The International Conference on Information Systems Security and Privacy – ICISSP – aims to create a meeting point for practitioners and researchers interested in
security and
privacy challenges that concern
information systems covering technological and social issues.
The format of the conference counts on technical sessions,
poster sessions,
tutorials, doctoral consortiums, panels, industrial tracks and keynote lectures. The papers presented in the conference are made available at the SCITEPRESS
digital library, published in the conference
proceedings and some of the best papers are invited to a post-publication with
Springer,[1] in a
CCIS Series book.
Proceedings of the 5th International Conference on Information Systems Security and Privacy.
ISBN978-989-758-081-9[3]
Best Paper Award – Dayana Spagnuelo, Ana Ferreira and Gabriele Lenzini, “Accomplishing Transparency within the General Data Protection Regulation” [4]
Best Student Paper Award - Maja Nyman and Christine Große, “Are You Ready When It Counts? IT Consulting Firm’s Information Security Incident Management” [5]
Proceedings of the 3rd International Conference on Information Systems Security and Privacy.
ISBN978-989-758-209-7[9]
Best Paper Award – Lake Bu and Mark G. Karpovsky, “A Design of Secure and ReliableWireless Transmission Channel for Implantable Medical Devices” [10]
Best Student Paper Award - Iman Sedeeq, Frans Coenen and Alexei Lisitsa, “Attribute Permutation Steganography Detection using Attribute Position Changes Count” [11]
Proceedings of the 1st International Conference on Information Systems Security and Privacy .
ISBN978-989-758-081-9[15]
Best Paper Award - Fabian Knirsch, Dominik Engel, Christian Neureiter, Marc Frincu and Viktor Prasanna. "Model-driven Privacy Assessment in the Smart Grid"[16][17]
Best Student Paper Award - Carsten Büttner and
Sorin A. Huss. "A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks"[18]
^Lenzini, Gabriele; Ferreira, Ana; Spagnuelo, Dayana (2019). "Accomplishing Transparency within the General Data Protection Regulation". Proceedings of the 5th International Conference on Information Systems Security and Privacy. pp. 114–125.
doi:10.5220/0007366501140125.
ISBN978-989-758-359-9.
^Große, Christine; Nyman, Maja (2019). "Are You Ready when It Counts? IT Consulting Firm's Information Security Incident Management". Proceedings of the 5th International Conference on Information Systems Security and Privacy. pp. 26–37.
doi:10.5220/0007247500260037.
ISBN978-989-758-359-9.
^Lee, Ruby; Ko, Bongjun; Ortiz, Jorge; Lee, Wei-Han (2018). "Inferring Smartphone Users' Handwritten Patterns by using Motion Sensors". Proceedings of the 4th International Conference on Information Systems Security and Privacy. pp. 139–148.
doi:10.5220/0006650301390148.
ISBN978-989-758-282-0.
^Müller, Tilo; Haupert, Vincent (2018). "On App-based Matrix Code Authentication in Online Banking". Proceedings of the 4th International Conference on Information Systems Security and Privacy. pp. 149–160.
doi:10.5220/0006650501490160.
ISBN978-989-758-282-0.
^g. Karpovsky, Mark; Bu, Lake (2017). "A Design of Secure and ReliableWireless Transmission Channel for Implantable Medical Devices". Proceedings of the 3rd International Conference on Information Systems Security and Privacy. pp. 233–242.
doi:10.5220/0006270502330242.
ISBN978-989-758-209-7.
^Lisitsa, Alexei; Coenen, Frans; Sedeeq, Iman (2017). "Attribute Permutation Steganography Detection using Attribute Position Changes Count". Proceedings of the 3rd International Conference on Information Systems Security and Privacy. pp. 95–100.
doi:
10.5220/0006166400950100.
ISBN978-989-758-209-7.
S2CID6224450.
^Sun, Siwei; Hu, Lei; Qiao, Kexin (2016). "Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques". Proceedings of the 2nd International Conference on Information Systems Security and Privacy. pp. 74–84.
doi:
10.5220/0005684400740084.
ISBN978-989-758-167-0.
^"A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks". Proceedings of the 1st International Conference on Information Systems Security and Privacy. 2015. pp. 259–269.
doi:
10.5220/0005238902590269.
ISBN978-989-758-081-9.