Conveners
Session 1B - Network Security
- Emil-Ioan CEBUC (Agency ARNIEC/RoEduNet, Technical University of Cluj-Napoca)
Description
Online participation available here
https://acecloud.webex.com/acecloud/j.php?MTID=mdb21f44fba55794ef50ae01fdbe34d6b
The cybersecurity landscape in the last years shows a disastrous scenario in which more than 281 million people were affected by cyber-threads in 2021 with an estimated financial impact of more than $15.680 million. Perimeter breaching is the incipient step that attackers take when they target external networks. According to the latest research1, on average the penetration of the internal...
The interest of attackers is expanding in response to the on-growing enthusiasm for rapid development, so seeking ways to quantify and manage the risks has become a priority. However, in the current context, there is no consistent and effective strategy for evaluating computer network security. Therefore, we propose a comprehensive software solution that collects, processes, and evaluates data...
The market of Medical Devices have a compound annual growth rate perspective of 5.4% in the period 2022 - 2028. The growth rate is mainly supported by the increased usage of devices for chronic diseases prevention and for remote patients monitoring. The growth rate is also supported by the population's appetite for mobile devices. The continuously growing number of mobile devices has led to...
The web applications security systems often use the authentication strategy and credentials to be able to assess the identity of the user. Based on the credentials, the system is able to claim the identity of the user. Also, the authenticity of identity is claimed based on authentication strategy. This paper analyzes and compares different strategies used to enforce the web applications...
Abstract—As IoT ecosystems are growing these days, the question of potentially dangerous and even life-threatening security risks raises concerns, especially for bigger-scale environments, such as smart cities. In this regard, many cyber security researchers are trying to develop solutions, which eventually could provide a high-security level enough to discourage any attempts of illicit...