Journal articles on the topic 'Mathematical data- Security'

To see the other types of publications on this topic, follow the link: Mathematical data- Security.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Mathematical data- Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Nurhidayati, Rika, and Salauddin Muis. "Analysis Of Voice Data Security Security By Using The Rc4 Algorithm." Jurnal Info Sains : Informatika dan Sains 11, no. 2 (September 1, 2021): 22–28. http://dx.doi.org/10.54209/infosains.v11i2.44.

Full text
Abstract:
Data security and confidentiality is one of the most important aspects in the field of communication, especially communication using computer media. One of the fields of science that is used to secure data is cryptography. Cryptography is a science that uses mathematical equations to encrypt and decrypt data. Encryption is the process of converting plaintext (readable data) into ciphertext (unreadable data) and decryption is the opposite of encryption, which changes ciphertext back into plaintext. In this study, the RC4 algorithm will be discussed to encrypt and decrypt mp3 files stored on the computer.
APA, Harvard, Vancouver, ISO, and other styles
2

Erkayev, Husan Ahmadaliyevich. "MATHEMATICAL MODEL OF CRYPTOGRAPHICAL HISTORICAL CODE ALGORITHMS TO DATA SECURITY." Theoretical & Applied Science 89, no. 09 (September 30, 2020): 30–33. http://dx.doi.org/10.15863/tas.2020.09.89.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Saksonov, E. A. "Method of Depersonalization of Personal Data." INFORMACIONNYE TEHNOLOGII 27, no. 6 (June 9, 2021): 314–21. http://dx.doi.org/10.17587/it.27.314-321.

Full text
Abstract:
A method of depersonalization of large amounts of personal data is proposed. The method preserves the structure and semantics of data, allows you to increase the security of depersonalized data and process personal data without prior depersonalization. A mathematical model of the method is developed. Estimates of security depersonalized data are obtained.
APA, Harvard, Vancouver, ISO, and other styles
4

Hub, Miloslav, and Agnès Kateřina Příhodová. "Impact of Globalisation on Data Security – Authentication Issues." SHS Web of Conferences 92 (2021): 05009. http://dx.doi.org/10.1051/shsconf/20219205009.

Full text
Abstract:
Research background: In today’s globalised world, there is an increasing need for reliable verification of users’ identity accessing various types of information systems. This verification is realised through authentication, which is traditionally divided according to the kind of identification mark that is used: knowledge authentication (e.g., passwords, control questions), authentication through an authentication object (e.g., magnetic cards, smart cards) and biometric authentication (e.g., voice, face recognition). However, it should be noted that this identity may not only be the specific identity of the user but also, for example, his group affiliation or ability. Purpose of the article: This paper aims to identify and describe the impact of globalisation on selected types of authentication. Methods: As the representative of the current methods of authentication of persons are selected a password authentication and hand-based biometric authentication. The most often used methods of password attacks are simulated through mathematical modelling, and the results are compared concerning the timeline. Through modelling, multi characteristics authentication using the thermal characteristics of the hand will be presented. Findings & Value added: Through mathematical modelling, the article demonstrates the influence of globalisation on the resilience of passwords to the most commonly used attacks and discusses the impact of globalisation on the requirements for modern forms of authentication.
APA, Harvard, Vancouver, ISO, and other styles
5

Horubała, Aleksandra, Daniel Waszkiewicz, Michał Andrzejczak, and Piotr Sapiecha. "Data confidentiality and computations hiding in cloud services for public administration." Computer Science and Mathematical Modelling, no. 7/2018 (July 18, 2018): 11–18. http://dx.doi.org/10.5604/01.3001.0012.2001.

Full text
Abstract:
Cloud services are gaining interest and are very interesting option for public administration. Although, there is a lot of concern about security and privacy of storing personal data in cloud. In this work mathematical tools for securing data and hiding computations are presented. Data privacy is obtained by using homomorphic encryption schemes. Computation hiding is done by algorithm cryptographic obfuscation. Both primitives are presented and their application for public administration is discussed.
APA, Harvard, Vancouver, ISO, and other styles
6

Bolshakov, A. S., A. I. Zhila, and A. V. Osin. "FUZZY LOGIC DATA PROTECTION MANAGEMENT." H&ES Research 13, no. 4 (2021): 37–47. http://dx.doi.org/10.36724/2409-5419-2021-13-4-37-47.

