Home // SECURWARE

SECURWARE 2024, The Eighteenth International Conference on Emerging Security Information, Systems and Technologies

Type: conference

Notes: IARIA Conference.

Editors:
Fatima Hussain, Toronto Metropolitan University, Toronto, Canada
Steffen Fries, Siemens AG, Germany

ISSN: 2162-2116

ISBN: 978-1-68558-206-7

Location: Nice, France

Dates: from November 3, 2024 to November 7, 2024

Articles: there are 28 articles

Detecting Denial of Service Attacks in Smart Grids Using Machine Learning: A Study of IEC-61850 Protocols
Antonin Delhomme, Livinus Obiora Nweke, and Sule Yildirim Yayilgan
keywords: Smart Grids; Digital Substation; Machine Learning; Deep Learning; DoS Attacks; Cyber-Attack Detection.

Framework for Quantum Digital Wallets
Javaid Iqbal Zahid, Alex Ferworn, and Fatima Hussain
keywords: Self-Sovereign Identity, Digital Wallet, Verifiable Credentials, Public-key Cryptography, Quantum Cryptography, RSA, Peer-to-Peer Network.

Evaluating the Robustness of Kolmogorov-Arnold Networks against Noise and Adversarial Attacks
Evgenii Ostanin, Nebojsa Djosic, Fatima Hussain, Salah Sharieh, and Alexander Ferworn
keywords: Kolmogorov-Arnold Network, KAN, MLP, FGSM, PGD, MNIST, Classification.

KAN vs KAN: Examining Kolmogorov-Arnold Networks (KAN) Performance under Adversarial Attacks
Nebojsa Djosic, Evgenii Ostanin, Fatima Hussain, Salah Sharieh, and Alexander Ferworn
keywords: FGSM; MNIST; Kolmogorov-Arnold Networks; KAN; PGD; Classification.

An AI-based Cognitive Architecture for Augmenting Cybersecurity Analysts
Salvatore Vella, Moussa Noun, Salah Sharieh, and Alex Ferworn
keywords: AI Agents; Cybersecurity; Automation.

Validating Damage Assessment: A Simulation-Based Analysis of Blind Write Lineage in Fog Computing
Mariha Siddika Ahmad and Brajendra Panda
keywords: Fog computing security; blind write; data dependency; damage assessment; malicious transaction.

Theoretical and Practical Aspects in Identifying Gaps and Preparing for Post-Quantum Cryptography
Jörn-Marc Schmidt and Alexander Lawall
keywords: Post Quantum Cryptography (PQC); PQC Standards; PQC Implementations.

Riskpool – A Security Risk Management Methodology
Martin Ring, Paul Duplys, and Sven Köhler
keywords: security; risk management; cyber security.

Device Onboarding Transparency – Supporting Initial Trust Establishment
Steffen Fries and Rainer Falk
keywords: communication security; onboarding; trust establishment; industrial automation and control system; cybersecurity; Internet of Things.

Fast Charging Communication and Cybersecurity: A Technology Review
Jakob Löw, Kevin Mayer, and Hans-Joachim Hof
keywords: charging; fast charging; ccs; iso15118; DC charging; electric vehicle; vehicle charging; cybersecurity.

Enhanced Arbiter PUF Construction Model to Strengthening PUF-based Authentication
Rizka Reza Pahlevi, Hirokazu Hasegawa, Yukiko Yamaguchi, and Hajime Shimada
keywords: physical unclonable functions, authentication, arbiter PUF.

Towards a Stakeholder-Centric Trust Management Approach for the Automotive Ecosystem
Marco Michl and Hans-Joachim Hof
keywords: automotive; ecosystem; trust; authorization; stakeholder.

Enhancing Phishing Detection: An Eye-Tracking Study on User Interaction and Oversights in Phishing Emails
Meret Kristen, Fabian Engl, and Jürgen Mottok
keywords: Phishing; Security Awareness; Eye-Tracking; IT-Security; Usability and UX.

