A Quantitative Study of Vulnerabilities in the Internet of Medical Things

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ICISSP ICISSP 2020
1. Verfasser: Debar, Hervé (VerfasserIn)
Weitere Verfasser: Beuran, Razvan (VerfasserIn), Tan, Yasuo (VerfasserIn)
Pages:2020
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Leveraging Blockchain Technology to Enhance Security and Privacy in the Internet of Things 2020 Katsikas, Sokratis K.
AMNESIA: A Technical Solution towards GDPR-compliant Machine Learning 2020 Stach, Christoph
A Formal Approach for the Analysis of the XRP Ledger Consensus Protocol 2020 Mauri, Lara
Harmonized Group Mix for ITS 2020 Nitschke, Mirja
A Homomorphic Proxy Re-authenticators based Efficient Multi-client Non-interactive Verifiable Computation Scheme 2020 Xu, Shuaijianni
External Contextual Factors in Information Security Behaviour 2020 Snyman, D. P.
Maturity Modelling to Prepare for Cyber Crisis Escalation and Management 2020 Ostby, Grethe
Exploring Vulnerabilities in Solidity Smart Contract 2020 Tantikul, Phitchayaphong
Visualizing Syscalls using Self-organizing Maps for System Intrusion Detection 2020 Landauer, Max
A Systematic Approach toward Extracting Technically Enforceable Policies from Data Usage Control Requirements 2020 Hosseinzadeh, Arghavan
Risk Identification: From Requirements to Threat Models 2020 Wirtz, Roman
Revisiting Privacy-aware Blockchain Public Key Infrastructure 2020 Plessing, Paul
Computer Viruses: The Abstract Theory Revisited 2020 Gladychev, Nikolai
Securing IoT Devices using Geographic and Continuous Login Blocking: A Honeypot Study 2020 Heiding, Fredrik
Active Directory Kerberoasting Attack: Monitoring and Detection Techniques 2020 Kotlaba, Lukáš
Radical Text Detection based on Stylometry 2020 Pablo, Álvaro de
On Analyzing Third-party Tracking via Machine Learning 2020 Guarino, Alfonso
Systematization of Threats and Requirements for Private Messaging with Untrusted Servers: The Case of e-Mailing and Instant Messaging 2020 Symeonidis, Iraklis
Dual-use Research in Ransomware Attacks: A Discussion on Ransomware Defence Intelligence 2020 Geng, Ziya Alper
An Analytical Scanning Technique to Detect and Prevent the Transformed SQL Injection and XSS Attacks 2020 Alrabaee, Mohammad Qbea’h, Saed
Alle Artikel auflisten