Home // SECURWARE
SECURWARE 2023, The Seventeenth International Conference on Emerging Security Information, Systems and Technologies
Type: conference
Notes: IARIA Conference.
Editors:
Erik Buchmann, ScaDS.AI, Leipzig University, Germany
Eric Veith, Carl von Ossietzky University Oldenburg, Germany
Dirceu Cavendish, Kyushu Institute of Technology/UCLA, Japan/USA
ISSN: 2162-2116
ISBN: 978-1-68558-092-6
Location: Porto, Portugal
Dates: from September 25, 2023 to September 29, 2023
Articles: there are 15 articles
Lightweight Fine-grained Access Control Mechanism Based on Zero Trust in CPS
Nakul Ghate, Shohei Mitani, and Hirofumi Ueda
keywords: Cyber physical systems; zero trust; fine-grained; workload; distributed access control.
ChatIDS: Explainable Cybersecurity Using Generative AI
Victor Jüttner, Martin Grimmer, and Erik Buchmann
keywords: Intrusion Detection; ChatGPT; Networks
Privacy-preserving Vehicle Tracking Using Homomorphic Encryption
Hoang Anh Bui, Simy Chacko, and Duc Cuong Nguyen
keywords: Homomorphic encryption; privacy preserving; location tracking; trajectory monitoring
Virtual Sessions for Forensic Analysis of Video Conferencing Systems: A Novel Methodology
Jaykumar Soni, Tom Neubert, Benjamin Dietrich, and Claus Vielhauer
keywords: Privacy, Video Conferencing Systems, Media Security, Forensic Analysis
Electric Vehicle Authentication and Secure Metering in Smart Grids
Yutaka Yamaguchi, Dirceu Cavendish, and Hiroshi Koide
keywords: Smart Grids; Electric Vehicle Charging; Authentication and Key Agreement
Heterogeneous Network Inspection in IoT Environment with FPGA based Pre-Filter and CPU based LightGBM
Zhenguo Hu, Hirokazu Hasegawa, Yukiko Yamaguchi, and Hajime Shimada
keywords: Malicious Traffic Detection; Machine Learning; FPGA; LightGBM
Stego-Malware Attribution: Simple Signature and Content-based Features Derived and Validated from Classical Image Steganalysis on Five Exemplary Chosen Algorithms
Bernhard Birnbaum, Christian Kraetzer, and Jana Dittmann
keywords: stego-malware communication scenario; multi-class steganalysis and attribution
Joining of Data-driven Forensics and Multimedia Forensics for Deepfake Detection on the Example of Image and Video Data
Dennis Siegel, Christian Kraetzer, and Jana Dittmann
keywords: forensics, media forensics, DeepFake detection, machine learning
AI-driven Approach for Access Control List Management
Nader Shahata, Hirokazu Hasegawa, and Hiroki Takakura
keywords: Access Control; Cyber Security; Network; Artificial Intelligence.
Drivers for a Secure Mobile App Development Framework
Christoff Jacobs and Marijke Coetzee
keywords: mobile application; secure software development frameworks, cybersecurity
Quantum Threats to the TLS 1.3 Protocol
Luiz Filipi Anderson de Sousa Moura, Alexandre Augusto Giron, and Ricardo Felipe Custódio
keywords: Quantum Computing; Transport Layer Security (TLS) 1.3; Store-Now-Decrypt-Later.
Long-distance Remote Security Diagnostics during Maintenance Testing: A Practical Application and Evaluation
Kazutaka Matsuzaki, Masatoshi Enomoto, and Kenji Sawada
keywords: Industrial Control Systems (ICS), Remote Security Diagnostics, Maintenance Testing
Coordination of Controllers and Switches in Software Defined Networks (SDN) for Multiple Controllers
Stavroula Lalou, Georgios Spathoulas, and Sokratis Katsikas
keywords: Software Defined Networks, multiple controllers, coordination, load balancing.
Leveraging Attack Graphs in Automotive Threat Analysis and Risk Assessment
Mera Nizam-Edden Saulaiman, Miklos Kozlovszky, and Akos Csilling
keywords: TARA, threat and risk analysis, automotive network, connected vehicles
Science-Tracker Fingerprinting with Uncertainty: Selected Common Characteristics of Publishers from Network to Application Trackers on the Example of Web, App and Email
Stefan Kiltz, Robert Altschaffel, and Jana Dittmann
keywords: Security, trust and privacy metrics; IT forensics; Attribution