Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Computer networks – Security measures – Zimbabwe.

Zeitschriftenartikel zum Thema „Computer networks – Security measures – Zimbabwe“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Computer networks – Security measures – Zimbabwe" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Littlewood, Bev, Sarah Brocklehurst, Norman Fenton, Peter Mellor, Stella Page, David Wright, John Dobson, John McDermid und Dieter Gollmann. „Towards Operational Measures of Computer Security“. Journal of Computer Security 2, Nr. 2-3 (01.04.1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Klevtsov, O., A. Symonov und S. Trubchaninov. „Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment“. Nuclear and Radiation Safety, Nr. 4(88) (11.12.2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.

Der volle Inhalt der Quelle
Annotation:
The paper is devoted to the issues of computer security assessment of instrumentation and control systems (I&C systems) of nuclear power plants (NPPs). The authors specified the main areas of assessing the computer security of NPP I&C systems, especially the assessment of cyber threats, vulnerabilities of I&C computer security, sufficiency of applied measures for ensuring I&C systems computer security, risks of I&C system computer security as well as periodic reassessment of I&C computer security. The paper considers the assessment of I&C computer security vulnerabilities, sufficiency of applied measures for ensuring I&C computer security (assessment of cyber threats and the risks of I&C computer security are discussed in detail in other publications from the series “Computer Security of NPP Instrumentation and Control Systems”). Approaches to assessing the computer security vulnerabilities of I&C systems and software at each stage of I&C life cycle are considered. The recommendations for assessing vulnerabilities regarding technical and software protection against unauthorized access or connection to I&C, protection of local networks, implementation of organizational measures and procedures for computer security are provided. The paper describes the scope and procedures for the initial assessment and periodic reassessment of NPP I&C computer security. Recommendations for the formation of an appropriate evaluation team are provided. Methods of assessing I&C computer security are considered, namely: analysis of documents (computer security policy, program, plan, reports, etc.), survey of staff (administrative, operational, service and computer security experts), direct review of I&C systems, their components and local networks. The evaluation stages (collection of information, detailed analysis, reporting) and the scope of work at each stage are described. General information about the possibility and necessity of assessing the computer security risks of I&C systems in the case of using risk-informed approaches is provided. The need to document the results of the assessment is noted separately and specific proposals about the procedure for developing relevant reports are made.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Courtney, Robert H. „Security Measures are Inherently Undesirable“. EDPACS 13, Nr. 9 (März 1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Zhang, Wen Jie. „Network Security Vulnerabilities and Preventive Measures“. Applied Mechanics and Materials 433-435 (Oktober 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.

Der volle Inhalt der Quelle
Annotation:
As the arrival times network economy and social networks, computers and computer networks popularity indicates that a ubiquitous network will go into not the state. As the use of network and the virus has become increasingly serious, virus writers from the original to show off to obtain invalid income, the resulting harm is incalculable. This situation not only jeopardize the current development of the Internet but also undermined the reality of social stability and unity, therefore, this paper is on how the network vulnerabilities, how to survive and how to protection, so that there are loopholes in our network deeper understanding of network vulnerability and protection so that we have a new breakthrough for the network to provide a good environment for development.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Guo, Wen Zhan. „Research on Computer Wireless Network and Information Security“. Applied Mechanics and Materials 416-417 (September 2013): 1450–53. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1450.

Der volle Inhalt der Quelle
Annotation:
with the rapid development and wide application of wireless networking technology, Information security issues are increasingly prominent manifested by more and more attention. The article describes the schema of the data monitoring platform separate from the data layer, network layer and presentation layer three levels,focuses on platform of intelligent back-end database structure, and proposed specific measures to ensure platform security,to ensure the information security of computer networks, so as to give full play role of computer networks.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Smith, Martin. „Part 2 Personnel security measures within a computer installation“. Computer Law & Security Review 6, Nr. 2 (Juli 1990): 23–26. http://dx.doi.org/10.1016/0267-3649(90)90109-o.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Alfonsi, B. J. „Hacker study: aiding security measures development?“ IEEE Security & Privacy 1, Nr. 6 (November 2003): 11. http://dx.doi.org/10.1109/msecp.2003.1253562.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Mtengwa, Bonnie Batsirai, Agripah Kandiero und Stanislas Bigirimana. „Drivers of Mobile Money Services Development in Zimbabwe“. International Journal of E-Business Research 17, Nr. 1 (Januar 2021): 42–64. http://dx.doi.org/10.4018/ijebr.2021010104.

Der volle Inhalt der Quelle
Annotation:
This study sought to identify the drivers of mobile money services development in Zimbabwe using Ecocash as a case study. Through purposive sampling, respondents were selected from financial institutions, regulatory bodies, customers, and agents. The research showed that in Zimbabwe the development of mobile money services is influenced by several factors such as a high mobile telephone penetration rate, a high number of unbanked people owing to poor access to traditional banking services, a lower level of internet penetration levels, customer awareness of the service because of aggressive branding, security and ease of use, and a dense networks of agents. Fast technology diffusion was also a factor that influenced the fast adoption of mobile money services in Zimbabwe. More research is needed to assess the impediments in countries where the adoption of mobile money services has not been as spectacular as in Zimbabwe or Kenya.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Zhang, Kai, Liang Zhao und Hai Qing Cao. „Research on the Computer Network Crime and Information Security“. Applied Mechanics and Materials 687-691 (November 2014): 1806–9. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1806.

Der volle Inhalt der Quelle
Annotation:
Network not only brings people convenience, but also becomes a hotbed for breeding crime. And it not only brings people efficiency, but also opens a new criminal platform for the computer network criminals. This paper analyzes the performance form and main features of computer networks crime and proposes several control measures based on their form and features.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Kounavis, Michael, David Durham, Sergej Deutsch und Ken Grewal. „Security definitions, entropy measures and constructions for implicitly detecting data corruption“. Computer Communications 160 (Juli 2020): 815–46. http://dx.doi.org/10.1016/j.comcom.2020.05.022.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Hewitt, Barbara, und Garry White. „Factors Influencing Security Incidents on Personal Computing Devices“. Journal of Organizational and End User Computing 33, Nr. 4 (Juli 2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.

