Journal articles on the topic 'Computer security Australia Case studies'

To see the other types of publications on this topic, follow the link: Computer security Australia Case studies.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer security Australia Case studies.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

E. Fluck, Andrew, Olawale Surajudeen Adebayo, and Shafi'i Muhammad Abdulhamid. "Secure E-Examination Systems Compared: Case Studies from Two Countries." Journal of Information Technology Education: Innovations in Practice 16 (2017): 107–25. http://dx.doi.org/10.28945/3705.

Full text
Abstract:
Aim/Purpose: Electronic examinations have some inherent problems. Students have expressed negative opinions about electronic examinations (e-examinations) due to a fear of, or unfamiliarity with, the technology of assessment, and a lack of knowledge about the methods of e-examinations. Background: Electronic examinations are now a viable alternative method of assessing student learning. They provide freedom of choice, in terms of the location of the examination, and can provide immediate feedback; students and institutions can be assured of the integrity of knowledge testing. This in turn motivates students to strive for deeper learning and better results, in a higher quality and more rigorous educational process. Methodology : This paper compares an e-examination system at FUT Minna Nigeria with one in Australia, at the University of Tasmania, using case study analysis. The functions supported, or inhibited, by each of the two e-examination systems, with different approaches to question types, cohort size, technology used, and security features, are compared. Contribution: The researchers’ aim is to assist stakeholders (including lecturers, invigilators, candidates, computer instructors, and server operators) to identify ways of improving the process. The relative convenience for students, administrators, and lecturer/assessors and the reliability and security of the two systems are considered. Challenges in conducting e-examinations in both countries are revealed by juxtaposing the systems. The authors propose ways of developing more effective e-examination systems. Findings: The comparison of the two institutions in Nigeria and Australia shows e-examinations have been implemented for the purpose of selecting students for university courses, and for their assessment once enrolled. In Nigeria, there is widespread systemic adoption for university entrance merit selection. In Australia this has been limited to one subject in one state, rather than being adopted nationally. Within undergraduate courses, the Nigerian scenario is quite extensive; in Australia this adoption has been slower, but has penetrated a wide variety of disciplines. Recommendations for Practitioners: Assessment integrity and equipment reliability were common issues across the two case studies, although the delivery of e-examinations is different in each country. As with any procedural process, a particular solution is only as good as its weakest attribute. Technical differences highlight the link between e-examination system approaches and pedagogical implications. It is clear that social, cultural, and environmental factors affect the success of e-examinations. For example, an interrupted electrical power supply and limited technical know-how are two of the challenges affecting the conduct of e-examinations in Nigeria. In Tasmania, the challenge with the “bring your own device” (BYOD) is to make the system operate on an increasing variety of user equipment, including tablets. Recommendation for Researchers: The comparisons between the two universities indicate there will be a productive convergence of the approaches in future. One key proposal, which arose from the analysis of the existing e-examination systems in Nigeria and Australia, is to design a form of “live” operating system that is deployable over the Internet. This method would use public key cryptography for lecturers to encrypt their questions online. Impact on Society : If institutions are to transition to e-examinations, one way of facilitating this move is by using computers to imitate other assessment techniques. However, higher order thinking is usually demonstrated through open-ended or creative tasks. In this respect the Australian system shows promise by providing the same full operating system and software application suite to all candidates, thereby supporting assessment of such creative higher order thinking. The two cases illustrate the potential tension between “online” or networked reticulation of questions and answers, as opposed to “offline” methods. Future Research: A future design proposition is a web-based strategy for a virtual machine, which is launched into candidates’ computers at the start of each e-examination. The new system is a form of BYOD externally booted e-examination (as in Australia) that is deployable over the Internet with encryption and decryption features using public key cryptography (Nigeria). This will allow lecturers to encrypt their questions and post them online while the questions are decrypted by the administrator or students are given the key. The system will support both objective and open-ended questions (possibly essays and creative design tasks). The authors believe this can re-define e-examinations as the “gold standard” of assessment.
APA, Harvard, Vancouver, ISO, and other styles
2

O'Donnell, Jonathan, Margaret Jackson, Marita Shelly, and Julian Ligertwood. "Australian Case Studies in Mobile Commerce." Journal of Theoretical and Applied Electronic Commerce Research 2, no. 2 (August 1, 2007): 1–18. http://dx.doi.org/10.3390/jtaer2020010.

Full text
Abstract:
Sixteen wireless case studies highlight issues relating to mobile commerce in Australia. The issues include: the need for a clear business case; difficulty of achieving critical mass and acceptance of a new service; training and technical issues, as well as staff acceptance issues; that privacy and security issues arise through the potential to track the location of people and through the amounts of personal data collected; difficulties in integrating with existing back-end systems; projects being affected by changes to legislation, or requiring changes to the law; and that while there is potential for mobile phone operators to develop new billing methods that become new models for issuing credit, they are not covered by existing credit laws. We have placed the case studies in a Fit-Viability framework and analyzed the issues according to key success criteria. While many organizations are keen to use the technology, they are struggling to find a compelling business case for adoption and that without a strong business case projects are unlikely to progress past the pilot stage.
APA, Harvard, Vancouver, ISO, and other styles
3

Rein, Tony. "Case studies II — Australia." Computer Law & Security Review 6, no. 6 (March 1991): 33–36. http://dx.doi.org/10.1016/0267-3649(91)90180-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rehman, Amjad, Sultan Alqahtani, Ayman Altameem, and Tanzila Saba. "Virtual machine security challenges: case studies." International Journal of Machine Learning and Cybernetics 5, no. 5 (April 9, 2013): 729–42. http://dx.doi.org/10.1007/s13042-013-0166-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Newman, Andrew. "The Legal In/Security of Temporary Migrant Agricultural Work: Case Studies from Canada and Australia." Deakin Law Review 18, no. 2 (December 1, 2013): 361. http://dx.doi.org/10.21153/dlr2013vol18no2art43.

Full text
Abstract:
Despite differing labour law systems and program structures, temporary migrant agricultural workers under the Canadian Seasonal Agricultural Worker Program and Australian Seasonal Worker Program often possess minimal security of employment rights and protections, despite potentially lengthy periods of consecutive seasonal service to the same employer. Such lesser rights and protections are partly due to the central role played by continuity of service in determining the length of reasonable notice periods and the strength of unfair dismissal protections and stand-down/recall rights. Although it is often presumed that the temporary duration of the seasonal work visa necessarily severs the legal continuity of the employment relationship, such is not the case. This article argues that security of employment rights and protections can be re-conceptualised to recognise non-continuous seasonal service within the current parameters of a fixed-term work visa. In both Canada and Australia this could be accomplished through contractual or collective agreement terms or through the amendment of labour law legislation. Such reforms would recognise a form of unpaid ‘migrant worker leave’, whereby the legal continuity of employment would be preserved despite periods of mandatory repatriation, thus allowing accrual of security of employment rights and protections.
APA, Harvard, Vancouver, ISO, and other styles
6

Burns, T. W., and E. Szczerbicki. "Implementing Concurrent Engineering: Case Studies from Eastern Australia." Concurrent Engineering 5, no. 2 (June 1997): 163–70. http://dx.doi.org/10.1177/1063293x9700500208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shaver, Sheila. "Gender, Class and the Welfare State: The Case of Income Security in Australia." Feminist Review, no. 32 (1989): 90. http://dx.doi.org/10.2307/1395365.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shaver, Sheila. "Gender, Class and the Welfare State: The Case of Income Security in Australia." Feminist Review 32, no. 1 (July 1989): 90–110. http://dx.doi.org/10.1057/fr.1989.21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kimmel, Laurence, Mike Barnard, and Aysu Kuru. "“Open to the public”." Archnet-IJAR: International Journal of Architectural Research 14, no. 2 (March 17, 2020): 251–66. http://dx.doi.org/10.1108/arch-08-2019-0189.

