Dear all,
We have submitted the paper „Technical Threat Intelligence Analytics: What and How to Visualize for Analytic Process“ to the 24th International Conference ELECTRONICS 2020
Abstract: Visual Analytics uses data visualization methods for enabling compelling analysis of data by engaging graphical and visual representation. In the domain of cybersecurity, convincing visual representation of data enables to ascertain valuable observations that allow the domain experts to construct efficient cyberattack mitigation strategies and provide useful decision support. In this paper, we present a survey of the visual analytics tools and methods in the domain of cybersecurity. We explore and discuss Technical Threat Intelligence visualization tools using the Five Question Method. We conclude the analysis of the works using Moody’s Physics of Notations, and VIS4ML ontology as a methodological background of visual analytics process.
This paper is still under evaluation.
If it gets accepted, we will acknowledge SPARTA.
Best,
Algimantas Venčkauskas
Kauno technologijos universitetas
Dear All,
We submitted Sparta paper (attached) to a journal in January 2020.
Title: Securing Organization’s Data: A Role-Based Authorized Keyword Search Scheme with Efficient Decryption
By: Nazatul Haque Sultan, Maryline Laurent, Vijay Varadharajan.
If accepted we plan to acknowledge SPARTA.
Kind Regards,
Prof. Maryline Laurent
Maryline Laurent
Professor, Télécom SudParis
Head of R3S team, CNRS UMR5157 SAMOVAR lab
Cofounder of the chair Values and Policies of Personal Information
9 rue Charles Fourier, 91011 EVRY
+33 (0)160764442
Dear all,
we plan to submit the survey paper “Security and Privacy Protection for
Intelligent Infrastructures in the Post-Quantum Era” to the journal IEEE
COMMUNICATIONS SURVEYS & TUTORIALS.
Please find the compressed manuscript version in the attachment. The paper is in
line with WP6 - Task 6.5 Privacy-by-Design and does not contain any
sensitive information.
If the paper will be accepted and no objections will be raised by diss.
committee, we would like to acknowledge to SPARTA.
Thank you.
Best regards,
Lukas Malina
--
doc. Ing. Lukáš Malina, Ph.D.
E-mail: malina(a)feec.vutbr.cz
Brno University of Technology
Faculty of Electrical Engineering and Communication
Department of Telecommunications
Technicka 12
616 00 Brno
Czech Republic
Dear all,
we plan to submit the paper “Privacy ABCs: Now Ready for Your Wallets!”
to Workshop on Privacy in the Electronic Society which is held in
conjunction with the ACM CCS conference.
Please find the manuscript version in the attachment. The paper is in
line with WP6 - Task 6.5 Privacy-by-Design and does not contain any
sensitive information.
If the paper will be accepted and no objections will be raised by diss.
committee, we would like to acknowledge to SPARTA.
Thank you.
Best regards,
Lukas Malina
--
doc. Ing. Lukáš Malina, Ph.D.
E-mail: malina(a)feec.vutbr.cz
Brno University of Technology
Faculty of Electrical Engineering and Communication
Department of Telecommunications
Technicka 12
616 00 Brno
Czech Republic
Dear all,
If the dissemination committee raises no objections, we would like to acknowledge the SPARTA project on the attached paper (preprint version).
This paper has been recently accepted for publication at the ICSE conference (rank A*).
This paper is related to our research activities performed in WP5 Cape.
Jordan Samhi, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein, RAICC: Revealing Atypical Inter-Component Communication in Android Apps, 43rd International Conference on Software Engineering (ICSE), IEEE/ACM, May 2021, To appear, Madrid, Spain (Virtual Conference)
All the best,
Jacques
--
Prof. Jacques Klein
Chief Scientist
University of Luxembourg - SnT
00352 46 66 44 56 00 / Gsm: 0033 6 06 47 62 54
https://jacquesklein2302.github.io/
Dear all,
I would like to announce a recent publication by fortiss. Our paper has
been accepted for publication at VNC 2020. It acknowledges the SPARTA
project. Our paper is related to our research activities performed in
T5.2 (Convergence of security and safety).
Title:
A Formal Security Assessment Framework for Cooperative Adaptive Cruise
Control
Authors:
Yuri Gil Dantas (fortiss, Germany), Vivek Nigam (fortiss, Germany),
Carolyn Talcott (SRI International, USA)
Conference:
2020 IEEE Vehicular Networking Conference (VNC)
The paper is attached.
Cheers,
Yuri
--
fortiss · Landesforschungsinstitut des Freistaats Bayern
An-Institut Technische Universität München
Guerickestraße 25
80805 München
Germany
Tel.: +49 (89) 3603522 193
Fax: +49 (89) 3603522 50 E-Mail: dantas(a)fortiss.org
https://www.fortiss.org/
Amtsgericht München: HRB: 176633
USt-IdNr.: DE263907002, Steuer-Nr.: 143/237/25900
Rechtsform: gemeinnützige GmbH
Sitz der Gesellschaft: München
Geschäftsführer: Dr. Harald Rueß, Thomas Vallon
Vorsitzender des Aufsichtsrats: Dr. Manfred Wolter
Dear all,
If the dissemination committee raises no objections, we would like to acknowledge the SPARTA project on the attached paper (not yet the camera ready version).
This paper has been recently accepted for publication in the ACM Transactions on Software Engineering and Methodology (TOSEM) journal.
This paper is related to our research activities performed in WP5 Cape.
Xiaoyu Sun, Li Li, Tegawendé F. Bissyandé, Jacques Klein, Damien Octeau, John Grundy , Taming Reflection: An Essential Step Towards Whole-Program Analysis of Android Apps, ACM Transactions on Software Engineering and Methodology (TOSEM), ACM, Accepted for publication on Nov. 29, 2020
All the best,
Jacques
--
Prof. Jacques Klein
Chief Scientist
University of Luxembourg - SnT
00352 46 66 44 56 00 / Gsm: 0033 6 06 47 62 54
https://jacquesklein2302.github.io/
Dear All
I would like to let you know that we have a paper under evaluation of
"Computers & Security" acknowledging SPARTA. The title and abstract are
the following (the pre-print is attached):
Title: Optimisation of cyber insurance coverage with selection of cost
effective security controls.
Abstract: Nowadays, cyber threats are considered among the most
dangerous risks by top
management of enterprises. One way to deal with these risks is to insure
them,
but cyber insurance is still quite expensive. The insurance fee can be
reduced if
organisations improve their cyber security protection, i.e., reducing
the insured
risk. In other words, organisations need an investment strategy to
decide the
optimal amount of investments into cyber insurance and self-protection.
In this work, we propose an approach to help a risk-averse organisation to
distribute its cyber security investments in a cost-efficient way. What
makes
our approach unique is that next to defining the amount of investments in
cyber insurance and self-protection, our proposal also explicitly
defines how
these investments should be spent by selecting the most cost-ecffiient
security
controls. Moreover, we provide an exact algorithm for the control selection
problem considering several threats at the same time and compare this
algorithm
with other approximate algorithmic solutions.
--
___________
best regard,
Artsiom Yautsiukhin