Der volle Inhalt der Quelle
Annotation:
Organizations expect their employees to connect securely to the organization's computer systems. Often these employees use their personal computers to access the organization's networks. This research explores whether these same employees apply protective security measures to their personal computers. Perhaps these employees behave riskily based on their optimistic bias. Results indicate that while cyber optimistic bias and perceived vulnerability influence individuals to apply more protective security measures, the users still experienced security incidents. Thus, organization are vulnerable to cyber-attacks if they are allowing employees to use personal computers to access these databases.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Mo, Xin Ju. „Study on Information Security of Network-Based Manufacturing Environment“. Applied Mechanics and Materials 484-485 (Januar 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.493.

Der volle Inhalt der Quelle
Annotation:
with the rapid development and wide application of networking technology, information security increasingly prominent problems are evident, more and more attention. The article introduced the current situation of network information security, explored the meaning of network information security, major threat analysis network information security, and finally gives the implementation technology of network information security and preventive measures, to ensure the information security of computer networks, so as to give full play to role of computer networks.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Peng, Yu, Xinrong Liu, Ming Li, Zheng Li, Tao Hu, Yangjun Xiao, Sheng Zhang et al. „Sensing network security prevention measures of BIM smart operation and maintenance system“. Computer Communications 161 (September 2020): 360–67. http://dx.doi.org/10.1016/j.comcom.2020.07.039.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Heinrich, Markus, Tsvetoslava Vateva-Gurova, Tolga Arul, Stefan Katzenbeisser, Neeraj Suri, Henk Birkholz, Andreas Fuchs et al. „Security Requirements Engineering in Safety-Critical Railway Signalling Networks“. Security and Communication Networks 2019 (14.07.2019): 1–14. http://dx.doi.org/10.1155/2019/8348925.

Der volle Inhalt der Quelle
Annotation:
Securing a safety-critical system is a challenging task, because safety requirements have to be considered alongside security controls. We report on our experience to develop a security architecture for railway signalling systems starting from the bare safety-critical system that requires protection. We use a threat-based approach to determine security risk acceptance criteria and derive security requirements. We discuss the executed process and make suggestions for improvements. Based on the security requirements, we develop a security architecture. The architecture is based on a hardware platform that provides the resources required for safety as well as security applications and is able to run these applications of mixed-criticality (safety-critical applications and other applications run on the same device). To achieve this, we apply the MILS approach, a separation-based high-assurance security architecture to simplify the safety case and security case of our approach. We describe the assurance requirements of the separation kernel subcomponent, which represents the key component of the MILS architecture. We further discuss the security measures of our architecture that are included to protect the safety-critical application from cyberattacks.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Franchi, Enrico, Agostino Poggi und Michele Tomaiuolo. „Information Attacks on Online Social Networks“. Journal of Information Technology Research 7, Nr. 3 (Juli 2014): 54–71. http://dx.doi.org/10.4018/jitr.2014070104.

Der volle Inhalt der Quelle
Annotation:
Online social networks have changed the way people interact, allowing them to stay in touch with their acquaintances, reconnect with old friends, and establish new relationships with other people based on hobbies, interests, and friendship circles. Unfortunately, the regrettable concurrence of the users' carefree attitude in sharing information, the often sub-par security measures from the part of the system operators and, eventually, the high value of the published information make online social networks an interesting target for crackers and scammers alike. The information contained can be used to trigger attacks to even more sensible targets and the ultimate goal of sociability shared by the users allows sophisticated forms of social engineering inside the system. This work reviews some typical social attacks that are conducted on social networking systems, carrying real-world examples of such violations and analysing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Franchi, Enrico, Agostino Poggi und Michele Tomaiuolo. „Information and Password Attacks on Social Networks“. Journal of Information Technology Research 8, Nr. 1 (Januar 2015): 25–42. http://dx.doi.org/10.4018/jitr.2015010103.

Der volle Inhalt der Quelle
Annotation:
Online social networks have changed the way people interact, allowing them to stay in touch with their acquaintances, reconnect with old friends, and establish new relationships with other people based on hobbies, interests, and friendship circles. Unfortunately, the regrettable concurrence of the users' carefree attitude in sharing information, the often sub-par security measures from the part of the system operators and, eventually, the high value of the published information make online social networks an interesting target for crackers and scammers alike. The information contained can be used to trigger attacks to even more sensible targets and the ultimate goal of sociability shared by the users allows sophisticated forms of social engineering inside the system. This work reviews some typical social attacks that are conducted on social networking systems, carrying real-world examples of such violations and analysing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Sheela, D., und G. Mahadevan. „Mobile Agent Based Enhanced Security for Wireless Sensor Networks“. International Journal of Business Data Communications and Networking 10, Nr. 2 (April 2014): 15–29. http://dx.doi.org/10.4018/ijbdcn.2014040102.

Der volle Inhalt der Quelle
Annotation:
Wireless sensor networks (WSNs) have attracted a lot of researchers due to their high potential in critical applications. WSNs are currently being employed in a variety of applications ranging from medical to military, and from home to industry. WSNs have unique constraints as compared to traditional networks making the implementation of existing security measures not practicable. These constraints are the result of limitations regarding the sensor nodes' memory, energy and transmission and processing power. So, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Thus, design and implementation of secure WSNs is challenging task. Recently mobile agents have been proved as an enabled technology for programming WSN. This research work fundamentally focuses on producing a combined security solution which uses mobile agents. The proposed security solution using mobile agents is to provide basic security services and to defend against seven attacks such as Denial of Service attack, Hello flooding attack, Traffic analysis, Cloning attack, Sink hole attack, Black hole attack and Selective forwarding attack with the energy overhead of addressing a single attack.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Ouyang, Chun-Juan, Ming Leng, Jie-Wu Xia und Huan Liu. „Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model“. Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/1790268.

