Home // SECURWARE

SECURWARE 2021, The Fifteenth International Conference on Emerging Security Information, Systems and Technologies

Type: conference

Notes: IARIA Conference.

Editors:
Hans-Joachim Hof, INSicherheit - Ingolstadt Research Group Applied IT Security, CARISSMA – Center of Automotive Research on Integrated Safety Systems, Germany
Manuela Popescu, IARIA, USA/EU
Anders Fongen, Norwegian Defence University College, Norway

ISSN: 2162-2116

ISBN: 978-1-61208-919-5

Location: Athens, Greece

Dates: from November 14, 2021 to November 18, 2021

Articles: there are 14 articles

IT-Security Compliance for Home Offices
Christoph Haar and Erik Buchmann
keywords: IT-Grundschutz; Home Office Security; Compliance; Basic Protection

Identification of Automotive Digital Forensics Stakeholders
Kevin Gomez Buquerin and Hans-Joachim Hof
keywords: automotive; digital forensics; forensic; cyber security; embedded; vehicle; car; automobile; stakeholder

Trust Management in Space Information Networks
Anders Fongen
keywords: LEO satellites; trust management; space information networks; AaaS in space

Boardgames as Security Awareness Improvement Tools
Eszter Oroszi
keywords: security awareness; improvement; gamfication; board game; serious game.

Differential Privacy Approaches in a Clinical Trial
Martin Leuckert and Antao Ming
keywords: Differential Privacy; Clinical Trial; Sensor Data; Machine Learning; Privacy Preservation; Data Security

Threat Level Assessment of Smart-Home Stakeholders Using EBIOS Risk Manager
N'guessan Yves-Roland Douha, Doudou Fall, Yuzo Taenaka, and Youki Kadobayashi
keywords: EBIOS RM; Internet of Things; Smart Home; Stakeholder; Security.

Software Based Glitching Detection
Jakob Löw, Dominik Bayerl, and Hans-Joachim Hof
keywords: computer security, clocks, microcontrollers, pro- gram compilers, program control structures

Quantifying Information Leakage of Probabilistic Programs Using the PRISM Model Checker
Khayyam Salehi, Ali A. Noroozi, and Sepehr Amir-Mohammadian
keywords: Information leakage; Quantitative information flow; Confidentiality; PRISM-Leak.

Maverick: Detecting Network Configuration and Control Plane Bugs through Structural Outlierness
Vasudevan Nagendra, Abhishek Pokala, Arani Bhattacharya, and Samir Das
keywords: Network, Control plane, Verification, Outliers, Machine Learning, Network Bugs, Anomaly Detection, Bug Severity.

Cost-benefit Analysis Toward Designing Efficient Education Programs for Household Security
N'guessan Yves-Roland Douha, Bernard Ousmane Sane, Masahiro Sasabe, Doudou Fall, Yuzo Taenaka, and Youki Kadobayashi
keywords: Cost-benefit analysis; game theory; household security awareness; smart-home security.

Cryptanalysis of RSA with Moduli N=p^r q Based on Coppersmith Method: A survey
Simeng Yuan, Wei Yu, Kunpeng Wang, and Xiuxiu Li
keywords: Coppersmith method; Takagi RSA; prime power RSA

Securing Runtime Memory via MMU Manipulation
Marinos Tsantekidis and Vassilis Prevelakis
keywords: Secure, Run-time, Memory, MMU

Adaptive User Profiling with Online Incremental Machine Learning for Security Information and Event Management
Dilli P. Sharma, Barjinder Kaur, Farzaneh Shoeleh, Masoud Erfani, Duc-Phong Le, Arash Habibi Lashkari, and Ali A. Ghorbani
keywords: Machine learning; anomaly detection; cybersecurity; user profiling; incremental learning

Modeling Damage Paths and Repairing Objects in Critical Infrastructure Systems
Justin Burns, Brajendra Panda, and Thanh Bui
keywords: critical infrastructure; damage assessment; recovery