IoT health devices: exploring security risks in the connected landscape
The concept of the Internet of Things (IoT) spans decades, and the same can be said for its
inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable …
inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable …
Exploring sybil and double-spending risks in blockchain systems
M Iqbal, R Matulevičius - IEEE Access, 2021 - ieeexplore.ieee.org
The first step to realise the true potential of blockchain systems is to explain the associated
security risks and vulnerabilities. These risks and vulnerabilities, exploited by the threat …
security risks and vulnerabilities. These risks and vulnerabilities, exploited by the threat …
Safeguarding a formalized blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns
Designing government independent and secure identification-and authentication protocols
is a challenging task. Design flaws and missing specifications as well as security-and …
is a challenging task. Design flaws and missing specifications as well as security-and …
Post-quantum era privacy protection for intelligent infrastructures
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …
[HTML][HTML] Addressing insider attacks via forensic-ready risk management
Cyberattacks perpetrated by insiders are difficult to prevent using traditional security
approaches. Often, such attackers misuse legitimate access to the system to conduct an …
approaches. Often, such attackers misuse legitimate access to the system to conduct an …
Blockchain-based ontology driven reference framework for security risk management
Security risk management (SRM) is crucial for protecting valuable assets from malicious
harm. While blockchain technology has been proposed to mitigate security threats in …
harm. While blockchain technology has been proposed to mitigate security threats in …
An empirical study of security practices for microservices systems
Despite the numerous benefits of microservices systems, security has been a critical issue in
such systems. Several factors explain this difficulty, including a knowledge gap among …
such systems. Several factors explain this difficulty, including a knowledge gap among …
Risk-oriented design approach for forensic-ready software systems
L Daubner, R Matulevičius - … of the 16th International Conference on …, 2021 - dl.acm.org
Digital forensic investigation is a complex and time-consuming activity in response to a
cybersecurity incident or cybercrime to answer questions related to it. These typically are …
cybersecurity incident or cybercrime to answer questions related to it. These typically are …
[PDF][PDF] Information Security Risks Analysis and Assessment in the Passenger-Autonomous Vehicle Interaction.
M Bakhtina, R Matulevicius - J. Wirel. Mob. Networks Ubiquitous …, 2022 - scholar.archive.org
Technological advances, consumer demands for advanced automotive assistant systems,
and systems connectivity make cyber-security an essential requirement for ride-hailing …
and systems connectivity make cyber-security an essential requirement for ride-hailing …
A model of qualitative factors in forensic-ready software systems
Forensic-ready software systems enhance the security posture by designing the systems
prepared for potential investigation of incidents. Yet, the principal obstacle is defining their …
prepared for potential investigation of incidents. Yet, the principal obstacle is defining their …