Gary Steri
YOU?
Author Swipe
View article: Large Language Models for Cyber Threat Intelligence: Extracting MITRE With LLMs
Large Language Models for Cyber Threat Intelligence: Extracting MITRE With LLMs Open
Cyber Threat Intelligence (CTI) reports provide information about emerging and current cyber threats, and their analysis is key for adopting appropriate countermeasures. Reports are typically in the form of long texts from which cybersecur…
View article: A Review on the Application of Distributed Ledgers in the Evolution of Road Transport
A Review on the Application of Distributed Ledgers in the Evolution of Road Transport Open
In recent years, distributed ledger technologies (DLTs) and blockchain have become disruptive technologies to support distributed and trusted sharing ecosystems in various domains. Among the potential scenarios that can leverage their bene…
View article: Blockchain Performance Analysis for Supporting Cross-Border E-Government Services
Blockchain Performance Analysis for Supporting Cross-Border E-Government Services Open
With the continuous development of distributed ledger and blockchain technologies, new use cases apart from cryptocurrencies have come into the spotlight. In this article, we evaluate whether an e-government service could be a suitable can…
View article: Table of Contents
Table of Contents Open
This special issue of IEEE Security & Privacy explores future trends impacting cybersecurity policy.Dynamic trends are affecting the landscape of cybersecurity policy making.Whatever the driver of these changes new technologies, threat typ…
View article: Physical Layer Authentication and Identification of Wireless Devices Using the Synchrosqueezing Transform
Physical Layer Authentication and Identification of Wireless Devices Using the Synchrosqueezing Transform Open
This paper addresses the problem of authentication and identification of wireless devices using their physical properties derived from their Radio Frequency (RF) emissions. This technique is based on the concept that small differences in t…
View article: A Blockchain-based Approach for Data Accountability and Provenance Tracking
A Blockchain-based Approach for Data Accountability and Provenance Tracking Open
The recent approval of the General Data Protection Regulation (GDPR) imposes new data protection requirements on data controllers and processors with respect to the processing of European Union (EU) residents' data. This requirements consi…
View article: A Blockchain-based Approach for Data Accountability and Provenance\n Tracking
A Blockchain-based Approach for Data Accountability and Provenance\n Tracking Open
The recent approval of the General Data Protection Regulation (GDPR) imposes\nnew data protection requirements on data controllers and processors with\nrespect to the processing of European Union (EU) residents' data. These\nrequirements c…
View article: A Blockchain-based Approach for Data Accountability and Provenance Tracking
A Blockchain-based Approach for Data Accountability and Provenance Tracking Open
The recent approval of the General Data Protection Regulation (GDPR) imposes new data protection requirements on data controllers and processors with respect to the processing of European Union (EU) residents' data. These requirements cons…
View article: Identification of Mobile Phones Using the Built-In Magnetometers Stimulated by Motion Patterns
Identification of Mobile Phones Using the Built-In Magnetometers Stimulated by Motion Patterns Open
We investigate the identification of mobile phones through their built-in magnetometers. These electronic components have started to be widely deployed in mass market phones in recent years, and they can be exploited to uniquely identify m…
View article: Mobile phone identification through the built-in magnetometers
Mobile phone identification through the built-in magnetometers Open
Mobile phones identification through their built in components has been demonstrated in literature for various types of sensors including the camera, microphones and accelerometers. The identification is performed by the exploitation of th…
View article: A privacy enforcing framework for Android applications
A privacy enforcing framework for Android applications Open
The widespread adoption of the Android operating system in a variety type of devices ranging from smart phones to smart TVs, makes it an interesting target for developers of malevolent applications. In the current security model of Android…
View article: Experimental Identification of Smartphones Using Fingerprints of Built-In Micro-Electro Mechanical Systems (MEMS)
Experimental Identification of Smartphones Using Fingerprints of Built-In Micro-Electro Mechanical Systems (MEMS) Open
The correct identification of smartphones has various applications in the field of security or the fight against counterfeiting. As the level of sophistication in counterfeit electronics increases, detection procedures must become more acc…