Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Irena Bojanova is active.

Publication


Featured researches published by Irena Bojanova.


ieee symposium on security and privacy | 2016

Learning Internet-of-Things Security "Hands-On"

Constantinos Kolias; Angelos Stavrou; Jeffrey M. Voas; Irena Bojanova; D. Richard Kuhn

What can you glean from using inexpensive, off-the-shelf parts to create Internet of Things (IoT) use cases? As it turns out, a lot. The fast productization of IoT technologies is leaving users vulnerable to security and privacy risks.


It Professional | 2016

Cyber-Physical-Human Systems: Putting People in the Loop

Sulayman K. Sowe; Eric D. Simmon; Koji Zettsu; Frederic J. de Vaulx; Irena Bojanova

This article outlines the challenges of understanding how to integrate people into a new generation of cyber-physical-human systems (CPHSs) and proposes a human service capability description model to help.


2016 IEEE International Conference on Software Quality, Reliability and Security (QRS) | 2016

The Bugs Framework (BF): A Structured Approach to Express Bugs

Irena Bojanova; Paul E. Black; Yaacov Yesha; Yan Wu

To achieve higher levels of assurance for digital systems, we need to answer questions such as does this software have bugs of these critical classes? Do two software assurance tools find the same set of bugs or different, complimentary sets? Can we guarantee that a new technique discovers all problems of this type? To answer such questions, we need a vastly improved way to describe classes of vulnerabilities and chains of failures. We present the Bugs Framework (BF), which raises the current realm of best efforts and useful heuristics. Our BF includes rigorous definitions and (static) attributes of bug classes, along with their related dynamic properties, such as proximate, secondary and tertiary causes, consequences and sites. The paper discusses the buffer overflow class, the injection class and the control of interaction frequency class, and provides examples of applying our BF taxonomy to describe particular vulnerabilities.


ieee international conference on cloud computing technology and science | 2016

IEEE Transactions on Cloud Computing : Entering Its Fourth Year with Confidence

Irena Bojanova

WELCOME to the fourth year of IEEE Transactions on Cloud Computing (TCC). TCC is entering 2016 as an established, highly reputable, quarterly publication for innovative research and applications in cloud computing, and with a new Editor-in-Chief (EIC), who is promising to bring it to its next level of excellence. With great pleasure, I would like to introduce here Dr. Hui Lei, the newly appointed EIC, TCC.


It Professional | 2016

Defeating Buffer Overflow: A Trivial but Dangerous Bug

Paul E. Black; Irena Bojanova

With the C programming language comes buffer overflows. Because it is unlikely that the use of C will stop any time soon, the authors present some ways to deal with buffer overflows--both how to detect and prevent them.


It Professional | 2017

Trusting the Internet of Things

Irena Bojanova; Jeffrey M. Voas

The Internet of Things (IoT) appears to be the next great technology revolution. It is expected to affect everything from healthcare delivery, to food production, to how we work, to all forms of transportation and communication, and to automation. The IoT will impact everyone, and in multiple ways. With a technology revolution with such a large impact on society, it is imperative that IoT-based systems can be trusted. This special issue presents articles on security and privacy, authentication and authorization, and security risk assessment in the IoT.


computer software and applications conference | 2018

Randomness Classes in Bugs Framework (BF): True-Random Number Bugs (TRN) and Pseudo-Random Number Bugs (PRN)

Irena Bojanova; Yaacov Yesha; Paul E. Black


It Professional | 2018

IT Professional Enters its 20th Year with Confidence

Irena Bojanova


2017 IEEE 28th Annual Software Technology Conference (STC) | 2017

Cryptography classes in bugs framework (BF): Encryption bugs (ENC), verification bugs (VRF), and key management bugs (KMN)

Irena Bojanova; Paul E. Black; Yaacov Yesha


ieee international conference on cloud computing technology and science | 2016

1. Cloud Computing

San Murugesan; Irena Bojanova

Collaboration


Dive into the Irena Bojanova's collaboration.

Top Co-Authors

Avatar

Paul E. Black

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Yaacov Yesha

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Jeffrey M. Voas

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Eric D. Simmon

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Frederic J. de Vaulx

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Koji Zettsu

National Institute of Information and Communications Technology

View shared research outputs
Top Co-Authors

Avatar

Sulayman K. Sowe

National Institute of Information and Communications Technology

View shared research outputs
Top Co-Authors

Avatar

San Murugesan

University of Western Sydney

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge