Quantcast
Channel: Latest Results
Browsing all 44 articles
Browse latest View live

Information Security and Privacy Research

View Article



Formal analysis for robust anti-SPIT protection using model checking

AbstractAnti-SPIT policies counter the SPam over Internet Telephony (SPIT) by distinguishing bots launching unsolicited bulks of VoIP calls from human beings. We propose an Anti-SPIT Policy Management...

View Article

Insiders Trapped in the Mirror Reveal Themselves in Social Media

AbstractSocial media have widened society’s opportunities for communication, while they offer ways to perform employees’ screening and profiling. Our goal in this paper is to develop an insider threat...

View Article

A Qualitative Metrics Vector for the Awareness of Smartphone Security Users

AbstractThe proliferation of smartphones introduced new challenges in the users’ security and privacy. Currently, the literature concentrates mainly on the ‘nuts and bolts’ of their security models....

View Article

Evaluating the Manageability of Web Browsers Controls

AbstractThe proliferation of smartphones has introduced new challenges in web browsing security. These devices often have limited resources and small size, which may limit the security ‘arsenal’ of...

View Article


On Business Logic Vulnerabilities Hunting: The APP_LogGIC Framework

AbstractWhile considerable research effort has been put in the identification of technical vulnerabilities, such as buffer overflows or SQL injections, business logic vulnerabilities have drawn limited...

View Article

The Insider Threat in Cloud Computing

AbstractCloud computing is an emerging technology paradigm, enabling and facilitating the dynamic and versatile provision of computational resources and services. Even though the advantages offered by...

View Article

Interdependencies between Critical Infrastructures: Analyzing the Risk of...

AbstractOne of the most challenging problems, when protecting critical infrastructures, is the identification and assessment of interdependencies. In this paper we examine the possible cumulative...

View Article


Cascading Effects of Common-Cause Failures in Critical Infrastructures

AbstractOne of the most challenging problems in critical infrastructure protection is the assessment and mitigation of cascading failures across infrastructures. In previous research, we have proposed...

View Article


Probabilistic Model Checking of CAPTCHA Admission Control for DoS Resistant...

AbstractVoice over IP (VoIP) service is expected to play a key role to new ways of communication. It takes advantage of Internet Protocols by using packet networks to transmit voice and multimedia...

View Article

In Cloud We Trust: Risk-Assessment-as-a-Service

AbstractCloud computing is an emerging paradigm that allows adoption of on-demand services in a cost-effective way. Migrating services to the Cloud also means been exposed to new threats and...

View Article

Critical Information Infrastructure Security

View Article

Assessing Privacy Risks in Android: A User-Centric Approach

AbstractThe increasing presence of privacy violating apps in app marketplaces poses a significant privacy risk for smartphone users. Current approaches assessing privacy risk lack user input, assuming...

View Article


Youtube User and Usage Profiling: Stories of Political Horror and Security...

AbstractSocial media and Web 2.0 have enabled internet users to contribute online content, which may be crawled and utilized for a variety of reasons, from personalized advertising to behaviour...

View Article

Business Process Modeling for Insider Threat Monitoring and Handling

AbstractBusiness process modeling has facilitated modern enterprises to cope with the constant need to increase their productivity, reduce costs and offer competitive products and services. Despite...

View Article


Cryptology and Network Security

View Article

Smart Home Solutions: Privacy Issues

AbstractSmart home solutions enable access to health-care services to patients by the use of ubiquitous, smart devices or sensors, at the convenience of their home. As in any health-care IT...

View Article


Using Centrality Measures in Dependency Risk Graphs for Efficient Risk...

AbstractOne way to model cascading critical infrastructure failures is through dependency risk graphs. These graphs help assess the expected risk of critical infrastructure dependency chains. This...

View Article

Automated Detection of Logical Errors in Programs

AbstractStatic and dynamic program analysis tools mostly focus on the detection of a priori defined defect patterns and security vulnerabilities. Automated detection of logical errors, due to a faulty...

View Article

Using Logical Error Detection in Software Controlling Remote-Terminal Units...

AbstractA method for predicting software failures to critical information infrastructures is presented in this paper. Software failures in critical infrastructures can stem from logical errors in the...

View Article
Browsing all 44 articles
Browse latest View live




Latest Images