Dear all,
We have submitted the paper „Technical Threat Intelligence Analytics: What and How to Visualize for Analytic Process“ to the 24th International Conference ELECTRONICS 2020
Abstract: Visual Analytics uses data visualization methods for enabling compelling analysis of data by engaging graphical and visual representation. In the domain of cybersecurity, convincing visual representation of data enables to ascertain valuable observations that allow the domain experts to construct efficient cyberattack mitigation strategies and provide useful decision support. In this paper, we present a survey of the visual analytics tools and methods in the domain of cybersecurity. We explore and discuss Technical Threat Intelligence visualization tools using the Five Question Method. We conclude the analysis of the works using Moody’s Physics of Notations, and VIS4ML ontology as a methodological background of visual analytics process.
This paper is still under evaluation.
If it gets accepted, we will acknowledge SPARTA.
Best,
Algimantas Venčkauskas
Kauno technologijos universitetas
Dear All,
We submitted Sparta paper (attached) to a journal in January 2020.
Title: Securing Organization’s Data: A Role-Based Authorized Keyword Search Scheme with Efficient Decryption
By: Nazatul Haque Sultan, Maryline Laurent, Vijay Varadharajan.
If accepted we plan to acknowledge SPARTA.
Kind Regards,
Prof. Maryline Laurent
Maryline Laurent
Professor, Télécom SudParis
Head of R3S team, CNRS UMR5157 SAMOVAR lab
Cofounder of the chair Values and Policies of Personal Information
9 rue Charles Fourier, 91011 EVRY
+33 (0)160764442
Dear all,
we plan to submit the survey paper “Security and Privacy Protection for
Intelligent Infrastructures in the Post-Quantum Era” to the journal IEEE
COMMUNICATIONS SURVEYS & TUTORIALS.
Please find the compressed manuscript version in the attachment. The paper is in
line with WP6 - Task 6.5 Privacy-by-Design and does not contain any
sensitive information.
If the paper will be accepted and no objections will be raised by diss.
committee, we would like to acknowledge to SPARTA.
Thank you.
Best regards,
Lukas Malina
--
doc. Ing. Lukáš Malina, Ph.D.
E-mail: malina(a)feec.vutbr.cz
Brno University of Technology
Faculty of Electrical Engineering and Communication
Department of Telecommunications
Technicka 12
616 00 Brno
Czech Republic
Dear all,
we plan to submit the paper “Privacy ABCs: Now Ready for Your Wallets!”
to Workshop on Privacy in the Electronic Society which is held in
conjunction with the ACM CCS conference.
Please find the manuscript version in the attachment. The paper is in
line with WP6 - Task 6.5 Privacy-by-Design and does not contain any
sensitive information.
If the paper will be accepted and no objections will be raised by diss.
committee, we would like to acknowledge to SPARTA.
Thank you.
Best regards,
Lukas Malina
--
doc. Ing. Lukáš Malina, Ph.D.
E-mail: malina(a)feec.vutbr.cz
Brno University of Technology
Faculty of Electrical Engineering and Communication
Department of Telecommunications
Technicka 12
616 00 Brno
Czech Republic
Dear all,
UNamur wrote a paper titled "GDPR and Automated individual
decision-making: Fair processing v. Fair result". In order to respect
the deadline set by the GA, please find enclosed the complete draft of
the publication.
If the dissemination committee raises no objections, we would like to
acknowledge SPARTA.
Best regards,
Manon
--
MANON KNOCKAERT
Chercheuse
Centre de Recherches Information, Droit et Société
T. +32 (0)81 724 798
F. +32 (0)81 725 202
manon.knockaert(a)unamur.be <mailto:manon.knockaert@unamur.be>
http://www.unamur.be
Université de Namur
Rue de Bruxelles 61 - 5000 Namur
Belgique
Let's respect the environment together.
Only print this message if necessary!
Dear All,
we submitted the paper /dg2pix: Pixel-Based Visual Analysis of Dynamic
Graphs/ to the Visualization in Data Science (VDS at IEEE VIS 2020). We
request to acknowledge SPARTA if the paper is accepted.
* Abstract: "Presenting long sequences of dynamic graphs remains
challenging due to the underlying large-scale and high-dimensional
data. We propose dg2pix, a novel pixel-based visualization
technique, to visually explore temporal and structural properties in
long sequences of large-scale graphs. The approach consists of three
main steps: (1) the multiscale modeling of the temporal dimension;
(2) unsupervised graph embeddings to learn low-dimensional
representations of the dynamic graph data; and (3) an interactive
pixel-based visualization to explore the evolving data at different
temporal aggregation scales simultaneously. dg2pix provides a
scalable overview of a dynamic graph, supports the exploration of
long sequences of high-dimensional graph data, and enables the
identification and comparison of similar temporal states. We show
the applicability of the technique to synthetic and real-world
datasets, demonstrating that temporal patterns in dynamic graphs can
be easily identified and interpreted over time. Our dg2pix
contributes a suitable intermediate representation between node-link
diagrams at the high detail end, and matrix representations on the
low detail end."
Best Regards,
Eren Cakmak
--
Research Associate
Department of Computer and Information Science
Data Analysis and Visualization Group
78457 Konstanz, Germany
Website: http://infovis.uni.kn/~cakmak
Phone: +49 (0)7531 88 2507
Room: D334
Dear,
LEONARDO and CETIC submitted a joint paper to the CyberCert 2020
workshop that has been accepted for publication. The paper reports on
joint work in WP11 and WP5 (CAPE) and acknowledges SPARTA.
Title: Towards Incremental Safety and Security Requirements
Co-Certification
Authors: Morgagni Andrea, Massonet Philippe, Dupont Sébastien,
Grandclaudon Jeremy
Abstract: The continuous technological developments and the growing
connectivity of applications and infrastructures is leading to the new
threats to the technological world in particular to the possibility of
considering certain threats in environments that were not previously
touched by them. Now that many safety critical systems are becoming
connected, they need to be protected from security threats. Safety and
security engineering and certification evaluation are processes that
have evolved independently. However now that security issues may impact
safety they need to be analysed together, yet the processes must become
more flexible to encourage certification when it is not mandatory. In
this paper we sketch an approach for incremental certification of
security requirements with Common Criteria in the general context of
security/safety co-engineering and certification. The approach is
illustrated with a case study.
Best regards,
Philippe
--
*Philippe Massonet*
/Scientific Coordinator/
CETIC
Avenue Jean Mermoz, 28
B-6041 Charleroi
Mobile: +32 472 56 98 31
e-mail: philippe.massonet(a)cetic.be <mailto:philippe.massonet@cetic.be>
https://www.cetic.be/
/
/
Dear All,
we have submitted a research paper entitled “SEkey: A Distributed Hardware-based Key Management System" to the 18th IEEE EAST-WEST DESIGN & TEST SYMPOSIUM (EWDTS-2020) that will be held online from September 4th to 7th.
In the paper we describe the design and development of a cryptographic key management system that leverage on the characteristics and functionalities of the SEcube Open Security Platform.
Please find the pre-final version of our paper attached to this email.
If the dissemination committee raises no objections, we would like to acknowledge the SPARTA project.
Best regards,
Nicolò MAUNERO
Politecnico di Torino - Dipartimento di Automatica e Informatica
CINI - Laboratorio Nazionale Cybersecurity
Sede di Torino c/o LINKS - Leading Innovation & Knowledge for Society
Via Pier Carlo Boggio 61, I-10129 Torino - Italy
Tel: +39 334 2555532
nicolo.maunero(a)polito.it <mailto:nicolo.maunero@polito.it>
Skype: nicolo.maunero