IoT health devices: exploring security risks in the connected landscape

AO Affia, H Finch, W Jung, IA Samori, L Potter… - IoT, 2023 - mdpi.com
The concept of the Internet of Things (IoT) spans decades, and the same can be said for its
inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable …

Exploring sybil and double-spending risks in blockchain systems

M Iqbal, R Matulevičius - IEEE Access, 2021 - ieeexplore.ieee.org
The first step to realise the true potential of blockchain systems is to explain the associated
security risks and vulnerabilities. These risks and vulnerabilities, exploited by the threat …

Safeguarding a formalized blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns

A Norta, R Matulevičius, B Leiding - Computers & Security, 2019 - Elsevier
Designing government independent and secure identification-and authentication protocols
is a challenging task. Design flaws and missing specifications as well as security-and …

Post-quantum era privacy protection for intelligent infrastructures

L Malina, P Dzurenda, S Ricci, J Hajny… - IEEE …, 2021 - ieeexplore.ieee.org
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …

[HTML][HTML] Addressing insider attacks via forensic-ready risk management

L Daubner, M Macak, R Matulevičius… - Journal of Information …, 2023 - Elsevier
Cyberattacks perpetrated by insiders are difficult to prevent using traditional security
approaches. Often, such attackers misuse legitimate access to the system to conduct an …

Blockchain-based ontology driven reference framework for security risk management

M Iqbal, A Kormiltsyn, V Dwivedi… - Data & Knowledge …, 2024 - Elsevier
Security risk management (SRM) is crucial for protecting valuable assets from malicious
harm. While blockchain technology has been proposed to mitigate security threats in …

An empirical study of security practices for microservices systems

AR Nasab, M Shahin, SAH Raviz, P Liang… - Journal of Systems and …, 2023 - Elsevier
Despite the numerous benefits of microservices systems, security has been a critical issue in
such systems. Several factors explain this difficulty, including a knowledge gap among …

Risk-oriented design approach for forensic-ready software systems

L Daubner, R Matulevičius - … of the 16th International Conference on …, 2021 - dl.acm.org
Digital forensic investigation is a complex and time-consuming activity in response to a
cybersecurity incident or cybercrime to answer questions related to it. These typically are …

[PDF][PDF] Information Security Risks Analysis and Assessment in the Passenger-Autonomous Vehicle Interaction.

M Bakhtina, R Matulevicius - J. Wirel. Mob. Networks Ubiquitous …, 2022 - scholar.archive.org
Technological advances, consumer demands for advanced automotive assistant systems,
and systems connectivity make cyber-security an essential requirement for ride-hailing …

A model of qualitative factors in forensic-ready software systems

L Daubner, R Matulevičius, B Buhnova - International Conference on …, 2023 - Springer
Forensic-ready software systems enhance the security posture by designing the systems
prepared for potential investigation of incidents. Yet, the principal obstacle is defining their …