Full text
Abstract:
PurposeThe cultural imperative for public buildings in countries like Australia to maintain their intrinsic “openness” – physically and symbolically – faces particular challenges in the context of current global terrorism concerns. Building regulations and counter-terrorism guidelines coexist uneasily, with implications for both public amenity and safety. This is particularly evident in the context of current approaches to hostile vehicle (HV) mitigation.Design/methodology/approachBased on a review of comparative literature, this multidisciplinary project assimilates design aesthetics and security expertise to assess the advantages and limitations of current counter-terrorism design approaches in Australia, the UK and the USA. The research focusses on public buildings of high cultural symbolic value (e.g. concert halls) in the context of HV mitigation.FindingsTwo key recommendations emerge. The first presents the benefits of adopting a layered security strategy tailored to a building's security and symbolic profile mix. The second proposes enhancements to the existing counter-terrorism guidelines based on a model that accounts for both symbolic value and openness.Originality/valueThe research presents new strategies for urban design and security stakeholders to balance openness and security in the design of publicly accessible buildings. While existing research addresses the challenges of terrorism in the design of public space, a literature (and practice) gap exists in Australia, the UK and the USA regarding current approaches to the design of public buildings. Using Australia as a case study, the findings will inform government and industry practitioners seeking more complementary approaches to public amenity and safety in comparable counter-security design contexts globally.
APA, Harvard, Vancouver, ISO, and other styles
10

Due, Clemence, Kathleen Connellan, and Damien W. Riggs. "Surveillance, Security and Violence in a Mental Health Ward: An Ethnographic Case-Study of a Purpose-Built Unit in Australia." Surveillance & Society 10, no. 3/4 (November 28, 2012): 292–302. http://dx.doi.org/10.24908/ss.v10i3/4.4276.

Full text
Abstract:
This paper discusses the potential relationship between surveillance techniques, the enactment of security measures, and patient violence in mental health wards. The paper draws upon data from an ethnographic study conducted in a purpose-built mental health unit containing two wards (one locked and one open) in South Australia, and argues that acts of violence observed in the unit were typically preceded by an incident within the unit that was related to the implementation of security measures aimed at controlling non-compliant behaviours. The paper argues that if a relationship between security measures and violence does exist in mental health wards, then close attention must be paid to the ways in which forms of surveillance may arguably exacerbate, rather than prevent, the need for security measures.
APA, Harvard, Vancouver, ISO, and other styles
11

Chen, Fei, Duming Luo, Tao Xiang, Ping Chen, Junfeng Fan, and Hong-Linh Truong. "IoT Cloud Security Review." ACM Computing Surveys 54, no. 4 (May 2021): 1–36. http://dx.doi.org/10.1145/3447625.

Full text
Abstract:
Recent years have seen the rapid development and integration of the Internet of Things (IoT) and cloud computing. The market is providing various consumer-oriented smart IoT devices; the mainstream cloud service providers are building their software stacks to support IoT services. With this emerging trend even growing, the security of such smart IoT cloud systems has drawn much research attention in recent years. To better understand the emerging consumer-oriented smart IoT cloud systems for practical engineers and new researchers, this article presents a review of the most recent research efforts on existing, real, already deployed consumer-oriented IoT cloud applications in the past five years using typical case studies. Specifically, we first present a general model for the IoT cloud ecosystem. Then, using the model, we review and summarize recent, representative research works on emerging smart IoT cloud system security using 10 detailed case studies, with the aim that the case studies together provide insights into the insecurity of current emerging IoT cloud systems. We further present a systematic approach to conduct a security analysis for IoT cloud systems. Based on the proposed security analysis approach, we review and suggest potential security risk mitigation methods to protect IoT cloud systems. We also discuss future research challenges for the IoT cloud security area.
APA, Harvard, Vancouver, ISO, and other styles
12

Rao, N. Thirupathi, Debnath Bhattacharyya, and Tai-Hoon Kim. "Security Issues and Attacks in Wireless Sensor Networks: Some Case Studies." International Journal of Security and Its Applications 10, no. 5 (September 30, 2018): 1–10. http://dx.doi.org/10.14257/ijsia.2018.12.5.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Ibrahim, Ahmed, Craig Valli, Ian McAteer, and Junaid Chaudhry. "A security review of local government using NIST CSF: a case study." Journal of Supercomputing 74, no. 10 (July 12, 2018): 5171–86. http://dx.doi.org/10.1007/s11227-018-2479-2.

Full text
Abstract:
Abstract Evaluating cyber security risk is a challenging task regardless of an organisation’s nature of business or size, however, an essential activity. This paper uses the National Institute of Standards and Technology (NIST) cyber security framework (CSF) to assess the cyber security posture of a local government organisation in Western Australia. Our approach enabled the quantification of risks for specific NIST CSF core functions and respective categories and allowed making recommendations to address the gaps discovered to attain the desired level of compliance. This has led the organisation to strategically target areas related to their people, processes, and technologies, thus mitigating current and future threats.
APA, Harvard, Vancouver, ISO, and other styles
14

Abdallah, Nahel, and Odeh Abdullah. "Computer Security Behavior and Awareness: An Empirical Case Study." International Journal on Perceptive and Cognitive Computing 5, no. 1 (April 12, 2019): 8–14. http://dx.doi.org/10.31436/ijpcc.v5i1.76.

Full text
Abstract:
The purpose of this study is to investigate the student’s behavior towards information security and test critical factors that are affecting its awareness, which was carried out among the undergraduate students of An-Najah National University, Palestine. Previous studies have shown that end-users present the weakest link in the security chain. The attacks on computer systems are continuously becoming serious problems which raise the interest among researchers. In achieving the goal of this study, surveys of 80 university students' data were collected and analyzed using SPSS to examine the theoretical model. It is hoped that the outcome of this study will contribute in developing a proper understanding of the factors influencing the behavior of university students towards information security behavior. Additionally, it is anticipated that the findings of this study to lead to more awareness programs that can be used to promote privacy and security protection behaviors of information security.
APA, Harvard, Vancouver, ISO, and other styles
15

Koskosas, Ioannis. "Communicating information systems goals: A case in internet banking security." Computer Science and Information Systems 6, no. 1 (2009): 71–92. http://dx.doi.org/10.2298/csis0901071k.

