In the past few years the security issues in the supervisory control and data acquisition (SCADA) system have been investigated, and many security mechanisms have been proposed fro...
An overview of the activities of the UNESCO Chair in Data Privacy is first given. One of these activities is research. We focus on the research conducted to conciliate security an...
Even though security requirements in health care are traditionally high, most computerized health care applications lack sophisticated security measures or focus only on single sec...
As network traffic increases, the problems associated with monitoring and analyzing the traffic on high speed networks become increasingly difficult. In this paper, we introduce a ...
Abstract—While log data are being increasingly used as digital evidence in judicial disputes, the extent to which existing secure logging protocols used to collect log data ful...