Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 3, Issue 4December 2022
Editor:
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
EISSN:2576-5337
Reflects downloads up to 25 Dec 2024Bibliometrics
Skip Table Of Content Section
SECTION: Special Issue on the Lifecycle of IoT (In)Security
editorial
Open Access
research-article
Open Access
Emerging Cybersecurity Capability Gaps in the Industrial Internet of Things: Overview and Research Agenda
Article No.: 34, Pages 1–27https://doi.org/10.1145/3503920

Internet of Things (IoT)-enabled devices are becoming integrated into a significant and increasing proportion of critical infrastructures, changing the cybersecurity-risk landscape. Risk is being introduced to industry sectors such as transport, energy, ...

research-article
Open Access
Randomized Moving Target Approach for MAC-Layer Spoofing Detection and Prevention in IoT Systems
Article No.: 35, Pages 1–24https://doi.org/10.1145/3477403

MAC-layer spoofing, also known as identity spoofing, is recognized as a serious problem in many practical wireless systems. IoT systems are particularly vulnerable to this type of attack as IoT devices (due to their various limitations) are often ...

note
Open Access
Field Note on IoT Security: Novel JIT Security for Large-Scale Heterogeneous IoT Deployments
Article No.: 36, Pages 1–5https://doi.org/10.1145/3503919

This article provides an overview of specific security considerations for multi-modal Internet-of-Things(IoT) use-case deployment. With the year-over-year exponential increase in smartdevice deployments, threat vectors continue to fall into a concise list ...

SECTION: Special Issue on Vulnerabilities
introduction
Open Access
research-article
Open Access
Analyzing the Direct and Transitive Impact of Vulnerabilities onto Different Artifact Repositories
Article No.: 38, Pages 1–25https://doi.org/10.1145/3472811

In modern-day software development, a vast amount of public software libraries enable the reuse of existing implementations for reoccurring tasks and common problems. While this practice does yield significant benefits in productivity, it also puts an ...

research-article
Open Access
Are We Skillful or Just Lucky? Interpreting the Possible Histories of Vulnerability Disclosures
Article No.: 39, Pages 1–28https://doi.org/10.1145/3477431

 Coordinated Vulnerability Disclosure (CVD) stands as a consensus response to the persistent fact of vulnerable software, yet few performance indicators have been proposed to measure its efficacy at the broadest scales. In this article, we seek to fill ...

research-article
Open Access
Vulnerability Exposure Driven Intelligence in Smart, Circular Cities
Article No.: 40, Pages 1–18https://doi.org/10.1145/3487059

In this article, we study the vulnerability management dimension in smart city initiatives. As many cities across the globe invest a considerable amount of effort, resources and budget to modernise their infrastructure by deploying a series of ...

research-article
Open Access
Strategies for Practical Hybrid Attack Graph Generation and Analysis
Article No.: 41, Pages 1–24https://doi.org/10.1145/3491257

As an analytical tool in cyber-security, an attack graph (AG) is capable of discovering multi-stage attack vectors on target computer networks. Cyber-physical systems (CPSs) comprise a special type of network that not only contains computing devices but ...

research-article
Open Access
Vulnerability Forecasting: Theory and Practice
Article No.: 42, Pages 1–27https://doi.org/10.1145/3492328

It is possible to forecast the volume of CVEs released within a time frame with a given prediction interval. For example, the number of CVEs published between now and a year from now can be forecast within 8% of the actual value. Different predictive ...

SECTION: Regular Papers
research-article
Open Access
Risk-aware Fine-grained Access Control in Cyber-physical Contexts
Article No.: 43, Pages 1–29https://doi.org/10.1145/3480468

Access to resources by users may need to be granted only upon certain conditions and contexts, perhaps particularly in cyber-physical settings. Unfortunately, creating and modifying context-sensitive access control solutions in dynamic environments ...

research-article
Open Access
Threat Intelligence Quality Dimensions for Research and Practice
Article No.: 44, Pages 1–22https://doi.org/10.1145/3484202

As the adoption and diversity of threat intelligence solutions continue to grow, questions about their effectiveness, particularly in regards to the quality of the data they provide, remain unanswered. Several studies have highlighted data quality issues ...

Subjects

Comments