Der volle Inhalt der Quelle
Annotation:
Security measure is of great importance in both steganography and steganalysis. Considering that statistical feature perturbations caused by steganography in an image are always nondeterministic and that an image is considered nonstationary, in this paper, the steganography is regarded as a fuzzy process. Here a steganographic security measure is proposed. This security measure evaluates the similarity between two vague sets of cover images and stego images in terms of n-order Markov chain to capture the interpixel correlation. The new security measure has proven to have the properties of boundedness, commutativity, and unity. Furthermore, the security measures of zero order, first order, second order, third order, and so forth are obtained by adjusting the order value of n-order Markov chain. Experimental results indicate that the larger n is, the better the measuring ability of the proposed security measure will be. The proposed security measure is more sensitive than other security measures defined under a deterministic distribution model, when the embedding is low. It is expected to provide a helpful guidance for designing secure steganographic algorithms or reliable steganalytic methods.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Nazir, Sajid, Shushma Patel und Dilip Patel. „Autonomic Computing Architecture for SCADA Cyber Security“. International Journal of Cognitive Informatics and Natural Intelligence 11, Nr. 4 (Oktober 2017): 66–79. http://dx.doi.org/10.4018/ijcini.2017100104.

Der volle Inhalt der Quelle
Annotation:
Autonomic computing paradigm is based on intelligent computing systems that can autonomously take actions under given conditions. These technologies have been successfully applied to many problem domains requiring autonomous operation. One such area of national interest is SCADA systems that monitor critical infrastructures such as transportation networks, large manufacturing, business and health facilities, power generation, and distribution networks. The SCADA systems have evolved into a complex, highly connected system requiring high availability. On the other hand, cyber threats to these infrastructures have increasingly become more sophisticated, extensive and numerous. This highlights the need for newer measures that can proactively and autonomously react to an impending threat. This article proposes a SCADA system framework to leverage autonomic computing elements in the architecture for coping with the current challenges and threats of cyber security.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Liu, Rosina. „Is Security, is Audit, and Control Measures in Telecommunication Toll Fraud“. EDPACS 25, Nr. 3 (September 1997): 1–11. http://dx.doi.org/10.1080/07366989709452320.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Zhu, Qingyi, und Chen Cen. „A Novel Computer Virus Propagation Model under Security Classification“. Discrete Dynamics in Nature and Society 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/8609082.

Der volle Inhalt der Quelle
Annotation:
In reality, some computers have specific security classification. For the sake of safety and cost, the security level of computers will be upgraded with increasing of threats in networks. Here we assume that there exists a threshold value which determines when countermeasures should be taken to level up the security of a fraction of computers with low security level. And in some specific realistic environments the propagation network can be regarded as fully interconnected. Inspired by these facts, this paper presents a novel computer virus dynamics model considering the impact brought by security classification in full interconnection network. By using the theory of dynamic stability, the existence of equilibria and stability conditions is analysed and proved. And the above optimal threshold value is given analytically. Then, some numerical experiments are made to justify the model. Besides, some discussions and antivirus measures are given.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Feng, Liping, Ruifeng Han, Hongbin Wang, Qingshan Zhao, Chengli Fu und Qi Han. „A Virus Propagation Model and Optimal Control Strategy in the Point-to-Group Network to Information Security Investment“. Complexity 2021 (03.06.2021): 1–7. http://dx.doi.org/10.1155/2021/6612451.

Der volle Inhalt der Quelle
Annotation:
Epidemiological dynamics is a vital method in studying the spread of computer network viruses. In this paper, an optimal control measure is proposed based on the SEIR virus propagation model in point-to-group information networks. First, considering the need for antivirus measures in reality, an optimal control problem is introduced, and then a controlled computer virus spread model in point-to-group information networks is established. Second, the optimal control measure is formulated by making a tradeoff between control cost and network loss caused by virus intrusion. Third, optimal control strategies are theoretically investigated by Pontryagin’s maximum principle and the Hamiltonian function. Finally, through numerical simulations, effective measures for controlling virus spread in point-to-group information networks are proposed.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Samreen, Shirina. „Packet Dropping Counter Measures in a MANET Through Reliable Routing Protocol Leveraging a Trust Management Framework“. International Journal of Mobile Computing and Multimedia Communications 9, Nr. 3 (Juli 2018): 60–75. http://dx.doi.org/10.4018/ijmcmc.2018070104.

Der volle Inhalt der Quelle
Annotation:
The applications of a mobile ad hoc network (MANET) range from military and disaster response to commercial and civilian environments. The intrinsic characteristics like lack of infrastructure, self-organizing nature and deployment flexibility contributes to its usefulness but few other features like open media for communication and topological changes on-the-fly makes it vulnerable to security attacks. The focus of the current work is security mechanisms for a MANET against the various insider attacks targeting the data forwarding operations. It is accomplished through a trust management framework and a secure routing protocol relying upon the TMF to form the routes with most trusted nodes. The protocol computes a novel reliability metric termed as Path Allegiance metric (PAM) which acts as a selection criteria for route selection. The performance evaluation involves simulation results which prove the robustness of the proposed TMF and the effectiveness of the PAM routing protocol in reliable data delivery in the presence of packet droppers which disrupt the data transmission.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Das, Amit, und Habib Ullah Khan. „Security behaviors of smartphone users“. Information & Computer Security 24, Nr. 1 (14.03.2016): 116–34. http://dx.doi.org/10.1108/ics-04-2015-0018.

Der volle Inhalt der Quelle
Annotation:
Purpose – This paper aims to report on the information security behaviors of smartphone users in an affluent economy of the Middle East. Design/methodology/approach – A model based on prior research, synthesized from a thorough literature review, is tested using survey data from 500 smartphone users representing three major mobile operating systems. Findings – The overall level of security behaviors is low. Regression coefficients indicate that the efficacy of security measures and the cost of adopting them are the main factors influencing smartphone security behaviors. At present, smartphone users are more worried about malware and data leakage than targeted information theft. Research limitations/implications – Threats and counter-measures co-evolve over time, and our findings, which describe the state of smartphone security at the current time, will need to be updated in the future. Practical implications – Measures to improve security practices of smartphone users are needed urgently. The findings indicate that such measures should be broadly effective and relatively costless for users to implement. Social implications – Personal smartphones are joining enterprise networks through the acceptance of Bring-Your-Own-Device computing. Users’ laxity about smartphone security thus puts organizations at risk. Originality/value – The paper highlights the key factors influencing smartphone security and compares the situation for the three leading operating systems in the smartphone market.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Safavi-Naini, Reihaneh, Alireza Poostindouz und Viliam Lisy. „Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication“. Security and Communication Networks 2018 (07.05.2018): 1–15. http://dx.doi.org/10.1155/2018/8475818.

