2022 IEEE International Carnahan Conference on Security Technology (ICCST)最新文献

筛选
英文 中文
Secure Tax State Line: a Brazilian State Platform for Monitoring Roads, Designed to Support Tax Enforcement and Compliance 安全税收州线:巴西国家道路监测平台,旨在支持税收执法和合规
2022 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2022-09-07 DOI: 10.1109/ICCST52959.2022.9896597
Lindemberg Naffah Ferreira, Rogerio Zupo Braga, Bruno Meira Tenorio D'Albuquerque, Bruno Eduardo Abreu de Oliveira, Carlos Augusto Lisboa da Silva, Guilherme Couto Soares, Alex Discacciati Neves, Pierre Juliao Pimentel, Marcelo Maximiliano Maciel, Eufrasio Alves Cambui Junior, Carlos Renato Machado Confar, Aline Chevrand Campos, Alessandro Márcio de Moraes Zebral, Jose Roberto Miranda, R. Morais, Adriano Araujo Campolina, Osvaldo Lage Scavazza, Luiz Claudio Fernandes L. Gomes
{"title":"Secure Tax State Line: a Brazilian State Platform for Monitoring Roads, Designed to Support Tax Enforcement and Compliance","authors":"Lindemberg Naffah Ferreira, Rogerio Zupo Braga, Bruno Meira Tenorio D'Albuquerque, Bruno Eduardo Abreu de Oliveira, Carlos Augusto Lisboa da Silva, Guilherme Couto Soares, Alex Discacciati Neves, Pierre Juliao Pimentel, Marcelo Maximiliano Maciel, Eufrasio Alves Cambui Junior, Carlos Renato Machado Confar, Aline Chevrand Campos, Alessandro Márcio de Moraes Zebral, Jose Roberto Miranda, R. Morais, Adriano Araujo Campolina, Osvaldo Lage Scavazza, Luiz Claudio Fernandes L. Gomes","doi":"10.1109/ICCST52959.2022.9896597","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896597","url":null,"abstract":"This paper presents a solution conceived to fight tax evasion, involving the application of analytical intelligence on data sources, including those from the control of road operations. Said solution is based on the capture of the license plate information obtained from 1,065 cameras located on the state highways in the Brazilian State of Minas Gerais. These data are enriched with information about electronic invoice documents and used in an analytical platform to provide insights about likely tax evasion. In the future, it will be possible to get license plate data from other cameras installed on federal roads in the said state, as well as make the license plate information available for other state government bodies, like the Civil and Military Police, Secretariat of Agricultural, State Department of Traffic (as the Department of Motor Vehicle is named in Brazil), among other government agencies. It will help carry out food safety inspections, fight crime and improve law enforcement.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127032708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Current Preventive Approaches in the Context of Cybersecurity 网络安全背景下的现有预防方法分析
2022 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2022-09-07 DOI: 10.1109/ICCST52959.2022.9896499
M. Oka, M. Hromada
{"title":"Analysis of Current Preventive Approaches in the Context of Cybersecurity","authors":"M. Oka, M. Hromada","doi":"10.1109/ICCST52959.2022.9896499","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896499","url":null,"abstract":"Reliance on information technology and computer network solutions is on the increase, so are the activities of cyber criminals, the number of cyber-attacks and the impact. According to Identity theft Resource Centre, the number of data breaches jumped 68% over what was reported in 2020.IT Governance recorded 1,243 security incidents in 2021 representing an 11% increase compared to 2020 that recorded 1,120. Governments and companies continue to invest in preventing these cyber-attacks from occurring by adopting various methods such as patch management, end point protection, installation of fire walls, backup of data, security policies, access control and privileges, Wi-Fi security access, and most importantly security awareness training. According to Info Guard cybersecurity, 95% of security breach is caused by human error.This review paper evaluated the findings from various articles on methods used to prevent cyber-attacks in a simplified format.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131961920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of insurance conditions as a tool to ensure physical protection in the Czech Republic 分析保险条件作为确保捷克共和国人身保护的工具
2022 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2022-09-07 DOI: 10.1109/ICCST52959.2022.9896603
Gabriela Králícková, Petra Dostálová
{"title":"Analysis of insurance conditions as a tool to ensure physical protection in the Czech Republic","authors":"Gabriela Králícková, Petra Dostálová","doi":"10.1109/ICCST52959.2022.9896603","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896603","url":null,"abstract":"Corporate companies are exposed to a large number of risks, which they have to deal with on a daily basis. Security management always considers which risks need to be avoided, eliminated and which can be accepted. It is possible to protect the company from the effects of some of them by transferring them to insurance companies. Insurance companies cannot prevent crisis situations, but they can help the company with the financial costs incurred. The article describes a model company and its physical protection settings. Furthermore, an insurance contract is introduced, which covers the insu rance risks of damage, destruction and theft of property and overall business liability. The aim of the article is to explain not only the insurance conditions of insurance companies, but also the attitudes of insurance companies in compiling insurance offers in connection with the degree of physical protection.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123189771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new hybdrid steganographic technique for images 一种新的图像混合隐写技术
