIROCCO.

[93]  Muawia A. Elsadig,et al.  Packet Length Covert Channel: A Detection Scheme , 2018, 2018 1st International Conference on Computer Applications & Information Security (ICCAIS).

[94]  Pr. Mahmoud Abdellaoui,et al.  A novel cryptographic solution to secure mobile wireless sensors networks , 2019, Int. J. Secur. Networks.

[95]  Mahesh Chandra Govil,et al.  A comparative analysis of SVM and its stacking with other classification algorithm for intrusion detection , 2016, 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Spring).

[96]  A. Annie Portia,et al.  Analysis on credit card fraud detection methods , 2011, 2011 International Conference on Computer, Communication and Electrical Technology (ICCCET).

[97]  W. W. Minor,et al.  Techniques of Neutralization: a Reconceptualization and Empirical Examination , 1981 .

[98]  V. Canda,et al.  A new mode of using all-or-nothing transforms , 2002, Proceedings IEEE International Symposium on Information Theory,.

[99]  Adel M. Alimi,et al.  Deep neural network features for horses identity recognition using multiview horses’ face pattern , 2017, International Conference on Machine Vision.

[100]  Sophie Ahrens,et al.  Recommender Systems , 2012 .

[101]  V. Prasad,et al.  H.264/AVC video protection model based on private cloud for military organisation , 2016, 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT).

[102]  A Yahia,et al.  Survey on Covert Storage Channel in Computer Network Protocols Detection and Mitigation Techniques , 2016 .

[103]  Isil Dillig,et al.  Apposcopy: semantics-based detection of Android malware through static analysis , 2014, SIGSOFT FSE.

[104]  Oded Regev,et al.  The Learning with Errors Problem (Invited Survey) , 2010, 2010 IEEE 25th Annual Conference on Computational Complexity.

[105]  Chong-Wah Ngo,et al.  k-means: A revisit , 2018, Neurocomputing.

[106]  Bhusari,et al.  Application of Hidden Markov Model in Credit Card Fraud Detection , 2011 .

[107]  Hesham El-Sayed,et al.  Traceroute Based IP Channel for Sending Hidden Short Messages , 2006, IWSEC.

[108]  Valentin Sgarciu,et al.  Anomaly Intrusions Detection Based on Support Vector Machines with an Improved Bat Algorithm , 2015, 2015 20th International Conference on Control Systems and Computer Science.

[109]  Jinquan Zeng,et al.  Research on Dynamical Security Risk Assessment for the Internet of Things inspired by immunology , 2012, 2012 8th International Conference on Natural Computation.

[110]  Tancrède Lepoint,et al.  NFLlib: NTT-Based Fast Lattice Library , 2016, CT-RSA.

[111]  Hartmut Ehrig,et al.  Fundamentals of Algebraic Graph Transformation , 2006, Monographs in Theoretical Computer Science. An EATCS Series.

[112]  Hervé Debar,et al.  Dynamic risk management response system to handle cyber threats , 2017, Future Gener. Comput. Syst..

[113]  Mathias Weske,et al.  Blockchains for Business Process Management - Challenges and Opportunities , 2017, ACM Trans. Manag. Inf. Syst..

[114]  Igor Nai Fovino,et al.  A Permission verification approach for android mobile applications , 2015, Comput. Secur..

[115]  Ekrem Duman,et al.  Detecting credit card fraud by decision trees and support vector machines , 2011 .

[116]  Stefan Savage,et al.  802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.

[117]  Yuan Xue,et al.  A language for describing attacks on cyber-physical systems , 2015, Int. J. Crit. Infrastructure Prot..

[118]  Shadi Aljawarneh,et al.  Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model , 2017, J. Comput. Sci..

[119]  Mariem Abid System-Level Hardwa Synthesis of Dataflow Programs with HEVC as Study Use Case , 2016 .

[120]  Ali Al-Haj,et al.  Copyright protection of e-government document images using digital watermarking , 2017, 2017 3rd International Conference on Information Management (ICIM).

[121]  Mohamed Jmaiel,et al.  A rule-driven approach for architectural self adaptation in collaborative activities using graph grammars , 2010, Int. J. Auton. Comput..

[122]  Mathias Ekstedt,et al.  Quantitative Information Security Risk Estimation Using Probabilistic Attack Graphs , 2016, RISK.

[123]  Julien Eynard,et al.  A Full RNS Variant of FV Like Somewhat Homomorphic Encryption Schemes , 2016, SAC.

[124]  David K. Y. Yau,et al.  Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis , 2018, IEEE Transactions on Information Forensics and Security.

[125]  Burton S. Kaliski,et al.  A Cryptographic Library for the Motorola DSP56000 , 1991, EUROCRYPT.

[126]  Anacleto Correia,et al.  An Approach to GDPR Based on Object Role Modeling , 2019, WorldCIST.