Der volle Inhalt der Quelle
Annotation:
Moving target defense (MTD) strategies have been widely studied for securing computer systems. We consider using MTD strategies to provide long-term cryptographic security for message transmission against an eavesdropping adversary who has access to a quantum computer. In such a setting, today’s widely used cryptographic systems including Diffie-Hellman key agreement protocol and RSA cryptosystem will be insecure and alternative solutions are needed. We will use a physical assumption, existence of multiple communication paths between the sender and the receiver, as the basis of security, and propose a cryptographic system that uses this assumption and an MTD strategy to guarantee efficient long-term information theoretic security even when only a single path is not eavesdropped. Following the approach of Maleki et al., we model the system using a Markov chain, derive its transition probabilities, propose two security measures, and prove results that show how to calculate these measures using transition probabilities. We define two types of attackers that we call risk-taking and risk-averse and compute our proposed measures for the two types of adversaries for a concrete MTD strategy. We will use numerical analysis to study tradeoffs between system parameters, discuss our results, and propose directions for future research.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Safi, Roozmehr, Glenn J. Browne und Azadeh Jalali Naini. „Mis-spending on information security measures: Theory and experimental evidence“. International Journal of Information Management 57 (April 2021): 102291. http://dx.doi.org/10.1016/j.ijinfomgt.2020.102291.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Liang, Jiaqi, Yibei Wu, Jun’e Li, Xiong Chen, Heqin Tong und Ming Ni. „Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks“. Complexity 2021 (19.02.2021): 1–12. http://dx.doi.org/10.1155/2021/6659879.

Der volle Inhalt der Quelle
Annotation:
With the development of distributed networks, the remote controllability of the distributed energy objects and the vulnerability of user-side information security protection measures make distributed energy objects extremely vulnerable to malicious control by attackers. Hence, the large-scale loads may produce abnormal operation performance, such as load casting/dropping synchronously or frequent and synchronous casting and dropping, and hence, it can threaten the security and stable operation of the distribution networks. First, we analyze the security threats faced by industrial controllable load, civil controllable load, and the gains and losses of attacks on the distribution networks. Considering the factors of cyber attacks, we propose a control model and cyber attack model in active distribution networks (ADNs). And, three types of attacks that the target suffered are defined on the basis of “on” and “off” modes for control. Then, the controllable load was maliciously controlled as the research object, and a suitable scenario is selected. The impact of malicious control of the controllable load on the power supply reliability and power quality of the distribution networks are simulated and analyzed, and risk consequences for different types of attacks are provided.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

A. D., Azernikov, Norkina A. N., Myseva E. R. und Chicherov K. A. „Innovative Technologies in Combating Cyber Crime“. KnE Social Sciences 3, Nr. 2 (15.02.2018): 248. http://dx.doi.org/10.18502/kss.v3i2.1550.

Der volle Inhalt der Quelle
Annotation:
So far, development and enhancement of global communication networks, distribution of software, and upgrading of computer systems are accompanied by the evolution of criminal environment, with the latter evolving not only within one particular nation but throughout the international community. New opportunities in cyber crime translate into new threats for global information networks and community as a whole, which in terms of preventing and combating cyber crime requires substantial strengthening of information security measures and an approach that is completely different from that applied to combating common crime. The article presents innovative technologies in combating cyber crime and an ever-increasing significance of information security as a system of protecting private, public and state interests. Keywords: cyber crime, cyber security, Internet, information security, innovative technologies, computer systems, information technologies (IT), cyber threats, cyber space.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Sharma, Tanusree, Hunter A. Dyer und Masooda Bashir. „Enabling User-centered Privacy Controls for Mobile Applications“. ACM Transactions on Internet Technology 21, Nr. 1 (Februar 2021): 1–24. http://dx.doi.org/10.1145/3434777.

Der volle Inhalt der Quelle
Annotation:
Mobile apps have transformed many aspects of clinical practice and are becoming a commonplace in healthcare settings. The recent COVID-19 pandemic has provided the opportunity for such apps to play an important role in reducing the spread of the virus. Several types of COVID-19 apps have enabled healthcare professionals and governments to communicate with the public regarding the pandemic spread, coronavirus awareness, and self-quarantine measures. While these apps provide immense benefits for the containment of the spread, privacy and security of these digital tracing apps are at the center of public debate. To address this gap, we conducted an online survey of a midwestern region in the United State to assess people’s attitudes toward such apps and to examine their privacy and security concerns and preferences. Survey results from 1,550 participants indicate that privacy/security protections and trust play a vital role in people’s adoption of such apps. Furthermore, results reflect users’ preferences wanting to have control over their personal information and transparency on how their data is handled. In addition, personal data protection priorities selected by the participants were surprising and yet revealing of the disconnect between technologists and users. In this article, we present our detailed survey results as well as design guidelines for app developers to develop innovative human-centered technologies that are not only functional but also respectful of social norms and protections of civil liberties. Our study examines users’ preferences for COVID-19 apps and integrates important factors of trust, willingness, and preferences in the context of app development. Through our research findings, we suggest mechanisms for designing inclusive apps’ privacy and security measures that can be put into practice for healthcare-related apps, so that timely adoption is made possible.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Shabbir, Aysha, Maryam Shabbir, Muhammad Rizwan und Fahad Ahmad. „Ensuring the Confidentiality of Nuclear Information at Cloud Using Modular Encryption Standard“. Security and Communication Networks 2019 (18.12.2019): 1–16. http://dx.doi.org/10.1155/2019/2509898.

