scispace - formally typeset
Search or ask a question
Author

Tomáš Minárik

Bio: Tomáš Minárik is an academic researcher from NATO Cooperative Cyber Defence Centre of Excellence. The author has contributed to research in topics: European Union law & The Right to Privacy. The author has an hindex of 1, co-authored 1 publications receiving 13 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: The human rights connotations of the anonymity provided by Tor are explored, coming to the conclusion that this anonymity is an integral part of certain human rights, particularly the right to privacy and theright to freedom of expression.

15 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This study presents an integrated cloud incident handling and forensic‐by‐design model and demonstrates the utility of the model for organisational cloud users to undertake incident investigations (e.g. collect and analyse residual data from cloud storage applications).
Abstract: Summary Information security incident handling strategies or models are important to ensure the security of organisations, particularly in cloud and big data environments. However, existing strategies or models may not adequate as cloud data are generally virtualised, geographically distributed and ephemeral, presenting both technical and jurisdictional challenges. We present an integrated cloud incident handling and forensic-by-design model. We then seek to validate the model using a set of controlled experiments on a cloud-related incident. Three popular cloud storage applications were deployed namely, Dropbox, Google Drive, and OneDrive. This study demonstrates the utility of the model for organisational cloud users to undertake incident investigations (e.g. collect and analyse residual data from cloud storage applications). Copyright © 2016 John Wiley & Sons, Ltd.

91 citations

Dissertation
01 Jan 2019
TL;DR: The Europos deliktų teisės kontekste as mentioned in this paper, a group of Europos Teisių Teismo groups, has been formed to promote the development of the Eurovision Song Contest 2019.
Abstract: Disertacijoje, remiantis Europos Žmogaus Teisių Teismo nagrinėtose Delfi AS v. Estonia, MTE & Index v. Hungary, Pihl v. Sweden ir Tamiz v. the United Kingdom bylose suformuluotais interneto tinklalapių valdytojų saviraiskos laisvės ribojimo būtinumo demokratinėje visuomenėje vertinimo elementais, nustatyti ir įvertinti interneto tinklalapių valdytojų deliktinės civilinės atsakomybės už anoniminiais svetainės lankytojų komentarais tretiesiems asmenims sukeltą žalą, susijusią su jų teisės į privatų gyvenimą pažeidimais, taikymą pateisinantys kriterijai. Struktūralizmo koncepcija grindžiamoje pirmojoje darbo dalyje atskleidžiamas is EŽTK 10 straipsnio kylancios interneto tinklalapių valdytojų saviraiskos laisvės ir privataus gyvenimo kategorijos, kaip interneto tinklalapių valdytojų saviraiskos laisvės ribojimo prielaidos, turinys bei isskirti konkretūs interneto tinklalapių valdytojų civilinės atsakomybės už žalą, treciųjų asmenų patiriamą dėl jų teisės į privatų gyvenimą pažeidimo anoniminiais svetainių lankytojų komentarais, taikymą pateisinantys kriterijai. Antrojoje disertacijos dalyje, kuri grindžiama funkcionalizmo principu, kompleksinės minėtose Europos Žmogaus Teisių Teismo bylose priimtų sprendimų analizės pagrindu įvertintas kiekvieno kriterijaus turinys, palyginti jų turinio ir taikymo skirtingose bylose ypatumai, įvertinta sių kriterijų problematika ir reiksmė, taip pat nustatytas jų tarpusavio santykis. Tai yra pirmasis tokio pobūdžio mokslinis tyrimas ne tik Lietuvos, bet ir Europos deliktų teisės kontekste. Tyrimas parodė, kad kertiniai interneto tinklalapių valdytojų civilinės atsakomybės už žalą, kylancią tretiesiems asmenims dėl jų teisės į privatų gyvenimą pažeidimo anoniminiais svetainės lankytojų komentarais, taikymą pateisinantys kriterijai yra i) komentarų paskelbimo kontekstas ir pacių komentarų turinys bei ii) interneto tinklalapio valdytojo taikytos isankstinės komentarų teisėtumo užtikrinimo priemonės ir faktinis elgesys po komentarų paskelbimo. Tuo metu kiti Europos Žmogaus Teisių Teismo praktikoje isskiriami kriterijai (t. y. i) nukentėjusiojo asmens veiksmai iki ir po komentarų pasirodymo, ii) jam komentarų sukeltos pasekmės, iii) komentarų autorių atsakomybės galimybė kaip tam tikra alternatyva interneto tinklalapių valdytojų atsakomybei ir iv) civilinės atsakomybės taikymo pasekmės konkreciam interneto tinklalapio valdytojui) vertintini kaip papildomi ir neturintys esminės įtakos interneto svetainės valdytojų civilinės atsakomybės taikymo faktui, taciau reiksmingi sprendžiant dėl jų civilinės atsakomybės taikymo masto.