[127]  Paul D. Yoo,et al.  From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods , 2018, IEEE Communications Surveys & Tutorials.

[128]  Alessandra Gorla,et al.  Checking app behavior against app descriptions , 2014, ICSE.

[129]  Konstantin Kogos,et al.  A random traffic padding to limit packet size covert channels , 2015, 2015 Federated Conference on Computer Science and Information Systems (FedCSIS).

[130]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[131]  David A. Wagner,et al.  Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.

[132]  Engin Kirda,et al.  UNVEIL: A large-scale, automated approach to detecting ransomware (keynote) , 2016, SANER.

[133]  Leïla Azouz Saïdane,et al.  Revocable Sliced CipherText Policy Attribute Based Encryption Scheme in Cloud Computing , 2019, 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC).

[134]  Alaa Tharwat,et al.  Parameter investigation of support vector machine classifier with kernel functions , 2019, Knowledge and Information Systems.

[135]  Wathiq Laftah Al-Yaseen,et al.  Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system , 2017, Expert Syst. Appl..

[136]  Raouf Boutaba,et al.  A comprehensive survey on machine learning for networking: evolution, applications and research opportunities , 2018, Journal of Internet Services and Applications.

[137]  Yashwant Prasad Singh,et al.  ONE-CLASS SUPPORT VECTOR MACHINES APPROACH TO ANOMALY DETECTION , 2013, Appl. Artif. Intell..

[138]  Xin Luo,et al.  Awareness Education as the Key to Ransomware Prevention , 2007, Inf. Secur. J. A Glob. Perspect..

[139]  Zhongying Bai,et al.  4-Way Handshake Solutions to Avoid Denial of Service Attack in Ultra Wideband Networks , 2009, 2009 Third International Symposium on Intelligent Information Technology Application.

[140]  Michael Naehrig,et al.  Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme , 2013, IMACC.

[141]  Aad van Moorsel,et al.  Smartphone Continuous Authentication Using Deep Learning Autoencoders , 2017, 2017 15th Annual Conference on Privacy, Security and Trust (PST).

[142]  Lefteris Angelis,et al.  WIVSS: a new methodology for scoring information systems vulnerabilities , 2013, PCI '13.

[143]  Fatima Ezzahra Ouerfelli,et al.  On the Collaborative Inference of DDoS: An Information-theoretic Distributed Approach , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).

[144]  Jaime A. Camelio,et al.  A cyber-physical attack taxonomy for production systems: a quality control perspective , 2019, J. Intell. Manuf..

[145]  Joachim Biskup,et al.  On the Inference-Proofness of Database Fragmentation Satisfying Confidentiality Constraints , 2011, ISC.

[146]  Azzedine Boukerche,et al.  On the Impact of DDoS Attacks on Software-Defined Internet-of-Vehicles Control Plane , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).

[147]  Wolfgang Garn,et al.  How Artificial Intelligence and machine learning research impacts payment card fraud detection: A survey and industry benchmark , 2018, Eng. Appl. Artif. Intell..

[148]  I. V. Kotenko,et al.  Detection of anomalies in data for monitoring of security components in the Internet of Things , 2015, 2015 XVIII International Conference on Soft Computing and Measurements (SCM).

[149]  Irina Shklovski,et al.  An Analysis of the Consequences of the General Data Protection Regulation (GDPR) on Social Network Research , 2019, ArXiv.

[150]  Sebastian Zander,et al.  Pattern-Based Survey and Categorization of Network Covert Channel Techniques , 2014, ACM Comput. Surv..

[151]  V. Sheng,et al.  An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment , 2018 .

[152]  Josep Domingo-Ferrer,et al.  Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics , 2015, ArXiv.

[153]  Eric S. K. Yu,et al.  A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities , 2010, Requirements Engineering.

[154]  Steven C. H. Hoi,et al.  Face Detection using Deep Learning: An Improved Faster RCNN Approach , 2017, Neurocomputing.

[155]  W. Alec Cram,et al.  Organizational information security policies: a review and research framework , 2017, Eur. J. Inf. Syst..

[156]  Jacques Klein,et al.  FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps , 2014, PLDI.

[157]  Igor V. Kotenko,et al.  Event correlation in the integrated cyber-physical security system , 2016, 2016 XIX IEEE International Conference on Soft Computing and Measurements (SCM).

[158]  Mohammad Zulkernine,et al.  Bad-token: denial of service attacks on WPA3 , 2019, SIN.

[159]  John C. S. Lui,et al.  TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime , 2016, CCS.

[160]  Adel M. Alimi,et al.  Online Arabic writer identification based on Beta-elliptic model , 2015, 2015 15th International Conference on Intelligent Systems Design and Applications (ISDA).

