2022 IEEE International Carnahan Conference on Security Technology (ICCST)最新文献

筛选
英文 中文
Perceived severity of vulnerability in cybersecurity: cross linguistic variegation 网络安全脆弱性的感知严重性:跨语言差异
2022 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2022-09-07 DOI: 10.1109/ICCST52959.2022.9896488
Wiktor Sedkowski, Karol Bierczyński
{"title":"Perceived severity of vulnerability in cybersecurity: cross linguistic variegation","authors":"Wiktor Sedkowski, Karol Bierczyński","doi":"10.1109/ICCST52959.2022.9896488","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896488","url":null,"abstract":"The emergence of artificial intelligence [AI] , computer vision, and speech recognition systems have made significant growth in all areas of human life including cybersecurity. Multiple cybersecurity companies are trying to leverage AI to help combat cyberattacks as AI and machine learning can faster and cheaper monitor for any suspicious activity in the network, informing security specialists and network administrators only in case of a true emergency. As modern AI-powered systems are cooperating with human users by not only providing raw reports but also producing information based on text generation algorithms and text-to-speech functions, it is essential to ensure that this sensitive, security related information is not biased. In this pilot study, we are trying to showcase the problem of the perceived severity of a vulnerability by recipients speaking different native languages. Also, we are trying to answer the following question: how should an AI system present the information in order for the user to correctly understand the severity of the finding?","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126887788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of the most important fire threats of the building 对建筑物最重要的火灾威胁进行评估
2022 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2022-09-07 DOI: 10.1109/ICCST52959.2022.9896486
Adam Malatinský, M. Hromada
{"title":"Evaluation of the most important fire threats of the building","authors":"Adam Malatinský, M. Hromada","doi":"10.1109/ICCST52959.2022.9896486","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896486","url":null,"abstract":"The article deals with analysing the most important threats in industrial buildings and also evaluates the top 12 most important threats using a quantitative and qualitative threat analysis method, dividing them into primary, secondary and tertiary according to their significance. Based on the results, preventive measures can be created and applied for the most important threats that could significantly affect the proper operation of the building.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123591511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposing an E-Government Stage Model in Terms of Personal Information Security in Developing Countries 从发展中国家个人信息安全的角度提出电子政务阶段模型
2022 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2022-09-07 DOI: 10.1109/ICCST52959.2022.9896521
H. Muhammad, M. Hromada
{"title":"Proposing an E-Government Stage Model in Terms of Personal Information Security in Developing Countries","authors":"H. Muhammad, M. Hromada","doi":"10.1109/ICCST52959.2022.9896521","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896521","url":null,"abstract":"With improvements in Internet technology, the majority of governments throughout the world have adopted Information and Communication Technologies (ICTs) to deliver more efficient and effective services to their agencies, companies, and people. In general, e-Government refers to the use of information and communication technologies (ICTs) by government agencies to offer and improve public service delivery. Developing countries are extremely enthusiastic about implementing e-government. But these emerging countries are still in the beginning stages of development and suffer from shortages. In e-government, individuals are concerned about their privacy since e-government frequently deals with personal information. This article studies the concerns and obstacles that affect personal information security in e-government, taking into account the majority of security viewpoints, this research proposes models of e-government from perspective of protecting personal data. The study is qualitative in terms of methodology, it depends on documentary studies, content analysis and comparative study.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121427551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Interactive Education of People in the Field of Protection of Soft Targets 软目标保护领域人员在线互动教育
2022 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2022-09-07 DOI: 10.1109/ICCST52959.2022.9896591
Lukas Kotek, M. Hromada, Dora Kotkova
