NexTech 2021 Congress
October 03, 2021 to October 07, 2021 - Barcelona, Spain

  • UBICOMM 2021, The Fifteenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
  • ADVCOMP 2021, The Fifteenth International Conference on Advanced Engineering Computing and Applications in Sciences
  • SEMAPRO 2021, The Fifteenth International Conference on Advances in Semantic Processing
  • AMBIENT 2021, The Eleventh International Conference on Ambient Computing, Applications, Services and Technologies
  • EMERGING 2021, The Thirteenth International Conference on Emerging Networks and Systems Intelligence
  • DATA ANALYTICS 2021, The Tenth International Conference on Data Analytics
  • GLOBAL HEALTH 2021, The Tenth International Conference on Global Health Challenges
  • CYBER 2021, The Sixth International Conference on Cyber-Technologies and Cyber-Systems

SoftNet 2021 Congress
October 03, 2021 to October 07, 2021 - Barcelona, Spain

  • ICSEA 2021, The Sixteenth International Conference on Software Engineering Advances
  • ICSNC 2021, The Sixteenth International Conference on Systems and Networks Communications
  • CENTRIC 2021, The Fourteenth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services
  • VALID 2021, The Thirteenth International Conference on Advances in System Testing and Validation Lifecycle
  • SIMUL 2021, The Thirteenth International Conference on Advances in System Simulation
  • SOTICS 2021, The Eleventh International Conference on Social Media Technologies, Communication, and Informatics
  • INNOV 2021, The Tenth International Conference on Communications, Computation, Networks and Technologies
  • HEALTHINFO 2021, The Sixth International Conference on Informatics and Assistive Technologies for Health-Care, Medical Support and Wellbeing

NetWare 2021 Congress
November 14, 2021 to November 18, 2021 - Athens, Greece

  • SENSORCOMM 2021, The Fifteenth International Conference on Sensor Technologies and Applications
  • SENSORDEVICES 2021, The Twelfth International Conference on Sensor Device Technologies and Applications
  • SECURWARE 2021, The Fifteenth International Conference on Emerging Security Information, Systems and Technologies
  • AFIN 2021, The Thirteenth International Conference on Advances in Future Internet
  • CENICS 2021, The Fourteenth International Conference on Advances in Circuits, Electronics and Micro-electronics
  • ICQNM 2021, The Fifteenth International Conference on Quantum, Nano/Bio, and Micro Technologies
  • FASSI 2021, The Seventh International Conference on Fundamentals and Advances in Software Systems Integration
  • GREEN 2021, The Sixth International Conference on Green Communications, Computing and Technologies

TrendNews 2021 Congress
November 14, 2021 to November 18, 2021 - Athens, Greece

  • CORETA 2021, Advances on Core Technologies and Applications
  • DIGITAL 2021, Advances on Societal Digital Transformation

 


ThinkMind // SECURWARE 2020, The Fourteenth International Conference on Emerging Security Information, Systems and Technologies

Type: conference

Download: SECURWARE 2020 cover page

Download: SECURWARE 2020 foreword page

Download: SECURWARE 2020 committee page

Download: SECURWARE 2020 table of contents

Download: SECURWARE 2020 full proceedings

Notes: IARIA Conference.

Editors:
Hans-Joachim Hof, INSicherheit - Ingolstadt Research Group Applied IT Security, CARISSMA – Center of Automotive Research on Integrated Safety Systems, Germany
Manuela Popescu, IARIA, USA/EU
George Yee, Carleton University, Canada

Event editions: - there are 10 editions.

ISSN: 2162-2116

ISBN: 978-1-61208-821-1

Location: Valencia, Spain

Dates: from November 21, 2020 to November 25, 2020

Articles: there are 15 articles

An Information Flow Modelling Approach for Critical Infrastructure Simulation
Denise Gall, Christian Luidold, Gregor Langner, Thomas Schaberreiter, and Gerald Quirchmayr
keywords: Information Flow Modelling; Critical Infrastructure; Infrastructure Simulation; Cascading Effects.

A Gap Analysis of Visual and Functional Requirements in Cybersecurity Monitoring Tools
Christian Luidold and Thomas Schaberreiter
keywords: requirements analysis; collaboration; situational awareness; multi-stakeholder; visualization.

Trust Through Origin and Integrity: Protection of Client Code for Improved Cloud Security
Anders Fongen, Kirsi Helkala, and Mass Soldal Lund
keywords: cloud security; integrity attestation; trusted computing; Google ChromeOS

Integration of Network Services in Tactical Coalition SDN Networks
Anders Fongen and Mass Soldal Lund
keywords: authentication; intrusion prevention; software defined networks; tactical networks; trust management

Detection Algorithm for Non-recursive Zip Bombs
MaoYang Chen and MingYu Fan
keywords: Software safety, File viruses, Compression bombs.

Information Extraction from Darknet Market Advertisements and Forums
Sven Schlarb, Clemens Heistracher, and Faisal Ghaffar
keywords: natural language processing; Information extraction; named entity recognition; relationship extraction, event detection

WAF Signature Generation with Real-Time Information on the Web
Masahito Kumazaki, Yukiko Yamaguchi, Hajime Shimada, and Hirokazu Hasegawa
keywords: Web Application Firewall(WAF); Zero-day Attack; Vulnerability Information; Real-time Information.

Securing Smart Homes using Intrusion Detection Systems
Christoph Haar and Erik Buchmann
keywords: IT Security; Smart Home Security; Intrusion Detection Systems

Automatic Mapping of Vulnerability Information to Adversary Techniques
Otgonpurev Mendsaikhan, Hirokazu Hasegawa, Yukiko Yamaguchi, and Hajime Shimada
keywords: Multi-label classification; MITRE ATT&CK; Security Vulnerability

Introduction to Being a Privacy Detective: Investigating and Comparing Potential Privacy Violations in Mobile Apps Using Forensic Methods
Stefan Kiltz, Robert Altschaffel, Thorsten Lucke, and Jana Dittmann
keywords: Privacy Measurement; Data sovereignty

Towards Cybersecurity Act: A Survey on IoT Evaluation Frameworks
Maxime Puys, Jean-Pierre Krimm, and Raphaël Collado
keywords: Cybersecurity Act; Internet of Things; IoT; certification; evaluation scheme; smart-home.

Towards Reducing the Impact of Data Breaches
George O. M. Yee
keywords: reducing impact, data breach, private data loss, B2C e-commerce

Forensic Behavior Analysis in Video Conferencing Based on the Metadata of Encrypted Audio and Video Streams - Considerations and Possibilities
Robert Altschaffel, Jonas Hielscher, Christian Krätzer, Kevin Lamshöft, and Jana Dittmann
keywords: Security, Video conferencing, Zoom, Big Blue Button, User and traffic profiling, Network forensics

Towards Situation-based IT Management During Natural Disaster Crisis
Abdelmalek Benzekri, Romain Laborde, Arnaud Oglaza, Maleerat Sodanil, and Hatahairat Ketmaneechairat
keywords: crisis management ; policy-based management ; situation awareness ; network infrastructure ; social media ; machine learning ; natural language processing.

A Concept of an Attack Model for a Model-Based Security Testing Framework
Tina Volkersdorfer and Hans-Joachim Hof
keywords: model; adversary model; model-based testing; security testing; penetration test.

SERVICES CONTACT
2010 - 2017 © ThinkMind. All rights reserved.
Read Terms of Service and Privacy Policy.