贿赂 发表于 2025-3-27 00:37:31
Privacy and Informational Self-determination Through Informed Consent: The Way Forwardinformed consent”, which allows it to do as it pleases with your Personal Information (PI). Although many developed countries have enacted privacy laws and regulations to govern the collection and use of PI as a response to the increased misuse of PI, these laws and regulations rely heavily on the cBOOST 发表于 2025-3-27 02:04:09
Building a Privacy Testbed: Use Cases and Design Considerationscommon practice of using third-party libraries to provide critical functionality. To add to the complexity, most mobile applications interact with the “cloud”—not only the platform provider’s ecosystem (such as Apple or Google) but also with third-party servers (as a consequence of library use). Thilegislate 发表于 2025-3-27 06:43:02
http://reply.papertrans.cn/24/2339/233880/233880_33.pngSNEER 发表于 2025-3-27 13:02:14
TAESim: A Testbed for IoT Security Analysis of Trigger-Action Environment, etc. With the advancement of IoT technologies, the IoT platforms bring many new features to the IoT devices so that these devices can not only passively monitor the environment (e.g. conventional sensors), but also interact with the physical surroundings (e.g. actuators). In this light, new probleAntarctic 发表于 2025-3-27 17:05:09
Adversarial Command Detection Using Parallel Speech Recognition Systemss; an attacker is able to modify an audio signal such that humans do not notice this modification but the Speech Recognition (SR) will recognise a command of the attacker’s choice. In this paper we describe a defence method against such adversarial commands. By using a second SR in parallel to the m墙壁 发表于 2025-3-27 19:17:47
Security Measuring System for IoT Devicess for the end users and producers that will allow them to understand how secure their IoT devices are and to compare these devices with each other, as well as to enhance the security of the devices. The paper proposes a security measuring system that is based on the hierarchy of metrics representingheartburn 发表于 2025-3-27 23:13:15
http://reply.papertrans.cn/24/2339/233880/233880_37.pngdefendant 发表于 2025-3-28 02:13:03
A Cybersecurity Ontology to Support Risk Information Gathering in Cyber-Physical Systemshysical systems, two practical application and validation scenarios are presented. In the first case we apply our ontology to fill in some gaps into the National Vulnerability Database, by utilizing a logistic classifier trained by a subset of the NVD, with the purpose of predicting missing values f公共汽车 发表于 2025-3-28 07:57:11
Attack Path Analysis and Cost-Efficient Selection of Cybersecurity Controls for Complex Cyberphysicarein for selecting a set of security controls that minimizes both the residual risk and the cost of implementation. We use the DELTA demand-response management platform for the energy market stakeholders such as Aggregators and Retailers [.] as a use case to illustrate the workings of the proposed a独行者 发表于 2025-3-28 14:28:04
Analysis of Cyber Security Features in Industry 4.0 Maturity Modelsto assess the negative impact on business caused by cyber security attacks in Industry 4.0. So-called maturity models are useful instruments for this purpose. However, it has not yet been thoroughly investigated which maturity models from the literature can be used to assess cyber security in the co