Full text
Abstract:
A large part of information systems (IS) security approaches is technical in nature with less consideration on people and organizational issues. The research presented in this paper adopts a broader perspective and presents an understanding of IS security in terms of a social and organizational perspective. In doing so, it uses the communication of risk messages among the members of IT groups in setting Internet banking goals in order to identify any weaknesses in security management procedures. The novel approach of this investigation is that explores and presents the issues of risk communication and goal setting in Internet banking security through indepth interviews within three case studies. That said, it promotes an interdisciplinary and inter-organizational theory which fosters a new dialog that transcends security industry specific contexts as opposed to other studies. Interview results suggest how an effective setting of Internet banking security goals can be achieved through specific considerations for improving the communication of security messages. The research contributes to interpretive information systems with the study of risk communication and goal setting in an Internet banking security context.
APA, Harvard, Vancouver, ISO, and other styles
16

Ciampi, Mario, Diego Romano, and Giovanni Schmid. "Process Authentication through Blockchain: Three Case Studies." Cryptography 6, no. 4 (November 11, 2022): 58. http://dx.doi.org/10.3390/cryptography6040058.

Full text
Abstract:
In this work, we elaborate on the concept of process authenticity, which intuitively corresponds to the validity of all process steps and their proper binding. It represents the most exciting forefront of distributed ledger technology research concerning the primary challenge of reliably connecting distributed ledger networks to the physical context it must operate. More in detail, the paper describes a novel methodological approach to ensure the authenticity of business processes through blockchain and several security mechanisms applied to the digital twins of the actual processes. We illustrate difficulties and opportunities deriving from implementing process authenticity in concrete case studies in which we were involved as software designers belonging to three critical application domains: document dematerialization, e-voting, and healthcare.
APA, Harvard, Vancouver, ISO, and other styles
17

Lewis, Helen, John Gertsakis, Nicholas Johns, and Tim Grant. "The Evolution of Sustainable Product Design: Case Studies from Australia and New Zealand." Design Journal 5, no. 3 (November 2002): 23–34. http://dx.doi.org/10.2752/146069202789317771.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Davis, Brittany D., Janelle C. Mason, and Mohd Anwar. "Vulnerability Studies and Security Postures of IoT Devices: A Smart Home Case Study." IEEE Internet of Things Journal 7, no. 10 (October 2020): 10102–10. http://dx.doi.org/10.1109/jiot.2020.2983983.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Fiaidhi, Jinan, Jinan Fiaidhi, and Sabah Mohammed. "Security and Vulnerability of Extreme Automation Systems: The IoMT and IoA Case Studies." IT Professional 21, no. 4 (July 1, 2019): 48–55. http://dx.doi.org/10.1109/mitp.2019.2906442.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Lambert, Rob, and Edward Webster. "Searching for Security: Case Studies of the Impact of Work Restructuring on Households in South Korea, South Africa and Australia." Journal of Industrial Relations 52, no. 5 (November 2010): 595–611. http://dx.doi.org/10.1177/0022185610381672.

Full text
Abstract:
The reconfiguration of the employment relationship — through the growing intensification, informalization and casualization of work, downsizing and retrenchments — impacts directly on workers’ households and the communities within which they are embedded. To understand these responses, we need to rethink the way we study the changing employment relationship. Employment relations should not only analyse the workplace: we need to research workers in the totality of their lives. To comprehend these processes we surveyed and interviewed workers in the workplace and in their households and communities. Through following workers into their homes and communities in South Africa, Australia and South Korea, the differential impact of the global restructuring of one industry, the white goods industry, on the non-working life of working people emerged. Two types of responses were identified: on the one hand, a retreat from, or an adaptation to, rapid market liberalization; on the other, mobilization to challenge the market. All three research sites evidenced innovative attempts at the local level to search for security. However, these responses lacked an overall vision of alternative possibilities to the realities of the free market paradigm of globalization.
APA, Harvard, Vancouver, ISO, and other styles
21

Bolderson, Helen. "Comparing Social Policies: Some Problems of Method and the Case of Social Security Benefits in Australia, Britain and the USA." Journal of Social Policy 17, no. 3 (July 1988): 267–88. http://dx.doi.org/10.1017/s0047279400016810.

Full text
Abstract:
ABSTRACTThe cross-national works of development sociologists and of political scientists have sought to disentangle some of the determinants of welfare, whereas studies in comparative social policy have been mainly evaluative. These have laid themselves open to charges of being, variously, a-theoretical, unsystematic and narrowly focused on the state sector. However, a case is made here for the continuation of such studies with a clear focus on social policy rather than the mixed economy of welfare, using more explicit evaluative criteria and a range of methods. A small comparative study of social security benefit levels in Australia, Britain and the USA is used as an illustration of the potential in this approach and the problems of method involved.
APA, Harvard, Vancouver, ISO, and other styles
22

Carr, Robert Anthony. "Political Economy and the Australian Government’s CCTV Programme: An Exploration of State-Sponsored Street Cameras and the Cultivation of Consent and Business in Local Communities." Surveillance & Society 14, no. 1 (May 9, 2016): 90–112. http://dx.doi.org/10.24908/ss.v14i1.5372.

Full text
Abstract:
This article explores the political economy of Closed-Circuit Television (CCTV) in Australia, providing new insights into the relationship between government policy and its economic implications. I have rationalised state-sponsored street cameras as a component in the cultivation of consent between the state and local communities; a mechanism for government to facilitate the flow of public funds to business through arrangements that are virtually unchecked and non-evidence based; a mechanism for government to facilitate profitable opportunities in and beyond the security technologies industry; and, a mechanism to normalise hegemonic social and political relations at the level of discourse. This article explores how government has assisted growth in the security industry in Australia. I draw on a case study about Kiama Municipal Council’s decision in 2014 to accept funding from the Abbott Government to install CCTV cameras through the Safer Streets Programme. This is despite historically low crime rates in Kiama and an inability to demonstrate broad support for the programme in the local community. This study reveals how politicians have cultivated support for CCTV at the local level and pressured councils to install these systems despite a lack of evidence they reduce, deter or prevent crime. Examined is how the footage captured on local council CCTV has been distributed and its meanings mediated by political and commercial groups. I argue that the politics of CCTV dissemination in Australia is entwined with the imperatives of electoral success and commercial opportunity—a coalescent relationship evident in the Safer Streets Programme. Furthermore, the efficacy of CCTV as an electoral tool in Australia is explained via the proposition that street cameras perform a central role in the discourses and political economy of the state.
APA, Harvard, Vancouver, ISO, and other styles
23

Moreno-Lax, Violeta, Daniel Ghezelbash, and Natalie Klein. "Between life, security and rights: Framing the interdiction of ‘boat migrants’ in the Central Mediterranean and Australia." Leiden Journal of International Law 32, no. 4 (September 17, 2019): 715–40. http://dx.doi.org/10.1017/s0922156519000451.