{"title":"Online Interactive Education of People in the Field of Protection of Soft Targets","authors":"Lukas Kotek, M. Hromada, Dora Kotkova","doi":"10.1109/ICCST52959.2022.9896591","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896591","url":null,"abstract":"This article discusses the possibilities of interactive online education of people in the field of protection of soft targets. The initial premise is the fact that at the time of the attack, the victims of the attack (people) are always present and professional assistance is not available until their arrival. In our opinion, educating the general public in suitable areas is key to reducing the negative effects of violent attacks. Our research seeks to find a time- and cost-effective way to educate and train people in this area. The article presents the current progress in our research on this issue.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130843316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Emotional analysis of safeness and risk perception of cybersecurity attacks during the COVID-19 pandemic 对 COVID-19 大流行期间网络安全攻击的安全感和风险感的情感分析
2022 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2022-09-07 DOI: 10.1109/ICCST52959.2022.9896577
F. Garzia, F. Borghini, Ekaterina Makshanova, M. Lombardi, S. Ramalingam
{"title":"Emotional analysis of safeness and risk perception of cybersecurity attacks during the COVID-19 pandemic","authors":"F. Garzia, F. Borghini, Ekaterina Makshanova, M. Lombardi, S. Ramalingam","doi":"10.1109/ICCST52959.2022.9896577","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896577","url":null,"abstract":"The assessment of perceived safeness and risk by persons is especially valuable for security and safety managing. Each person is founded on the opinion of other people to make a selection and the Internet embodies the place where these opinions are mostly pursued, taken, and estimated. From this point of view, social networks are characterized by a considerable influence. Due to this reason, Opinion Mining and Sentiment Analysis have found outstanding employs in diverse environments and one of the most remarkable is expressed by public security and safety.The purpose of the present work is to investigate the perception of safeness and risk of cybersecurity attacks during COVID-19 pandemic by means of the semantic analysis of the textual contents existing in Twitter.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130873003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical Protection and Guarding Service in the Company During the Pandemic - Human Resource Management 大流行期间公司的人身保护和防护服务——人力资源管理
2022 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2022-09-07 DOI: 10.1109/ICCST52959.2022.9896606
A. Veľas, Z. Zvaková, M. Boroš
{"title":"Physical Protection and Guarding Service in the Company During the Pandemic - Human Resource Management","authors":"A. Veľas, Z. Zvaková, M. Boroš","doi":"10.1109/ICCST52959.2022.9896606","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896606","url":null,"abstract":"The article focuses on the issue of physical protection management, especially guarding, in organizations during a pandemic. The need to solve this issue was determined by the spread of COVID-19. The positives and negatives of implementing the asset protection by own employees and private security service (outsourced) were compared. The platform for this comparison was personal interviews with security managers. The cost of physical protection - guarding service in both ways (by own employees and private security service) were compared. The article contains a solution generally usable in designing asset protection outside the pandemic.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130988795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Biometric Identity Verification as Part of Physical Protection Systems 生物识别身份验证作为物理保护系统的一部分
2022 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2022-09-07 DOI: 10.1109/ICCST52959.2022.9896544
T. Loveček, Jakub Durica, K. Kampová, Katarína Petrlová
{"title":"Biometric Identity Verification as Part of Physical Protection Systems","authors":"T. Loveček, Jakub Durica, K. Kampová, Katarína Petrlová","doi":"10.1109/ICCST52959.2022.9896544","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896544","url":null,"abstract":"The presented article is focused on access control systems like the basic elements of the property protection system, designed for intelligent access/exit control of persons to/from the protected area and for their movement tracking. The authors highlight the importance of identity verification within alarm systems designed to detect unauthorized access and describe the possibilities of applying various authentication information within access control systems. They focus on the method of authentication using the unique biometric characteristics of a man. In addition to the many advantages, that this approach presents, there are limitations in its application, resulting from the technological means and procedures used. These limitations can be summarized as metrics of biometric system performance. However, these metrics are often evaluated on ideal, so-called zero effort impostor datasets, which distort the design of physical protection systems. In this article, the authors emphasize the need to focus on the quantification of biometric performance, including spoof attacks. By testing the selected biometric system, authors outline the possibilities for real evaluation of the performance level. The results from testing can be used for physical protection systems models and for simulating the violation of the protected area (e.g. elements of critical infrastructure).","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131169294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Economic Evaluation of Cost and Benefits of Implementing Monitoring and Tracking System of Persons in Medical Facilitates 医疗机构实施人员监测跟踪系统的成本效益经济评价
