Home // SECURWARE

SECURWARE 2020, The Fourteenth International Conference on Emerging Security Information, Systems and Technologies

Type: conference

Notes: IARIA Conference.

Editors:
Hans-Joachim Hof, INSicherheit - Ingolstadt Research Group Applied IT Security, CARISSMA – Center of Automotive Research on Integrated Safety Systems, Germany
Manuela Popescu, IARIA, USA/EU
George Yee, Carleton University, Canada

ISSN: 2162-2116

ISBN: 978-1-61208-821-1

Location: Valencia, Spain

Dates: from November 21, 2020 to November 25, 2020

Articles: there are 15 articles

An Information Flow Modelling Approach for Critical Infrastructure Simulation
Denise Gall, Christian Luidold, Gregor Langner, Thomas Schaberreiter, and Gerald Quirchmayr
keywords: Information Flow Modelling; Critical Infrastructure; Infrastructure Simulation; Cascading Effects.

A Gap Analysis of Visual and Functional Requirements in Cybersecurity Monitoring Tools
Christian Luidold and Thomas Schaberreiter
keywords: requirements analysis; collaboration; situational awareness; multi-stakeholder; visualization.

Trust Through Origin and Integrity: Protection of Client Code for Improved Cloud Security
Anders Fongen, Kirsi Helkala, and Mass Soldal Lund
keywords: cloud security; integrity attestation; trusted computing; Google ChromeOS

Integration of Network Services in Tactical Coalition SDN Networks
Anders Fongen and Mass Soldal Lund
keywords: authentication; intrusion prevention; software defined networks; tactical networks; trust management

Detection Algorithm for Non-recursive Zip Bombs
MaoYang Chen and MingYu Fan
keywords: Software safety, File viruses, Compression bombs.

Information Extraction from Darknet Market Advertisements and Forums
Sven Schlarb, Clemens Heistracher, and Faisal Ghaffar
keywords: natural language processing; Information extraction; named entity recognition; relationship extraction, event detection

WAF Signature Generation with Real-Time Information on the Web
Masahito Kumazaki, Yukiko Yamaguchi, Hajime Shimada, and Hirokazu Hasegawa
keywords: Web Application Firewall(WAF); Zero-day Attack; Vulnerability Information; Real-time Information.

Securing Smart Homes using Intrusion Detection Systems
Christoph Haar and Erik Buchmann
keywords: IT Security; Smart Home Security; Intrusion Detection Systems

Automatic Mapping of Vulnerability Information to Adversary Techniques
Otgonpurev Mendsaikhan, Hirokazu Hasegawa, Yukiko Yamaguchi, and Hajime Shimada
keywords: Multi-label classification; MITRE ATT&CK; Security Vulnerability

Introduction to Being a Privacy Detective: Investigating and Comparing Potential Privacy Violations in Mobile Apps Using Forensic Methods
Stefan Kiltz, Robert Altschaffel, Thorsten Lucke, and Jana Dittmann
keywords: Privacy Measurement; Data sovereignty

Towards Cybersecurity Act: A Survey on IoT Evaluation Frameworks
Maxime Puys, Jean-Pierre Krimm, and Raphaël Collado
keywords: Cybersecurity Act; Internet of Things; IoT; certification; evaluation scheme; smart-home.

Towards Reducing the Impact of Data Breaches
George O. M. Yee
keywords: reducing impact, data breach, private data loss, B2C e-commerce

Forensic Behavior Analysis in Video Conferencing Based on the Metadata of Encrypted Audio and Video Streams - Considerations and Possibilities
Robert Altschaffel, Jonas Hielscher, Christian Krätzer, Kevin Lamshöft, and Jana Dittmann
keywords: Security, Video conferencing, Zoom, Big Blue Button, User and traffic profiling, Network forensics

Towards Situation-based IT Management During Natural Disaster Crisis
Abdelmalek Benzekri, Romain Laborde, Arnaud Oglaza, Maleerat Sodanil, and Hatahairat Ketmaneechairat
keywords: crisis management ; policy-based management ; situation awareness ; network infrastructure ; social media ; machine learning ; natural language processing.

A Concept of an Attack Model for a Model-Based Security Testing Framework
Tina Volkersdorfer and Hans-Joachim Hof
keywords: model; adversary model; model-based testing; security testing; penetration test.