Full text
Abstract:
Introduction: to ensure the necessary level of personal data security in computer systems, it is advisable to create an information security management system that would allow you to help choose protective measures for certain input data. Purpose: to develop an algorithm for the personal data protection model that allows considering a set of input factors for making decisions on information security. Methods: it is proposed to use the fuzzy inference apparatus as a mathematical apparatus for describing such a situation. The main advantage of using this mathematical approach in modeling a control system is the description of conditions and methods for solving problems under uncertainty. Results: when building an information security management system, defined a set of rules and study the influence of changes in input variables on a set of protective measures. The model developed on the basis of this algorithm using fuzzy inference identifies the impact of information security threats on decision-making on the choice of measures to protect personal data in a computer system. The result of threat modeling is also planning that illustrate the relationship between the input and output parameters of the model. These planes allow you to determine the management decision on the choice of measures depending on the values of the selected parameters. The paper proposes three thresholds for the values of each of the protective measures, which determine the need for the measures used to neutralize the simulated threats. The influence of input variables on the output values of the constructed model identify a change in the distribution of the terms of the membership functions of the input parameters, the change of which can significantly affect the final decision on information security management. Discussion: the results of the work indicate the need for an adequate description of both the input variables and the response of the output variables of the model to the input variables in order to take effective measures to protect information.
APA, Harvard, Vancouver, ISO, and other styles
7

Henge, Santosh Kumar, Gitanjali Jayaraman, M. Sreedevi, R. Rajakumar, Mamoon Rashid, Sultan S. Alshamrani, Mrim M. Alnfiai, and Ahmed Saeed AlGhamdi. "Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology." Networks and Heterogeneous Media 18, no. 3 (2023): 1313–34. http://dx.doi.org/10.3934/nhm.2023057.

Full text
Abstract:
<abstract> <p>The central remote servers are essential for storing and processing data for cloud computing evaluation. However, traditional systems need to improve their ability to provide technical data security solutions. Many data security challenges and complexities await technical solutions in today's fast-growing technology. These complexities will not be resolved by combining all secure encryption techniques. Quantum computing efficiently evolves composite algorithms, allowing for natural advances in cyber security, forensics, artificial intelligence, and machine learning-based complex systems. It also demonstrates solutions to many challenging problems in cloud computing security. This study proposes a user-storage-transit-server authentication process model based on secure keys data distribution and mathematical post-quantum cryptography methodology. The post-quantum cryptography mathematical algorithm is used in this study to involve the quantum computing-based distribution of security keys. It provides security scenarios and technical options for securing data in transit, storage, user, and server modes. Post-quantum cryptography has defined and included the mathematical algorithm in generating the distributed security key and the data in transit, on-storage, and on-editing. It has involved reversible computations on many different numbers by super positioning the qubits to provide quantum services and other product-based cloud-online access used to process the end-user's artificial intelligence-based hardware service components. This study will help researchers and industry experts prepare specific scenarios for synchronizing data with medicine, finance, engineering, and banking cloud servers. The proposed methodology is implemented with single-tenant, multi-tenant, and cloud-tenant-level servers and a database server. This model is designed for four enterprises with 245 users, and it employs integration parity rules that are implemented using salting techniques. The experimental scenario considers the plain text size ranging from 24 to 8248 for analyzing secure key data distribution, key generation, encryption, and decryption time variations. The key generation and encryption time variations are 2.3233 ms to 8.7277 ms at quantum-level 1 and 0.0355 ms to 1.8491 ms at quantum-level 2. The key generation and decryption time variations are 2.1533 ms to 19.4799 ms at quantum-level 1 and 0.0525 ms to 3.3513 ms at quantum-level 2.</p> </abstract>
APA, Harvard, Vancouver, ISO, and other styles
8

Raj, A. Samson Arun, R. Venkatesan, S. Malathi, V. D. Ambeth Kumar, E. Thenmozhi, Anbarasu Dhandapani, M. Ashok Kumar, and B. Chitra. "A Mathematical Queuing Model Analysis Using Secure Data Authentication Framework for Modern Healthcare Applications." Journal of Sensors 2022 (September 16, 2022): 1–15. http://dx.doi.org/10.1155/2022/8397635.

