NexTech 2021 Congress
October 03, 2021 to October 07, 2021 - Barcelona, Spain

  • UBICOMM 2021, The Fifteenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
  • ADVCOMP 2021, The Fifteenth International Conference on Advanced Engineering Computing and Applications in Sciences
  • SEMAPRO 2021, The Fifteenth International Conference on Advances in Semantic Processing
  • AMBIENT 2021, The Eleventh International Conference on Ambient Computing, Applications, Services and Technologies
  • EMERGING 2021, The Thirteenth International Conference on Emerging Networks and Systems Intelligence
  • DATA ANALYTICS 2021, The Tenth International Conference on Data Analytics
  • GLOBAL HEALTH 2021, The Tenth International Conference on Global Health Challenges
  • CYBER 2021, The Sixth International Conference on Cyber-Technologies and Cyber-Systems

SoftNet 2021 Congress
October 03, 2021 to October 07, 2021 - Barcelona, Spain

  • ICSEA 2021, The Sixteenth International Conference on Software Engineering Advances
  • ICSNC 2021, The Sixteenth International Conference on Systems and Networks Communications
  • CENTRIC 2021, The Fourteenth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services
  • VALID 2021, The Thirteenth International Conference on Advances in System Testing and Validation Lifecycle
  • SIMUL 2021, The Thirteenth International Conference on Advances in System Simulation
  • SOTICS 2021, The Eleventh International Conference on Social Media Technologies, Communication, and Informatics
  • INNOV 2021, The Tenth International Conference on Communications, Computation, Networks and Technologies
  • HEALTHINFO 2021, The Sixth International Conference on Informatics and Assistive Technologies for Health-Care, Medical Support and Wellbeing

NetWare 2021 Congress
November 14, 2021 to November 18, 2021 - Athens, Greece

  • SENSORCOMM 2021, The Fifteenth International Conference on Sensor Technologies and Applications
  • SENSORDEVICES 2021, The Twelfth International Conference on Sensor Device Technologies and Applications
  • SECURWARE 2021, The Fifteenth International Conference on Emerging Security Information, Systems and Technologies
  • AFIN 2021, The Thirteenth International Conference on Advances in Future Internet
  • CENICS 2021, The Fourteenth International Conference on Advances in Circuits, Electronics and Micro-electronics
  • ICQNM 2021, The Fifteenth International Conference on Quantum, Nano/Bio, and Micro Technologies
  • FASSI 2021, The Seventh International Conference on Fundamentals and Advances in Software Systems Integration
  • GREEN 2021, The Sixth International Conference on Green Communications, Computing and Technologies

TrendNews 2021 Congress
November 14, 2021 to November 18, 2021 - Athens, Greece

  • CORETA 2021, Advances on Core Technologies and Applications
  • DIGITAL 2021, Advances on Societal Digital Transformation

 


ThinkMind // International Journal On Advances in Security, volume 11, numbers 1 and 2, 2018

Type: journal

Notes: A free access journal featuring works submitted on an invitation basis only.

Event editions: - there are 26 editions.

ISSN: 1942-2636

Articles: there are 15 articles

Seven Steps to a Forever-Safe Cipher - (An Introduction to Poly-Substitution Encryption)
Julian Murguia Hughes
keywords: cipher; poly-substitution; unconditional security; perfect secrecy; inifinite computational power; quantum-resistant; cryptography; secrecy; unbreakability; privacy; encryption; quantum; computing; resistant; data.

An Elaborated Framework for Protecting Privacy in the IoT
George O. M. Yee
keywords: privacy protection, IoT, privacy policy, compliance, controller

Security and Privacy under a Unified Framework: A Review
Argyri Pattakou, Christos Kalloniatis, and Stefanos Gritzalis
keywords: security; privacy; requirements engineering methods; traditional architecture; cloud computing; unified framework

Security Hardening of Automotive Networks Through the Implementation of Attribute-Based Plausibility Checks
Marcel Rumez, Jürgen Dürrwang, Johannes Braun, and Reiner Kriesten
keywords: Automotive Safety and Security; Vehicular Attacks; Plausibility Checks; Vehicle Networks

Empirical Case Studies of the Root Cause Analysis Method in Information Security
Niclas Hellesen, Henrik Miguel Nacarino Torres, and Gaute Wangen
keywords: Information Security; Root cause analysis; Risk Management; Case study; Socio-technical; Empirical

Optimal Security Protection for Sensitive Data
George O. M. Yee
keywords: optimal, security protection, assessment, sensitive data, vulnerability

RMDM – Further Verification of the Conceptual ICT Risk-Meta-Data-Model - Verified with the underlying Risk Models of COBIT for Risk and COSO ERM 2017
Martin Latzenhofer and Gerald Quirchmayr
keywords: information and communication technology risk management; ICT risk-meta-data-model; COBIT for Risk; COSO ERM 2017; metamodeling; UML

A Survey on Open Forensics in Embedded Systems of Systems - From Automotive Considerations to a Larger Scope
Robert Altschaffel, Kevin Lamshöft, Stefan Kiltz, Mario Hildebrandt, and Jana Dittmann
keywords: computer forensics; embedded systems; forensic processes; industrial control systems; safety & security.

Proposal and Study on Implementation of Data Eavesdropping Protection Method over Multipath TCP Communication Using Data Scrambling and Path Dispersion
Toshihiko Kato, Shihan Cheng, Ryo Yamamoto, Satoshi Ohzahata, and Nobuo Suzuki
keywords: Multipath TCP; Eavesdropping; Data Dispersion; Data Scrambling; JProbe.

Empirical Analysis of Domain Blacklists
Tran Phuong Thao, Akira Yamada, and Ayumu Kubota
keywords: Web Security, Empirical Analysis, Blacklist, Malicious Domain, Whois Information, HTML Document, Text Mining

Simulating Blast Effects on High Security Vehicles with 3D Fluid-Structure Interaction
Arash Ramezani, Burghard Hillig, and Hendrik Rothe
keywords: CFD-FEM coupling methods; fully automatic structure analyses; high-performance computing techniques; blast loading; vehicle structure

Advanced Sound Static Analysis to Detect Safety- and Security-Relevant Programming Defects
Daniel Kästner, Laurent Mauborgne, Nicolas Grafe, and Christian Ferdinand
keywords: static analysis; abstract interpretation; runtime errors; security vulnerabilities; functional safety; cybersecurity

Integrating Autonomous Vehicle Safety and Security Analysis Using STPA Method and the Six-Step Model
Giedre Sabaliauskaite, Lin Shen Liew, and Jin Cui
keywords: Autonomous vehicle; safety; security; Six-Step Model; STPA

System Integrity Monitoring for Industrial Cyber Physical Systems
Rainer Falk and Steffen Fries
keywords: system integrity, device integrity; cyber physical systems; Internet of Things, embedded security; cyber security

A Block Cipher Masking Technique for Single and Multi-Paired-User Environments
Ray Hashemi, Amar Rasheed, Azita Bahrami, and Jeffrey Young
keywords: Cyber Security; Masking and Unmasking Ciphertext; V ariable-Block Cipher V accination; Masking Strength; Key Aggregation; Re-keying; Re-Profiling

SERVICES CONTACT
2010 - 2017 © ThinkMind. All rights reserved.
Read Terms of Service and Privacy Policy.