On the Applicability of Security and Privacy Threat Modeling for Blockchain Applications

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ESORICS (24. : 2019 : Luxemburg) Computer security
1. Verfasser: Landuyt, Dimitri Van (VerfasserIn)
Weitere Verfasser: Sion, Laurens (VerfasserIn), Vandeloo, Emiel (VerfasserIn), Joosen, Wouter (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
A Proposed Privacy Impact Assessment Method Using Metrics Based on Organizational Characteristics 2020 Makri, Eleni-Laskarina
GDPR Compliance: Proposed Technical and Organizational Measures for Cloud Providers 2020 Georgiopoulou, Zafeiroula
On the Applicability of Security and Privacy Threat Modeling for Blockchain Applications 2020 Landuyt, Dimitri Van
An Insight into Decisive Factors in Cloud Provider Selection with a Focus on Security 2020 Pape, Sebastian
Selective Forwarding Attack on IoT Home Security Kits 2020 Hariri, Ali
Denial-of-Service Attacks and Countermeasures in the RPL-Based Internet of Things 2020 Vassilakis, Philokypros P. Ioulianou Vassilios G.
Secure Location Verification: Why You Want Your Verifiers to Be Mobile 2020 Schäfer, Matthias
Distributed UCON in CoAP and MQTT Protocols 2020 Rizos, Athanasios
Anomaly Detection in the HVAC System Operation by a RadViz Based Visualization-Driven Approach 2020 Novikova, Evgenia
Anomaly Detection for Industrial Control Systems Using Sequence-to-Sequence Neural Networks 2020 Kim, Jonguk
Reflective Attenuation of Cyber-Physical Attacks 2020 Segovia, Mariana
Identifying Safety and Human Factors Issues in Rail Using IRIS and CAIRIS 2020 Altaf, Amna
Privacy, Security, Legal and Technology Acceptance Requirements for a GDPR Compliance Platform 2020 Tsohou, Aggeliki
From ISO/IEC 27002:2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance 2020 Diamantopoulou, Vasiliki
Analysis of Automation Potentials in Privacy Impact Assessment Processes 2020 Zibuschka, Jan
A Basic Theory of Lightweight Hierarchical Key Predistribution Scheme 2020 Dalai, Deepak Kumar
Study of DNS Rebinding Attacks on Smart Home Devices 2020 Tatang, Dennis
Towards the Creation of a Threat Intelligence Framework for Maritime Infrastructures 2020 Pitropakis, Nikolaos
Connect and Protect: Requirements for Maritime Autonomous Surface Ship in Urban Passenger Transportation 2020 Amro, Ahmed
Simulation-Based Evaluation of DDoS Against Smart Grid SCADAs 2020 Gogic, Damjan
Alle Artikel auflisten