Der volle Inhalt der Quelle
Annotation:
Lifeblood of every organization is its confidential information. The accentuation on cybersecurity has expanded considerably in the course of the last few years because of the expanded number in attacks at the individual and organization and even at the state level. One specific zone of consideration is the assurance of the security of nuclear information. This may relate to both Instrumentation and Control (I&C) and Information Technology (IT). The present security measures are insufficient for nuclear information because of their lack of identification, classification, and securing measures (because of their multifaceted nature). With the increasing trends of data storage and management with the assistance of cloud, data confidentiality threats are immensely increasing. As there is no such safeguard that can make our systems a hundred percent secure, the best approach is to provide security at distinct layers. The basic purpose of layered security is to have the benefit that if one layer fails or compromised, the other layer compensates or maintains that confidentiality with the access control in the owner’s hand. In this paper, we have proposed a multilevel approach with protection-based computing by using Modular Encryption Standard (MES). We proposed a cloud framework as well to further enhance its security by utilizing a multicloud and modular approach. By performing simulations, the obtained results depicted that our proposed scheme works efficiently than other commonly used schemes.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Ahmad, Bilal, Wang Jian und Zain Anwar Ali. „Role of Machine Learning and Data Mining in Internet Security: Standing State with Future Directions“. Journal of Computer Networks and Communications 2018 (02.07.2018): 1–10. http://dx.doi.org/10.1155/2018/6383145.

Der volle Inhalt der Quelle
Annotation:
As time progresses with vast development of information technology, a large number of industries are more dependent on network connections for sensitive business trading and security matters. Communications and networks are highly vulnerable to threats because of increase in hacking. Personnel, governments, and armed classified networks are more exposed to difficulties, so the need of the hour is to install safety measures for network to prevent illegal modification, damage, or leakage of serious information. Intrusion detection, an important entity towards network security, has the ability to observe network activity as well as detect intrusions/attacks. This study highlights the developing research about the application of machine learning and data mining in Internet security. We provide background, enthusiasm, discussion of challenges, and recommendations for the application of ML/DM in the field of intrusion detection.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Iqbal, Sohail, Shahzad Farooq, Khuram Shahzad, Asad Waqar Malik, Mian M. Hamayun und Osman Hasan. „SecureSurgiNET: A framework for ensuring security in telesurgery“. International Journal of Distributed Sensor Networks 15, Nr. 9 (September 2019): 155014771987381. http://dx.doi.org/10.1177/1550147719873811.

Der volle Inhalt der Quelle
Annotation:
The notion of surgical robotics is actively being extended to enable telesurgery, where both the surgeon and patient are remotely located and connected via a public network, which leads to many security risks. Being a safety-critical application, it is highly important to make telesurgery robust and secure against active and passive attacks. In this article, we propose the first complete framework, called SecureSurgiNET, for ensuring security in telesurgery environments. SecureSurgiNET is primarily based on a set of well-established protocols to provide a fool-proof telesurgical robotic system. For increasing the efficiency of secured telesurgery environments, the idea of a telesurgical authority is introduced that ensures the integrity, identity management, authentication policy implementation, and postoperative data security. An analysis is provided describing the security and throughput of Advanced Encryption Standard during the intraoperative phase of SecureSurgiNET. Moreover, we have tabulated the possible attacks on SecureSurgiNET along with the devised defensive measures. Finally, we also present a time complexity analysis of the SecureSurgiNET through simulations.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Niveditha, V. R., D. Usha, P. S. Rajakumar, B. Dwarakanath und Magesh S. „Emerging 5G IoT Smart System Based on Edge-to-Cloud Computing Platform“. International Journal of e-Collaboration 17, Nr. 4 (Oktober 2021): 122–31. http://dx.doi.org/10.4018/ijec.2021100109.

Der volle Inhalt der Quelle
Annotation:
Security over internet communication has now become difficult as technology is increasingly more effective and faster, particularly in resource limited devices such as wireless sensors, embedded devices, internet of things (IoT), radio frequency identification (RFID) tags, etc. However, IoT is expected to connect billions of computers as a hopeful technology for the future. Hence, security, privacy, and authentication services must protect the communication in IoT. There are several recent considerations, such as restricted computing capacity, register width, RAM size, specific operating environment, ROM size, etc. that have compelled IoT to utilize conventional measures of security. These technologies require greater data speeds, high throughput, expanded power, lower bandwidth, and high efficiency. In addition, IoT has transformed the world in light of these new ideas by offering smooth communication between heterogeneous networks (HetNets).
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Tang, Zhenjun, Shaopeng Zhang, Zhenhai Chen und Xianquan Zhang. „Robust Video Hashing Based on Multidimensional Scaling and Ordinal Measures“. Security and Communication Networks 2021 (30.04.2021): 1–11. http://dx.doi.org/10.1155/2021/9930673.

Der volle Inhalt der Quelle
Annotation:
Multimedia hashing is a useful technology of multimedia management, e.g., multimedia search and multimedia security. This paper proposes a robust multimedia hashing for processing videos. The proposed video hashing constructs a high-dimensional matrix via gradient features in the discrete wavelet transform (DWT) domain of preprocessed video, learns low-dimensional features from high-dimensional matrix via multidimensional scaling, and calculates video hash by ordinal measures of the learned low-dimensional features. Extensive experiments on 8300 videos are performed to examine the proposed video hashing. Performance comparisons reveal that the proposed scheme is better than several state-of-the-art schemes in balancing the performances of robustness and discrimination.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Zurek, Tomasz, Michail Mokkas und Bogdan Ksiezopolski. „On the Modelling of Context-Aware Security for Mobile Devices“. Mobile Information Systems 2016 (2016): 1–16. http://dx.doi.org/10.1155/2016/8743504.

Der volle Inhalt der Quelle
Annotation:
Security management in wireless networks has to deal with the changing character of the environment, which can further lead to decision making problem for unexpected events. Among a huge list of devices, the mobile ones are especially vulnerable to this situation. The solution for adapting systems and applications to dynamic environments can be context-aware description of the user actions, which gives a possibility to take into account the factors that influence these actions. In the article, we propose a context-aware security adjusting model, which is based on proposition logic and incorporates mechanisms that assist in the reasoning process. The main benefits that differentiate our approach from similar ones are a formal representation of the model, the usage of the whole spectrum of context attributes, the detection and analysis of contextual data integrity, and conflicting rules’ eradication capability. All these traits transcribe into a more effective way of adjusting security measures in accordance with existing circumstances. To illustrate the proposed approach, we present the case study of context-aware security management for mobile devices.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Sheikh, Muhammad Sameer, und Jun Liang. „A Comprehensive Survey on VANET Security Services in Traffic Management System“. Wireless Communications and Mobile Computing 2019 (15.09.2019): 1–23. http://dx.doi.org/10.1155/2019/2423915.