Full text
Abstract:
AbstractThis article sets out two case studies to examine the evolving reality of ‘boat migration’ and the intersecting legal frameworks at play. Our analysis takes a systemic integration approach to reflect on the complex dynamics underpinning responses to the phenomenon in Australia and the Central Mediterranean. The regime that governments purport to act under in any given instance reflects the way they choose to frame incidents and possibly exploit legal gaps in, or contested interpretations of, the relevant rules. The ‘closed ports’ strategy adopted by Italy and Malta against the MV Lifeline and the detention-at-sea policy pursued by Australia are investigated from the competing perspectives of what we call the ‘security lens’ and the ‘humanitarian lens’ to demonstrate how a good faith interpretation of the applicable (if apparently conflicting and overlapping) norms can (and should) be mobilized to save lives, and how that goal is unduly undercut when security concerns trump humanitarian interests.
APA, Harvard, Vancouver, ISO, and other styles
24

Ballesteros, Francisco J., Enrique Soriano, Gorka Guardiola, and Katia Leal. "The Plan B OS for ubiquitous computing. Voice control, security, and terminals as case studies." Pervasive and Mobile Computing 2, no. 4 (November 2006): 472–88. http://dx.doi.org/10.1016/j.pmcj.2006.08.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Salkuti, Surender Reddy. "Smart cities: Understanding policies, standards, applications and case studies." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 4 (August 1, 2021): 3137. http://dx.doi.org/10.11591/ijece.v11i4.pp3137-3144.

Full text
Abstract:
<span>This paper presents the integration of required basic facilities of living such as healthcare, education, and infrastructure for building the smart cities. The administrations of smart cities should have the smart governance, safety measures with cultural and social stimulus. Four building blocks of smart cities, i.e., people and environment, smart utilities, smart technology and smart administration are described in the present paper. The aim of this paper is to give a clearer perspective of the key decisions with spatial reference that may assume a key part in the plan of a smart city technique. Application of various technologies, for examples big data, artificial intelligence, machine learning, internet of things (IoT), cloud computing, block chain technology to the smart cities are discussed in this paper. Various challenges of smart cities such as information technology (IT) infrastructure, cost, privacy, security, efficiency, fossil fuel dependency and congested commutes with proposed solutions are also presented in this paper.</span>
APA, Harvard, Vancouver, ISO, and other styles
26

Zografopoulos, Ioannis, Juan Ospina, Xiaorui Liu, and Charalambos Konstantinou. "Cyber-Physical Energy Systems Security: Threat Modeling, Risk Assessment, Resources, Metrics, and Case Studies." IEEE Access 9 (2021): 29775–818. http://dx.doi.org/10.1109/access.2021.3058403.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Kuo, Cynthia, Adrian Perrig, and Jesse Walker. "Designing user studies for security applications: a case study with wireless network configuration." International Journal of Security and Networks 4, no. 1/2 (2009): 101. http://dx.doi.org/10.1504/ijsn.2009.023429.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Jung, Ji-Wook, and Seok-Won Lee. "Security Requirement Recommendation Method Using Case-Based Reasoning to Prevent Advanced Persistent Threats." Applied Sciences 13, no. 3 (January 23, 2023): 1505. http://dx.doi.org/10.3390/app13031505.

Full text
Abstract:
As the world becomes digitized and connected, cyberattacks and security issues have been steadily increasing. In particular, advanced persistent threats (APTs) are actors who perform various complex attacks over the long term to achieve their purpose. These attacks involve more planning and intelligence than typical cyberattacks. Many studies have investigated APT detection and defense methods; however, studies on security requirements that focus on non-technical factors and prevention are relatively few. Therefore, this study aims to provide attack information to users obtained by analyzing attack scenarios as well as security requirements to help the users understand and make decisions. To this end, we propose a method for extracting attack elements by providing users with templates for attack scenarios with different levels of abstraction. In addition, we use a problem domain ontology that is based on the concept of a case to provide users with attack analysis results and recommended security requirements. Our method uses case-based reasoning to retrieve similar cases, recommend reusable security requirements, and propose revision directions. The ontology can be improved by adding the solution to the problem as a new case. We conducted case studies and surveys to evaluate our methods and showed that they help specify security requirements.
APA, Harvard, Vancouver, ISO, and other styles
29

Hancock, Linda, and Linda Wollersheim. "EU Carbon Diplomacy: Assessing Hydrogen Security and Policy Impact in Australia and Germany." Energies 14, no. 23 (December 3, 2021): 8103. http://dx.doi.org/10.3390/en14238103.

Full text
Abstract:
Hydrogen is fast becoming a new international “super fuel” to accelerate global climate change ambitions. This paper has two inter-weaving themes. Contextually, it focuses on the potential impact of the EU’s new Carbon Border Adjustment Mechanism (CBAM) on fossil fuel-generated as opposed to green hydrogen imports. The CBAM, as a transnational carbon adjustment mechanism, has the potential to impact international trade in energy. It seeks both a level playing field between imports and EU internal markets (subject to ambitious EU climate change policies), and to encourage emissions reduction laggards through its “carbon diplomacy”. Countries without a price on carbon will be charged for embodied carbon in their supply chains when they export to the EU. Empirically, we focus on two hydrogen export/import case studies: Australia as a non-EU state with ambitions to export hydrogen, and Germany as an EU Member State reliant on energy imports. Energy security is central to energy trade debates but needs to be conceptualized beyond supply and demand economics to include geopolitics, just transitions and the impacts of border carbon taxes and EU carbon diplomacy. Accordingly, we apply and further develop a seven-dimension energy security-justice framework to the examples of brown, blue and green hydrogen export/import hydrogen operations, with varying carbon-intensity supply chains, in Australia and Germany. Applying the framework, we identify potential impact—risks and opportunities—associated with identified brown, blue and green hydrogen export/import projects in the two countries. This research contributes to the emerging fields of international hydrogen trade, supply chains, and international carbon diplomacy and develops a potentially useful seven-dimension energy security-justice framework for energy researchers and policy analysts.
APA, Harvard, Vancouver, ISO, and other styles
30

Leideman, Gertjan. "Designing Australia's energy future: applying global learnings to secure Australia's position as a leading global energy supplier." APPEA Journal 55, no. 2 (2015): 459. http://dx.doi.org/10.1071/aj14094.

Full text
Abstract:
Low labour productivity, high costs, regulatory instability and remoteness of operations are some issues frequently raised by oil and gas operators and those considering investment in Australia. This extended abstract looks at the next wave of capital investment and presents recommendations on how to sustain Australia’s energy future. Australia has a significant opportunity to build future resilience and sustained growth through energy reform. This extended abstract draws heavily on the World Economic Forum's global energy architecture performance index (EAPI), developed in collaboration with Accenture, which ranks 125 countries globally on how well their energy system delivers economic growth and development, environmental sustainability and energy security and access. It is recommended that Australia should apply lessons from the global community and actively implement solutions to sustain the country's energy future. Using case studies from oil and gas regions around the world, recommendations are made to improve competitiveness and secure Australia’s position as a leading global energy supplier.
APA, Harvard, Vancouver, ISO, and other styles
31

Pinto, Francisco Silva, Alain Michel Tchadie, Susana Neto, and Shahbaz Khan. "Contributing to water security through water tariffs: some guidelines for implementation mechanisms." Journal of Water, Sanitation and Hygiene for Development 8, no. 4 (August 23, 2018): 730–39. http://dx.doi.org/10.2166/washdev.2018.015.

