Search Results - "2020 International Conference on Software Security and Assurance (ICSSA)"

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Medical Blockchains and Privacy in Austria - Technical and Legal Aspects by Kolan, Andreas, Tjoa, Simon, Kieseberg, Peter

    “…The utilization of blockchains in the medical domain has been discussed for quite some time, with multiple academic projects targeting various application…”
    Get full text
    Conference Proceeding
  2. 2

    Distributed Unit Security for 5G Base-Stations using Blockchain by Crowe, William, Oh, Tae Tom

    “…5G in the United States has been rapidly growing this past year as the New Radio (NR) standards have been finalized. The top three US cellular carriers cover…”
    Get full text
    Conference Proceeding
  3. 3

    Continuous Security through Integration Testing in an Electronic Health Records System by Purkayastha, Saptarshi, Goyal, Shreya, Phillips, Tyler, Wu, Huanmei, Haakenson, Brandon, Zou, Xukai

    “…The estimated average cost of a healthcare data breach in 2019 was 6.45 million, which is the highest among all industries. Yet, security remains an…”
    Get full text
    Conference Proceeding
  4. 4

    Security Analysis of SOHO Wi-Fi routers by Romana, Sandeep, Grandhi, Jyostna, Eswari, P R Lakshmi

    “…Wi-Fi-enabled Small Office/Home Office (SOHO) routers have become ubiquitous for having internet access in many network environments. With the advent of the…”
    Get full text
    Conference Proceeding
  5. 5

    Document Representations to Improve Topic Modelling by Poojitha, P. Venkata, Menon, Remya R. K.

    “…Each and every day we are collecting lots of information from web applications. So it is difficult to understand or detect what the whole information is all…”
    Get full text
    Conference Proceeding
  6. 6

    An Internet of Things (IoT) Security Assessment for Households by Aiken, William, Ryoo, Jungwoo, Rizvi, Syed

    “…IoT is becoming a common term. More consumers are purchasing and installing household IoT devices such as thermostats, security cameras, and lighting…”
    Get full text
    Conference Proceeding
  7. 7

    Blockchain-based Service Performance Evaluation Method Using Native Cloud Environment by TaeYoung, Kim, Hyung-Jong, Kim

    “…This study presents a performance evaluation system that helps Blockchain-based service planners make decisions. This system is offered as Docker and…”
    Get full text
    Conference Proceeding
  8. 8

    A Study on Reflecting User Experience for Sensor-based Android IoT Services by Kim, Bo-Min, Ahn, Jae-Yoon, Kim, Hyung-Jong

    “…Smartphones are equipped with various sensors for apps with mobility services. However, the operating systems of smartphones do not provide proper…”
    Get full text
    Conference Proceeding
  9. 9

    VM based Malware Security Protection on Android Platform by Avella, Anthony, Rizvi, Syed, Gibson, Andrew, Ryan, Marcus, Strimple, Ryan, Menovich, Ian

    “…This paper looks at the different ways in which Android phones can be attacked by android malware, and the different developments in malware protection and…”
    Get full text
    Conference Proceeding
  10. 10

    Assessing the sovereignty and security of the Austrian internet by Plainer, Florian, Kieseberg, Klaus, Kieseberg, Peter

    “…With many people depending on the internet in their daily work lives, the question on dependencies of these services arises. This is especially true when…”
    Get full text
    Conference Proceeding
  11. 11

    Comparison of various interpolation techniques to infer localization of audio files using ENF signals by Han, Hyekyung, Lee, KangHoon, Jeon, Youngbae, Yoon, Ji Won

    “…Electrical Network Frequency (ENF) is a frequency of the electrical power signal of the power grid that plays a key role in the level of security. There is a…”
    Get full text
    Conference Proceeding
  12. 12

    Compiling and Analyzing Open Source Malware for Research Purposes by Judt, Daniel, Kochberger, Patrick, Kieseberg, Peter, Schrittwieser, Sebastian

    “…Malware obfuscation can make both automatic and manual analysis of its binary code and the contained functionality significantly more time consuming. For…”
    Get full text
    Conference Proceeding
  13. 13

    Why Compliance is needed for Internet of Things? by Rizvi, Syed, Campbell, Shakir, Alden, Kieran

    “…The Internet of Things (IoT) is a relatively new concept that has been coined and is now commonly used in the field of Information Technology (IT). This…”
    Get full text
    Conference Proceeding
  14. 14

    Anomaly Detection to Protect Networks from Advanced Persistent Threats Using Adaptive Resonance AI Concepts by Rizvi, Syed, Flock, Tanner, Flock, Travis, Williams, Iyonna

    “…In this paper, we will improve the Advanced Persistent Threats (APT) attack detection rate accuracy by using an artificial intelligence based anomalous…”
    Get full text
    Conference Proceeding
  15. 15
  16. 16
  17. 17
  18. 18