Search Results - "2020 International Conference on Software Security and Assurance (ICSSA)"
-
1
Medical Blockchains and Privacy in Austria - Technical and Legal Aspects
Published in 2020 International Conference on Software Security and Assurance (ICSSA) (01-10-2020)“…The utilization of blockchains in the medical domain has been discussed for quite some time, with multiple academic projects targeting various application…”
Get full text
Conference Proceeding -
2
Distributed Unit Security for 5G Base-Stations using Blockchain
Published in 2020 International Conference on Software Security and Assurance (ICSSA) (01-10-2020)“…5G in the United States has been rapidly growing this past year as the New Radio (NR) standards have been finalized. The top three US cellular carriers cover…”
Get full text
Conference Proceeding -
3
Continuous Security through Integration Testing in an Electronic Health Records System
Published in 2020 International Conference on Software Security and Assurance (ICSSA) (01-10-2020)“…The estimated average cost of a healthcare data breach in 2019 was 6.45 million, which is the highest among all industries. Yet, security remains an…”
Get full text
Conference Proceeding -
4
Security Analysis of SOHO Wi-Fi routers
Published in 2020 International Conference on Software Security and Assurance (ICSSA) (01-10-2020)“…Wi-Fi-enabled Small Office/Home Office (SOHO) routers have become ubiquitous for having internet access in many network environments. With the advent of the…”
Get full text
Conference Proceeding -
5
Document Representations to Improve Topic Modelling
Published in 2020 International Conference on Software Security and Assurance (ICSSA) (01-10-2020)“…Each and every day we are collecting lots of information from web applications. So it is difficult to understand or detect what the whole information is all…”
Get full text
Conference Proceeding -
6
An Internet of Things (IoT) Security Assessment for Households
Published in 2020 International Conference on Software Security and Assurance (ICSSA) (01-10-2020)“…IoT is becoming a common term. More consumers are purchasing and installing household IoT devices such as thermostats, security cameras, and lighting…”
Get full text
Conference Proceeding -
7
Blockchain-based Service Performance Evaluation Method Using Native Cloud Environment
Published in 2020 International Conference on Software Security and Assurance (ICSSA) (01-10-2020)“…This study presents a performance evaluation system that helps Blockchain-based service planners make decisions. This system is offered as Docker and…”
Get full text
Conference Proceeding -
8
A Study on Reflecting User Experience for Sensor-based Android IoT Services
Published in 2020 International Conference on Software Security and Assurance (ICSSA) (01-10-2020)“…Smartphones are equipped with various sensors for apps with mobility services. However, the operating systems of smartphones do not provide proper…”
Get full text
Conference Proceeding -
9
VM based Malware Security Protection on Android Platform
Published in 2020 International Conference on Software Security and Assurance (ICSSA) (01-10-2020)“…This paper looks at the different ways in which Android phones can be attacked by android malware, and the different developments in malware protection and…”
Get full text
Conference Proceeding -
10
Assessing the sovereignty and security of the Austrian internet
Published in 2020 International Conference on Software Security and Assurance (ICSSA) (01-10-2020)“…With many people depending on the internet in their daily work lives, the question on dependencies of these services arises. This is especially true when…”
Get full text
Conference Proceeding -
11
Comparison of various interpolation techniques to infer localization of audio files using ENF signals
Published in 2020 International Conference on Software Security and Assurance (ICSSA) (01-10-2020)“…Electrical Network Frequency (ENF) is a frequency of the electrical power signal of the power grid that plays a key role in the level of security. There is a…”
Get full text
Conference Proceeding -
12
Compiling and Analyzing Open Source Malware for Research Purposes
Published in 2020 International Conference on Software Security and Assurance (ICSSA) (01-10-2020)“…Malware obfuscation can make both automatic and manual analysis of its binary code and the contained functionality significantly more time consuming. For…”
Get full text
Conference Proceeding -
13
Why Compliance is needed for Internet of Things?
Published in 2020 International Conference on Software Security and Assurance (ICSSA) (01-10-2020)“…The Internet of Things (IoT) is a relatively new concept that has been coined and is now commonly used in the field of Information Technology (IT). This…”
Get full text
Conference Proceeding -
14
Anomaly Detection to Protect Networks from Advanced Persistent Threats Using Adaptive Resonance AI Concepts
Published in 2020 International Conference on Software Security and Assurance (ICSSA) (01-10-2020)“…In this paper, we will improve the Advanced Persistent Threats (APT) attack detection rate accuracy by using an artificial intelligence based anomalous…”
Get full text
Conference Proceeding -
15
Title Page III
Published in 2020 International Conference on Software Security and Assurance (ICSSA) (01-10-2020)Get full text
Conference Proceeding -
16
Keynotes
Published in 2020 International Conference on Software Security and Assurance (ICSSA) (01-10-2020)Get full text
Conference Proceeding -
17
Sponsors
Published in 2020 International Conference on Software Security and Assurance (ICSSA) (01-10-2020)Get full text
Conference Proceeding -
18
Message from the General Chairs
Published in 2020 International Conference on Software Security and Assurance (ICSSA) (01-10-2020)Get full text
Conference Proceeding