Latest Communications of International Proceedings articles

08
Sep
2021

An Efficient Provable Forward Secure Blind Signature Scheme for Cryptocurrency

Cybersecurity Innovations - Strategies, Challenges, and Solutions: 37SP 2021
In this paper we construct and perform an in-depth analysis of a forward-secure blind signature scheme, which can be used in some protocols associated with cryptocurrency. The construction is based on both properties of bilinearity and certain relations between nodes of binary trees, where a…
08
Sep
2021

Simplified Entropy as A Criterion for Corpus Distillation in Fuzzing Process

Cybersecurity Innovations - Strategies, Challenges, and Solutions: 37SP 2021
Fuzzing is an automated testing technique of finding security vulnerabilities in software. It guarantees more thorough security testing than manual code review for classic white-box testing or attempting to generate an error with black-box testing. The currently used methods of generating test data are based on the initial set of test data, so-called…
07
Sep
2021

An Overview of Risk Assessment of Data Security Management Over Data Governance

Cybersecurity Innovations - Strategies, Challenges, and Solutions: 37SP 2021
Data governance (DG) comprises a combination of processes, procedures, standards, organizational bodies, decision-making, rules, policies, and accountabilities to handle the information assets. Data governance has various dimensions and elements such as data quality management, data management systems, data security, and data administration. Many organizations adopt…
06
Sep
2021

A Simple Method for FPGAs and CPUs Vulnerabilities Assessment

Cybersecurity Innovations - Strategies, Challenges, and Solutions: 37SP 2021
The development of IT sciences and technology is a massive opportunity for mankind, but it might potentially be a severe threat as well. Implementing recently introduced solutions can raise work efficiency to a whole new level. Simultaneously, a new vulnerability may occur. The harmfulness of…
06
Sep
2021

Web Analytics Tools: Analysis, Perception and Trends

Trends and Challenges in Software Development and Performance Optimization: 37SE 2021
Since the early days of the internet, the need to measure and analyse web traffic proved to be essential in website and business growth. With an increasing number of web users, organisations needed strong web analytics tools and skills to monitor and to optimise the…
06
Sep
2021

Group Permission – Based Analysis of Android Mobile Applications for Malware Detection

Cybersecurity Innovations - Strategies, Challenges, and Solutions: 37SP 2021
The main goal of this paper is the introduction of the problem of mobile device protection against malware for the Android platform. The article presents a concept of group malware detection based on the analysis of the installation package. 50 samples of malware were analyzed.…
05
Sep
2021

Telemonitoring System for Home Care During COVID-19 Pandemic – A Case Study

Challenges in Communication Technologies - IoT, Networks, and Security: 37ICT 2021
During the COVID-19 pandemic, the need for home care systems was higher than ever before. Limited access to medical in-person care because of higher demand as well as quarantines and self-isolation could benefit from automating elements of the monitoring especially among the seniors and chronically…
05
Sep
2021

Design And Development Guidelines for Biomedical Systems Capable of Wearable Sensor Data Fusion and Health Events Reasoning: Case Study

Trends and Challenges in Software Development and Performance Optimization: 37SE 2021
This paper focuses on sharing and discussing efficient system design and architectural concepts developed and tested acquisition and processing of biomedical data in large-scale systems for medical monitoring and reasoning. A major area of the research included utilization of wearable and mobile technologies to enable…
03
Sep
2021

Methodology for Automated Hardening of GNU/Linux System Configurations based on Results of Security Scans: A Conceptual Review

Cybersecurity Innovations - Strategies, Challenges, and Solutions: 37SP 2021
This article proposes a methodology for automated hardening of GNU/Linux system configurations. It allows to improve the system’s security level while minimising the impact on the availability of provided services. Correlated results of security scanners were used for the preparation of appropriate recommendations.
03
Sep
2021

On The Essence of Cyberspace

Challenges in Communication Technologies - IoT, Networks, and Security: 37ICT 2021
The paper presents the author's view on the essence of cyberspace. A short overview of the used definitions of cyberspace and a discussion on the constituent terms of the definitions are also presented.