Countermeasure against Insider Threat Regarding Psychological State of Organizational Members and Business Impact of Information Resources
Yuki Kodaka, Hirokazu Hasegawa, and Hiroki Takakura
keywords: Insider threat, Psychological state analysis, Business impact analysis.

Addressing Malware Family Concept Drift with Triplet Autoencoder
Numan Halit Guldemir, Oluwafemi Olukoya, and Jesús Martínez-del-Rincón
keywords: Concept drift; Windows PE malware; temporal analysis; triplet loss; autoencoder; metric learning.

Security-risk-mitigation Measures for Automotive Remote Diagnostic System
Masaaki Miyashita and Hiroki Takakura
keywords: Automotive cybersecurity; Remote diagnosis; UDS.

Cyber Threat Response System Design and Test Environment
Taewoo Tak, Young-Jun Lee, and Taejin Kim
keywords: cybersecurity in NPP; NPP cybersecurity response system; cybersecurity test environment.

An Analysis Framework for Steganographic Network Data in Industrial Control Systems
Tom Neubert, Bjarne Peuker, Eric Schueler, Henning Ullrich, Laura Buxhoidt, and Claus Vielhauer
keywords: Information Hiding; Intrusion Detection and Attribution; Network Steganography; Stealthy Malware; Industrial Control Systems; Analysis Framework.

Information Hiding Detection in Industrial Control Systems - Statistical Analysis in Modbus TCP/IP
Robert Altschaffel, Jana Dittmann, and Lennox Lingk
keywords: Communication; Steganography; Attribution.

A Comparative Study of Backbone Architectures for Language Model-Based Intrusion Detection
Benedikt Pletzer and Jürgen Mottok
keywords: IDS;Transformer; BitNet; Mamba; MatMul-Free LM.

Fingerprinting and Tracing Shadows: The Development and Impact of Browser Fingerprinting on Digital Privacy
Alexander Lawall
keywords: browser fingerprinting; device fingerprinting; tracking; privacy.

Forensic Analysis of GAN Training and Generation: Output Artifacts Assessment of Circles and Lines
Stefan Seidlitz and Jana Dittmann
keywords: Media Forensic; Generative Adversarial Networks (GAN); DeepFake; Advance and Challenges.

Merging Digital Twins and Multi-Agent Systems Approaches for Security Monitoring
Zoe Lagache, Annabelle Mercier, Oum-El-Kheir Aktouf, and Arthur Baudet
keywords: Multi-Agent Systems, Digital Twins, Cyber Physical Systems, Network Security.

Vehicle Security Operations Center for Cooperative, Connected and Automated Mobility
Kevin Mayer, Tina Volkersdorfer, Jenny Hofbauer, Patrizia Heinl, and Hans-Joachim Hof
keywords: automotive; cyber security; security operations center; vehicle; vehicle security operations center; defensive; detection.

SEC-AIRSPACE: Addressing Cyber Security Challenges in Future Air Traffic Management
Karin Bernsmed, Per Håkon Meland, Tim Stelkens-Kobsch, Alessandra Tedeschi, Carlo Dambra, Irene Buselli, Enrico Frumento, Davide Martintoni, Valerio Senni, Andrei Gurtov, Gurjot Singh Gaba, Alejandro Sastre García, and Supathida Boonsong
keywords: cyber security; threats; vulnerabilities; security risk assessment; Learning Analytics; Air Traffic Management; SESAR.

Evaluating Performance Characteristics of Threshold Fully Homomorphic Encryption for Distributed Analytics Scenarios
Svetlana Boudko and Kristian Teig Grønvold
keywords: privacy; data security; threshold homomorphic encryption; multi-party computation; distributed analytics.

Blue Team Fundamentals: Roles and Tools in a Security Operations Center
Jenny Hofbauer and Kevin Mayer
keywords: Security Operations Center; SOC; SOC Roles; SOC Tools; Blue Team.

Cryptocurrency Integration in Qatar's Financial Markets Analyzing the Opportunities, Issues, and Regulatory Implications
Asma Nasser Al-Nassr and Moutaz Alazab
keywords: financial innovation; blockchain technology; fintech; economic analysis; cryptocurrency; Islamic finance; sharia law; regulatory framework.