2022 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2022-09-07 DOI: 10.1109/ICCST52959.2022.9896583
F. Garzia, R. Cusani, Andrea Chiarella
{"title":"A new hybdrid steganographic technique for images","authors":"F. Garzia, R. Cusani, Andrea Chiarella","doi":"10.1109/ICCST52959.2022.9896583","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896583","url":null,"abstract":"Steganography is a technique that aims to hide the communication between two interlocutors. Steganography, unlike cryptography, allows to hide a message within a cover medium that can allow it to be transferred without arousing suspicion. Currently there are numerous techniques depending on the digital file (also named cover media or briefly cover) that is used to hide the message for which it is desired to ensure the necessary protection (also named secret message). In this way, the desired recipient can only read it. As regards the images, some main techniques are based on the modification of the LSB (Least Significant Bit) of each pixel of the cover image and on the modification of the bits of the DCT (Discrete Cosine Transform) values of the image itself. The purpose of the present work is to illustrate a new hybrid steganographic technique that merges the two methodologies illustrated above. It also allows to use an appropriate parameter as a cryptographic key for encoding and decoding the secret message.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134095072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Effect of Number Plate Layout and Design on Automated Recognition 车牌布局与设计对自动识别的影响
2022 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2022-09-07 DOI: 10.1109/ICCST52959.2022.9896522
Robert Gurney, Mike Rhead, W. E. Martin
{"title":"The Effect of Number Plate Layout and Design on Automated Recognition","authors":"Robert Gurney, Mike Rhead, W. E. Martin","doi":"10.1109/ICCST52959.2022.9896522","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896522","url":null,"abstract":"This paper considers the implications of adding unnecessary markings to vehicle registration plates following the enactment of The Road Vehicles (Display of Registration Marks) (Amendment) (EU Exit) (No. 2) Regulations 2020","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124450948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Applying Text Analytics to Insider Risk Analysis: A Case Study on Keyword Generation 将文本分析应用于内部风险分析:关键词生成的案例研究
2022 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2022-09-07 DOI: 10.1109/ICCST52959.2022.9896598
Carrie Gardner, William R. Clacyomb
{"title":"Applying Text Analytics to Insider Risk Analysis: A Case Study on Keyword Generation","authors":"Carrie Gardner, William R. Clacyomb","doi":"10.1109/ICCST52959.2022.9896598","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896598","url":null,"abstract":"Recent advancements in text analytics demonstrate significant gains in many natural language processing tasks, taking advantage of newer neural network architectures and transfer learning. In this article, we present findings from a literature review and exploratory study which investigated a specific application of text analytics for insider risk analysis. Results from our literature review find that recent advancements in text analytics greatly augment capabilities to exploit unstructured text commonly collected for insider risk analysis, offering new abilities to extract and generate intelligence to further support, standardize, and automate workflows. Results from our exploratory study suggest that the curation of keyword lists for insider threat detection can be augmented by automated text analytics capabilities, finding evidence that the manual process of managing threat keyword lists can be augmented with automated text analytics approaches. As a takeaway, the insider risk community should investigate further applications of text analytics to support and automate insider risk analysis workflows.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127679828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysing keystroke dynamics using wavelet transforms 用小波变换分析击键动力学
2022 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2022-09-07 DOI: 10.1109/ICCST52959.2022.9896483
Ashhadul Islam, S. Belhaouari
