Home // SECURWARE
SECURWARE 2016, The Tenth International Conference on Emerging Security Information, Systems and Technologies
Type: conference
Notes: IARIA Conference.
Editors:
Carla Merkle Westphall, University of Santa Catarina, Brazil
Hans-Joachim Hof, Munich University of Applied Sciences, Germany
Geir Køien, University of Agder, Norway
Lukáš Králík, Tomas Bata University in Zlin, Czech Republic
Martin Hromada, Tomas Bata University in Zlin, Czech Republic
Dora Lapkova, Tomas Bata Univerzity in Zlin, Czech Republic
ISSN: 2162-2116
ISBN: 978-1-61208-493-0
Location: Nice, France
Dates: from July 24, 2016 to July 28, 2016
Articles: there are 59 articles
A Generic Feature-based Detection for Facebook Spamming Groups
Meng-Jia Yen, Yang-Ling Hwang, Cheng-Yu Tsai, Fu-Hau Hsu, and Chih-Wen Ou
keywords: Facebook; spamming group; online social network
Beyond the Dolev-Yao Model: Realistic Application-Specific Attacker Models for Applications Using Vehicular Communication
Christoph Ponikwar, Hans-Joachim Hof, Smriti Gopinath, and Lars Wischhof
keywords: security; attacker model; VANET; V2X; ITS.
Cost-Effective Biometric Authentication using Leap Motion and IoT Devices
Louis-Philip Shahim, Dirk Snyman, Tiny Du Toit, and Hennie Kruger
keywords: biometrics; information security; internet of things (IoT); leap motion; multifactor authentication.
Node Compromise Detection Based on Parameter Grouping in Wireless Sensor Networks
Manyam Thaile and Oruganti Bala Venkata Ramanaiah
keywords: node compromise detection; software attestation; parameter grouping; wireless sensor network security
Embedded Security Testing with Peripheral Device Caching and Runtime Program State Approximation
Markus Kammerstetter, Daniel Burian, and Wolfgang Kastner
keywords: Embedded Systems; Security Analysis; State Explosion; Program Slicing; Virtual Machine Introspection
The Principle of 3D Sensors
Miroslav Marcaník, Michal Šustek, Pavel Tomášek, and Jiří Dvořák
keywords: 3D sensors; sensors; CCD; CMOS
A Secure Frequency Hiding Index for Encrypted Databases
Somayeh Sobati Moghadam
keywords: Data outsourcing; data privacy; querying encrypted data
Analysis of Direct Punch in Professional Defence Using Multiple Methods
Dora Lapkova, Milan Adamek, and Lukas Kralik
keywords: direct punch; professional defence; complex analysis; velocity; force
Methodology of the Determination of the Uncertainties by Using the Biometric Device the iCAM 7000
Hana Talandova, Lukas Kralik, and Milan Adamek
keywords: Iris recognition; Identification; iCAM 7000; Percentage of success
Scanning Probe Microscopy Used for 3D Topography Image Acquisition of Marks on Cartidge Cases in Forensic Ballistics
Milan Navratil, Vojtech Kresalek, Adam Koutecky, and Zdenek Malanik
keywords: forensic balistic; scanning probe microscopy; firing pin; cartridge case; marks; 3D; topography
Security of Seniors – The Detection and Prevention of Falls
Lubomír Macků and Markéta Matějíčková
keywords: seniors; emergency response; fall detection; smart phones; assistive technology; senior inspect; witrack.
Improvement of CPRNG of the PM-DC-LM Mode and Comparison with its Previous Version
Petr Zacek, Roman Jasek, and David Malanik
keywords: Deterministic Chaos; Logistic Map; CPRNG; Symmetric Cryptography; Block Cipher; Block Cipher Mode of Operation; PM-DC-LM.
Severity Assessment of Security Incidents
Lukas Kralik, Petr Stipek, Roman Senkerik, and Roman Jasek
keywords: severity assessment; security; incident; incident management; security management, multi-criterial decision making; MCDM
Methodology of Future Security Studies
Jan Valouch and Hana Urbanočoková
keywords: security futurology; forecasting methodology; security forecast; security situation; futurologists.
Measurement of Electromagnetic Interference of Electronic Devices
Hana Urbancokova, Jan Valouch, Stanislav Kovar, and Milan Adamek
keywords: Electromagnetic compatibility; Electromagnetic interference; Intrusion and hold-up alarm systems; Electronic device; Level of interference signals
Object Oriented Role-Based Access Control
Petr Stipek, Lukas Kralik, and Roman Senkerik
keywords: software security; object-oriented programming; weakly-typed languages; ACL;RBAC; CRUD; ORM/ODM
Introduction to Web Security and Evaluation Methods of Web Application Vulnerabilities
Petra Holbíková and Roman Jašek
keywords: Web Security; Secure Socket Layer; Threat Risk Modelling; Common Vulnerabilities Score System; Basic Web Security; Security Risks
Electromagnetic Weapons as Means of Stopping Vehicles
Jan Valouch and Hana Urbanočoková
keywords: direct energy weapons; car; vehicle; electromagnetic susceptibility; high power microwave; non-lethal weapons.
