Latest Communications of International Proceedings articles

10
Sep
2021

Layout of The Meteorological Module

Challenges in Communication Technologies - IoT, Networks, and Security: 37ICT 2021
This article presents the results of work related to the project of a meteorological module based on the Arduino platform using a module with a BME280 sensor. The ARDUINO IDE programming environment was used in the implementation. The programmer responsible for the correct operation of…
09
Sep
2021

Information Society Versus Security and Privacy in Cyberspace

Cybersecurity Innovations - Strategies, Challenges, and Solutions: 37SP 2021
This text outlines the problem of the level of knowledge about security and privacy in cyberspace. The article also deals with the aspect of data collection by social networks. This article is an introduction to planned research on Internet users’ knowledge of the security risk…
09
Sep
2021

Cyberspace As a Platform of Social Impact

Cybersecurity Innovations - Strategies, Challenges, and Solutions: 37SP 2021
The article presents certain aspects of using cyberspace as a perfect platform of social impact, used with regard to hybrid threats and hybrid warfare in particular. The authors made an attempt to answer the following question: ‘To what extent can cyberspace become an element of…
08
Sep
2021

Autonomic Control of Measurement Data Integrity in Telemedicine Systems

Cybersecurity Innovations - Strategies, Challenges, and Solutions: 37SP 2021
This paper focuses on specific aspects of telemedicine systems relied upon for simultaneous measurement of electrocardiogram ECG and impedance cardiogram ICG signals. Using such systems, patients suffering from heart diseases measure their hemodynamic parameters on their own, without any external supervision, over a relatively long…
08
Sep
2021

An Efficient Provable Forward Secure Blind Signature Scheme for Cryptocurrency

Cybersecurity Innovations - Strategies, Challenges, and Solutions: 37SP 2021
In this paper we construct and perform an in-depth analysis of a forward-secure blind signature scheme, which can be used in some protocols associated with cryptocurrency. The construction is based on both properties of bilinearity and certain relations between nodes of binary trees, where a…
08
Sep
2021

Simplified Entropy as A Criterion for Corpus Distillation in Fuzzing Process

Cybersecurity Innovations - Strategies, Challenges, and Solutions: 37SP 2021
Fuzzing is an automated testing technique of finding security vulnerabilities in software. It guarantees more thorough security testing than manual code review for classic white-box testing or attempting to generate an error with black-box testing. The currently used methods of generating test data are based on the initial set of test data, so-called…
07
Sep
2021

An Overview of Risk Assessment of Data Security Management Over Data Governance

Cybersecurity Innovations - Strategies, Challenges, and Solutions: 37SP 2021
Data governance (DG) comprises a combination of processes, procedures, standards, organizational bodies, decision-making, rules, policies, and accountabilities to handle the information assets. Data governance has various dimensions and elements such as data quality management, data management systems, data security, and data administration. Many organizations adopt…
06
Sep
2021

A Simple Method for FPGAs and CPUs Vulnerabilities Assessment

Cybersecurity Innovations - Strategies, Challenges, and Solutions: 37SP 2021
The development of IT sciences and technology is a massive opportunity for mankind, but it might potentially be a severe threat as well. Implementing recently introduced solutions can raise work efficiency to a whole new level. Simultaneously, a new vulnerability may occur. The harmfulness of…
06
Sep
2021

Web Analytics Tools: Analysis, Perception and Trends

Trends and Challenges in Software Development and Performance Optimization: 37SE 2021
Since the early days of the internet, the need to measure and analyse web traffic proved to be essential in website and business growth. With an increasing number of web users, organisations needed strong web analytics tools and skills to monitor and to optimise the…
06
Sep
2021

Group Permission – Based Analysis of Android Mobile Applications for Malware Detection

Cybersecurity Innovations - Strategies, Challenges, and Solutions: 37SP 2021
The main goal of this paper is the introduction of the problem of mobile device protection against malware for the Android platform. The article presents a concept of group malware detection based on the analysis of the installation package. 50 samples of malware were analyzed.…