Full text
Abstract:
Healthcare application is one of the most promising developments to provide on-time demand services to the end users, vehicles, and other Road Side Units (RSUs) in the urban environment. In recent years, several application interfaces have been developed to connect, communicate, and share the required services from one source to another. However, the urban environment holds a complex entity of both homogenous and heterogeneous devices to which the communication/sensing range between the devices leads to connectivity breakage, lack of needed service in time, and other environmental constraints. Also, security plays a vital role in allowing everyone in the urban area to access/request services according to their needs. Again, this leads to a massive breakthrough in providing reliable service to authentic users or a catastrophic failure of service denial involving unauthorized user access. This paper proposes a novel topological architecture, Secure Authentication Relay-based Urban Network (S-ARUN), designed for healthcare and other smart city applications for registered transportation stakeholders. The registered stakeholders hold a built-in data security framework with three subsystems connected to the S-ARUN topology: (1) authentication subsystem: the stakeholder must identify themselves to the source responder as part of the authentication subsystem before transmitting the actual data service request; (2) connectivity subsystem: to periodically check the connection state of stakeholders as they travel along with the road pattern; and (3) service subsystem: each source responder will keep a separate queue for collecting data service requests, processing them quickly, and sending the results to the appropriate stakeholder. The Kerberos authentication method is used in working with S-ARUN’s model to connect the stakeholders securely and legitimately. The performance of the proposed S-ARUN is assessed, and the performance metric toward key generation and other data security-related metrics is tested with existing schemes.
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Yutang, and Qin Zhang. "Mathematical Modeling of Static Data Attribute Encryption Based on Big Data Technology." Journal of Function Spaces 2022 (August 2, 2022): 1–10. http://dx.doi.org/10.1155/2022/4292063.

Full text
Abstract:
Attribute encryption is an effective one to many network communication technologies, which supports flexible access control strategies and is very suitable for fine-grained access control in large-scale information systems. In order to improve the attributes of static data, encryption technology can provide a reliable technical guarantee for network security. This paper presents a mathematical modeling method of static data attribute encryption based on big data technology. The big data redundancy elimination algorithm based on similarity calculation is analyzed. By using static data attribute encryption based on big data technology, the length of encrypted data packets will not increase, and partial redundancy of fragments can be eliminated, which can greatly improve the efficiency of the system. The attribute-based encryption mechanism uses attributes as public keys, and the decryption user is a group; so, the encryption efficiency is very high. It can realize efficient encryption and decryption, as well as flexible access control based on user attributes. This scheme can reflect the importance of attributes; so, it is more practical.
APA, Harvard, Vancouver, ISO, and other styles
10

Boychenko, O. V., and D. V. Ivanyuta. "INFORMATION SECURITY MODELS." Construction economic and environmental management 80, no. 3 (2022): 33–39. http://dx.doi.org/10.37279/2519-4453-2021-3-33-39.

Full text
Abstract:
This article considers the problem of ensuring information security in modern conditions. The analysis of a possible solution to this problem is carried out by constructing information security models: conceptual, mathematical and functional. Taking into account the improvement of strategic information security management and new technologies in the computer sphere, an attempt is made to consider in detail the conceptual model of information security, the importance and necessity of which is associated with an increase in the volume of transmitted, used and stored data, as well as the implementation in practice of protecting the information rights of users using the proposed mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
11

Sutrisno, Agus, Aang Nuryaman, Muslim Ansori, and Ahmad Faisol. "Image Cryptography Based On A Second-Order QRT Difference Equation." International Journal of Mathematical, Engineering and Management Sciences 7, no. 3 (May 8, 2022): 399–416. http://dx.doi.org/10.33889/ijmems.2022.7.3.027.

Full text
Abstract:
The use of mathematical concepts of mapping in cryptography provides advantages in securing text or image data. The qualitative properties of mapping can preserve data that is kept confidential. Two of the essential properties in the mapping are the reversible and the preserving area. In this article, besides constructing a linear mapping derived from a second-order QRT difference equation and examining its qualitative properties, the coding procedure is used to encrypt text and fractal images based on the two-dimensional linear maps. For the digital text and image security algorithms, we developed the pseudo code algorithm implemented in Mathematica®. The proposed encoding technique will be compared with a 2D mKdV linear map to demonstrate its efficacy.
APA, Harvard, Vancouver, ISO, and other styles
12

Imankulova, B., S. Alpar, and S. Amanzholova. "DATA SECURITY, MODELING AND VISUALIZATION OF DATA FROM IOT DEVICES." Scientific Journal of Astana IT University 10 (June 30, 2022): 107–18. http://dx.doi.org/10.37943/acwt2121.

