We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 81-100 of 10,000 results
  1. Climate Change Risk Framework Using Complex Interdependent Critical Systems (Short Paper)

    Canada encompasses a band of territory that extends from the glaciers in the Arctic to the agricultural areas on Parallel 49th at the border with the...
    Andrea T. J. Martí, José R. Martí in Critical Information Infrastructures Security
    Conference paper 2024
  2. Map** and Analysis of Common Vulnerabilities in Popular Web Servers

    The digitalization of the modern society has made many organizations susceptible to cybercrime through exploitations of software vulnerabilities. The...
    Matyas Barocsai, Johan Can, ... Simin Nadjm-Tehrani in Critical Information Infrastructures Security
    Conference paper 2024
  3. Assessing the Effect of the Lack of Essential Workforce on the Economic Sectors During a Pandemic

    This study presents a dynamic modeling framework that combines epidemiological and Input-Output analyses to evaluate the impact of a pandemic on...
    Stefano Bartolucci, Roberto Setola, ... Gabriele Oliva in Critical Information Infrastructures Security
    Conference paper 2024
  4. Adoption of Explainable Artificial Intelligence, to Protect Key Decision Processes from Information Manipulations and Disorders (Work in Progress)

    Information security, applied to both systems and cognition, is a priority for states and private actors alike. Artificial Intelligence (AI) has the...
    Fréderic Tatout, Christine Dugoin-Clément in Critical Information Infrastructures Security
    Conference paper 2024
  5. Managing Uncertainty Using CISIApro 2.0 Model

    Critical infrastructures are large and complex systems showing physical, geographical, cyber, and logical interdependencies. Assessing the...
    Chiara Foglietta, Valeria Bonagura, ... Federica Pascucci in Critical Information Infrastructures Security
    Conference paper 2024
  6. GNSS Signal Monitoring and Security of Supply of GNSS-Based Services

    The global GNSS markets are expected to grow considerably in future, thus the number of threats against GNSS services will also increase....
    Mika Saajasto, Sanna Kaasalainen, ... Heidi Kuusniemi in Critical Information Infrastructures Security
    Conference paper 2024
  7. iUC-Secure Distributed File Transfer from Standard Attribute-Based Encryption

    Attribute-Based Encryption ( \(\textsf {ABE}\) )...
    Pascal Lafourcade, Gael Marcadet, Léo Robert in Progress in Cryptology - AFRICACRYPT 2024
    Conference paper 2024
  8. Wireless Modulation Identification: Filling the Gap in IoT Networks Security Audit

    The massive deployment of IoT devices comes with the creation of many wireless communication protocols designed to support various applications....
    Florent Galtier, Guillaume Auriol, ... Mohamed Kaâniche in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2024
  9. Applied Cryptography

    This chapter illustrates how cryptography can be used to achieve aims other than confidentiality of data. In particular, it can be used to ensure:...
    Chapter 2024
  10. Network Security

    This chapter presents a number of common ways of protecting systems against various forms of attack via the network. These include:...
    Chapter 2024
  11. Incident Handling and System Availability

    This chapter 1 focuses on how to react if, despite all precautions, an attack or other incident leads to a security breach. This is largely a...
    Chapter 2024
  12. Epilogue

    This concluding chapter considers the question of whether in practice t is possible to achieve the aim of having true cybersecurity. It reviews in...
    Chapter 2024
  13. Data Governance Act (DGA)

    Living reference work entry 2024
  14. Data Act

    Living reference work entry 2024
  15. Introduction to Public-Key Cryptography

    As we start to learn about public-key cryptography, let’s recall that the term publickey cryptography is used interchangeably with asymmetric...
    Christof Paar, Jan Pelzl, Tim Güneysu in Understanding Cryptography
    Chapter 2024
  16. Key Management

    With the cryptographic mechanisms that we have learned so far, in particular symmetric and asymmetric encryption, digital signatures and message...
    Christof Paar, Jan Pelzl, Tim Güneysu in Understanding Cryptography
    Chapter 2024
  17. Elliptic Curve Cryptosystems

    Elliptic Curve Cryptography (ECC) forms together with RSA and discrete logarithm schemes the third family of public-key algorithms that are currently...
    Christof Paar, Jan Pelzl, Tim Güneysu in Understanding Cryptography
    Chapter 2024
  18. Advances in Differential Privacy and Differentially Private Machine Learning

    There has been an explosion of research on differential privacy (DP) and its various applications in recent years, ranging from novel variants and...
    Saswat Das, Subhankar Mishra in Information Technology Security
    Chapter 2024
  19. MRMM-Based Keystream Generators for Information Security

    The central theme of a stream cipher is a keystream generator that produces a pseudorandom bit sequence and is popularly used to ensure privacy over...
    Susil Kumar Bishoi, Vashek Matyas in Information Technology Security
    Chapter 2024
Did you find what you were looking for? Share feedback.