[161]  Nick Cercone,et al.  Dynamic inference control in privacy preference enforcement , 2006, PST.

[162]  Xiaohua Jia,et al.  Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage , 2014, IEEE Transactions on Parallel and Distributed Systems.

[163]  Bernhard Rinner,et al.  An Autonomous Multi-UAV System for Search and Rescue , 2015, DroNet@MobiSys.

[164]  Dewan Md. Farid,et al.  Application of Machine Learning Approaches in Intrusion Detection System: A Survey , 2015 .

[165]  Abas Md Said,et al.  Hybrid machine learning technique for intrusion detection system , 2015 .

[166]  Manisha Patil,et al.  A brief study of Wannacry Threat: Ransomware Attack 2017 , 2017 .

[167]  Roland Siegwart,et al.  BRISK: Binary Robust invariant scalable keypoints , 2011, 2011 International Conference on Computer Vision.

[168]  Philippe Gaborit,et al.  Lattice-based homomorphic encryption of vector spaces , 2008, 2008 IEEE International Symposium on Information Theory.

[169]  Jin Cao,et al.  Tracking Long Duration Flows in Network Traffic , 2010, 2010 Proceedings IEEE INFOCOM.

[170]  Izak Benbasat,et al.  Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..

[171]  Hee-su Chae,et al.  Selection for efficient Intrusion Detection using Attribute Ratio , .

[172]  Qingtang Su,et al.  Robust color image watermarking technique in the spatial domain , 2018, Soft Comput..

[173]  Yu Guan,et al.  Mobile Based Continuous Authentication Using Deep Features , 2018, EMDL@MobiSys.

[174]  John Mylopoulos,et al.  Security and privacy requirements analysis within a social setting , 2003, Proceedings. 11th IEEE International Requirements Engineering Conference, 2003..

[175]  Naiqi Wu,et al.  SVM-DT-based adaptive and collaborative intrusion detection , 2018, IEEE/CAA Journal of Automatica Sinica.

[176]  Slim Kallel,et al.  An Engineering Process for Security Patterns Application in Component Based Models , 2013, 2013 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[177]  Andrew Y. Ng,et al.  Convolutional-Recursive Deep Learning for 3D Object Classification , 2012, NIPS.

[178]  Patrick Traynor,et al.  CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data , 2016, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS).

[179]  Orlenys López-Pintado,et al.  Caterpillar: A business process execution engine on the Ethereum blockchain , 2018, Softw. Pract. Exp..

[180]  Adel M. Alimi,et al.  2009 10th International Conference on Document Analysis and Recognition Combining Multiple HMMs Using On-line and Off-line Features for Off-line Arabic Handwriting Recognition , 2022 .

[181]  Vijay Varadharajan,et al.  A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection , 2019, IEEE Communications Surveys & Tutorials.

[182]  Stuart Henry,et al.  Degrees of Deviance: Student Accounts of Their Deviant Behavior , 1999 .

[183]  Mohand-Said Hacid,et al.  Effectively and efficiently selecting access control rules on materialized views over relational databases , 2010, IDEAS '10.

[184]  Xiapu Luo,et al.  TCP covert timing channels: Design and detection , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).

[185]  Khalil Drira,et al.  GMTE: A Tool for Graph Transformation and Exact/Inexact Graph Matching , 2013, GbRPR.

[186]  Xiaoyu Chen,et al.  Run-Time Risk Management in Adaptive ICT Systems , 2013, 2013 International Conference on Availability, Reliability and Security.

[187]  Gagandeep Kaur,et al.  Wavelets Based Anomaly-Based Detection System or J48 and Naïve Bayes Based Signature-Based Detection System: A Comparison , 2018 .

[188]  Lamia Chaari,et al.  Intrusion Detection Study and Enhancement Using Machine Learning , 2019, CRiSIS.

[189]  Fei Wang,et al.  VicSifter: A Collaborative DDoS Detection System with Lightweight Victim Identification , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[190]  Hanna M. Wallach,et al.  Topic modeling: beyond bag-of-words , 2006, ICML.

[191]  Sarah Nait Bahloul,et al.  Securing Materialized Views: a Rewriting-Based Approach , 2013 .

[192]  Atilla Özgür,et al.  A review of KDD99 dataset usage in intrusion detection and machine learning between 2010 and 2015 , 2016, PeerJ Prepr..

[193]  Haralambos Mouratidis,et al.  Secure Tropos: a Security-Oriented Extension of the Tropos Methodology , 2007, Int. J. Softw. Eng. Knowl. Eng..

[194]  Ruth Breu,et al.  Sectet: an extensible framework for the realization of secure inter-organizational workflows , 2006, Internet Res..

[195]  Gregory D. Abowd,et al.  Securing context-aware applications using environment roles , 2001, SACMAT '01.

