Publications & Demonstrators

All accepted publications from SPARTA partners under its funding as well as videos presenting some of the work done under SPARTA

Publications

Hybroid: Toward Android Malware Detection and Categorization with Program Code and Network Traffic

Mohammad Reza Norouzian, Peng Xu, Claudia Eckert, and Apostolis Zarras

Android malicious applications have become so sophisticated that they can bypass endpoint protection measures. Therefore, it is safe to admit that traditional anti-malware techniques have become cumbersome, thereby raising the need to develop efficient ways to detect Android malware. In this paper, we present Hybroid, a hybrid Android malware detection...More>>

Domains: Android, malware detection, F1-score, AUC

Development of the Information Security Management System Standard for Public Sector Organisations in Estonia

Mari Seeba, Raimundas Matulevičius, and Ilmar Toom

Standardisation gives us a common understanding or processes to do something in a commonly accepted way. In information security management, it means to achieve the appropriate security level in the context of known and unknown risks. Each government’s goal should be to provide digital services to its citizens with the...More>>

Domains: ISMS, Public Sector Organisations

Security Risk Estimation and Management in Autonomous Driving Vehicles

Abasi-amefon O. Affia, Raimundas Matulevičius, and Rando Tõnisson

Autonomous vehicles (AV) are intelligent information systems that perceive, collect, generate and disseminate information to improve knowledge to act autonomously and provide its required services of mobility, safety, and comfort to humans. This paper combines the security risk management (ISSRM) and operationally critical threat, asset, and vulnerability evaluation (OCTAVE allegro) methods...More>>

Domains: Autonomous vehicles, Self-driving cars, Security risk management, ISSRM, OCTAVE, Intelligent information systems

Information Security Analysis in the Passenger-Autonomous Vehicle Interaction

Mariia Bakhtina, Raimundas Matulevičius

Autonomous vehicles (AV) are becoming a part of humans’ everyday life. There are numerous pilot projects of driverless public buses; some car manufacturers deliver their premium-level automobiles with advanced self-driving features. Thus, assuring the security of a Passenger–Autonomous Vehicle interaction arises as an important research topic, as along with opportunities,...More>>

Domains: Autonomous vehicles

Risk-Oriented Design Approach For Forensic-Ready Software Systems

Lukas Daubner, Raimundas Matulevičius

Digital forensic investigation is a complex and time-consuming activity in response to a cybersecurity incident or cybercrime to answer questions related to it. These typically are what happened, when, where, how, and who is responsible. However, answering them is often very laborious and sometimes outright impossible due to a lack...More>>

Domains: Computing, Technology policy, Computer crime

A Novel Approach for Network Intrusion Detection Using Multistage Deep Learning Image Recognition

Toldinas, Jevgenijus, Algimantas Venčkauskas, Robertas Damaševičius, Šarūnas Grigaliūnas, Nerijus Morkevičius, and Edgaras Baranauskas

The current rise in hacking and computer network attacks throughout the world has heightened the demand for improved intrusion detection and prevention solutions. The intrusion detection system (IDS) is critical in identifying abnormalities and assaults on the network, which have grown in size and pervasiveness. The paper proposes a novel...More>>

Domains: network intrusion detection; deep learning; image representation

Method for Dynamic Service Orchestration in Fog Computing

Morkevicius, Nerijus, Algimantas Venčkauskas, Nerijus Šatkauskas, and Jevgenijus Toldinas

Fog computing is meant to deal with the problems which cloud computing cannot solve alone. As the fog is closer to a user, it can improve some very important QoS characteristics, such as a latency and availability. One of the challenges in the fog architecture is heterogeneous constrained devices and...More>>

Domains: QoS, Fog Computing

SI‐AKAV: Secure integrated authentication and key agreement for cellular‐connected IoT devices in vehicular social networks

Alireza Esfahani, Jérémie Decouchant, Marcus Völp, Shahid Mumtaz, Kostromitin Konstantin Igorevich

Vehicular social networking (VSN), as a novel communication paradigm, exploits opportunistic encounters among vehicles for mobile social networking, collaborative content dissemination, and to provide a variety of services for users and their vehicles. VSNs promise to solve problems such as the ever‐increasing number of road accidents, or traffic congestion, by...More>>

Domains: Vehicular social networking

Securing Organization’s Data: A Role-Based Authorized Keyword Search Scheme with Efficient Decryption

Nazatul Haque Sultan, Maryline Laurent, Vijay Varadharajan

For better data availability and accessibility while ensuring data secrecy, organizations often tend to outsource their encrypted data to the cloud storage servers, thus bringing the challenge of keyword search over encrypted data. In this paper, we propose a novel authorized keyword search scheme using Role-Based Encryption (RBE) technique in...More>>

Domains: Security and privacy, Privacy-preserving protocols, Management and querying of encrypted data