Full text
Abstract:
Abstract The reform of water pricing practices and tariff mechanisms plays an important role in improving water supply services. However, setting tariff policies is a process that is rife with controversy. The current urban development rhythm and consequent challenges, in several developing cities, requires an urgent review and the establishment of an increasingly more ‘integrated’ management system with a suitable water tariff policy to promote water security. Many lessons can be learned from the successes and failures of water pricing policies in other countries and world regions, taking into account the context, status and development of the water supply sector. In this paper, several case studies are assessed throughout different countries or regions (South Africa, Vietnam, Malaysia, Singapore, Australia, and Europe) to provide key information able to support successful policy ‘transfer routes’. Based on those lessons, key policy recommendations are summarized to pave the way towards water security, particularly in rapidly growing urban centres that suffer already from water stress.
APA, Harvard, Vancouver, ISO, and other styles
32

Ma, Jinnan, Xuekui Shangguan, and Ying Zhang. "IoT Security Review: A Case Study of IIoT, IoV, and Smart Home." Wireless Communications and Mobile Computing 2022 (August 21, 2022): 1–10. http://dx.doi.org/10.1155/2022/6360553.

Full text
Abstract:
The Internet of Things (IoT) acts as a tremendous network that is constructed by fusing diverse sensors. IoT can achieve the interconnection of individuals, things, and machines at any place and time and improve the function performance of network applications. However, the security of IoT has always been a major problem that may limit the application perspective of IoT technologies. Nowadays, industrial IOT (IIoT), Internet of vehicles (IoV), and smart home have become the three primary emerging perspectives of the current IoT studies, and it is necessary to systematically highlight the security analysis of these three types of scenarios. Hence, in this paper, guided by the three major IoT application scenarios, i.e., IIoT, IoV, and smart home, we sum up the development status of IoT security technologies, analyzed corresponding technical difficulties, and discussed several future outlook of challenges and development trends for the IoT technology.
APA, Harvard, Vancouver, ISO, and other styles
33

Alzamil, Zakarya A. "Information security practice in Saudi Arabia: case study on Saudi organizations." Information & Computer Security 26, no. 5 (November 12, 2018): 568–83. http://dx.doi.org/10.1108/ics-01-2018-0006.

Full text
Abstract:
Purpose Information security of an organization is influenced by the deployed policy and procedures. Information security policy reflects the organization’s attitude to the protection of its information assets. The purpose of this paper is to investigate the status of the information security policy at a subset of Saudi’s organizations by understanding the perceptions of their information technology’s employees. Design/methodology/approach A descriptive and statistical approach has been used to describe the collected data and characteristics of the IT employees and managers to understand the information security policy at the surveyed organizations. The author believes that understanding the IT employees’ views gives a better understanding of the organization’s status of information security policy. Findings It has been found that most of the surveyed organizations have established information security policy and deployed fair technology; however, many of such policies are not enforced and publicized effectively and efficiently which degraded the deployed technology for such protection. In addition, the clarity and the comprehensibility of such policies are questionable as indicated by most of the IT employees’ responses. A comparison with similar studies at Middle Eastern and European countries has shown similar findings and shares the same concerns. Originality/value The findings of this research suggest that the Saudi Communications and Information Technology Commission should develop a national framework for information security to guide the governmental and non-governmental organizations as well as the information security practitioners on the good information security practices in terms of policy and procedures to help the organizations to avoid any vulnerability that may lead to violations on the security of their information.
APA, Harvard, Vancouver, ISO, and other styles
34

Isaeva, Ekaterina V. "Topic Modelling in Computer Security Discourse: a Case Study of Whitepaper Publications and News Feeds." Вестник Пермского университета. Российская и зарубежная филология 14, no. 2 (2022): 18–26. http://dx.doi.org/10.17072/2073-6681-2022-2-18-26.

Full text
Abstract:
Up-to-date information plays a crucial role in modern linguistic research. For this reason,computational linguistic methods, including those aided with analytical and machine-learning tools, are attracting growing attention. Some of their applications in cognitive-discursive linguistics are keyword extraction, topic modelling, and content analysis. Text-mining tools facilitate time-consuming linguistic work andadd to the results’ reliability and greater statistical precision by processing a significantly larger data volume.Most studies, however, have overlooked interference of socially significant but context-irrelevant (e.g. political) information into a specialized discourse by focusing mainly on one data format. The current study,aimed at topic modelling, has been carried out on the computer security discourse. We have implemented theproject on the KNIME analytical platform. The model enables comparison between topics extracted frompublished articles and date-specific RSS news feeds. The study provides important insights into infodemiology and political incidental news exposure occurring in computer-security-oriented RSS feeds on theKaspersky website but untraceable in the papers published on the same website in a PDF format. The resultsreported here provide further evidence for the need to consider the hypercontext of professional communication and employ real-time data in solving similar problems within cognitive-discursive linguistics.Our contribution to the development of cognitive-discursive linguistics is the method for comparingtopics within one discourse, taking into account near-real-time data. For computational linguistics, the significance of our work lies in describing a new application of the topic extraction workflow freely available onthe KNIME hub.
APA, Harvard, Vancouver, ISO, and other styles
35

McAuley, Elise, Chandana Unnithan, and Sofie Karamzalis. "Implementing Scanned Medical Record Systems in Australia." International Journal of E-Adoption 4, no. 4 (October 2012): 29–54. http://dx.doi.org/10.4018/jea.2012100103.

Full text
Abstract:
In recent years, influenced by the pervasive power of technology, standards and mandates, Australian hospitals have begun exploring digital forms of keeping this record. The main rationale is the ease of accessing different data sources at the same time by varied staff members. The initial step in this transition was implementation of scanned medical record systems, which converts the paper based records to digitised form, which required process flow redesign and changes to existing modes of work. For maximising the benefits of scanning implementation and to better prepare for the changes, Austin Hospital in the State of Victoria commissioned this research focused on elective admissions area. This structured case study redesigned existing processes that constituted the flow of external patient forms and recommended a set of best practices at the same time highlighting the significance of user participation in maximising the potential benefits anticipated. In the absence of published academic studies focused on Victorian hospitals, this study has become a conduit for other departments in the hospital as well as other hospitals in the incursion.
APA, Harvard, Vancouver, ISO, and other styles
36

Moshi, Magdalena Ruth, Jacqueline Parsons, Rebecca Tooher, and Tracy Merlin. "Evaluation of Mobile Health Applications: Is Regulatory Policy Up to the Challenge?" International Journal of Technology Assessment in Health Care 35, no. 4 (2019): 351–60. http://dx.doi.org/10.1017/s0266462319000461.

