Evolving Bitcoin Custody

JTG Swambo - arxiv preprint arxiv:2310.11911, 2023 - arxiv.org
The broad topic of this thesis is the design and analysis of Bitcoin custody systems. Both the
technology and threat landscape are evolving constantly. Therefore, custody systems …

timeTree: How to Represent Time Sequence in a Threat Tree

Z Wu, J Hu, X Zhang, W Ren - 2022 IEEE 24th Int Conf on High …, 2022 - ieeexplore.ieee.org
Threat tree can be used as a tool to represent the threat conditions for certain risks. The
conditions are represented as children, and the resulting risk is represented as a father. The …

Risk framework for bitcoin custody operation with the revault protocol

J Swambo, A Poinsot - Financial Cryptography and Data Security. FC 2021 …, 2021 - Springer
Our contributions with this paper are twofold. First, we elucidate the methodological
requirements for a risk framework of custodial operations and argue for the value of this type …

Optimising a defence-aware threat modelling diagram incorporating a defence-in-depth approach for the internet-of-things

ML Godakanda - 2023 - ro.ecu.edu.au
Modern technology has proliferated into just about every aspect of life while improving the
quality of life. For instance, IoT technology has significantly improved over traditional …

Exploring the Viability of PageRank for Attack Graph Analysis and Defence Prioritization

M Dypbukt Källman - 2023 - diva-portal.org
In today's digital world, cybersecurity is becoming increasingly critical. Essential services
that we rely on every day such as finance, transportation, and healthcare all rely on complex …

[PDF][PDF] Security Requirements and Risks Conceptualization

VTT Lead - pape.science
This document presents the research results on usable security and privacy, and on usability
of different security solutions, that were acquired in the context of Cyber Security for Europe …

Інформаційно-аналітична система оцінки ризиків інформаційної безпеки комп'ютерної мережі

КМ Загнітко - 2024 - elar.khmnu.edu.ua
Анотація Мета кваліфікаційної роботи полягає у створенні інформаційно-аналітичної
системи оцінки ризиків інформаційної безпеки комп'ютерної мережі. Для досягнення …

[CITATION][C] Gestaltungsmodell eines Informationssicherheits-managementsystems für produzierende Unternehmen in Industrie-4.0-Umgebungen

J Engländer - Dissertation, RWTH Aachen …