Search
Search Results
-
Climate Change Risk Framework Using Complex Interdependent Critical Systems (Short Paper)
Canada encompasses a band of territory that extends from the glaciers in the Arctic to the agricultural areas on Parallel 49th at the border with the... -
Map** and Analysis of Common Vulnerabilities in Popular Web Servers
The digitalization of the modern society has made many organizations susceptible to cybercrime through exploitations of software vulnerabilities. The... -
Assessing the Effect of the Lack of Essential Workforce on the Economic Sectors During a Pandemic
This study presents a dynamic modeling framework that combines epidemiological and Input-Output analyses to evaluate the impact of a pandemic on... -
Adoption of Explainable Artificial Intelligence, to Protect Key Decision Processes from Information Manipulations and Disorders (Work in Progress)
Information security, applied to both systems and cognition, is a priority for states and private actors alike. Artificial Intelligence (AI) has the... -
Managing Uncertainty Using CISIApro 2.0 Model
Critical infrastructures are large and complex systems showing physical, geographical, cyber, and logical interdependencies. Assessing the... -
GNSS Signal Monitoring and Security of Supply of GNSS-Based Services
The global GNSS markets are expected to grow considerably in future, thus the number of threats against GNSS services will also increase.... -
iUC-Secure Distributed File Transfer from Standard Attribute-Based Encryption
Attribute-Based Encryption ( \(\textsf {ABE}\) )... -
Wireless Modulation Identification: Filling the Gap in IoT Networks Security Audit
The massive deployment of IoT devices comes with the creation of many wireless communication protocols designed to support various applications.... -
Applied Cryptography
This chapter illustrates how cryptography can be used to achieve aims other than confidentiality of data. In particular, it can be used to ensure:... -
Network Security
This chapter presents a number of common ways of protecting systems against various forms of attack via the network. These include:... -
Incident Handling and System Availability
This chapter 1 focuses on how to react if, despite all precautions, an attack or other incident leads to a security breach. This is largely a... -
Epilogue
This concluding chapter considers the question of whether in practice t is possible to achieve the aim of having true cybersecurity. It reviews in... -
-
-
-
Introduction to Public-Key Cryptography
As we start to learn about public-key cryptography, let’s recall that the term publickey cryptography is used interchangeably with asymmetric... -
Key Management
With the cryptographic mechanisms that we have learned so far, in particular symmetric and asymmetric encryption, digital signatures and message... -
Elliptic Curve Cryptosystems
Elliptic Curve Cryptography (ECC) forms together with RSA and discrete logarithm schemes the third family of public-key algorithms that are currently... -
Advances in Differential Privacy and Differentially Private Machine Learning
There has been an explosion of research on differential privacy (DP) and its various applications in recent years, ranging from novel variants and... -
MRMM-Based Keystream Generators for Information Security
The central theme of a stream cipher is a keystream generator that produces a pseudorandom bit sequence and is popularly used to ensure privacy over...