An Empirical Survey on how Much Security and Privacy Customers Want in Instant Messengers
Thomas Paul and Hans-Joachim Hof
keywords: Instant Messaging; instant messenger; security; usability.
The Mathematical Modeling of Road Transport in Context of Critical Infrastructure Protection
Jan Mrazek, Lucia Duricova, and Martin Hromada
keywords: critical infrastructure; crisis situation; extraordinary event; mathematical models of road transport; road critical infrastructure
Linkages Types with an Emphasis on Important Critical Infrastructure Sectors
Martin Hromada and Frantisek Paulus
keywords: critical infrastructure; important critical infrastructure sector; linkage; dependence; interdependence;
Security and Safety Processes in Czech Republic Universities
Lucia Duricova, Martin Hromada, and Jan Mrazek
keywords: Law Requirements; Risk Management; Safety; Security; Soft Targets
Comprehensive System of Intense Convective Precipitation Forecasts for Regional Crisis Management
David Saur and Lucia Duricova
keywords: Flash Floods; Weather Forecast; Thunderstorms; Crisis Management
Insight into Contemporary Dissemination Techniques of Mobile Botnet Clients (Bots)
Milan Oulehla and David Malanik
keywords: Android permission analysis; bot (client of botnet); bot dissemination, C&C server; Google Play; mobile botnet
Innovation Standard Methods of Evaluating the Results of Shooting
Zdeněk Maláník and David Malanik
keywords: Series Shooting Capability Index; Process Shooting Capability Index; Time Shooting Capability Index.
The Possibilities of the Search Engine Shodan in Relation to SCADA
Jan Vávra and Martin Hromada
keywords: Cyber Security; Industrial Control System; Vulnerability; Supervisory Control and Data Acquisition
The Configuration of Alarm Systems during the Measurement of Electromagnetic Interference
Jan Valouch and Stanislav Kovář
keywords: electromagnetic compatibility; alarm systems configuration; equipment under test; alarm security systems.
Comparison of Security Devices in Terms of Interception
Stanislav Kovar, Jan Valouch, Hana Urbancokova, and Milan Adamek
keywords: electromagnetic interference; semi-anechoic chamber; closed circuit television; transmission path; far-field
Theoretical Sources for a Theory of Safety and Security
Ludek Lukas
keywords: theory of safety and security; risk theory; crisis theory; causality
Comparison of Various Encryption Techniques Based on Deterministic Chaos
Miroslav Popelka
keywords: Chaos; Chaotic Deterministic Map; Image Encryption; Pixels Shifting.
Using Ethical Hacking to Analyze BYOD Safety in Corporations
Roman Jašek and Jakub Nožička
keywords: hacking; tablet; android; Kali Linux; wireless network.
Critical Infrastructure Protection – Modeling of Domino and Synergy Effects
Martin Hromada
keywords: critical infrastructure; model; domino effect; resilience; protection; leontief’s economy model.
Towards Extensible Signature Policies in Brazil: A Case Study
Maurício Oliveira, Martín Vigil, Marcelo Carlomagno Carlos, and Ricardo Custódio
keywords: Signature Policy; Digital Signature; Public Key Infrastructure; Time-Stamp.
Information Support System Development in Relation to Critical Infrastructure Element Resilience Evaluation
Martin Hromada
keywords: critical infrastructure; resilience evaluation; information support system.
Strengthening Software Diversity Through Targeted Diversification
Vipin Singh Sehrawat and Yvo Desmedt
keywords: Software diversity, Return Oriented Programming, Code reuse attack, Targeted diversification.
Education System in Commercial Security
Vladislav Stefka
keywords: Commercial Security, Detective Activities, Property Protection and Security.
Possibilities of Technical Security of Elementary Schools
Rudolf Drga and Hana Charvatova
keywords: Elementary school; technical security; organizational structure.