Full text
Abstract:
AbstractObjectivesThe aim of this study is to determine whether the approach used in Australia to regulate mobile medical applications (MMA) is consistent with international standards and is suitable to address the unique challenges of these technologies.MethodsThe policies of members of the International Medical Device Regulator's Forum (IMDRF) were analyzed, to determine whether these regulatory bodies address IMDRF recommendations for the clinical evaluation of software as a medical device (SaMD). Case-studies of varying types of regulated MMAs in Australia and the United States were also reviewed to determine how well the guidance in the IMDRF's SaMD: Clinical Evaluation (2017) document was operationalized.ResultsAll included jurisdictions evaluated the effectiveness of MMAs and addressed the majority of the key sub-categories recommended in the IMDRF guidance document. However, safety principles concerning information security (cybersecurity) and potential dangers of misinformation (risk-classification) were generally not addressed in either the case-studies or in the policy documents of international regulatory bodies. Australia's approach was consistent with MMA regulation conducted internationally. None of the approaches used by global regulatory bodies adequately addressed the risk of misinformation from apps and the potential for adverse clinical consequences.ConclusionsThe risks posed by MMAs are mainly through the information they provide and how this is used in clinical decision-making. Policy in Australia and elsewhere should be adjusted to follow the IMDRF risk-classification criteria to address potential harms from misinformation. Australian regulatory information should also be updated so the harm posed by cybersecurity and connectivity can be comprehensively evaluated.
APA, Harvard, Vancouver, ISO, and other styles
37

Er-rajy, Latifa, My Ahmed El Kiram, and Mohamed El Ghazouani. "New Security Risk Value Estimate Method for Android Applications." Computer Journal 63, no. 4 (November 14, 2019): 593–603. http://dx.doi.org/10.1093/comjnl/bxz109.

Full text
Abstract:
Abstract Nowadays, mobile applications are the devices’ core, so their security is essential for the platform on which are installed. Therefore, to make this security strong, Android implements permission system and sandboxing mechanism to reduce the attacks contingency. Also, antivirus software is used to detect the already known malware based on their signature, but unfortunately, this kind of program cannot detect cloned or repackaged malware. Thus, using authorizations to estimate the security vulnerability will surely be very useful for avoiding applications that are more susceptible to be dangerous according to the risk values obtained. Consequently, this will provide systematic support that will make it easier for users to make appropriate decisions and therefore greatly improve the Android devices’ security. In this article, additionally to the risk measures that have been already proposed in previous studies based on functionalities such as permissions and function calls, we add a set of mathematical metrics describing the case of susceptible and innocent applications already known. Our risk assessment exploits applications already known as malware and safe samples without any threat.
APA, Harvard, Vancouver, ISO, and other styles
38

Yellu, Pruthvy, Landon Buell, Miguel Mark, Michel A. Kinsy, Dongpeng Xu, and Qiaoyan Yu. "Security Threat Analyses and Attack Models for Approximate Computing Systems." ACM Transactions on Design Automation of Electronic Systems 26, no. 4 (April 2021): 1–31. http://dx.doi.org/10.1145/3442380.

Full text
Abstract:
Approximate computing (AC) represents a paradigm shift from conventional precise processing to inexact computation but still satisfying the system requirement on accuracy. The rapid progress on the development of diverse AC techniques allows us to apply approximate computing to many computation-intensive applications. However, the utilization of AC techniques could bring in new unique security threats to computing systems. This work does a survey on existing circuit-, architecture-, and compiler-level approximate mechanisms/algorithms, with special emphasis on potential security vulnerabilities. Qualitative and quantitative analyses are performed to assess the impact of the new security threats on AC systems. Moreover, this work proposes four unique visionary attack models, which systematically cover the attacks that build covert channels, compensate approximation errors, terminate normal error resilience mechanisms, and propagate additional errors. To thwart those attacks, this work further offers the guideline of countermeasure designs. Several case studies are provided to illustrate the implementation of the suggested countermeasures.
APA, Harvard, Vancouver, ISO, and other styles
39

Cohn, Ellen R., and Jana Cason. "Editors' Note." International Journal of Telerehabilitation 6, no. 2 (January 29, 2015): 1–2. http://dx.doi.org/10.5195/ijt.2014.6165.

Full text
Abstract:
The Fall 2014 issue of the International Journal of Telerehabilitation (IJT) contains original research that evaluates the role of teletherapy and online language exercises in the treatment of chronic aphasia; investigates whether improvements are maintained after in-home pulmonary telerehabilitation for patients with chronic obstructive pulmonary disease; and studies the use of in-home telerehabilitation for proximal humerus fractures. Within the context of two case studies, an author evaluated three service delivery models (direct, hybrid, and telepractice) for stuttering intervention. The results of a preliminary qualitative investigation are presented for telepractice in rural schools in Australia. And, schemas are offered for privacy and security analyses for store and forward applications in physical and occupational therapy. The Fall 2014 issue also contains a book review, and announcements from the American Telemedicine Association and the Mid-Atlantic Telehealth Resource Center.
APA, Harvard, Vancouver, ISO, and other styles
40

Bielefeld, Shelley, Jenna Harb, and Kathryn Henne. "Financialization and Welfare Surveillance: Regulating the Poor in Technological Times." Surveillance & Society 19, no. 3 (September 21, 2021): 299–316. http://dx.doi.org/10.24908/ss.v19i3.14244.

Full text
Abstract:
In light of concerns that the technologies employed by the digital welfare state exacerbate inequality and oppression, this article considers contemporary shifts in the administration of social assistance. Specifically, it examines the surveillance of recipients of government income support focusing on marginalized peoples in two jurisdictions: social security recipients subject to the Cashless Debit Card (CDC) in Australia, many of whom are Indigenous, and persons under the purview of the Lebanon One Unified Inter-Organizational System for E-Cards (LOUISE) in Lebanon, many of whom are Syrian refugees. Taken together, the cases illuminate embedded ideologies and adverse experiences associated with the financialization of social assistance and the digitization of cash. Through a dual case study approach, this analysis draws out patterns as well as contextual distinctions to illustrate how technological changes reflect financialization trends and attempt neoliberal assimilation of social welfare recipients through intensive surveillance, albeit with disparate outcomes. After considering how these dynamics play out in each case, the article concludes by reflecting on the contradictions that emerge in relation to the promises of empowerment and individual responsibility through financialized logics and technologies.
APA, Harvard, Vancouver, ISO, and other styles
41

Giannelos, Spyros, Predrag Djapic, Danny Pudjianto, and Goran Strbac. "Quantification of the Energy Storage Contribution to Security of Supply through the F-Factor Methodology." Energies 13, no. 4 (February 14, 2020): 826. http://dx.doi.org/10.3390/en13040826.