2022 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2022-09-07 DOI: 10.1109/ICCST52959.2022.9896566
K. Kampová, Katarína Mäkká, Katarína Petrlová
{"title":"Economic Evaluation of Cost and Benefits of Implementing Monitoring and Tracking System of Persons in Medical Facilitates","authors":"K. Kampová, Katarína Mäkká, Katarína Petrlová","doi":"10.1109/ICCST52959.2022.9896566","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896566","url":null,"abstract":"Healthcare is one of the most important systems of the state, the non-functioning of which causes a serious impact on the health and life of its population. From the point of view of the continuous provision of health care, it is necessary to consider measures that would reduce the risk of potentially spreading infectious respiratory diseases (such as COVID - 19) to health professionals. Continuous provision of health care is conditioned by the staffing of health facilities. One of the possible and long-term measures that contributes to reducing the transmission of COVID-19 as well as other infectious diseases is the monitoring and tracing of people. Within the project APPV-20-0457 Monitoring and Tracing of Movement and Contacts of Persons in Medical Facilities, researchers at the Faculty of Security Engineering of the University of Žilina address this issue. The research focuses on creating cost-effective tool for tracking and monitoring people in healthcare facilities using appropriate innovative technological solutions. The presented article focuses on solving a part of the researched issue of the economic evaluation of monitoring and tracing of persons in health care facilities. It points out the possibilities of applying the method of cost-benefit analysis when deciding on the implementation of monitoring and tracing systems for selected medical facilities.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123700023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Testing Smart Meters with Custom Application 测试智能电表自定义应用程序
2022 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2022-09-07 DOI: 10.1109/ICCST52959.2022.9896543
David Kohout, P. Mlynek
{"title":"Testing Smart Meters with Custom Application","authors":"David Kohout, P. Mlynek","doi":"10.1109/ICCST52959.2022.9896543","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896543","url":null,"abstract":"This paper presents a solution for testing smart meters and other related technologies in relation to their cyber security. To test all possible requirements from electricity distribution companies and from the Czech Republic legislation there is a need for a flexible tool. None other solutions were acceptable for our needs, so we designed and developed a custom application for testing smart meters. Our solution can be used for testing smart meters and their interoperability, compatibility with communication technologies, security of the smart meters and all the data, that can be read from them. All testing takes place at our Smart Grid Lab at BUT.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122458506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Game theory analysis of incentive distribution for prompt generation of the proof tree in zk-SNARK based sidechains 基于zk-SNARK的侧链中证明树快速生成激励分配的博弈论分析
2022 IEEE International Carnahan Conference on Security Technology (ICCST) Pub Date : 2022-09-07 DOI: 10.1109/ICCST52959.2022.9896484
Y. Bespalov, L. Kovalchuk, Hanna Nelasa, R. Oliynykov, Alberto Garoffolo
{"title":"Game theory analysis of incentive distribution for prompt generation of the proof tree in zk-SNARK based sidechains","authors":"Y. Bespalov, L. Kovalchuk, Hanna Nelasa, R. Oliynykov, Alberto Garoffolo","doi":"10.1109/ICCST52959.2022.9896484","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896484","url":null,"abstract":"In sidechains with Latus consensus, a block forger generates a block using SNARK-proofs, created by decentralized provers and organized in a perfect binary tree (proof tree). One of the most important questions is to assign incentives for these proofs. In this paper, the game theory instruments are used to investigate incentive distribution in proof trees for SNARK-based sidechains to provide stable and efficient block generation. Two different models are considered: when only one sidechain exists, and when there exist a lot of sidechains among which provers may switch any time, trying to get a higher incentive. Utilization of Stirling numbers with non-integer arguments turns out to be very efficient for the second model.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":" 67","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120834651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信