[196]  Igor V. Kotenko,et al.  Countermeasure Security Risks Management in the Internet of Things Based on Fuzzy Logic Inference , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[197]  Gary B. Wills,et al.  Formal Modelling of Data Integration Systems Security Policies , 2016, Data Science and Engineering.

[198]  Paul F. Cromwell,et al.  the devil made me do it: use of neutralizations by shoplifters , 2003 .

[199]  Rick Cattell,et al.  Scalable SQL and NoSQL data stores , 2011, SGMD.

[200]  Jean-Marie Flaus,et al.  Filters based Approach with Temporal and Combinational Constraints for Cybersecurity of Industrial Control Systems , 2018 .

[201]  M. V. Kuzin,et al.  Payment card fraud detection using neural network committee and clustering , 2015, Optical Memory and Neural Networks.

[202]  Nicolas Gama,et al.  Efficient Multiplication over Extension Fields , 2012, WAIFI.

[203]  Kenneth G. Paterson,et al.  On the Security of RC4 in TLS , 2013, USENIX Security Symposium.

[204]  Harry S. Delugach,et al.  Wizard: A Database Inference Analysis and Detection System , 1996, IEEE Trans. Knowl. Data Eng..

[205]  Heng Yin,et al.  DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis , 2012, USENIX Security Symposium.

[206]  Tolga Acar,et al.  Analyzing and comparing Montgomery multiplication algorithms , 1996, IEEE Micro.

[207]  Yutaka Kawai,et al.  Outsourcing the Re-encryption Key Generation: Flexible Ciphertext-Policy Attribute-Based Proxy Re-encryption , 2015, ISPEC.

[208]  Christian Sturm,et al.  A Lean Architecture for Blockchain Based Decentralized Process Execution , 2018, Business Process Management Workshops.

[209]  Bouabidi Imen,et al.  Hierarchical organization with a cross layers using smart sensors for intelligent cities , 2015, 2015 SAI Intelligent Systems Conference (IntelliSys).

[210]  Zheng Lin,et al.  Research on customer segmentation model by clustering , 2005, ICEC '05.

[211]  Dustin Ormond,et al.  Don't make excuses! Discouraging neutralization to reduce IT policy violation , 2013, Comput. Secur..

[212]  Gerardo Schneider,et al.  Is Privacy by Construction Possible? , 2018, ISoLA.

[213]  Chellapilla Patvardhan,et al.  Effective Color image watermarking scheme using YCbCr color space and QR code , 2017, Multimedia Tools and Applications.

[214]  Thomas Plantard,et al.  Efficient Modular Arithmetic in Adapted Modular Number System Using Lagrange Representation , 2008, ACISP.

[215]  James Hrica Floating-Point Design with Vivado HLS , 2012 .

[216]  Michael Granitzer,et al.  Sequence classification for credit-card fraud detection , 2018, Expert Syst. Appl..

[217]  Song Chao,et al.  Network Covert Channel Detection with Cluster based on Hierarchy and Density , 2012 .

[218]  Ira S. Moskowitz,et al.  A Study of Inference Problems in Distributed Databases , 2002, DBSec.

[219]  Matthew Green,et al.  Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.

[220]  Joachim Biskup,et al.  Reducing inference control to access control for normalized database schemas , 2008, Inf. Process. Lett..

[221]  Mathy Vanhoef,et al.  Dragonblood: A Security Analysis of WPA3's SAE Handshake , 2019, IACR Cryptol. ePrint Arch..

[222]  Ketil Stølen,et al.  Model-Driven Risk Analysis - The CORAS Approach , 2010 .

[223]  Dongqing Xie,et al.  Real-time Network Risk Evaluation Paradigm-inspired by Immune , 2015, International Conference on Computing, Networking and Communications.

[224]  Zhen Huang,et al.  PScout: analyzing the Android permission specification , 2012, CCS.

[225]  Zouheir Trabelsi,et al.  Towards Optimized TCP/IP Covert Channels Detection, IDS and Firewall Integration , 2008, 2008 New Technologies, Mobility and Security.

[226]  Naixue Xiong,et al.  A Fuzzy Probability Bayesian Network Approach for Dynamic Cybersecurity Risk Assessment in Industrial Control Systems , 2018, IEEE Transactions on Industrial Informatics.

[227]  Muawia A. Elsadig,et al.  Covert Channels : Countermeasures Techniques , 2018 .

[228]  V. Braun,et al.  Using thematic analysis in psychology , 2006 .

[229]  Mehrdad Aliasgari,et al.  Benchmarks for Evaluating Anomaly Based Intrusion Detection Solutions , 2018 .

[230]  Zhiyong Cai,et al.  Integrated Covert Channel Countermeasure Model in MLS Networks , 2009, 2009 International Conference on Information Engineering and Computer Science.

[231]  Wesley W. Chu,et al.  Database Security Protection Via Inference Detection , 2006, ISI.

[232]  Yang Xiang,et al.  A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.

[233]  Craig Gentry,et al.  (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.

[234]  Serge Chaumette,et al.  Dynamicity Aware Graph Relabeling Systems (DA-GRS), A Local Computation based Model to Describe Manet Algorithms , 2005, IASTED PDCS.

[235]  Varghese Paul,et al.  An imperceptible spatial domain color image watermarking scheme , 2016, Journal of King Saud University - Computer and Information Sciences.

[236]  Iftikhar Ahmad,et al.  Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000 , 2018 .

[237]  Bashar Nuseibeh,et al.  Security Requirements Engineering: A Framework for Representation and Analysis , 2008, IEEE Transactions on Software Engineering.

[238]  Erik Wästlund,et al.  Usable Transparency with the Data Track: A Tool for Visualizing Data Disclosures , 2015, CHI Extended Abstracts.

[239]  Craig Gentry,et al.  A fully homomorphic encryption scheme , 2009 .

[240]  Karandeep Kaur,et al.  A Survey on Internet of Things – Architecture, Applications, and Future Trends , 2018, 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC).

[241]  Tara N. Sainath,et al.  FUNDAMENTAL TECHNOLOGIES IN MODERN SPEECH RECOGNITION Digital Object Identifier 10.1109/MSP.2012.2205597 , 2012 .

[242]  Serkan Öztürk,et al.  A novel hybrid DCT and DWT based robust watermarking algorithm for color images , 2019, Multimedia Tools and Applications.

[243]  Adel M. Alimi,et al.  Bag of face recognition systems based on holistic approaches , 2015, 2015 15th International Conference on Intelligent Systems Design and Applications (ISDA).

[244]  Tobias Pulls,et al.  Tools for Cloud Accountability: A4Cloud Tutorial , 2014, Privacy and Identity Management.

[245]  Xiaoou Tang,et al.  Learning a Deep Convolutional Network for Image Super-Resolution , 2014, ECCV.

[246]  Qun Li,et al.  Network Traffic Anomaly Detection Based on Wavelet Analysis , 2018, 2018 IEEE 16th International Conference on Software Engineering Research, Management and Applications (SERA).

[247]  Zhuming Bi,et al.  Blockchain-based business process management (BPM) framework for service composition in industry 4.0 , 2018, Journal of Intelligent Manufacturing.

[248]  Stephan Faßbender,et al.  Functional requirements under security PresSuRE , 2014, 2014 9th International Conference on Software Paradigm Trends (ICSOFT-PT).

[249]  Angelo De Caro,et al.  jPBC: Java pairing based cryptography , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).

[250]  Katia P. Sycara,et al.  WebMate: a personal agent for browsing and searching , 1998, AGENTS '98.

[251]  Paul Barrett,et al.  Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor , 1986, CRYPTO.

[252]  Brent Waters,et al.  Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based , 2013, CRYPTO.

[253]  Yuval Elovici,et al.  ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New Structural Feature Extraction Methodology , 2017, IEEE Transactions on Information Forensics and Security.

[254]  Xiaoqi Ma,et al.  Analysing and attacking the 4-way handshake of IEEE 802.11i standard , 2013, 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013).

[255]  Krzysztof Juszczyszyn,et al.  Evaluation of an Impact of the DoS Attacks on the Selected Virtualization Platforms , 2018 .

[256]  Tobias Pulls,et al.  Transparency, Privacy and Trust - Technology for Tracking and Controlling My Data Disclosures: Does This Work? , 2016, IFIPTM.

[257]  Fengjun Li,et al.  Cyber-Physical Systems Security—A Survey , 2017, IEEE Internet of Things Journal.

[258]  Yuri Monakhov,et al.  A Machine-Synesthetic Approach To DDoS Network Attack Detection , 2019, IntelliSys.

[259]  Frederik Vercauteren,et al.  Somewhat Practical Fully Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..

[260]  Fernanda Lima Kastensmidt,et al.  Analyzing Reliability and Performance Trade-Offs of HLS-Based Designs in SRAM-Based FPGAs Under Soft Errors , 2017, IEEE Transactions on Nuclear Science.

[261]  Leslie Lamport,et al.  Paxos Made Simple , 2001 .

[262]  Sushil Jajodia,et al.  VULCON: A System for Vulnerability Prioritization, Mitigation, and Management , 2018, ACM Trans. Priv. Secur..

[263]  Jan Mendling,et al.  Untrusted Business Process Monitoring and Execution Using Blockchain , 2016, BPM.

[264]  Erhard Rahm,et al.  A survey of approaches to automatic schema matching , 2001, The VLDB Journal.

[265]  Maritta Heisel,et al.  Secure Data Processing in the Cloud , 2017, ESOCC Workshops.

[266]  Liqing Zhang,et al.  Credit Card Fraud Detection Using Convolutional Neural Networks , 2016, ICONIP.

[267]  Seungwon Shin,et al.  Toward Semantic Assessment of Vulnerability Severity: A Text Mining Approach , 2018, CIKM Workshops.

[268]  Isabel Maria Lopes,et al.  Improvement of the Applicability of the General Data Protection Regulation in Health Clinics , 2019, WorldCIST.

[269]  Maritta Heisel,et al.  Towards an End-to-End Architecture for Run-Time Data Protection in the Cloud , 2018, 2018 44th Euromicro Conference on Software Engineering and Advanced Applications (SEAA).

[270]  Basim Nasih,et al.  Application of Wavelet Transform and Its Advantages Compared To Fourier Transform , 2016 .

[271]  Routa Moussaileb,et al.  Detection of Side Channel Attacks Based on Data Tainting in Android Systems , 2017, SEC.

[272]  Hans Hedbom,et al.  Trust and Assurance HCI , 2011, Privacy and Identity Management for Life.

[273]  Nadeem Akhtar,et al.  Real-Time Credit-Card Fraud Detection using Artificial Neural Network Tuned by Simulated Annealing Algorithm , 2014 .

[274]  Adel M. Alimi,et al.  ReLiDSS: Novel lie detection system from speech signal , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).

[275]  Teek Parval Sharma,et al.  On the IEEE 802.11i security: a denial-of-service perspective , 2015, Secur. Commun. Networks.

[276]  Irene M. Y. Woon,et al.  Perceptions of Information Security at the Workplace : Linking Information Security Climate to Compliant Behavior , 2006 .

[277]  Ahmed A. Alzahrani,et al.  The role of neutralisation techniques in violating hospitals privacy policies in Saudi Arabia , 2018, 2018 4th International Conference on Information Management (ICIM).

[278]  G. R. Blakley,et al.  A Computer Algorithm for Calculating the Product AB Modulo M , 1983, IEEE Trans. Computers.

[279]  Haralambos Mouratidis,et al.  Syntactic and Semantic Extensions to Secure Tropos to Support Security Risk Management , 2012, J. Univers. Comput. Sci..

[280]  David A. Huffman,et al.  A method for the construction of minimum-redundancy codes , 1952, Proceedings of the IRE.

[281]  F. Taylor,et al.  Large moduli multipliers for signal processing , 1981 .

[282]  Farouk Kamoun,et al.  End to End Cloud Computing Architecture Based on A Novel Classification of Security Issues , 2017, 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA).

[283]  Sushil Jajodia,et al.  Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures , 2000, IEEE Trans. Knowl. Data Eng..

[284]  A. V. Olgac,et al.  Performance Analysis of Various Activation Functions in Generalized MLP Architectures of Neural Networks , 2011 .

[285]  Stephan Haarmann,et al.  Estimating the Duration of Blockchain-Based Business Processes Using Simulation , 2019, ZEUS.

[286]  Michael O. Rabin,et al.  Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.

[287]  Bashar Nuseibeh,et al.  Security requirements engineering: when anti-requirements hit the fan , 2002, Proceedings IEEE Joint International Conference on Requirements Engineering.

[288]  Yiwei Li Generalization of k-means Related Algorithms , 2019, ArXiv.

[289]  D. Harkins,et al.  Simultaneous Authentication of Equals: A Secure, Password-Based Key Exchange for Mesh Networks , 2008, 2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008).

[290]  Chunhua Wang,et al.  Machine Learning and Deep Learning Methods for Cybersecurity , 2018, IEEE Access.

[291]  Elena Trofimenko,et al.  Program-technical aspects of encryption protection of users' data , 2016, 2016 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET).

[292]  Areej Al-Bataineh,et al.  Analysis and detection of malicious data exfiltration in web traffic , 2012, 2012 7th International Conference on Malicious and Unwanted Software.

[293]  Vincent H. Berk,et al.  Data exfiltration and covert channels , 2006, SPIE Defense + Commercial Sensing.

[294]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[295]  B. Byers,et al.  Bias Crime Motivation , 1999 .

[296]  Frank Piessens,et al.  Denial of Service Attacks Against the 4-Way Wi-Fi Handshake , 2017 .

[297]  Antonio Kung,et al.  Methods and Tools for GDPR Compliance Through Privacy and Data Protection Engineering , 2018, 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[298]  Gresham M. Sykes,et al.  Techniques of neutralization: A theory of delinquency. , 1957 .

[299]  William M. Campbell,et al.  Recommender Systems for the Department of Defense and Intelligence Community , 2016 .

[300]  John Ioannidis,et al.  Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.

[301]  Prashant R. Deshmukh,et al.  Active warden for TCP sequence number base covert channel , 2015, 2015 International Conference on Pervasive Computing (ICPC).

[302]  Nancy Reichman,et al.  The Criminal Elite: The Sociology of White-Collar Crime. , 1986 .

[303]  Biswanath Mukherjee,et al.  SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack , 2009 .

[304]  Paul Benjamin Lowry,et al.  Organizational Violations of Externally Governed Privacy and Security Rules: Explaining and Predicting Selective Violations Under Conditions of Strain and Excess , 2015, J. Assoc. Inf. Syst..

[305]  Jaspreet Kaur,et al.  Countermeasures for Covert Channel-Internal Control Protocols , 2015, 2015 10th International Conference on Availability, Reliability and Security.

[306]  Kelley L. Dempsey,et al.  Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations: National Institute of Standards and Technology Special Publication 800-137 , 2011 .

[307]  Immo Fritsche,et al.  Account Strategies for the Violation of Social Norms: Integration and Extension of Sociological and Social Psychological Typologies , 2002 .

[308]  Magdy M. A. Salama,et al.  Distributed generation technologies, definitions and benefits , 2004 .

[309]  Gary B. Wills,et al.  Exposing data leakage in Data Integration Systems , 2014, The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014).

[310]  Parvez Faruki,et al.  Network Intrusion Detection for IoT Security Based on Learning Techniques , 2019, IEEE Communications Surveys & Tutorials.

[311]  Aron Laszka,et al.  Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach , 2017, Financial Cryptography.

[312]  Vijay Chidambaram,et al.  Analyzing the Impact of GDPR on Storage Systems , 2019, HotStorage.

[313]  Rabah Attia,et al.  A GDPR Controller for IoT Systems: Application to e-Health , 2019, 2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE).

[314]  Michael B. Blankenship,et al.  examining the role of differential association and techniques of neutralization in explaining corporate crime , 2005 .

[315]  Shareeful Islam,et al.  An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System , 2018, Applied Sciences.

[316]  Maritta Heisel,et al.  Problem-based Elicitation of Security Requirements - The ProCOR Method , 2018, ENASE.

[317]  Pascal Véron,et al.  Efficient modular operations using the adapted modular number system , 2020, Journal of Cryptographic Engineering.

[318]  Muawia A. Elsadig,et al.  A balanced approach to eliminate packet length-based covert channels , 2017, 2017 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS).

[319]  Ana María Monteiro,et al.  Intrusion Detection in Computer Networks Based on KNN, K-Means++ and J48 , 2018, IntelliSys.

[320]  Konstantinos Demertzis,et al.  ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT Using Blockchain Technology , 2018, SecITC.

[321]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[322]  Adel M. Alimi,et al.  Understand Me if You Can! Global Soft Biometrics Recognition from Social Visual Data , 2016, HIS.

[323]  Helen M. Edwards,et al.  Problem frames: analyzing and structuring software development problems , 2002, Softw. Test. Verification Reliab..

[324]  Juan Enrique Ramos,et al.  Using TF-IDF to Determine Word Relevance in Document Queries , 2003 .

[325]  Stéphane Mallat,et al.  A Theory for Multiresolution Signal Decomposition: The Wavelet Representation , 1989, IEEE Trans. Pattern Anal. Mach. Intell..

[326]  Jean-Christophe Burie,et al.  A Spatial Domain Steganography for Grayscale Documents Using Pattern Recognition Techniques , 2017, 2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR).

[327]  K. Harald Gjermundrød,et al.  privacyTracker: A Privacy-by-Design GDPR-Compliant Framework with Verifiable Data Traceability Controls , 2016, ICWE Workshops.

[328]  Abhinav Srivastava,et al.  Credit Card Fraud Detection Using Hidden Markov Model , 2008, IEEE Transactions on Dependable and Secure Computing.

[329]  Mikko T. Siponen,et al.  New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs , 2012, Inf. Manag..

[330]  Ketki Nanadikar,et al.  FireCol: A Collaborative Protection Network for the Detection of Flooding DDOS Attack , 2014 .

[331]  Jianzhong Li,et al.  Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition , 2017, Multimedia Tools and Applications.

[332]  Mahendra Kumar Pandey,et al.  Non-blind Arnold scrambled hybrid image watermarking in YCbCr color space , 2018, Microsystem Technologies.

[333]  Yoshua Bengio,et al.  Extracting and composing robust features with denoising autoencoders , 2008, ICML '08.

[334]  Serge Chaumette,et al.  Control of a Remote Swarm of Drones/Robots Through a Local (Possibly Model) Swarm: Qualitative and Quantitative Issues , 2017, PE-WASUN '17.