Full text
Abstract:
The ongoing electrification of the heat and transport sectors is expected to lead to a substantial increase in peak electricity demand over the coming decades, which may drive significant investment in network reinforcement in order to maintain a secure supply of electricity to consumers. The traditional way of security provision has been based on conventional investments such as the upgrade of the capacity of electricity transmission or distribution lines. However, energy storage can also provide security of supply. In this context, the current paper presents a methodology for the quantification of the security contribution of energy storage, based on the use of mathematical optimization for the calculation of the F-factor metric, which reflects the optimal amount of peak demand reduction that can be achieved as compared to the power capability of the corresponding energy storage asset. In this context, case studies underline that the F-factors decrease with greater storage power capability and increase with greater storage efficiency and energy capacity as well as peakiness of the load profile. Furthermore, it is shown that increased investment in energy storage per system bus does not increase the overall contribution to security of supply.
APA, Harvard, Vancouver, ISO, and other styles
42

Alyari, Robab, Jaber Karimpour, and Habib Izadkhah. "Specifying a New Requirement Model for Secure Adaptive Systems." Computer Journal 63, no. 8 (December 26, 2019): 1148–67. http://dx.doi.org/10.1093/comjnl/bxz124.

Full text
Abstract:
Abstract Security is a growing concern in developing software systems. It is important to face unknown threats in order to make the system continue operating properly. Threats are vague and attack methods change frequently. Coping with such changes is a major feature of an adaptive software. Therefore, designing an adaptive secure software is an appropriate solution to address software security challenges. Through estimation of maximum amount of system assets security, one can determine whether the system is protecting the assets or not; if not, reconfiguration can be employed. This paper proposes a new requirement model for secure adaptive systems using fuzzy, goal modeling and Description Logic concepts. The model contains three phases of modeling security aspects of the system, identifying formalizations and relations between the requirements and monitoring and adapting, when needed. To illustrate the relations between the requirements, goal modeling is used in the first phase and fuzzy Description Logic in the second phase. For the third phase, four algorithms are proposed to monitor and determine whether reconfiguration is needed or not. Theorems are given to prove concept satisfaction of the requirements. Furthermore, examples and case studies are discussed to evaluate and show applicability of the proposed model.
APA, Harvard, Vancouver, ISO, and other styles
43

Formby, William A., and Vergil L. Williams. "Assessing Security Manpower Needs for Industrial Sites." Industrial Management & Data Systems 85, no. 11/12 (November 1, 1985): 3–5. http://dx.doi.org/10.1108/eb057418.

Full text
Abstract:
The cost of providing security is a legitimate operational expense in any company, despite its increases in recent years. In many cases, a good security programme will inevitably pay for itself through the protection of company assets. Two case studies covering companies utilising access control systems demonstrate the means of maintaining an adequate level of security while containing costs. The application of this process, and its impact on particular organisations, will depend on the interpretation of what constitutes a mandatory activity and the amount of unplanned activities by the organisation. Only through a critical analysis of any given situation can these activities, and subsequently the amount of savings, be determined.
APA, Harvard, Vancouver, ISO, and other styles
44

Du, Yuan-Wei, and Qiong Song. "Ecological Security Evaluation for Marine Ranching Based on the PLTS/ANP Method: A Case Study of Rongcheng." Complexity 2022 (January 22, 2022): 1–16. http://dx.doi.org/10.1155/2022/2134296.

Full text
Abstract:
The evaluation index system of ecological security of marine ranching (MRES) is based on the assumption that there is independence among evaluation indexes in the existing studies, which ignores the complex interactive paths of marine ranching as an artificial ecosystem. In this study, the MRES evaluation network model that includes interdependent relationships is established based on the Driver-Pressure-State-Impact-Response model and the analytic network process method. Then, the probabilistic linguistic term sets and analytic network process methods are used to calculate the weights of the evaluation indexes of MRES. The overall evaluation value and the contribution rate of clusters are consequently defined and analyzed to reflect the performance of MRES. Finally, a case study is carried out for evaluating the MRES of marine ranches in Rongcheng by means of the proposed method. The conclusions are summarized as follows: (1) The weights of clusters are ranked as Responses > Impact > Driver > State > Pressure, and “scientific management of fishery resources” is the most important index; (2) the MRES performance of marine ranches in the city of Rongcheng is at the medium security grade on the whole, and all 11 samples are driven by the response.
APA, Harvard, Vancouver, ISO, and other styles
45

Lanas, Fernando J., Francisco J. Martínez-Conde, Diego Alvarado, Rodrigo Moreno, Patricio Mendoza-Araya, and Guillermo Jiménez-Estévez. "Non-Strategic Capacity Withholding from Distributed Energy Storage within Microgrids Providing Energy and Reserve Services." Energies 13, no. 19 (October 8, 2020): 5235. http://dx.doi.org/10.3390/en13195235.

Full text
Abstract:
Microgrids have the potential to provide security and flexibility to power systems through the integration of a wide range of resources, including distributed energy storage, usually in the form of batteries. An aggregation of microgrids can enable the participation of these resources in the main system’s energy and ancillary services market. The traditional minimum-cost operation, however, can undermine microgrid’s ability to hold reserve capacity for operation in islanded mode and can rapidly degrade distributed batteries. This paper studies the impacts of various operational strategies from distributed energy storage plants on their revenues and on market prices, considering an array of microgrids that act in a synchronized fashion. The operational model minimizes the entire electric power system cost, considering transmission-connected and distributed energy resources, and capturing capacity degradation of batteries as part of the cost function. Additionally, microgrid-based, distributed batteries can provide energy arbitrage and both system-level and microgrid-level security services. Through several case studies, we demonstrate the economic impacts of distributed energy storage providing these services, including also capacity degradation. We also demonstrate the benefits of providing reserve services in terms of extra revenue and battery lifespan. Finally, we conclude that limitations in the provision of system-level services from distributed batteries due to degradation considerations and higher microgrid-level security requirements may, counterintuitively, increase system-level revenues for storage owners, if such degradation considerations and microgrid-level security requirements are adopted, at once, by a large number of microgrids, leading to unintended, non-strategic capacity withholding by distributed storage owners.
APA, Harvard, Vancouver, ISO, and other styles
46

Zhang, Shuailiang, Xiujuan Du, and Xin Liu. "An Efficient and Provable Multifactor Mutual Authentication Protocol for Multigateway Wireless Sensor Networks." Security and Communication Networks 2021 (August 4, 2021): 1–17. http://dx.doi.org/10.1155/2021/2037188.