50 citations

Proceedings ArticleDOI
27 Nov 2020
TL;DR: DeepImage as mentioned in this paper uses feature selection to pick the most important features to create a gray image and feed it to a two-dimensional convolutional neural network to detect and characterize darknet traffic.
Abstract: Darknet traffic classification is significantly important to categorize real-time applications. Although there are notable efforts to classify darknet traffic which rely heavily on existing datasets and machine learning classifiers, there are extremely few efforts to detect and characterize darknet traffic using deep learning. This work proposes a novel approach, named DeepImage, which uses feature selection to pick the most important features to create a gray image and feed it to a two-dimensional convolutional neural network to detect and characterize darknet traffic. Two encrypted traffic datasets are merged to create a darknet dataset to evaluate the proposed approach which successfully characterizes darknet traffic with 86% accuracy.

44 citations

Journal ArticleDOI
TL;DR: In this paper, the authors argue that the reluctance of states to engage in international law-making has left a power vacuum, lending credence to claims that international law fails in addressing modern challenges posed by rapid technological development.
Abstract: Several indicators point to a crisis at the heart of the emerging area of international cyber security law. First, proposals for binding international treaties by leading stakeholders, including China and Russia, have been met with little enthusiasm by other states, and are generally seen as having limited prospects of success. Second, states are extremely reluctant to commit themselves to specific interpretations of controversial legal questions and thus to express their cyber opinio juris. Third, instead of interpreting or developing rules, state representatives seek refuge in the more ambiguous term ‘norms’. This article argues that the reluctance of states to engage in international law-making has left a power vacuum, lending credence to claims that international law fails in addressing modern challenges posed by rapid technological development. In response, several non-state-driven norm-making initiatives have sought to fill the void, including Microsoft's cyber norms proposals and the Tallinn Manual project. The article then contends that this emerging body of non-binding norms presents states with a critical window of opportunity to reclaim a central law-making position, similar to historical precedents including the development of legal regimes for Antarctica and nuclear safety. Whether the supposed crisis will lead to the demise of inter-state cyberspace governance or a recalibration of legal approaches will thus be decided in the near future. States should assume a central role if they want to ensure that the existing power vacuum is not exploited in a way that would upset their ability to achieve strategic and political goals.

33 citations

Journal ArticleDOI
TL;DR: It is argued that online anonymity should not be conceptualized in absolute terms but as an inherently fluid and transitional condition that characterizes any kind of social interaction online.
Abstract: Whenever we navigate the Web, we leave a trace through our IP address, which can in turn be used to establish our identity – for instance, by cross-checking it with a user’s Internet subscription. By using software such as VPN and Tor, however, it might be possible to avoid leaving such traces. A lively debate among policymakers, security professionals, hacker communities, and human rights associations has recently ensued regarding the question if such anonymity is acceptable and in which form. This article introduces the Crosscurrent special section dedicated to this topic by providing a brief overview of this debate and by pointing to the necessity of considering online anonymity from multiple, interrelated perspectives. By taking into account both technical and social dimensions, we argue that online anonymity should not be conceptualized in absolute terms but as an inherently fluid and transitional condition that characterizes any kind of social interaction online.

27 citations