Journal ArticleDOI
Guidelines for Stego/Malware Detection Tools: Achieving GDPR Compliance
Reads0
Chats0
TLDR
The GDPR regulation is described in detail, the specific challenges that may arise when applying malware/stegomalware solutions are indicated, and several recommendations for ensuring compliance with the regulation are provided.Abstract:
Never before has cybersecurity been as significant for societies as today; its importance is still on the rise as people rely on computer systems every day. Recently, the ever-growing issues of personal data being stolen or misused have been addressed by several legal regulations, the most significant of them being the General Data Protection Regulation (GDPR). The paper deals with a specific cybersecurity measure, malware/stegomalware detection. This solution, which is meant to protect personal data from being used in a way that breaks the GDPR, has to be GDPR-compliant itself. This work describes the GDPR regulation in detail, indicates the specific challenges that may arise when applying malware/stegomalware solutions, and provides several recommendations for ensuring compliance with the regulation.read more
Citations
More filters
Journal ArticleDOI
A new method of hybrid time window embedding with transformer-based traffic data classification in IoT-networked environment
TL;DR: This paper proposes time window embedding solutions that efficiently process a massive amount of data and have a low-memory-footprint at the same time and formally evaluates various machine-learning schemes and discusses their effectiveness in the IoT-related context.
Journal ArticleDOI
A $10 million question and other cybersecurity-related ethical dilemmas amid the COVID-19 pandemic
TL;DR: In this article, the authors conducted a broad and comprehensive horizon-scanning study to identify the ethical issues that cybersecurity/cybercrime might bring about in the future, and presented the results of their horizon scanning study concerning the ethical dilemmas that emerged amid the COVID-19 pandemic.
Journal ArticleDOI
A survey on neural networks for (cyber-) security and (cyber-) security of neural networks
Journal ArticleDOI
First broad and systematic horizon scanning campaign and study to detect societal and ethical dilemmas and emerging issues spanning over cybersecurity solutions
TL;DR: In this paper, the authors present the results of a horizon scanning study aimed at identifying the ethical and human rights dilemmas that may arise in relation to cybersecurity and cybercrime; in the paper, the identified "weak signals" have been presented, that is, the ideas or concerns which are less obvious, not widely researched or present in the media.
Journal ArticleDOI
How to Effectively Collect and Process Network Data for Intrusion Detection
TL;DR: In this article, several feature selection techniques have been applied on five flow-based network intrusion detection datasets, establishing an informative flowbased feature set, and the results show that a set of 10 features and a small amount of data is enough for the final model to perform very well.
References
More filters
Book ChapterDOI
Consolidated Version of the Treaty on the Functioning of the European Union
TL;DR: The Treaty on the Functioning of the European Union (TFEU) as mentioned in this paper is a Treaty of Lisbon that was originally signed in Rome in 1957 as the Treaty establishing the European Economic Community (The Treaty of Rome) then becoming Treaty establishing European Community (TEC).
ARTICLE 29 Data Protection Working Party
TL;DR: In 2010, the European Data Protection Authorities (the Article 29 Working Party [WP29]) discussed the data protection and privacy implications of the Anti-Counterfeiting Trade Agreement (ACTA).
Journal ArticleDOI
Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions
TL;DR: This work reviews all controversies around the new stringent definitions of consent revocation and the right to be forgotten and argues that such enforcement is indeed feasible provided that implementation guidelines and low-level business specifications are put in place in a clear and cross-platform manner in order to cater for all possible exceptions and complexities.
Journal ArticleDOI
The rise of malware
TL;DR: The number of papers published by Asian countries such as China, Korea, India, Singapore and Malaysia in relation to the Middle East and North America is discussed and there are several significant impacts of research activities in Asia, in comparison to other continents.