© 2020

Information Systems Security and Privacy

5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers

  • Paolo Mori
  • Steven Furnell
  • Olivier Camp
Conference proceedings ICISSP 2019

Part of the Communications in Computer and Information Science book series (CCIS, volume 1221)

Table of contents

  1. Front Matter
    Pages i-xii
  2. Clemens Brunner, Fabian Knirsch, Dominik Engel
    Pages 1-23
  3. Roberto Di Pietro, Maurantonio Caprolu, Simone Raponi
    Pages 24-47
  4. Kazuhide Fukushima, Damien Marion, Yuto Nakano, Adrien Facon, Shinsaku Kiyomoto, Sylvain Guilley
    Pages 74-92
  5. Mary K. Bispham, Alastair Janse van Rensburg, Ioannis Agrafiotis, Michael Goldsmith
    Pages 93-120
  6. Florian Patzer, Philipp Lüdtke, Ankush Meshram, Jürgen Beyerer
    Pages 137-161
  7. Dayana Spagnuelo, Ana Ferreira, Gabriele Lenzini
    Pages 162-185
  8. Vanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay, Shinsaku Kiyomoto
    Pages 186-206
  9. José Torres, Sergio de los Santos, Efthimios Alepis, Constantinos Patsakis
    Pages 250-271
  10. Wenjun Xiong, Fredrik Krantz, Robert Lagerström
    Pages 272-287
  11. Mary K. Bispham, Ioannis Agrafiotis, Michael Goldsmith
    Pages 288-316
  12. Nezer Jacob Zaidenberg, Michael Kiperberg, Raz Ben Yehuda, Roee Leon, Asaf Algawi, Amit Resh
    Pages 317-334
  13. Christophe Ponsard, Jeremy Grandclaudon
    Pages 335-357
  14. Chiara Bodei, Letterio Galletta
    Pages 358-381
  15. Maryam Almarwani, Boris Konev, Alexei Lisitsa
    Pages 403-425

About these proceedings


This book constitutes the revised selected papers of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, held in Prague, Czech Republic, in February 2019. 

The 19 full papers presented were carefully reviewed and selected from a total of 100 submissions. The papers presented in this volume address various topical research, including new approaches for attack modelling andprevention, incident management and response, and user authentication andaccess control, as well as business and human-oriented aspects such as data pro-tection and privacy, and security awareness.


access control artificial intelligence authentication computer crime computer networks computer programming computer security computer systems cryptography data security databases distributed computer systems Human-Computer Interaction (HCI) network protocols network security privacy security issues signal processing software design software engineering

Editors and affiliations

  1. 1.IIT-CNRPisaItaly
  2. 2.Plymouth UniversityPlymouthUK
  3. 3.MODESTE/ESEOAngers Cedex 2France

Bibliographic information