NexTech 2021 Congress
October 03, 2021 to October 07, 2021 - Barcelona, Spain

  • UBICOMM 2021, The Fifteenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
  • ADVCOMP 2021, The Fifteenth International Conference on Advanced Engineering Computing and Applications in Sciences
  • SEMAPRO 2021, The Fifteenth International Conference on Advances in Semantic Processing
  • AMBIENT 2021, The Eleventh International Conference on Ambient Computing, Applications, Services and Technologies
  • EMERGING 2021, The Thirteenth International Conference on Emerging Networks and Systems Intelligence
  • DATA ANALYTICS 2021, The Tenth International Conference on Data Analytics
  • GLOBAL HEALTH 2021, The Tenth International Conference on Global Health Challenges
  • CYBER 2021, The Sixth International Conference on Cyber-Technologies and Cyber-Systems

SoftNet 2021 Congress
October 03, 2021 to October 07, 2021 - Barcelona, Spain

  • ICSEA 2021, The Sixteenth International Conference on Software Engineering Advances
  • ICSNC 2021, The Sixteenth International Conference on Systems and Networks Communications
  • CENTRIC 2021, The Fourteenth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services
  • VALID 2021, The Thirteenth International Conference on Advances in System Testing and Validation Lifecycle
  • SIMUL 2021, The Thirteenth International Conference on Advances in System Simulation
  • SOTICS 2021, The Eleventh International Conference on Social Media Technologies, Communication, and Informatics
  • INNOV 2021, The Tenth International Conference on Communications, Computation, Networks and Technologies
  • HEALTHINFO 2021, The Sixth International Conference on Informatics and Assistive Technologies for Health-Care, Medical Support and Wellbeing

NetWare 2021 Congress
November 14, 2021 to November 18, 2021 - Athens, Greece

  • SENSORCOMM 2021, The Fifteenth International Conference on Sensor Technologies and Applications
  • SENSORDEVICES 2021, The Twelfth International Conference on Sensor Device Technologies and Applications
  • SECURWARE 2021, The Fifteenth International Conference on Emerging Security Information, Systems and Technologies
  • AFIN 2021, The Thirteenth International Conference on Advances in Future Internet
  • CENICS 2021, The Fourteenth International Conference on Advances in Circuits, Electronics and Micro-electronics
  • ICQNM 2021, The Fifteenth International Conference on Quantum, Nano/Bio, and Micro Technologies
  • FASSI 2021, The Seventh International Conference on Fundamentals and Advances in Software Systems Integration
  • GREEN 2021, The Sixth International Conference on Green Communications, Computing and Technologies

TrendNews 2021 Congress
November 14, 2021 to November 18, 2021 - Athens, Greece

  • CORETA 2021, Advances on Core Technologies and Applications
  • DIGITAL 2021, Advances on Societal Digital Transformation

 


ThinkMind // International Journal On Advances in Security, volume 12, numbers 1 and 2, 2019

Type: journal

Notes: A free access journal featuring works submitted on an invitation basis only.

Event editions: - there are 26 editions.

ISSN: 1942-2636

Articles: there are 12 articles

Towards a Comprehensive Automotive Cybersecurity Reference Architecture
Christoph Schmittner, Martin Latzenhofer, Abdelkader Shaaban Magdy, Arndt Bonitz, and Markus Hofer
keywords: automotive cybersecurity; cooperative intelligent transport system; service matrix; reference architecture; risk management.

MEADcast: Explicit Multicast with Privacy Aspects
Vitalian Danciu and Cuong Ngoc Tran
keywords: Privacy-Preserving Multicast; Agnostic Destination; Explicit Multicast; Sender-Centric Multicast

Evaluating Security Products: Formal Model and Requirements of a New Approach
Pierre-Marie Bajan, Christophe Kiennert, and Hervé Debar
keywords: cybersecurity; simulation; evaluation; formal method

Power Consumption Analysis of the New Covert Channels in CoAP
Aleksandar Velinov, Aleksandra Mileva, and Done Stojanov
keywords: CoAP; network steganography; Contiki OS; Cooja; Copper

Secure Cooperation of Untrusted Components Using a Strongly Typed Virtual Machine
Roland Wismüller and Damian Ludwig
keywords: Security; software component; type system; object- capability model; membrane; virtual machine.

Implementation and Performance Evaluation of Eavesdropping Protection Method over MPTCP Using Data Scrambling and Path Dispersion
Toshihiko Kato, Shihan Cheng, Ryo Yamamoto, Satoshi Ohzahata, and Nobuo Suzuki
keywords: Multipath TCP; Eavesdropping; Data Dispersion; Data Scrambling

Protecting Deployment Models in Collaborative Cloud Application Development
Vladimir Yussupov, Ghareeb Falazi, Michael Falkenthal, and Frank Leymann
keywords: Collaboration; Security Policy; Confidentiality; Integrity; Deployment Model; Deployment Automation; TOSCA

Synthesis of Formal Specifications From Requirements for Refinement-based Real Time Object Code Verification
Eman Al-Qtiemat, Sudarshan Srinivasan, Zeyad Al-Odat, Mohana Asha Latha Dubasi, and Sana Shuja
keywords: requirements analysis; safety-critical IoT embedded devices; timing specifications; timing transition systems; formal model; formal verification.

Reviewing National Cybersecurity Awareness for Users and Executives in Africa
Maria Bada, Basie von Solms, and Ioannis Agrafiotis
keywords: Cybersecurity; National strategies; Cyber threat awareness; Risk

The Speech Interface as an Attack Surface: An Overview
Mary K. Bispham, Ioannis Agrafiotis, and Michael Goldsmith
keywords: cyber security; human-computer interaction; voice-controlled digital assistants; speech interface

Threat Analysis using Vulnerability Databases - Topic Model Analysis using LDA and System Model Description -
Katsuyuki Umezawa, Yusuke Mishina, Sven Wohlgemuth, and Kazuo Takaragi
keywords: Threat Analysis; Vulnerability Information; Attack Tree; Topic Model Analysis; System Model Description

Dont Wait to be Breached! Creating Asymmetric Uncertainty of Cloud Applications via Moving Target Defenses
Kennedy Torkura, Christoph Meinel, and Nane Kratzke
keywords: zero-day; exploit; moving target defense; microservice; cloud-native; application; security; asymmetric

SERVICES CONTACT
2010 - 2017 © ThinkMind. All rights reserved.
Read Terms of Service and Privacy Policy.