[335]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[336]  Pietro Ferrara,et al.  Static Analysis for GDPR Compliance , 2018, ITASEC.

[337]  Shichao Zhang,et al.  A novel kNN algorithm with data-driven k parameter computation , 2017, Pattern Recognit. Lett..

[338]  Bulusu Vardhan,et al.  Enhancing the Performance of an Intrusion Detection System Through Multi-Linear Dimensionality Reduction and Multi-Class SVM , 2018 .

[339]  Karen A. Scarfone,et al.  A Complete Guide to the Common Vulnerability Scoring System Version 2.0 | NIST , 2007 .

[340]  Joan Oldman,et al.  The Professional Fence , 1976 .

[341]  Leyla Bilge,et al.  Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks , 2015, DIMVA.

[342]  Waqar Ahmad,et al.  A Comparative Study of Data Mining Algorithms for High Detection Rate in Intrusion Detection System , 2018 .

[343]  Vishal Vatsa,et al.  A Game-Theoretic Approach to Credit Card Fraud Detection , 2005, ICISS.

[344]  Nabil Derbel,et al.  Handwriting trajectory movements controlled by a Beta-elliptic model , 2003, Seventh International Conference on Document Analysis and Recognition, 2003. Proceedings..

[345]  Steve Hanna,et al.  Android permissions demystified , 2011, CCS '11.

[346]  Yuning Jiang,et al.  A Language and Repository for Cyber Security of Smart Grids , 2018, 2018 IEEE 22nd International Enterprise Distributed Object Computing Conference (EDOC).

[347]  M. Marshall Sampling for qualitative research. , 1996, Family practice.

[348]  Rachel Player,et al.  Simple Encrypted Arithmetic Library-SEAL , 2017 .

[349]  Mitali Bansal,et al.  Credit Card Fraud Detection Using Self Organised Map , 2014 .

[350]  Joseph W. Rogers,et al.  Neutralization Techniques , 1974 .

[351]  Ibrahim Nadir,et al.  Contemporary cybercrime: A taxonomy of ransomware threats & mitigation techniques , 2018, 2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET).

[352]  Dazhong Wu,et al.  Cybersecurity for digital manufacturing , 2018, Journal of Manufacturing Systems.

[353]  Margus Välja,et al.  A Framework for Automatic IT Architecture Modeling: Applying Truth Discovery , 2019, Complex Syst. Informatics Model. Q..

[354]  Siddhartha Bhattacharyya,et al.  Data mining for credit card fraud: A comparative study , 2011, Decis. Support Syst..

[355]  Thomas Plantard,et al.  Arithmétique modulaire pour la cryptographie , 2005 .

[356]  W. Thompson,et al.  Privacy versus public health: the impact of current confidentiality rules. , 2010, American journal of public health.

[357]  Su Jin,et al.  Attribute-Based Encryption Schemes , 2011 .

[358]  Héctor M. Pérez Meana,et al.  Sender verification system for official documents based on watermarking technique , 2013, 2013 10th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE).

[359]  Adel M. Alimi,et al.  A Neuro-beta-Elliptic Model for Handwriting Generation Movements , 2012, 2012 International Conference on Frontiers in Handwriting Recognition.

[360]  Naofumi Takagi,et al.  A Radix-4 Modular Multiplication Hardware Algorithm for Modular Exponentiation , 1992, IEEE Trans. Computers.

[361]  Carolina Adaros Boye,et al.  Cyber-Risks in the Industrial Internet of Things (IIoT): Towards a Method for Continuous Assessment , 2018, ISC.

[362]  M. Tech Fraud Detection in Credit Card by Clustering Approach , 2014 .

[363]  Fabio Massacci,et al.  Computer Aided Threat Identification , 2011, 2011 IEEE 13th Conference on Commerce and Enterprise Computing.

[364]  P. L. Montgomery Modular multiplication without trial division , 1985 .

[365]  Byung-Gon Chun,et al.  TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.

[366]  Khan Muhammad,et al.  CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method , 2017, Multimedia Tools and Applications.

[367]  Gwen Littlewort,et al.  Recognizing facial expression: machine learning and application to spontaneous behavior , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[368]  Heith Copes,et al.  streetlife and the rewards of auto theft , 2003 .

[369]  Hsiao-Hwa Chen,et al.  Intrusion Detection in Cyber-Physical Systems: Techniques and Challenges , 2014, IEEE Systems Journal.

[370]  Emmanuel Coquery,et al.  Access control to materialized views: an inference-based approach , 2011, PhD '11.

[371]  Brian Kingsbury,et al.  New types of deep neural network learning for speech recognition and related applications: an overview , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[372]  Chris Peikert,et al.  On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.

[373]  Alair Pereira do Lago,et al.  Credit Card Fraud Detection with Artificial Immune System , 2008, ICARIS.