Latest Communications of International Proceedings articles

29
Dec
2025

The Role of DevSecOps in Ensuring Business Continuity and Resiliency of GIS Systems

Security, Privacy & Cryptographic Solutions: 46SP 2025
This article explores the integration of security practices within the DevSecOps methodology in the context of Geographic Information Systems (GIS). The primary objective of the study is to analyze the impact of DevSecOps on ensuring business continuity and system resilience against cybersecurity threats. The specific…
29
Dec
2025

Integrated Threat Modeling Framework for Software Supply Chain Security

Security, Privacy & Cryptographic Solutions: 46SP 2025
The increasing frequency of attacks targeting the Software Supply Chain (SSC) has made its security a critical component of organizational cyber resilience. The complexity of modern systems, which rely on components from diverse sources, complicates the identification of the attack surface. High-profile incidents such as…
29
Dec
2025

From Hardcoded Keys to Centralized Control: Modern Approaches to Secret Management

Security, Privacy & Cryptographic Solutions: 46SP 2025
The growing complexity of modern IT environments, supported by cloud computing, microservices, and DevSecOps practices, makes secret management an essential component of organizational security. Secrets, including API keys, credentials, and cryptographic keys, enable authentication between human and system entities. Their compromise leads to severe data…
29
Dec
2025

Domain Name System threats and Role of DNSSEC in Security

Security, Privacy & Cryptographic Solutions: 46SP 2025
The Domain Name System (DNS) is a fundamental component of Internet infrastructure. Its original design lacked mechanisms for data security and authenticity. Consequently, DNS remains vulnerable to various attacks. In recent years, these attacks have evolved from basic response spoofing to sophisticated campaigns, including distributed…
29
Dec
2025

Combining Lightweight Cryptographic Protocols with Physically Unclonable Functions (PUFs) for Key Generation and Device Authentication in the Industrial Internet of Things (IIoT)

Security, Privacy & Cryptographic Solutions: 46SP 2025
With the increased scale of Industry 4.0 systems, security of Industry Internet of Things (IIoT) became a critical challenge. Many devices still use legacy cryptographic algorithms which are often too "heavy" for limited resources of most hardware platforms. In this work, a hybrid approach is…
28
Dec
2025

Phishing Trends Over Time: An Empirical Analysis of Anti-Phishing Database Data

Security, Privacy & Cryptographic Solutions: 46SP 2025
Despite widespread claims of exponential phishing growth, empirical evidence remains fragmented and methodologically inconsistent. This study challenges conventional assumptions through systematic analysis of over 18.2 million phishing incidents across three major databases (PhishTank, APWG, CERT Polska) spanning 2009–2025. Employing Mann-Kendall trend analysis and seasonal decomposition,…
28
Dec
2025

Performance Comparison of graph-tool and NetworkX on Web Graph Domain Subgraphs: A Common Crawl Analysis

Security, Privacy & Cryptographic Solutions: 46SP 2025
Efficient graph processing is critical for web-scale analysis, yet practitioners lack empirical guidance for library selection on real-world data. We present a comprehensive performance comparison of graph-tool and NetworkX on Common Crawl web graph data, focusing on domain-level subgraph analysis. Through systematic benchmarking of seven…
27
Dec
2025

The Optimal Use of Natural Resources in Light of Intergenerational Equity

Green Innovation and Sustainable Consumption: 46ENV 2025
This paper provides an overview of those economic models of resource management which bear associations with the realization of the principle of intergenerational equity as the key element in effective implementation of the sustainable development postulates. Sustainable development entails the preservation of capital for future…
26
Dec
2025

Artificial Intelligence-Based Intrusion Detection System: A Comparison with the Traditional Snort Solution

AI-Driven Innovation and Smart Systems: 46AI 2025
This article presents a comparative analysis of an implemented modern Intrusion Detection System (IDS) based on artificial intelligence algorithms and traditional solutions, with particular emphasis on the Snort platform. The study includes a comprehensive evaluation of the effectiveness of various IDS/IPS systems in test environments,…
26
Dec
2025

Anomaly Detection of ESWT Device Supported by AI Agent Using Phase Portraits of Ballistic Pendulum

AI-Driven Innovation and Smart Systems: 46AI 2025
One of the known physiotherapeutic treatment is extracorporeal shockwave therapy. It lets restore health and the comfort of life. These treatments require the usage of the specialised devices generating shockwave. As each device equipped with mechanical elements it is exposed to defects and operational wear.…