Full text
Abstract:
As the most popular way of communication technology at the moment, wireless sensor networks have been widely concerned by academia and industry and plays an important role in military, agriculture, medicine, and other fields. Identity authentication offers the first line of defence to ensure the security communication of wireless sensor networks. Since the sensor nodes are resource-limited in the wireless networks, how to design an efficient and secure protocol is extremely significant. The current authentication protocols have the problem that the sensor nodes need to execute heavy calculation and communication consumption during the authentication process and cannot resist node capture attack, and the protocols also cannot provide perfect forward and backward security and cannot resist replay attack. Multifactor identity authentication protocols can provide a higher rank of security than single-factor and two-factor identity authentication protocols. The multigateway wireless sensor networks’ structure can provide a larger communication coverage area than the single-gateway network structure, so it has become the focus of recent studies. Therefore, we design a novel multifactor authentication protocol for multigateway wireless sensor networks, which only apply the lightweight hash function and are given biometric information to achieve a higher level of security and efficiency and a larger communication coverage area. We separately apply BAN logic, random oracle model, and AVISPA tool to validate the security of our authentication protocol in Case 1 and Case 2. We put forward sixteen evaluation criteria to comprehensively evaluate our authentication protocol. Compared with the related authentication protocols, our authentication protocol is able to achieve higher security and efficiency.
APA, Harvard, Vancouver, ISO, and other styles
47

Yan, Wei, and Yinghua Song. "Security Optimization Management for loT-Assisted Bank Liquidity Risk Emergency Using Big Data Analytic-Based Case Reasoning." Wireless Communications and Mobile Computing 2022 (June 18, 2022): 1–13. http://dx.doi.org/10.1155/2022/8396931.

Full text
Abstract:
In modern times, financial institutions are the core carrier of efficient operation of financial markets. With the continuous development of financial models such as IoT (Internet of Things) finance, commercial banks have made many attempts in the integration and innovation of finance and logistics, but they have also increased the types and complexity of risks they face while improving financing efficiency. It has the characteristics of great destructiveness, strong infectivity, and high complexity. The establishment of a perfect emergency security optimization management for early warning of bank liquidity risk is an important part of timely detection and effective management of liquidity risk. In order to enable decision makers to accurately use the effective disposal of similar liquidity risk emergencies as a reference for decision-making, this paper studies the generation method of emergency security plan for bank liquidity risk using big data analytic-based case reasoning. Firstly, analyze the characteristics of various types of bank liquidity emergencies a, and identify the key risk points, and form the accident case database. Secondly, carry out the interval division according to the different numerical distribution characteristics of the indicators, and calculate the repeatability of the involved stages. Finally, calculate the comprehensive similarity to obtain the emergency security plan for reference. At the same time, taking A commercial bank as an example, verify the effectiveness of the method by using the constructed case-based reasoning model to generate emergency security plans intelligently. It provides reference for commercial bank liquidity risk management.
APA, Harvard, Vancouver, ISO, and other styles
48

Yu, Chao, Wenke Yang, Feiyu Xie, and Jianmin He. "Technology and Security Analysis of Cryptocurrency Based on Blockchain." Complexity 2022 (July 21, 2022): 1–15. http://dx.doi.org/10.1155/2022/5835457.

Full text
Abstract:
Blockchain technology applied to cryptocurrencies is the dominant factor in maintaining the security of cryptocurrencies. This article reviews the technological implementation of cryptocurrency and the security and stability of cryptocurrency and analyzes the security support from blockchain technology and its platforms based on empirical case studies. Our results show that the security support from blockchain technology platforms is significantly insufficient and immature. In addition, we further Zyskind and Nathan (2015) and Choi (2019) and find that the top ten platforms play critical roles in security support and have significant advantages in terms of funds, duration, and human resources. Moreover, these platforms provide computational resources and benefits to the consensus algorithm selection for blockchain practitioners. Second, encryption ensures the security of cryptocurrencies. On the one hand, the digital signatures identify the identity of the signatory and the transaction. However, the principle of the hash algorithm (SHA256) confirms ownership. Meanwhile, SHA256 is infeasible to compute in the reverse direction and is difficult to attack. Furthermore, the records in the blockchain can be queried by every participant, making the system information transparent and open reliable. Third, compared to the study of Fu and Fang 2016, we find that the blockchain structure is composed of security components and basic components of six layers that are independent and cannot be extended completely and have a certain coupling among them. Fourth, the underlying ledger structures of Bitcoin and DAG are highly correlated to their security. Specifically, we follow Sompolinsky et al. (2016) and detect that the structure of SPECTRE ensures network security and robustness from its block production, conflict resolution, and generated trusted transaction sets. Meanwhile, the voting algorithm of SPECTRE makes resolving conflicting transactions by calculating votes and ensuring the transaction information that is virtually unable to be tampered with possible. In particular, the security calculation power of SPECTRE can reach 51% and resist “double-spend attacks” and “censorship attacks” effectively. In addition, the RDL framework of SPECTRE achieves security confirmation of transferring funds. Moreover, PHANTOM identifies evil blocks by employing block connectivity analysis and ensures its security. Eventually, we also expand the studies of (Sompolinsky et al., 2016 and Sompolinsky et al., 2017) and compare the basic characteristics of the protocols of Bitcoin, SPECTRE, and PHANTOM and find that protocols play imperative roles throughout the implementation process of cryptocurrency. In addition, the underlying ledger structure and consensus mechanism make up a blockchain while the confirmation time, throughput limit, and ordering are prerequisites for smart contracts.
APA, Harvard, Vancouver, ISO, and other styles
49

Wang, Xiaoxin, Christopher Kendrick, Raymond Ogden, Bousmaha Baiche, and Nicholas Walliman. "Thermal modelling of an industrial building with solar reflective coatings on external surfaces: case studies in China and Australia." Journal of Building Performance Simulation 5, no. 3 (May 2012): 199–207. http://dx.doi.org/10.1080/19401493.2011.573096.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Varan, Metin, Akif Akgul, Fatih Kurugollu, Ahmet Sansli, and Kim Smith. "A Novel Security Methodology for Smart Grids: A Case Study of Microcomputer-Based Encryption for PMU Devices." Complexity 2021 (September 18, 2021): 1–15. http://dx.doi.org/10.1155/2021/2798534.

Full text
Abstract:
Coordination of a power system with the phasor measurement devices (PMUs) in real time on the load and generation sides is carried out within the context of smart grid studies. Power systems equipped with information systems in a smart grid pace with external security threats. Developing a smart grid which can resist against cyber threats is considered indispensable for the uninterrupted operation. In this study, a two-way secure communication methodology underpinned by a chaos-based encryption algorithm for PMU devices is proposed. The proposed system uses the IEEE-14 busbar system on which the optimum PMU placement has been installed. The proposed hyperchaotic system-based encryption method is applied as a new security methodology among PMU devices. The success of results is evaluated by the completeness of data exchange, durations, the complexity of encryption-decryption processes, and strength of cryptography using a microcomputer-based implementation. The results show that the proposed microcomputer-based encryption algorithms can be directly embedded as encryption hardware units into PMU and PDC devices which have very fast signal processing capabilities taking into considerations the acceptable delay time for power system protection and measuring applications and quality metering applications which is 2 ms and 10 ms, respectively. While proposed algorithms can be used in TCP or UDP over IP-based IEEE C37.118, IEC 61850, and IEC 61850-90-5 communication frameworks, they can also be embedded into electronic cards, smartcards, or smart tokens which are utilized for authentication among smart grid components.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography