Pub Date : 2017-08-28DOI: 10.1007/978-3-319-65127-9_26
S. Drager, J. Zalewski
{"title":"A Novel and Unifying View of Trustworthiness in Cyberphysical Systems","authors":"S. Drager, J. Zalewski","doi":"10.1007/978-3-319-65127-9_26","DOIUrl":"https://doi.org/10.1007/978-3-319-65127-9_26","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122383018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-28DOI: 10.1007/978-3-319-65127-9_3
A. Grusho
{"title":"Data Mining and Information Security","authors":"A. Grusho","doi":"10.1007/978-3-319-65127-9_3","DOIUrl":"https://doi.org/10.1007/978-3-319-65127-9_3","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116623130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-28DOI: 10.1007/978-3-319-65127-9_21
An Braeken, S. Bezzateev, A. Touhafi, N. Voloshina
{"title":"HEPPA: Highly Efficient Privacy Preserving Authentication for ITS","authors":"An Braeken, S. Bezzateev, A. Touhafi, N. Voloshina","doi":"10.1007/978-3-319-65127-9_21","DOIUrl":"https://doi.org/10.1007/978-3-319-65127-9_21","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"18 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113992849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-28DOI: 10.1007/978-3-319-65127-9_6
E. Korkmaz, M. Davis, A. Dolgikh, V. Skormin
{"title":"Detection and Mitigation of Time Delay Injection Attacks on Industrial Control Systems with PLCs","authors":"E. Korkmaz, M. Davis, A. Dolgikh, V. Skormin","doi":"10.1007/978-3-319-65127-9_6","DOIUrl":"https://doi.org/10.1007/978-3-319-65127-9_6","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131878450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-28DOI: 10.1007/978-3-319-65127-9_18
Hubert Ostap, R. Antkiewicz
{"title":"A Concept of Clustering-Based Method for Botnet Detection","authors":"Hubert Ostap, R. Antkiewicz","doi":"10.1007/978-3-319-65127-9_18","DOIUrl":"https://doi.org/10.1007/978-3-319-65127-9_18","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123382239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-28DOI: 10.1007/978-3-319-65127-9_24
M. Niemiec, Maciej Francikiewicz
{"title":"Security Assessment of Cryptographic Algorithms","authors":"M. Niemiec, Maciej Francikiewicz","doi":"10.1007/978-3-319-65127-9_24","DOIUrl":"https://doi.org/10.1007/978-3-319-65127-9_24","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130657627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-28DOI: 10.1007/978-3-319-65127-9_1
J. Górski, Katarzyna Lukasiewicz
{"title":"Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile","authors":"J. Górski, Katarzyna Lukasiewicz","doi":"10.1007/978-3-319-65127-9_1","DOIUrl":"https://doi.org/10.1007/978-3-319-65127-9_1","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133512802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-28DOI: 10.1007/978-3-319-65127-9_9
L. Popyack, J. Biernat
{"title":"Race Condition Faults in Multi-core Systems","authors":"L. Popyack, J. Biernat","doi":"10.1007/978-3-319-65127-9_9","DOIUrl":"https://doi.org/10.1007/978-3-319-65127-9_9","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124989546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}