ThinkMind // International Journal On Advances in Security, volume 10, numbers 1 and 2, 2017
Notes: A free access journal featuring works submitted on an invitation basis only.
Event editions: - there are 26 editions.
Articles: there are 10 articles
Aspects of Security Update Handling for IoT-devices
keywords: Security update; Internet-of-Things; Incident reporting; Security maintenance; Privacy; Security management.
Visualization and Prioritization of Privacy Risks in Software Systems
George O. M. Yee
keywords: software, system, privacy, risks, visualization, prioritization
A Formalised Approach to Designing Sonification Systems for Network-Security Monitoring
Louise Axon, Jason R. C. Nurse, Michael Goldsmith, and Sadie Creese
keywords: Sonification; Network Security; Anomaly Detection; Network Monitoring; Formalised Model; Situational Awareness
The Influence of the Human Factor on ICT Security: An Empirical Study within the Corporate Landscape in Austria
Christine Schuster, Martin Latzenhofer, Stefan Schauer, Johannes Göllner, Christian Meurers, Andreas Peer, Peter Prah, Gerald Quirchmayr, and Thomas Benesch
keywords: information security; user perceptions; attitude; human risk factor; work satisfaction; compliance.
Verifying the Adherence to Security Policies for Secure Communication in Critical Infrastructures
Steffen Fries and Rainer Falk
keywords: critical infrastructure; smart energy grid; industrial automation; Internet of Things; Digital Grid secure communication; security policy; security protocol; Transport Layer Security
Modeling User-Based Modifications to Information Quality to Address Privacy and Trust Related Concerns in Online Social Networks
Brian Blake and Nitin Agarwal
keywords: information quality; privacy; trust; online social networks
Protecting Data Generated in Medical Research: Aspects of Data Protection and Intellectual Property Rights
Iryna Lishchuk and Marc Stauch
keywords: IP rights; data rights; medical data; data curation; personal data; data protection.
Tree Based Distributed Privacy in Ubiquitous Computing
Malika Yaici, Samia Ameza, Ryma Houari, and Sabrina Hammachi
keywords: Ubiquitous Computing; Cloud computing; Security; Private Data Protection; Privacy; Integrity.
Micro-CI: A Model Critical Infrastructure Testbed for Cyber-Security Training and Research
William Hurst, Nathan Shone, Qi Shi, and Behnam Bazli
keywords: critical infrastructure; cyber-security; modelling; testbed; data analysis; teaching.
Plausibility Checks in Electronic Control Units to Enhance Safety and Security
Martin Ring, Reiner Kriesten, and Frank Kargl
keywords: Automotive Security; Vehicular Attacks; Plausibility Checks.