Home // Sec

International Journal On Advances in Security, volume 10, numbers 1 and 2, 2017

Type: journal

Notes: A free access journal featuring works submitted on an invitation basis only.

ISSN: 1942-2636

Articles: there are 10 articles

Aspects of Security Update Handling for IoT-devices
Geir Køien
keywords: Security update; Internet-of-Things; Incident reporting; Security maintenance; Privacy; Security management.

Visualization and Prioritization of Privacy Risks in Software Systems
George O. M. Yee
keywords: software, system, privacy, risks, visualization, prioritization

A Formalised Approach to Designing Sonification Systems for Network-Security Monitoring
Louise Axon, Jason R. C. Nurse, Michael Goldsmith, and Sadie Creese
keywords: Sonification; Network Security; Anomaly Detection; Network Monitoring; Formalised Model; Situational Awareness

The Influence of the Human Factor on ICT Security: An Empirical Study within the Corporate Landscape in Austria
Christine Schuster, Martin Latzenhofer, Stefan Schauer, Johannes Göllner, Christian Meurers, Andreas Peer, Peter Prah, Gerald Quirchmayr, and Thomas Benesch
keywords: information security; user perceptions; attitude; human risk factor; work satisfaction; compliance.

Verifying the Adherence to Security Policies for Secure Communication in Critical Infrastructures
Steffen Fries and Rainer Falk
keywords: critical infrastructure; smart energy grid; industrial automation; Internet of Things; Digital Grid secure communication; security policy; security protocol; Transport Layer Security

Modeling User-Based Modifications to Information Quality to Address Privacy and Trust Related Concerns in Online Social Networks
Brian Blake and Nitin Agarwal
keywords: information quality; privacy; trust; online social networks

Protecting Data Generated in Medical Research: Aspects of Data Protection and Intellectual Property Rights
Iryna Lishchuk and Marc Stauch
keywords: IP rights; data rights; medical data; data curation; personal data; data protection.

Tree Based Distributed Privacy in Ubiquitous Computing
Malika Yaici, Samia Ameza, Ryma Houari, and Sabrina Hammachi
keywords: Ubiquitous Computing; Cloud computing; Security; Private Data Protection; Privacy; Integrity.

Micro-CI: A Model Critical Infrastructure Testbed for Cyber-Security Training and Research
William Hurst, Nathan Shone, Qi Shi, and Behnam Bazli
keywords: critical infrastructure; cyber-security; modelling; testbed; data analysis; teaching.

Plausibility Checks in Electronic Control Units to Enhance Safety and Security
Martin Ring, Reiner Kriesten, and Frank Kargl
keywords: Automotive Security; Vehicular Attacks; Plausibility Checks.