ThinkMind // SECURWARE 2018, The Twelfth International Conference on Emerging Security Information, Systems and Technologies
 Type: conference Download: SECURWARE 2018 cover page Download: SECURWARE 2018 foreword page Download: SECURWARE 2018 committee page Download: SECURWARE 2018 table of contents Download: SECURWARE 2018 full proceedings Notes: IARIA Conference. Editors: George Yee, Carleton University, Canada Stefan Rass, Universitaet Klagenfurt, Austria Stefan Schauer, Austrian Institute of Technology, Center of Digital Safety and Security, Vienna, Austria Martin Latzenhofer, Austrian Institute of Technology, Center of Digital Safety and Security, Vienna, Austria Event editions: - there are 13 editions. ISSN: 2162-2116 ISBN: 978-1-61208-661-3 Location: Venice, Italy Dates: from September 16, 2018 to September 20, 2018 Articles: there are 24 articles Analysing Trends and Success Factors of International Cybersecurity Capacity-Building Initiatives Faisal Hameed, Ioannis Agrafiotis, Carolin Weisser, Michael Goldsmith, and Sadie Creese keywords: Capacity Building Initiatives; Capacity Maturity Model
Towards a Quantitative Approach for Security Assurance Metrics Goitom Weldehawaryat and Basel Katt keywords: Quantitative security assurance metrics; Security testing; Goal question metric (GQM); Common vulnerability scoring system (CVSS); Security metrics.
Sensitive Data Anonymization Using Genetic Algorithms for SOM-based Clustering Fatemeh Amiri, Gerald Quirchmayr, and Peter Kieseberg keywords: Privacy-preserving; Big Data; Clustering; Kohonen's map; SOM; Genetic Algorithms
New Covert Channels in Internet of Things Aleksandra Mileva, Aleksandar Velinov, and Done Stojanov keywords: network steganography; covert channels; data hiding
Towards a Protection Profile for User-Centric and Self-Determined Privacy Management in Biometrics Salatiel Ezennaya Gomez, Jana Dittmann, and Claus Vielhauer keywords: GDPR; privacy; biometric data; sensible data; in- formed consent; transparency.
Exploiting User Privacy in IoT Devices Using Deep Learning and its Mitigation Rana AlAmeedee and Wonjun Lee keywords: Internet of Thing; Smart Home; Privacy; Deep Learning
Secure Collaborative Development of Cloud Application Deployment Models Vladimir Yussupov, Michael Falkenthal, Oliver Kopp, Frank Leymann, and Michael Zimmermann keywords: Collaboration; Security Policy; Confidentiality; Integrity; Deployment Automation; TOSCA
Pro-SRCC: Proxy-based Scalable Revocation for Constant Ciphertext Length Zeya Umayya and Divyashikha Sethia keywords: PIRATTE; CP-ABE; ProSRCC
A Logic-Based Network Security Zone Modelling Methodology Sravani Teja Bulusu, Romain Laborde, Ahmad Samer Wazan, Francois Barrère, and Abdelmalek Benzekri keywords: Network Security requirements; Security zoning
Towards a Blockchain-based Identity Provider Andreas Grüner, Alexander Mühle, Tatiana Gayvoronskaya, and Christoph Meinel keywords: Blockchain; distributed ledger technology; digital identity; self-sovereign identity; Ethereum
Enhancement of Usability of Information Security Systems Gwangil Ju and HarkSoo Park keywords: Usability; Compliance; Information Security System;
Information Security Resilience for Public Sector HarkSoo Park and Gwangil Ju keywords: Information Security System; Resilience; Compliance
Cyber Security Threats Targeting CPS Systems: A Novel Approach Using Honeypot Sameera Almulla, Elias Bou-Harb, and Claude Fachkha keywords: SCADA System; CPS Security; CPS honeypots; Threat characterization.
Metrics for Continuous Active Defence George O. M. Yee keywords: sensitive data, vulnerability, security measure, security level, metrics, continuous defence
The Probable Cyber Attack Concept Exploiting Interrupt Vulnerability in Nuclear Power Plants Taehee Kim, Soomin Lim, and Sangwoo Kim keywords: nuclear power plant; cyber threat; cyber attack; I&C system; preemptive OS; interrupt
Secure Cooperation of Untrusted Components Roland Wismüller and Damian Ludwig keywords: Software-components, security, typesystems
Implementation of Eavesdropping Protection Method over MPTCP Using Data Scrambling and Path Dispersion Toshihiko Kato, Shihan Cheng, Ryo Yamamoto, Satoshi Ohzahata, and Nobuo Suzuki keywords: Multipath TCP; Eavesdropping; Data Dispersion; Data Scrambling.
Deployment Enforcement Rules for TOSCA-based Applications Michael Zimmermann, Uwe Breitenbücher, Christoph Krieger, and Frank Leymann keywords: Cloud Computing; Application Provisioning; Automation; TOSCA; Security
A Botnet Detection System Based on Machine-Learning Using Flow-Based Features Chien-Hau Hung and Hung-Min Sun keywords: botnet; machine learning; feature selection; J48
Enhanced Software Implementation of a Chaos-Based Stream Cipher Guillaume Gautier, Safwan El Assad, Olivier Deforges, Sylvain Guilley, Adrien Facon, and Wassim Hamidouche keywords: Chaos-based stream ciphers, Constant time, Statistical analysis, Computational performance.
Adopting an ISMS Based Model for Better ITSM in Financial Institutions Zidiegha Seiyaboh and Mohammed Bahja keywords: Information Security Management System; Information Technology Service Management; ISO Standards; IT services; Service Operation.
Authentic Quantum Nonces Stefan Rass, Peter Schartner, and Jasmin Wachter keywords: Quantum Cryptography; Randomness Substitution Attack; Random number generation; Security; Authentication
Cyber-Security Aspects for Smart Grid Maritime Infrastructures Monica Canepa, Giampaolo Frugone, Stefan Schauer, and Riccardo Bozzo keywords: Smart grid, ports, energy security, cyber-attacks
Practical Risk Analysis in Interdependent Critical Infrastructures - a How-To Sandra König, Thomas Grafenauer, Stefan Rass, and Stefan Schauer keywords: critical infrastructure; dependencies; stochastic model; risk propagation; water supply
|