Evolving Bitcoin Custody
JTG Swambo - arxiv preprint arxiv:2310.11911, 2023 - arxiv.org
The broad topic of this thesis is the design and analysis of Bitcoin custody systems. Both the
technology and threat landscape are evolving constantly. Therefore, custody systems …
technology and threat landscape are evolving constantly. Therefore, custody systems …
timeTree: How to Represent Time Sequence in a Threat Tree
Z Wu, J Hu, X Zhang, W Ren - 2022 IEEE 24th Int Conf on High …, 2022 - ieeexplore.ieee.org
Threat tree can be used as a tool to represent the threat conditions for certain risks. The
conditions are represented as children, and the resulting risk is represented as a father. The …
conditions are represented as children, and the resulting risk is represented as a father. The …
Risk framework for bitcoin custody operation with the revault protocol
J Swambo, A Poinsot - Financial Cryptography and Data Security. FC 2021 …, 2021 - Springer
Our contributions with this paper are twofold. First, we elucidate the methodological
requirements for a risk framework of custodial operations and argue for the value of this type …
requirements for a risk framework of custodial operations and argue for the value of this type …
Optimising a defence-aware threat modelling diagram incorporating a defence-in-depth approach for the internet-of-things
ML Godakanda - 2023 - ro.ecu.edu.au
Modern technology has proliferated into just about every aspect of life while improving the
quality of life. For instance, IoT technology has significantly improved over traditional …
quality of life. For instance, IoT technology has significantly improved over traditional …
Exploring the Viability of PageRank for Attack Graph Analysis and Defence Prioritization
M Dypbukt Källman - 2023 - diva-portal.org
In today's digital world, cybersecurity is becoming increasingly critical. Essential services
that we rely on every day such as finance, transportation, and healthcare all rely on complex …
that we rely on every day such as finance, transportation, and healthcare all rely on complex …
[PDF][PDF] Security Requirements and Risks Conceptualization
VTT Lead - pape.science
This document presents the research results on usable security and privacy, and on usability
of different security solutions, that were acquired in the context of Cyber Security for Europe …
of different security solutions, that were acquired in the context of Cyber Security for Europe …
Інформаційно-аналітична система оцінки ризиків інформаційної безпеки комп'ютерної мережі
КМ Загнітко - 2024 - elar.khmnu.edu.ua
Анотація Мета кваліфікаційної роботи полягає у створенні інформаційно-аналітичної
системи оцінки ризиків інформаційної безпеки комп'ютерної мережі. Для досягнення …
системи оцінки ризиків інформаційної безпеки комп'ютерної мережі. Для досягнення …
[CITATION][C] Gestaltungsmodell eines Informationssicherheits-managementsystems für produzierende Unternehmen in Industrie-4.0-Umgebungen
J Engländer - Dissertation, RWTH Aachen …