{"title":"Analysing keystroke dynamics using wavelet transforms","authors":"Ashhadul Islam, S. Belhaouari","doi":"10.1109/ICCST52959.2022.9896483","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896483","url":null,"abstract":"Many smartphones are lost every year, with a meager percentage recovered. In many cases, users with malicious intent access these phones and use them to acquire sensitive data. There is a need for continuous monitoring and surveillance in smartphones, and keystroke dynamics play an essential role in identifying whether a phone is being used by its owner or an impersonator. Also, there is a growing need to replace expensive 2-tier authentication methods like One-time passwords (OTP) with cheaper and more robust methods. The methods proposed in this paper are applied to existing data and are proven to train more robust classifiers. A novel feature extraction method by wavelet transformation is demonstrated to convert keystroke data into features. The comparative study of classifiers trained on the extracted features vs. features extracted by existing methods shows that the processes proposed perform better than the state-of-art feature extraction methods.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116907828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threats and Resilience: Methodology in the Area of Railway Infrastructure 威胁与弹性:铁路基础设施领域的方法论
2022 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2022-09-07 DOI: 10.1109/ICCST52959.2022.9896580
Lucie Flynnova, Frantisek Paulus, J. Valasek
{"title":"Threats and Resilience: Methodology in the Area of Railway Infrastructure","authors":"Lucie Flynnova, Frantisek Paulus, J. Valasek","doi":"10.1109/ICCST52959.2022.9896580","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896580","url":null,"abstract":"Railway transport is one of the key sub-sectors of European critical infrastructure. Despite the high level of railway transport safety, railway infrastructure elements are exposed to constant threats arising from large-scale disruptive events, which can cause damage to the functionality of railway infrastructure elements and can endanger passenger safety. One possible approach to protecting these elements is to use the concept of resilience, which reduces the likelihood of potential disruptive events and the vulnerability of the system to their effects. To this end, the primary objective of this paper is to present currently available effective approaches and methods focusing on the protection of the railway infrastructure system, that is, approaches and methods in 1) the identification and specification of critical elements of railway infrastructure, 2) the identification and assessment of threats adversely affecting the operation of critical elements of railway infrastructure, 3) the assessment of the resilience of critical elements of railway infrastructure, and 4) strengthening the resilience of elements in the critical infrastructure system. The paper provides a multi-criteria comparative analysis, which aims to select a suitable methodological apparatus for addressing the issue.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122390747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Objective Method for Object Security Evaluation 对象安全性评价的客观方法
2022 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2022-09-07 DOI: 10.1109/ICCST52959.2022.9896557
S. Kovár, Jan Valouch, J. Nemec
{"title":"Objective Method for Object Security Evaluation","authors":"S. Kovár, Jan Valouch, J. Nemec","doi":"10.1109/ICCST52959.2022.9896557","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896557","url":null,"abstract":"The paper deals with designing a method for objectively determining the security level of buildings. Building security design is a crucial element that influences the final implementation. However, this process is highly subjective, as it depends on the experience of the designer, which may not agree with other experts. Therefore, the idea arose to design an objective method based on a mathematical model, the output of which will be a unique value. This article is conceived as a Proof-of-Concept and provides initial ideas and approaches that will lead to implementing an application with an implemented proposed method.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124016783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzing ICS Protocols: Modbus Fuzzer Framework 模糊测试ICS协议:Modbus模糊测试框架
2022 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2022-09-07 DOI: 10.1109/ICCST52959.2022.9896405
Petr Ilgner, R. Fujdiak
{"title":"Fuzzing ICS Protocols: Modbus Fuzzer Framework","authors":"Petr Ilgner, R. Fujdiak","doi":"10.1109/ICCST52959.2022.9896405","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896405","url":null,"abstract":"Traditionally, industrial control systems were very isolated and industrial control systems operated with very consistent data traffic. Along with the trend of Industry 4.0, their isolation is decreasing and industrial systems are much more connected to other networks. Specifically for these systems, there is a strong focus on their reliability, but also on cyber security. This paper focuses on the widely used industrial Modbus protocol, its security aspects and its structure. A tool for fuzzing testing of this protocol is presented in order to detect possible vulnerabilities in Modbus devices. The architecture of the proposed fuzzer is described in detail. The capabilities of the fuzzer are then demonstrated on a testbed.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117148624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信