Full text
Abstract:
The article describes the IoT infrastructure, the hardware of the IoT system, considers the issue of security of the chosen LoRa data transmission technology. Data was received from sensors for gas, temperature and humidity, atmospheric pressure, as well as the location of the end device. At the same time, the standardized security features of the selected LoRa technology for transmitting data from sensors to the server were investigated. The article deals with LoRa bi-directional secure communication line, the security function requires devices/end devices to be configured through the LoRa gateway. Security research is devoted to the development of a security mechanism to increase its resilience. The payload was formed with a hash of the last bytes, and the entire payload was encrypted with AES for integrity and confidentiality. A method for assessing and visualizing atmospheric air pollution is given on the example of the city of Almaty, Kazakhstan. The process of numerical modeling of the study of emissions of harmful substances into the atmosphere is based on a mathematical model formed by the system of Navier-Stokes equations, consisting of the continuity equation, as well as the equations of motion and the k-epsilon turbulence model. To test the numerical methods for processing mixing and chemical reactions, a test problem was chosen – a jet in a transverse flow. Three-dimensional numerical simulation has been implemented. The use of the Internet of Things (IoT) and the acquisition of big data made it possible to simultaneously observe the concentrations of several pollutants in the atmosphere, calculate this concentration and analyze the state of the surface air layer. Modeling allows forecasting the possible concentration of pollutants in certain areas at certain times of the year.
APA, Harvard, Vancouver, ISO, and other styles
13

Khandare, Snehal D., and Dr Shubhada S. Thakare. "Video Steganography Based on Modified Data Protection Scheme." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (August 31, 2023): 876–84. http://dx.doi.org/10.22214/ijraset.2023.55251.

Full text
Abstract:
Abstract: Since last few years, communication technology more focus about significance over information security during sharing on different platform by using internet service. Also in this world of computer we see everyone is exchange their personal as well as other type of information through the web. The main factor is that how to keep information unchanged while verifying it also keep it safe up to reaches the recipient. One component of the solution to these kind of problems is cryptography. Also steganography can be used security purpose to keep data safe. By Using mathematical techniques and the stego keys the issue how to store them safely
APA, Harvard, Vancouver, ISO, and other styles
14

Aljazaery, Ibtisam A., Haider Th Salim Alrikabi, and Mustafa Rabea Aziz. "Combination of Hiding and Encryption for Data Security." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 09 (June 17, 2020): 34. http://dx.doi.org/10.3991/ijim.v14i09.14173.

Full text
Abstract:
<pre>One of the techniques used in information security is the concealment technique, where the information to be hidden within another information medium to be saved in the process of messaging between two sides without detection. In this paper, an algorithm was proposed to conceal and encrypt data using several means.in order to ensure its preservation from detection and hackers. Wavelet transformer was used to change the shape of a wave of information (one and two-dimensional data) and its different mathematical formulas. Two sets of data were used, the first group used in a hidden process. The second group was considered as a means of both embedding and encryption. The data in the second group is reduced to the extent of sufficient for the modulation process, by extracting its high-value properties and then removing them from the mother's information wave. The process of encrypting of the two sets of data comes together using an exponential function. The result is undetectable information signals. Algorithms were built to hide and encrypt one and two-dimensional data. High-security signals and images were obtained. Decryption algorithms were built to return encrypted data to their original forms, and getting the replica data.</pre><p> </p>
APA, Harvard, Vancouver, ISO, and other styles
15

Santoso, Yogi Suryo. "Message Security Using a Combination of Hill Cipher and RSA Algorithms." Jurnal Matematika Dan Ilmu Pengetahuan Alam LLDikti Wilayah 1 (JUMPA) 1, no. 1 (March 30, 2021): 20–28. http://dx.doi.org/10.54076/jumpa.v1i1.38.

Full text
Abstract:
The process of exchanging digital messages is increasingly being used due to its easy and practical use. But the process of exchanging digital messages is vulnerable to being tapped by unauthorized people. Cryptography is the study of mathematical techniques related to aspects of information security, such as data confidentiality, data validity, data integrity, and data authentication. With cryptography, the process of exchanging messages between two people can be done securely. Thus, cryptographic techniques are used to overcome security issues when exchanging messages. The methods used in this study are hybrid hill cipher and RSA cryptography. In this study it was shown that hybrid hill cipher cryptography with a 3x3 matrix key and RSA with a 512 bit key can overcome security issues when exchanging data so that messages sent cannot be read by unauthorized people.
APA, Harvard, Vancouver, ISO, and other styles
16

Poltavtseva, Maria. "Active Monitoring Model as a Basis for Security Management of Industrial CPS." Voprosy kiberbezopasnosti, no. 2(42) (2021): 51–60. http://dx.doi.org/10.21681/2311-3456-2021-2-51-60.