Der volle Inhalt der Quelle
Annotation:
Recently, vehicular ad hoc networks (VANETs) embark a great deal of attention in the area of wireless and communication technology and are becoming one of the prominent research areas in the intelligent transportation system (ITS) because they provide safety and precautionary measures to the drivers and passengers, respectively. VANETs are quite different from the mobile ad hoc networks (MANETs) in terms of characteristics, challenges, system architecture, and their application. In this paper, we summarize the recent state-of-the-art methods of VANETs by discussing their architecture, security, and challenges. Secondly, we discuss the detailed analysis of security schemes and the possible measures to provide secure communication in VANETs. Then, we comprehensively cover the authentication schemes, which is able to protect the vehicular network from malicious nodes and fake messages. Thus, it provides security in VANETs. Thirdly, we cover the mobility and network simulators, as well as other simulation tools, followed by the performance of authentication schemes. Finally, we discuss the comfort and safety applications of VANETs. In sum, this paper comprehensively covers the entire VANET system and its applications by filling the gaps of existing surveys and incorporating the latest trends in VANETs.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Qadri, Yazdan Ahmad, Rashid Ali, Arslan Musaddiq, Fadi Al-Turjman, Dae Wan Kim und Sung Won Kim. „The limitations in the state-of-the-art counter-measures against the security threats in H-IoT“. Cluster Computing 23, Nr. 3 (01.01.2020): 2047–65. http://dx.doi.org/10.1007/s10586-019-03036-7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Aziz, Israa T., und Ihsan H. Abdulqadder. „An Overview on SDN and NFV Security Orchestration in Cloud Network Environment“. Cihan University-Erbil Scientific Journal 5, Nr. 1 (20.06.2021): 20–27. http://dx.doi.org/10.24086/cuesj.v5n1y2021.pp20-27.

Der volle Inhalt der Quelle
Annotation:
Cloud networks are being used in most industries and applications in the current era. Software-defined networking has come up as an alternative tool and mechanism to follow and implement in a cloud networking environment in place of the traditional networking approaches. This paper includes the security aspects of computer networking concerning the cloud networking environment and software-defined networks. The security risks and vulnerabilities have been listed and described in this work, and the measures that may be adapted to detect, prevent, and control the same. The use of figures, diagrams, and codes has been done as applicable.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Rietz, René, Radoslaw Cwalinski, Hartmut König und Andreas Brinner. „An SDN-Based Approach to Ward Off LAN Attacks“. Journal of Computer Networks and Communications 2018 (21.11.2018): 1–12. http://dx.doi.org/10.1155/2018/4127487.

Der volle Inhalt der Quelle
Annotation:
The detection of attacks on large administrative network domains is nowadays generally accomplished centrally by analyzing the data traffic on the uplink to the Internet. The first phase of an infection is usually difficult to observe. Often attackers use e-mail attachments or external media, such as USB sticks, hardware with preinstalled malware, or contaminated mobile devices to infect target systems. In such scenarios, the initial infection cannot be blocked at the network level. The lateral movement of attack programs (exploits) through internal networks and the exfiltration of data, however, which are the main purpose of targeted attacks, run always over the network. Security measures against such internal network attacks require a comprehensive monitoring concept that spans the entire network to its edge. Especially for preventive measures, this means providing a security concept for local area networks (LANs). In this paper, we propose based on an analysis of typical LAN-based attacks an approach for preventing these attacks for both IPv4 and IPv6 networks. It applies the software-defined networking (SDN) paradigm for centralizing the related network decisions in a central authority—the SDN controller—that manages all network connections and hence the associated data flows.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Roy Sarkar, Kuheli. „Assessing insider threats to information security using technical, behavioural and organisational measures“. Information Security Technical Report 15, Nr. 3 (August 2010): 112–33. http://dx.doi.org/10.1016/j.istr.2010.11.002.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Tosun, Nilgün. „Social Networks as a Learning and Teaching Environment and Security in Social Networks“. Journal of Education and Training Studies 6, Nr. 11a (29.11.2018): 194. http://dx.doi.org/10.11114/jets.v6i11a.3817.

Der volle Inhalt der Quelle
Annotation:
Technology is in a constantly evolving and changing structure since the existence of mankind. Because of this dynamic structure, technology fulfills a number of functions such as facilitating people's lives, time, profit from work, profit from cost, making life more enjoyable. At the same time, technology is used in all areas of life, and it also causes changes and transformations in these areas. Education is one of these areas, perhaps the most important, that technology affects. The hunter society, written with nails, made an important step with the paper's invention, and the written documents were moved from the stones to the books. The invention of computers and the internet has also opened an important milestone in human history and education. In the beginning, the course contents loaded on storage units such as floppy disks, CDs, DVDs were used by the students and teachers, computers were included in the education systems. During periods when we have not yet met with the internet, computer-assisted education has found a large place in many educational institutions and in the curriculum of education level. The development of information Technologies led to widespread use of the internet over time, and shortly thereafter examples of use in education began to increase. Computer-assisted education has also led to the rapid transition of education through internet-supported education, along with the different demands of the network society's individuals. Users are not satisfied with the internet environments where only reading authority is available, and more and more active and interacting requests have come to the agenda. Beyond reading, social networks that make it possible to comment, create content, upload/share/view images, upload video/audio files, and make video, text and voice calls have become popular for users. Social networking platforms where users interact with the environment or with other users in the environment have been attracted by the diversity of user profiles, the usage rates and durations, and the easy and versatility of accessibility. Because of these features, studies on the use of social networks in the field of education to support learning and teaching have also been accelerated and diversified. Social networks can also contain some security issues because they are huge platforms where billions of users are together. Having information about security issues as little as possible, what to do when they are encountered is important for the continuity of learning and teaching. The aim of this study is to demonstrate the importance of social networks, education, learning and teaching influences, possible security threats to be encountered in social networks, and measures to be taken. It is hoped that working in this context will shed light on the work of learners, teachers and decision makers on the subject.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Zhu, Qianxiang, Yuanqing Qin, Yue Zhao und Zhou Chunjie. „A hierarchical colored Petri net–based cyberattacks response strategy making approach for critical infrastructures“. International Journal of Distributed Sensor Networks 16, Nr. 1 (Januar 2020): 155014771988980. http://dx.doi.org/10.1177/1550147719889808.