Resistance of Passive Security Elements as A Quantitative Parameter Influencing The Overall Resistance and Resilience of A Critical Infrastructure Element
Tomáš Loveček, Anton Šiser, David Řehák, and Martin Hromada
keywords: resistance; resiliance; delay time; barriers; indicator
Electromagnetic Compatibility and Power-Line Quality
Frantisek Hruska and Milan Navratil
keywords: power-line quality; consumer net parameters; harmonic frequency; dynamic system
Interception Methods and GSM
Michal Sustek, Miroslav Marcanik, Milan Oplustil, Pavel Tomasek, and Zdenek Urednicek
keywords: eavesdropping; interception; GSM; 5G; wiretracking
Preliminary Study of Shielding of 802.11ah
Pavel Tomasek
keywords: IEEE 802.11ah; Internet of Things; Shielding; Eavesdropping
Authentication of Czech Banknotes using Raman Microscopy
Hana Vaskova and Pavel Valasek
keywords: authenticity; Czech banknotes; Raman sepctra; inks; spectral library.
An Efficient Pseudo Chaotic Number Generator Based on Coupling and Multiplexing Techniques
Ons Jallouli, Safwan El Assad, Mohammed Abu Taha, Maryline Chetto, René Lozi, and Daniel Caragata
keywords: Pseudo-chaotic number generator; Weakly Coupling; Chaotic multiplexing technique; Random numbers; Security analyses.
A Novel Verifiable Multi-Secret Sharing Scheme Based on Elliptic Curve Cryptography
Nisha Patel, Prakash D. Vyavahare, and Manish Panchal
keywords: Multi-Secret Sharing Scheme; Double Knapsack Algorithm; Shamir's Threshold Scheme; Malicious Participant Detection; ECDLP
An Improved ID-based Proxy Signature Scheme Based on Elliptic Curve Cryptography
Deepa Mukherjee, Prakash Vyavahare, and Manish Panchal
keywords: Proxy Signature Scheme; ID based Cryptography; designated verifier scheme; ECC; Knapsack Algorithm;
Selective Hybrid Chaotic-Based Cipher for Real-Time Image Application
Moussa Farajallah, Rawan Qumsieh, and Samer Isayed
keywords: skew tent map; confusion; diffusion; chaos-based cryptosystem
Seven Steps to a Quantum-Resistant Cipher
Julian Murguia Hughes
keywords: cipher; quantum-resistant; cryptography; secrecy; privacy; encryption; quantum; computing; resistant; data
Reflecting on the Use of Sonification for Network Monitoring
Louise Axon, Sadie Creese, Michael Goldsmith, and Jason R. C. Nurse
keywords: Sonification; Network Security; Anomaly Detection; Network Monitoring; Research Agenda
LoT: a Reputation-based Trust System for Long-term Archiving
Martín Vigil, Denise Demirel, Sheikh Mahbub Habib, Sascha Hauke, Johannes Buchmann, and Max Mühlhäuser
keywords: Digital Archiving; Time-Stamping; Reputation System; Trust; Electronic Health Record.
Security and Safety Requirements for Soft Targets in Czech Republic
Lucia Duricova, Martin Hromada, and Jan Mrazek
keywords: Management system; Safety requirements; Soft targets; System solution.
General Model for Personal Data Sensitivity Determination
Tomáš Loveček, Marián Magdolen, Jozef Ristvej, and Martin Hromada
keywords: Personal data protection; security measures, data security; privacy
A Study on User Perceptions of ICT Security
Christine Schuster, Martin Latzenhofer, Stefan Schauer, Johannes Göllner, Christian Meurers, Andreas Peer, Peter Prah, Gerald Quirchmayr, and Thomas Benesch
keywords: information security; user perceptions; attitude; human risk factor; work satisfaction; compliance
Visualization of Privacy Risks in Software Systems
George O. M. Yee
keywords: software; system; privacy; risks; visualization
Information Security Maturity as an Integral Part of ISMS based Risk Management Tools
Ben Fetler and Carlo Harpes
keywords: Information Security Management System; Maximal Efficiency Rate; Return On Security Maturity Investment; Information Security Risk Analysis; Security Maturity.
Modeling Vulnerable Internet of Things on SHODAN and CENSYS : An Ontology for Cyber Security
Marc Arnaert, Yoann Bertrand, and Karima Boudaoud
keywords: Keywords-vulnerability; Shodan; Internet of Things; Censys; ontology; cyber security
Energy-aware Security Adaptation in Ubiquitous Mobile Network
Tewfiq El Maliki and Aïcha Rizzotti-Kaddouri
keywords: framework; autonomic; security adaptation; energy awareness; mobile network
Security Update and Incident Handling for IoT-devices; A Privacy-Aware Approach
Geir Køien
keywords: Internet-of-Things; Smart home; Incident reporting; Security maintenance; Privacy; Security management.
Attacker-Parametrised Attack Graphs
Alastair Janse van Rensburg, Jason R. C. Nurse, and Michael Goldsmith
keywords: Attack graphs; attacker profiling; intrusion detection
Study on Dual Data Structure in Enterprise Information Security Architecture
Mikio Suzuki and Fumihiro Kubota
keywords: Operation Center; logs; Dual Data Structure; Information Security Policy.