Sökning: "Sokratis Katsikas"

Hittade 2 avhandlingar innehållade orden Sokratis Katsikas.

  1. 1. Secure and Privacy-aware Data Collection and Processing in Mobile Health Systems

    Författare :Leonardo H Iwaya; Simone Fischer-Hübner; Leonardo Martucci; Rose-Mharie Åhlfeldt; Sokratis Katsikas; Karlstads universitet; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; Mobile health; information security; data privacy; data collection; personal health data; Computer Science; Datavetenskap; Computer Science; Datavetenskap;

    Sammanfattning : Healthcare systems have assimilated information and communication technologies in order to improve the quality of healthcare and patient's experience at reduced costs. The increasing digitalization of people's health information raises however new threats regarding information security and privacy. LÄS MER

  2. 2. Vulnerability Analysis for Critical Infrastructures

    Författare :Yuning Jiang; Yacine Atif; Jianguo Ding; Manfred A. Jeusfeld; Birgitta Lindström; Christoffer Brax; Sokratis Katsikas; Högskolan i Skövde; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; critical infrastructure cybersecurity; vulnerability assessment; vulnerability quantification; computational intelligence in cybersecurity; cyber-physical system; INF303 Informationssäkerhet; INF303 Information Security; INF301 Data Science; INF301 Data Science; Distribuerade realtidssystem DRTS ; Distributed Real-Time Systems;

    Sammanfattning : The rapid advances in information and communication technology enable a shift from diverse systems empowered mainly by either hardware or software to cyber-physical systems (CPSs) that are driving Critical infrastructures (CIs), such as energy and manufacturing systems. However, alongside the expected enhancements in efficiency and reliability, the induced connectivity exposes these CIs to cyberattacks exemplified by Stuxnet and WannaCry ransomware cyber incidents. LÄS MER