Der volle Inhalt der Quelle
Annotation:
Critical infrastructures are essential for national security, economy, and public safety. As an important part of security protection, response strategy making provides useful countermeasures to reduce the impacts of cyberattacks. However, there have been few researches in this domain that investigate the cyberattack propagation within a station and the incident spreading process in the critical infrastructure network simultaneously, let along analyzing the relationships between security strategy making for a station and scheduling strategy for the critical infrastructure network. To tackle this problem, a hierarchical colored Petri net–based cyberattacks response strategy making approach for critical infrastructures is presented. In this approach, the relationships among cyberattacks, security measures, devices, functions, and station capacity are analyzed and described in a hierarchical way, and the system loss is calculated with the input of abnormal station capacities. Then, based on the above model, the security strategy making for a station and the scheduling strategy making for the critical infrastructure network are investigated in depth. Finally, the effectiveness of the proposed approach is demonstrated on a simulated water supply system.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

TANNIAN, MARK F., CHRISTINA SCHWEIKERT und YING LIU. „A Systems Security Analysis of Issuance and Verification of Birth Documents Enhanced with DNA Profiles“. Journal of Interconnection Networks 17, Nr. 01 (März 2017): 1740003. http://dx.doi.org/10.1142/s0219265917400035.

Der volle Inhalt der Quelle
Annotation:
The use of biometrics to enhance identification has been explored and utilized to various extents. DNA is the most reliable and stable biometric that remains unchanged throughout an individual’s lifetime. Advancements in DNA analysis, in terms of reduced cost and faster processing times, make the use of DNA as a biometric more feasible over time. Since DNA data is of a sensitive nature, privacy and ethical concerns would have to be carefully considered before large-scale adoption for use in identity documents. Birth certificates are a fundamental document used by a person for identification. However, it does not contain any means of authentication beyond possession of the document. This paper examines the security measures that would be required if birth certificates were embedded with DNA profile information. The U.S. FBI CODIS approach is referred to, being an established standard for human DNA profiling and identification. Effects on the issuance and verification network for birth certificate documents are explored, in addition to the security threats.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Ozcan, Alper, und Sule Gunduz Oguducu. „Multivariate Time Series Link Prediction for Evolving Heterogeneous Network“. International Journal of Information Technology & Decision Making 18, Nr. 01 (Januar 2019): 241–86. http://dx.doi.org/10.1142/s0219622018500530.

Der volle Inhalt der Quelle
Annotation:
Link prediction is considered as one of the key tasks in various data mining applications for recommendation systems, bioinformatics, security and worldwide web. The majority of previous works in link prediction mainly focus on the homogeneous networks which only consider one type of node and link. However, real-world networks have heterogeneous interactions and complicated dynamic structure, which make link prediction a more challenging task. In this paper, we have studied the problem of link prediction in the dynamic, undirected, weighted/unweighted, heterogeneous social networks which are composed of multiple types of nodes and links that change over time. We propose a novel method, called Multivariate Time Series Link Prediction for evolving heterogeneous networks that incorporate (1) temporal evolution of the network; (2) correlations between link evolution and multi-typed relationships; (3) local and global similarity measures; and (4) node connectivity information. Our proposed method and the previously proposed time series methods are evaluated experimentally on a real-world bibliographic network (DBLP) and a social bookmarking network (Delicious). Experimental results show that the proposed method outperforms the previous methods in terms of AUC measures in different test cases.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Aljably, Randa, Yuan Tian und Mznah Al-Rodhaan. „Preserving Privacy in Multimedia Social Networks Using Machine Learning Anomaly Detection“. Security and Communication Networks 2020 (20.07.2020): 1–14. http://dx.doi.org/10.1155/2020/5874935.

Der volle Inhalt der Quelle
Annotation:
Nowadays, user’s privacy is a critical matter in multimedia social networks. However, traditional machine learning anomaly detection techniques that rely on user’s log files and behavioral patterns are not sufficient to preserve it. Hence, the social network security should have multiple security measures to take into account additional information to protect user’s data. More precisely, access control models could complement machine learning algorithms in the process of privacy preservation. The models could use further information derived from the user’s profiles to detect anomalous users. In this paper, we implement a privacy preservation algorithm that incorporates supervised and unsupervised machine learning anomaly detection techniques with access control models. Due to the rich and fine-grained policies, our control model continuously updates the list of attributes used to classify users. It has been successfully tested on real datasets, with over 95% accuracy using Bayesian classifier, and 95.53% on receiver operating characteristic curve using deep neural networks and long short-term memory recurrent neural network classifiers. Experimental results show that this approach outperforms other detection techniques such as support vector machine, isolation forest, principal component analysis, and Kolmogorov–Smirnov test.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Rani, Sita, Aman Kataria, Vishal Sharma, Smarajit Ghosh, Vinod Karar, Kyungroul Lee und Chang Choi. „Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey“. Wireless Communications and Mobile Computing 2021 (26.04.2021): 1–30. http://dx.doi.org/10.1155/2021/5579148.

