Table of Contents, vol 12, no 1&2, year 2019

pages: 1 - 12
Towards a Comprehensive Automotive Cybersecurity Reference Architecture
Christoph Schmittner, Austrian Institute of Technology, Austria
Martin Latzenhofer, Austrian Institute of Technology, Austria
Abdelkader Shaaban Magdy, Austrian Institute of Technology, Austria
Arndt Bonitz, Austrian Institute of Technology, Austria
Markus Hofer, Austrian Institute of Technology, Austria

pages: 13 - 28
MEADcast: Explicit Multicast with Privacy Aspects
Vitalian Danciu, Ludwig-Maximilians-Universität München, Germany
Cuong Ngoc Tran, Ludwig-Maximilians-Universität München, Germany

pages: 29 - 41
Evaluating Security Products: Formal Model and Requirements of a New Approach
Pierre-Marie Bajan, IRT SystemX; University of Paris-Saclay, France
Christophe Kiennert, Télécom SudParis, France
Hervé Debar, Télécom SudParis, France

pages: 42 - 52
Power Consumption Analysis of the New Covert Channels in CoAP
Aleksandar Velinov, Faculty of Computer Science, University “Goce Delčev”, Stip, Republic of Macedonia
Aleksandra Mileva, Faculty of Computer Science, University “Goce Delčev”, Stip, Republic of Macedonia
Done Stojanov, Faculty of Computer Science, University “Goce Delčev”, Stip, Republic of Macedonia

pages: 53 - 68
Secure Cooperation of Untrusted Components Using a Strongly Typed Virtual Machine
Roland Wismüller, University of Siegen, Germany
Damian Ludwig, University of Siegen, Germany

pages: 69 - 78
Implementation and Performance Evaluation of Eavesdropping Protection Method over MPTCP Using Data Scrambling and Path Dispersion
Toshihiko Kato, University of Electro-Communications, Japan
Shihan Cheng, University of Electro-Communications, Japan
Ryo Yamamoto, University of Electro-Communications, Japan
Satoshi Ohzahata, University of Electro-Communications, Japan
Nobuo Suzuki, Advanced Telecommunication Research Institute International, Japan

pages: 79 - 94
Protecting Deployment Models in Collaborative Cloud Application Development
Vladimir Yussupov, Institute of Architecture of Application Systems (IAAS), University of Stuttgart, Germany
Ghareeb Falazi, Institute of Architecture of Application Systems (IAAS), University of Stuttgart, Germany
Michael Falkenthal, Institute of Architecture of Application Systems (IAAS), University of Stuttgart, Germany
Frank Leymann, Institute of Architecture of Application Systems (IAAS), University of Stuttgart, Germany

pages: 95 - 107
Synthesis of Formal Specifications From Requirements for Refinement-based Real Time Object Code Verification
Eman Al-Qtiemat, North Dakota State University, US
Sudarshan Srinivasan, North Dakota State University, US
Zeyad Al-Odat, North Dakota State University, US
Mohana Asha Latha Dubasi, North Dakota State University, US
Sana Shuja, COMSATS University, Pakistan

pages: 108 - 118
Reviewing National Cybersecurity Awareness for Users and Executives in Africa
Maria Bada, University of Cambridge, UK
Basie von Solms, University of Johannesburg, South Africa
Ioannis Agrafiotis, University of Oxford, UK

pages: 119 - 129
The Speech Interface as an Attack Surface: An Overview
Mary K. Bispham, University of Oxford, United Kingdom
Ioannis Agrafiotis, University of Oxford, United Kingdom
Michael Goldsmith, University of Oxford, United Kingdom

pages: 130 - 140
Threat Analysis using Vulnerability Databases - Topic Model Analysis using LDA and System Model Description -
Katsuyuki Umezawa, Shonan Institute of Technology, Japan
Yusuke Mishina, National Institute of Advanced Industrial Science and Technology (AIST), Japan
Sven Wohlgemuth, Hitachi, Ltd., Japan
Kazuo Takaragi, National Institute of Advanced Industrial Science and Technology (AIST), Japan

pages: 141 - 152
Dont Wait to be Breached! Creating Asymmetric Uncertainty of Cloud Applications via Moving Target Defenses
Kennedy Torkura, Hasso Plattner Institute, University of Potsdam, Germany
Christoph Meinel, Hasso Plattner Institute, University of Potsdam, Germany
Nane Kratzke, Lübeck University of Applied Sciences, Germany

download vol 12, no 1&2, year 2019

 
Copyright (c) 2008-2010. IARIA, All rights reserved.