ARTICLE | doi:10.20944/preprints202205.0344.v1
Subject: Computer Science And Mathematics, Information Systems Keywords: Linked (open) Data; Semantic Interoperability; Data Mapping; Governmental Data; SPARQL; Ontologies
Online: 25 May 2022 (08:18:46 CEST)
In this paper, we present a method to map information regarding service activity provision residing in governmental portals across European Commission. In order to perform this, we used as a basis the enriched Greek e-GIF ontology, modeling concepts, and relations in one of the two data portals (i.e., Points of Single Contacts) examined, since relevant information on the second was not provided. Mapping consisted in transforming information appearing in governmental portals in RDF format (i.e., as Linked data), in order to be easily exchangeable. Mapping proved a tedious task, since description on how information is modeled in the second Point of Single Contact is not provided and must be extracted in a manual manner.
ARTICLE | doi:10.20944/preprints202111.0214.v2
Online: 5 January 2022 (15:38:52 CET)
The IoT is recognized as one of the most important areas of future technology and is gaining vast attention from a wide range of industries. Although, after 20 years from the first published literature (2002) the technology (as a whole) is not yet mature. In this study we will review the basics of IoT with a general approach, by addressing the problems of a standard architecture, vulnerabilities and use cases of this promising technology. Moreover, we will review some of the communication protocols that have invented especially for IoT technology, security threats and general implementation challenges.
ARTICLE | doi:10.20944/preprints202012.0063.v1
Subject: Computer Science And Mathematics, Algebra And Number Theory Keywords: XSS; Cross site scripting; Sql injection
Online: 2 December 2020 (13:04:51 CET)
The danger is still very large from cross site scripting attacks. When designing web applications We must follow as much as we can prevention rules and don’t leave any loophole to our programs. Experience is a great factor for programmers to know these attacks and for a trainee programmer is a difficult task to spot all the weak points. In this article we present a tutorial on launching an XSS attack and also we propose simple solutions.
Online: 15 June 2020 (10:58:30 CEST)
Privacy and information insurance have consistently been a priority for the European Union lawmaker. This paper presents whether the NIS prevails in its underlying endeavors to remain the congruity among residents and companies. It distinguishes current difficulties that specific business structures may experience while conforming to the Regulation. The exploration traces certain reasons which could impede the opportune reception of the new lawful ideas inside the system of the organizations. The exploration incorporates what is unique about the NIS; how it overlaps with existing frameworks; and how security requirements in the GDPR influence the NIS Directive. This paper furnishes different point of views of experts with the aim of setting up an entire examination
ARTICLE | doi:10.20944/preprints201706.0119.v1
Subject: Engineering, Electrical And Electronic Engineering Keywords: emulation; network threat; network attack; network services; network topology; cyber defence exercises
Online: 27 June 2017 (05:16:41 CEST)
This paper outlines a tool developed with the purpose of creating a simple configurable emulated network environment that can be used in cyber defence exercises. Research has been conducted into the various related subject areas: cyber defence exercises, network threats, network emulation, network traffic replay, network topologies, and common network services. From this research a requirements specification was produced to encapsulate the features required to create this tool. A network, containing many of the aspects researched, was designed and implemented using Netkit-NG to act as a blueprint for the tool and to further knowledge in the construction of an emulated network. Following this the tool was developed and tested to ensure requirements were met.
Subject: Engineering, Control And Systems Engineering Keywords: Cooperative Intelligent Transport Systems (CITS); Vehicle to Pedestrian (V2P); Vulnerable 15 Road Users (VRU); GPS; smartphones; Inertial Measurement Units sensors
Online: 6 February 2020 (03:44:08 CET)
The field of Cooperative Intelligent Transport Systems and more specifically Pedestrians to Vehicles could be characterized as quite challenging, since there is a broad research area to be studied, with direct positive results to society. Pedestrians to Vehicles is a type of Cooperative Intelligent Transport System, within the group of Early Warning Collision/Safety System. In this article, we examine the research and applications carried out so far within the field of Pedestrians to Vehicles Cooperative Transport Systems by leveraging the information coming from Vulnerable Road Users’, smartphones. Moreover, an extensive literature review has been carried out in the fields of Vulnerable Road Users Outdoor Localisation via smartphones and Vulnerable Road Users Next Step/Movement Prediction, which are closely related to Pedestrian to Vehicle applications and research. We identify gaps that exist in these fields that could be improved/extended/enhanced or newly developed, while we address future research objectives and methodologies that could support the improvement/development of those identified gaps.
Subject: Computer Science And Mathematics, Security Systems Keywords: assessment framework; cyber security; GDPR; PCI-DSS; DSPT; NISD
Online: 9 May 2020 (04:35:03 CEST)
As organizations are vulnerable to cyber attacks, their protection becomes a significant issue. Capability Maturity Models can enable organizations to benchmark current maturity levels against best practices. Although many maturity models have been already proposed in the literature, a need for models that integrate several regulations exists. This article presents a light web-based model that can be used as a cybersecurity assessment tool for Higher Education Institutes (HEIs) of the UK. The novel Holistic Cybersecurity Maturity Assessment Framework incorporates all security and privacy regulations and best practices that HEIs must be compliant to and can be used as a self-assessment or a cybersecurity audit tool.