Der volle Inhalt der Quelle
Annotation:
Internet of Things (IoT) is the utmost assuring framework to facilitate human life with quality and comfort. IoT has contributed significantly to numerous application areas. The stormy expansion of smart devices and their credence for data transfer using wireless mechanics boost their susceptibility to cyberattacks. Consequently, the cybercrime rate is increasing day by day. Hence, the study of IoT security threats and possible corrective measures can benefit researchers in identifying appropriate solutions to deal with various challenges in cybercrime investigation. IoT forensics plays a vital role in cybercrime investigations. This review paper presents an overview of the IoT framework consisting of IoT architecture, protocols, and technologies. Various security issues at each layer and corrective measures are also discussed in detail. This paper also presents the role of IoT forensics in cybercrime investigation in various domains like smart homes, smart cities, automated vehicles, and healthcare. The role of advanced technologies like artificial intelligence, machine learning, cloud computing, edge computing, fog computing, and blockchain technology in cybercrime investigation is also discussed. Lastly, various open research challenges in IoT to assist cybercrime investigation are explained to provide a new direction for further research.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Feng, Bo, Qiang Li, Yuede Ji, Dong Guo und Xiangyu Meng. „Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users“. Security and Communication Networks 2019 (11.07.2019): 1–14. http://dx.doi.org/10.1155/2019/3053418.

Der volle Inhalt der Quelle
Annotation:
Online social networks have become an essential part of our daily life. While we are enjoying the benefits from the social networks, we are inevitably exposed to the security threats, especially the serious Advanced Persistent Threat (APT) attack. The attackers can launch targeted cyberattacks on a user by analyzing its personal information and social behaviors. Due to the wide variety of social engineering techniques and undetectable zero-day exploits being used by attackers, the detection techniques of intrusion are increasingly difficult. Motivated by the fact that the attackers usually penetrate the social network to either propagate malwares or collect sensitive information, we propose a method to assess the security risk of the user being attacked so that we can take defensive measures such as security education, training, and awareness before users are attacked. In this paper, we propose a novel user analysis model to find potential victims by analyzing a large number of users’ personal information and social behaviors in social networks. For each user, we extract three kinds of features, i.e., statistical features, social-graph features, and semantic features. These features will become the input of our user analysis model, and the security risk score will be calculated. The users with high security risk score will be alarmed so that the risk of being attacked can be reduced. We have implemented an effective user analysis model and evaluated it on a real-world dataset collected from a social network, namely, Sina Weibo (Weibo). The results show that our model can effectively assess the risk of users’ activities in social networks with a high area under the ROC curve of 0.9607.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Bihl, Trevor J., Todd J. Paciencia, Kenneth W. Bauer und Michael A. Temple. „Cyber-Physical Security with RF Fingerprint Classification through Distance Measure Extensions of Generalized Relevance Learning Vector Quantization“. Security and Communication Networks 2020 (24.02.2020): 1–12. http://dx.doi.org/10.1155/2020/3909763.

Der volle Inhalt der Quelle
Annotation:
Radio frequency (RF) fingerprinting extracts fingerprint features from RF signals to protect against masquerade attacks by enabling reliable authentication of communication devices at the “serial number” level. Facilitating the reliable authentication of communication devices are machine learning (ML) algorithms which find meaningful statistical differences between measured data. The Generalized Relevance Learning Vector Quantization-Improved (GRLVQI) classifier is one ML algorithm which has shown efficacy for RF fingerprinting device discrimination. GRLVQI extends the Learning Vector Quantization (LVQ) family of “winner take all” classifiers that develop prototype vectors (PVs) which represent data. In LVQ algorithms, distances are computed between exemplars and PVs, and PVs are iteratively moved to accurately represent the data. GRLVQI extends LVQ with a sigmoidal cost function, relevance learning, and PV update logic improvements. However, both LVQ and GRLVQI are limited due to a reliance on squared Euclidean distance measures and a seemingly complex algorithm structure if changes are made to the underlying distance measure. Herein, the authors (1) develop GRLVQI-D (distance), an extension of GRLVQI to consider alternative distance measures and (2) present the Cosine GRLVQI classifier using this framework. To evaluate this framework, the authors consider experimentally collected Z-wave RF signals and develop RF fingerprints to identify devices. Z-wave devices are low-cost, low-power communication technologies seen increasingly in critical infrastructure. Both classification and verification, claimed identity, and performance comparisons are made with the new Cosine GRLVQI algorithm. The results show more robust performance when using the Cosine GRLVQI algorithm when compared with four algorithms in the literature. Additionally, the methodology used to create Cosine GRLVQI is generalizable to alternative measures.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Villegas-Ch., William, Ivan Ortiz-Garces und Santiago Sánchez-Viteri. „Proposal for an Implementation Guide for a Computer Security Incident Response Team on a University Campus“. Computers 10, Nr. 8 (19.08.2021): 102. http://dx.doi.org/10.3390/computers10080102.

Der volle Inhalt der Quelle
Annotation:
Currently, society is going through a health event with devastating results. In their desire to control the 2019 coronavirus disease, large organizations have turned over the execution of their activities to the use of information technology. These tools, adapted to the use of the Internet, have been presented as an effective solution to the measures implemented by the majority of nations where quarantines are generalized. However, the solution given by information technologies has several disadvantages that must be solved. The most important in this regard is with the serious security incidents that exist, where many organizations have been compromised and their data has been exposed. As a solution, this work proposes the design of a guide that allows for the implementation of a computer incident response team on a university campus. Universities are optimal environments for the generation of new technologies; they also serve as the ideal test bed for the generation of security policies and new treatments for incidents in an organization. In addition, with the implementation of the computer incident response team in a university, it is proposed to be part of a response group to any security incident at the national level.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Gowthami K. „Security Issues on IoT Environment In Wireless Network Communications“. International Journal of Wireless Networks and Broadband Technologies 8, Nr. 2 (Juli 2019): 31–46. http://dx.doi.org/10.4018/ijwnbt.2019070104.

Der volle Inhalt der Quelle
Annotation:
The Internet of Things (IoT) integrates a giant range of physical objects that measures items that are unambiguously known, ubiquitously interconnected and accessible through the web. IoT aims to remodel any object within the real-world into a computer that has sensing, communication, and management capabilities. There is a growing range of IoT devices associated degree applications, and this results in an increase within the range, and quality of malicious attacks. It is necessary to guard IoT systems against malicious attacks, particularly to stop attackers from getting management over the devices. The common place web security protocols square measure recognized as unsuitable in these varieties of networks, significantly because of some categories of IOT devices with unnatural resources.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie