Search Results - "2022 IEEE International Carnahan Conference on Security Technology (ICCST)"
-
1
The Effect of Number Plate Layout and Design on Automated Recognition
Published in 2022 IEEE International Carnahan Conference on Security Technology (ICCST) (07-09-2022)“…This paper considers the implications of adding unnecessary markings to vehicle registration plates following the enactment of The Road Vehicles (Display of…”
Get full text
Conference Proceeding -
2
Game theory analysis of incentive distribution for prompt generation of the proof tree in zk-SNARK based sidechains
Published in 2022 IEEE International Carnahan Conference on Security Technology (ICCST) (07-09-2022)“…In sidechains with Latus consensus, a block forger generates a block using SNARK-proofs, created by decentralized provers and organized in a perfect binary…”
Get full text
Conference Proceeding -
3
Electronic Number Plate Generation for Performance Evaluation
Published in 2022 IEEE International Carnahan Conference on Security Technology (ICCST) (07-09-2022)“…The authors have been involved in real world analysis of Automatic Number Plate Recognition (ANPR) data and systems particularly for law enforcement…”
Get full text
Conference Proceeding -
4
Applying Text Analytics to Insider Risk Analysis: A Case Study on Keyword Generation
Published in 2022 IEEE International Carnahan Conference on Security Technology (ICCST) (07-09-2022)“…Recent advancements in text analytics demonstrate significant gains in many natural language processing tasks, taking advantage of newer neural network…”
Get full text
Conference Proceeding -
5
Testing Smart Meters with Custom Application
Published in 2022 IEEE International Carnahan Conference on Security Technology (ICCST) (07-09-2022)“…This paper presents a solution for testing smart meters and other related technologies in relation to their cyber security. To test all possible requirements…”
Get full text
Conference Proceeding -
6
Proposing an E-Government Stage Model in Terms of Personal Information Security in Developing Countries
Published in 2022 IEEE International Carnahan Conference on Security Technology (ICCST) (07-09-2022)“…With improvements in Internet technology, the majority of governments throughout the world have adopted Information and Communication Technologies (ICTs) to…”
Get full text
Conference Proceeding -
7
Analysis of Current Preventive Approaches in the Context of Cybersecurity
Published in 2022 IEEE International Carnahan Conference on Security Technology (ICCST) (07-09-2022)“…Reliance on information technology and computer network solutions is on the increase, so are the activities of cyber criminals, the number of cyber-attacks and…”
Get full text
Conference Proceeding -
8
Threats and Resilience: Methodology in the Area of Railway Infrastructure
Published in 2022 IEEE International Carnahan Conference on Security Technology (ICCST) (07-09-2022)“…Railway transport is one of the key sub-sectors of European critical infrastructure. Despite the high level of railway transport safety, railway infrastructure…”
Get full text
Conference Proceeding -
9
Objective Method for Object Security Evaluation
Published in 2022 IEEE International Carnahan Conference on Security Technology (ICCST) (07-09-2022)“…The paper deals with designing a method for objectively determining the security level of buildings. Building security design is a crucial element that…”
Get full text
Conference Proceeding -
10
Physical Protection and Guarding Service in the Company During the Pandemic - Human Resource Management
Published in 2022 IEEE International Carnahan Conference on Security Technology (ICCST) (07-09-2022)“…The article focuses on the issue of physical protection management, especially guarding, in organizations during a pandemic. The need to solve this issue was…”
Get full text
Conference Proceeding -
11
Secure Tax State Line: a Brazilian State Platform for Monitoring Roads, Designed to Support Tax Enforcement and Compliance
Published in 2022 IEEE International Carnahan Conference on Security Technology (ICCST) (07-09-2022)“…This paper presents a solution conceived to fight tax evasion, involving the application of analytical intelligence on data sources, including those from the…”
Get full text
Conference Proceeding -
12
Exploring the effects of segmentation when learning with Virtual Reality and 2D displays: a study with airport security officers
Published in 2022 IEEE International Carnahan Conference on Security Technology (ICCST) (07-09-2022)“…With novel 3D imaging technology based on computed tomography (CT) set to replace the current 2D X-ray systems, airports face the challenge of adequately…”
Get full text
Conference Proceeding -
13
Educational Platform for Personal and Community Protection Situations from the Perspective of Soft Targets - Self-defense part
Published in 2022 IEEE International Carnahan Conference on Security Technology (ICCST) (07-09-2022)“…This article is focused on one part of the created educational platform for personal and community protection situations, specifically on self-defense. The…”
Get full text
Conference Proceeding -
14
Evaluation of the most important fire threats of the building
Published in 2022 IEEE International Carnahan Conference on Security Technology (ICCST) (07-09-2022)“…The article deals with analysing the most important threats in industrial buildings and also evaluates the top 12 most important threats using a quantitative…”
Get full text
Conference Proceeding -
15
Analysis of insurance conditions as a tool to ensure physical protection in the Czech Republic
Published in 2022 IEEE International Carnahan Conference on Security Technology (ICCST) (07-09-2022)“…Corporate companies are exposed to a large number of risks, which they have to deal with on a daily basis. Security management always considers which risks…”
Get full text
Conference Proceeding -
16
Application of composite indicator in evaluation of resilience in critical infrastructure system
Published in 2022 IEEE International Carnahan Conference on Security Technology (ICCST) (07-09-2022)“…In the field of safety engineering, various approaches can be found using indicators to analyse and evaluate system resilience. Such resilience is generally…”
Get full text
Conference Proceeding -
17
Online Interactive Education of People in the Field of Protection of Soft Targets
Published in 2022 IEEE International Carnahan Conference on Security Technology (ICCST) (07-09-2022)“…This article discusses the possibilities of interactive online education of people in the field of protection of soft targets. The initial premise is the fact…”
Get full text
Conference Proceeding -
18
Deep Neural Networks for Industrial Protocol Recognition and Cipher Suite Used
Published in 2022 IEEE International Carnahan Conference on Security Technology (ICCST) (07-09-2022)“…The main objective of this paper is to determine the network traffic parameters to classify the industrial protocol and the cipher suite used without prior…”
Get full text
Conference Proceeding -
19
Fuzzing ICS Protocols: Modbus Fuzzer Framework
Published in 2022 IEEE International Carnahan Conference on Security Technology (ICCST) (07-09-2022)“…Traditionally, industrial control systems were very isolated and industrial control systems operated with very consistent data traffic. Along with the trend of…”
Get full text
Conference Proceeding -
20
A new hybdrid steganographic technique for images
Published in 2022 IEEE International Carnahan Conference on Security Technology (ICCST) (07-09-2022)“…Steganography is a technique that aims to hide the communication between two interlocutors. Steganography, unlike cryptography, allows to hide a message within…”
Get full text
Conference Proceeding