Dear all,
We have submitted the paper „Technical Threat Intelligence Analytics: What and How to Visualize for Analytic Process“ to the 24th International Conference ELECTRONICS 2020
Abstract: Visual Analytics uses data visualization methods for enabling compelling analysis of data by engaging graphical and visual representation. In the domain of cybersecurity, convincing visual representation of data enables to ascertain valuable observations that allow the domain experts to construct efficient cyberattack mitigation strategies and provide useful decision support. In this paper, we present a survey of the visual analytics tools and methods in the domain of cybersecurity. We explore and discuss Technical Threat Intelligence visualization tools using the Five Question Method. We conclude the analysis of the works using Moody’s Physics of Notations, and VIS4ML ontology as a methodological background of visual analytics process.
This paper is still under evaluation.
If it gets accepted, we will acknowledge SPARTA.
Best,
Algimantas Venčkauskas
Kauno technologijos universitetas
Hello,
We have submitted a paper on “Development of the Information Security Management System Standard for Public Sector Organisations in Estonia” to the 24th International Conference on Business Information Systems. If accepted we will acknowledge the SPARTA project. Please see its abstract below.
Best greetings,
Raimundas and Mari
Title: Development of the Information Security Management System Standard for Public Sector Organisations in Estonia
Authors: Mari Seeba, Raimundas Matulevicius, Ilmar Toom
Abstract. Standardisation gives us a common understanding or processes to do something in a commonly accepted way. In information security management, it means to achieve the appropriate security level in the context of known and unknown risks. Each government’s goal should be to provide digital services to its citizens with the acceptable level of confidentiality, integrity and availability. This study elicits the EU countries’ requirements for information security management system (ISMS) standards and provides the standards’ comparison requirements. The Estonian case is an example to illustrate the method when choosing or developing the appropriate ISMS standard to public sector organisations.
--------
Information Security Research Group: <https://infosec.cs.ut.ee>
--------
Dr. Raimundas Matulevičius,
Professor of Information Security
Institute of Computer Science
University of Tartu
Narva mnt 18,
51009 Tartu
Estonia
Dear All,
We submitted Sparta paper (attached) to a journal in January 2020.
Title: Securing Organization’s Data: A Role-Based Authorized Keyword Search Scheme with Efficient Decryption
By: Nazatul Haque Sultan, Maryline Laurent, Vijay Varadharajan.
If accepted we plan to acknowledge SPARTA.
Kind Regards,
Prof. Maryline Laurent
Maryline Laurent
Professor, Télécom SudParis
Head of R3S team, CNRS UMR5157 SAMOVAR lab
Cofounder of the chair Values and Policies of Personal Information
9 rue Charles Fourier, 91011 EVRY
+33 (0)160764442
Dear all,
we plan to submit the survey paper “Security and Privacy Protection for
Intelligent Infrastructures in the Post-Quantum Era” to the journal IEEE
COMMUNICATIONS SURVEYS & TUTORIALS.
Please find the compressed manuscript version in the attachment. The paper is in
line with WP6 - Task 6.5 Privacy-by-Design and does not contain any
sensitive information.
If the paper will be accepted and no objections will be raised by diss.
committee, we would like to acknowledge to SPARTA.
Thank you.
Best regards,
Lukas Malina
--
doc. Ing. Lukáš Malina, Ph.D.
E-mail: malina(a)feec.vutbr.cz
Brno University of Technology
Faculty of Electrical Engineering and Communication
Department of Telecommunications
Technicka 12
616 00 Brno
Czech Republic
Dear All,
We plan to submit a paper on cybersecurity training and education to IEEE Access.
Please find the pre-final version attached.
Kind regards,
Jan
——
doc. Ing. Jan Hajný, Ph.D.
Advanced Cybersecurity
Brno University of Technology
Phone: +420 541 146 961
WWW: http://crypto.utko.feec.vutbr.cz
Dear All,
We submitted 2 new papers related to Sparta/Safair.
1.
Title: The effects of data balancing procedures on surrogate explainability
methods in network cybersecurity-related streamed difficult data
By: Szczepanski, Komisarek, Pawlicki, Kozik, Choras.
Venue: IJCNN 2021 conference
Abstract:
Handling the data imbalance problem is one of the crucial steps in a
machine learning pipeline. The research community is well aware of the
effects of data imbalance on machine learning algorithms. At the same
time, there is a rising need for explainability of AI, especially in
difficult, high-stakes domains like network intrusion detection. In this
paper, the effects of data balancing procedures on two explainability
procedures implemented to explain a neural network used for network
intrusion detection are evaluated. The discrepancies between the two
methods are highlighted and important conclusions are drawn.
2.
Title:Is the COVID-19 pandemic helping to bridge the digital skill and
cybersecurity awareness-related gender gap?
By: A. Pawlicka, R. Tomaszewska, E. Krause, D. Jaroszewska-Choras,
M.Pawlicki, M.Choras ́
Venue: IEEE Security and Privacy
Abstract:
Women tend to possess lower digital competence than men. This may lead to
them being socially excluded and vulnerable to cybersecurity threats. This
study concerned the digital literacy and the cybersecurity awareness of
Polish women who have been forced to work online due to the COVID-19
pandemic.
If accepted we plan to acknowledge SPARTA.
Kind Regards,
Prof. Michal Choras
Dear all,
We are submitting a paper to the "IFIP SEC" conference this year. If it
is accepted, we acknowledge SPARTA.
Title: Hybroid: Toward Android Malware Detection and Categorization with
Program Code and Network Traffic
Abstract: Android malicious applications have become so sophisticated
that they can bypass endpoint protection measures. Therefore, it is safe
to admit that traditional anti-malware techniques have become
cumbersome, thereby raising the need to develop efficient ways to detect
Android malware. In this paper, we present Hybroid, a hybrid Android
malware detection and categorization solution that utilizes program code
structures as static behavioral features and network traffic as dynamic
behavioral features for detection (binary classification) and
categorization (multi-label classification). For static analysis, we
introduce a natural language processing-inspired technique based on
function call graph embeddings and design a graph neural network-based
approach to convert the whole graph structure of an Android app to a
vector. In dynamic analysis, we extract network flow features from the
raw network traffic by capturing each application's network flow.
Finally, Hybroid utilizes the network flow features combined with the
graphs' vectors to detect and categorize the malware. Our solution gets
99.6% accuracy on average for malware detection and 97.6% accuracy for
malware categorization.
Best regards,
Mohammad Norouzian
--
Mohammad Reza Norouzian
Lehrstuhl für Sicherheit in der Informatik I20
Institut für Informatik TU München
Boltzmannstr. 3
85748 Garching
Tel. +49 89 289 18584
Fax +49 89 289 18579
e-mail: norouzian(a)sec.in.tum.de
http://www.sec.in.tum.de