Search Results - "2022 IEEE International Carnahan Conference on Security Technology (ICCST)"

Refine Results
  1. 1

    The Effect of Number Plate Layout and Design on Automated Recognition by Gurney, Robert, Rhead, Michael, Martin, William E

    “…This paper considers the implications of adding unnecessary markings to vehicle registration plates following the enactment of The Road Vehicles (Display of…”
    Get full text
    Conference Proceeding
  2. 2

    Game theory analysis of incentive distribution for prompt generation of the proof tree in zk-SNARK based sidechains by Bespalov, Yuri, Kovalchuk, Lyudmila, Nelasa, Hanna, Oliynykov, Roman, Garoffolo, Alberto

    “…In sidechains with Latus consensus, a block forger generates a block using SNARK-proofs, created by decentralized provers and organized in a perfect binary…”
    Get full text
    Conference Proceeding
  3. 3

    Electronic Number Plate Generation for Performance Evaluation by Ramalingam, Soodamani, Martin, William E., Rhead, Michael, Gurney, Robert

    “…The authors have been involved in real world analysis of Automatic Number Plate Recognition (ANPR) data and systems particularly for law enforcement…”
    Get full text
    Conference Proceeding
  4. 4

    Applying Text Analytics to Insider Risk Analysis: A Case Study on Keyword Generation by Gardner, Carrie, Clacyomb, William R.

    “…Recent advancements in text analytics demonstrate significant gains in many natural language processing tasks, taking advantage of newer neural network…”
    Get full text
    Conference Proceeding
  5. 5

    Testing Smart Meters with Custom Application by Kohout, David, Mlynek, Petr

    “…This paper presents a solution for testing smart meters and other related technologies in relation to their cyber security. To test all possible requirements…”
    Get full text
    Conference Proceeding
  6. 6

    Proposing an E-Government Stage Model in Terms of Personal Information Security in Developing Countries by Muhammad, Hemin, Hromada, Martin

    “…With improvements in Internet technology, the majority of governments throughout the world have adopted Information and Communication Technologies (ICTs) to…”
    Get full text
    Conference Proceeding
  7. 7

    Analysis of Current Preventive Approaches in the Context of Cybersecurity by Oka, Mimi Enakome, Hromada, Martin

    “…Reliance on information technology and computer network solutions is on the increase, so are the activities of cyber criminals, the number of cyber-attacks and…”
    Get full text
    Conference Proceeding
  8. 8

    Threats and Resilience: Methodology in the Area of Railway Infrastructure by Flynnova, Lucie, Paulus, Frantisek, Valasek, Jarmil

    “…Railway transport is one of the key sub-sectors of European critical infrastructure. Despite the high level of railway transport safety, railway infrastructure…”
    Get full text
    Conference Proceeding
  9. 9

    Objective Method for Object Security Evaluation by Kovar, Stanislav, Valouch, Jan, Nemec, Jan

    “…The paper deals with designing a method for objectively determining the security level of buildings. Building security design is a crucial element that…”
    Get full text
    Conference Proceeding
  10. 10

    Physical Protection and Guarding Service in the Company During the Pandemic - Human Resource Management by Velas, Andrej, Zvakova, Zuzana, Boros, Martin

    “…The article focuses on the issue of physical protection management, especially guarding, in organizations during a pandemic. The need to solve this issue was…”
    Get full text
    Conference Proceeding
  11. 11
  12. 12

    Exploring the effects of segmentation when learning with Virtual Reality and 2D displays: a study with airport security officers by Kaufmann, Kaspar, Wyssenbach, Thomas, Schwaninger, Adrian

    “…With novel 3D imaging technology based on computed tomography (CT) set to replace the current 2D X-ray systems, airports face the challenge of adequately…”
    Get full text
    Conference Proceeding
  13. 13

    Educational Platform for Personal and Community Protection Situations from the Perspective of Soft Targets - Self-defense part by Kotkova, Dora, Kotek, Lukas, Hromada, Martin

    “…This article is focused on one part of the created educational platform for personal and community protection situations, specifically on self-defense. The…”
    Get full text
    Conference Proceeding
  14. 14

    Evaluation of the most important fire threats of the building by Malatinsky, Adam, Hromada, Martin

    “…The article deals with analysing the most important threats in industrial buildings and also evaluates the top 12 most important threats using a quantitative…”
    Get full text
    Conference Proceeding
  15. 15

    Analysis of insurance conditions as a tool to ensure physical protection in the Czech Republic by Kralickova, Gabriela, Dostalova, Petra

    “…Corporate companies are exposed to a large number of risks, which they have to deal with on a daily basis. Security management always considers which risks…”
    Get full text
    Conference Proceeding
  16. 16

    Application of composite indicator in evaluation of resilience in critical infrastructure system by Rehak, David, Splichalova, Alena

    “…In the field of safety engineering, various approaches can be found using indicators to analyse and evaluate system resilience. Such resilience is generally…”
    Get full text
    Conference Proceeding
  17. 17

    Online Interactive Education of People in the Field of Protection of Soft Targets by Kotek, Lukas, Hromada, Martin, Kotkova, Dora

    “…This article discusses the possibilities of interactive online education of people in the field of protection of soft targets. The initial premise is the fact…”
    Get full text
    Conference Proceeding
  18. 18

    Deep Neural Networks for Industrial Protocol Recognition and Cipher Suite Used by Holasova, Eva, Fujdiak, Radek

    “…The main objective of this paper is to determine the network traffic parameters to classify the industrial protocol and the cipher suite used without prior…”
    Get full text
    Conference Proceeding
  19. 19

    Fuzzing ICS Protocols: Modbus Fuzzer Framework by Ilgner, Petr, Fujdiak, Radek

    “…Traditionally, industrial control systems were very isolated and industrial control systems operated with very consistent data traffic. Along with the trend of…”
    Get full text
    Conference Proceeding
  20. 20

    A new hybdrid steganographic technique for images by Garzia, Fabio, Cusani, Roberto, Chiarella, Andrea

    “…Steganography is a technique that aims to hide the communication between two interlocutors. Steganography, unlike cryptography, allows to hide a message within…”
    Get full text
    Conference Proceeding