Full text
Abstract:
Purpose of the article – creating a model of active security monitoring that meets the current conditions for industrial cyber-physical systems. Methods of the study. The work concretizes the relationship between monitoring and security management processes in the form of a set of monitoring functions for the management implementation. The active monitoring model is defined using a threefold mapping of security goals, mathematical methods, and security object data. Based on this mapping, the paper formulates the reachability and minimality conditions of monitoring technological components (data and mathematical methods) with respect to security purposes and tasks. Results of the study. The article contains a management and control scheme based on the proposed active monitoring model. The workflow includes steps to evaluate, adjust the set of methods used, adjust the data collected, and verify that the security purpose has been achieved. Active monitoring of information security of digitalized objects, including industrial cyber-physical systems, will increase awareness in security management and provide the required level of protection in changing conditions.
APA, Harvard, Vancouver, ISO, and other styles
17

Kapopara, Eeva N., and Dr Prashant P. Pittalia. "A proposed approach for the key generation in cryptography to enrich the data confidentiality while sharing data over the network." Journal of Artificial Intelligence, Machine Learning and Neural Network, no. 24 (July 31, 2022): 26–32. http://dx.doi.org/10.55529/jaimlnn.24.26.32.

Full text
Abstract:
Data sharing over network has been threat in the digital world. To provide the security to the data being passed over the network various system has been defined. Most widely used systems are cryptography and steganography. Cryptography is the art of converting the data to some another format which will not be understandable by the intruders. The most important phase while sharing data over network using cryptography is the key generation and key distribution. General cryptography techniques either uses public key or uses public and private key both. The major focus of the propose method is not to commute keys with the data being shared over network. Proposed approach defines a method which will get feedback from the receiver and system will identify whether the receiver is undeniable or not. If the receiver is undeniable then only the data will be decrypted to the original to the original format. In this paper we have surveyed many traditional algorithms related to symmetric key and asymmetric key cryptography. Many mathematical operations are being applied to generate the complex keys to ensure security. This approach defines the complexity with almost no mathematical complexity and using no traditional approach for the key generation which are widely known.
APA, Harvard, Vancouver, ISO, and other styles
18

Akhramovich, Volodymyr. "METHOD OF CALCULATING THE PROTECTION OF PERSONAL DATA FROM THE NETWORK CLUSTERING FACTOR." Cybersecurity: Education, Science, Technique 2, no. 14 (2021): 36–49. http://dx.doi.org/10.28925/2663-4023.2021.14.3649.

Full text
Abstract:
A mathematical model has been developed and a study of the model of personal data protection from network clustering coefficient and data transfer intensity in social networks has been carried out. Dependencies of protection of the system from the size of the system (and from the amount of personal data); information security threats from the network clustering factor. A system of linear equations is obtained, which consists of the equation: rate of change of information flow from social network security and coefficients that reflect the impact of security measures, amount of personal data, leakage rate, change of information protection from network clustering factor, its size, personal data protection. As a result of solving the system of differential equations, mathematical and graphical dependences of the indicator of personal data protection in the social network from different components are obtained. Considering three options for solving the equation near the steady state of the system, we can conclude that, based on the conditions of the ratio of dissipation and natural frequency, the attenuation of the latter to a certain value is carried out periodically, with decaying amplitude, or by exponentially decaying law. A more visual analysis of the system behavior is performed, moving from the differential form of equations to the discrete one and modeling some interval of the system existence. Mathematical and graphical dependences of the system natural frequency, oscillation period, attenuation coefficient are presented. Simulation modeling for values with deviation from the stationary position of the system is carried out. As a result of simulation, it is proved that the social network protection system is nonlinear.
APA, Harvard, Vancouver, ISO, and other styles
19

Kazakova, Nataliya. "Predictive Financial Security Analytics Using Industry Paradigm and Big Data Technology." Auditor 8, no. 12 (February 6, 2023): 37–43. http://dx.doi.org/10.12737/1998-0701-2022-8-12-37-43.

Full text
Abstract:
An approach to the development of an algorithm and methodological tools for predicting the financial security of companies is considered, based on the risk-based concept of international financial reporting and auditing standards, the Harvard paradigm of industry analysis, which has been developed in modern studies in the fi eld of sustainable development and risk-based methods, as well as on the use of mathematical and statistical tools and modern big data technologies in economic research. Th e practical novelty of the proposed methodological tools lies in the complexity of assessing the risks of financial solvency (risk factors of the probability of bankruptcy), which may be in demand in audit and arbitration practice.
APA, Harvard, Vancouver, ISO, and other styles
20

Idris, Samwal, Anjali Mathur, and Asdaque Hussain. "Novel Enhanced Algorithm Based on DNA Cryptography to Secure Data Transfer over Network." Journal of Physics: Conference Series 2040, no. 1 (October 1, 2021): 012047. http://dx.doi.org/10.1088/1742-6596/2040/1/012047.

Full text
Abstract:
Abstract As the crime rates are increasing, the process of ensuring security has become one of the important demands in wide networks. There is always a chance by third-party to threatened the data privacy and security, which led to continued development the information security. Cryptography defined as the process of encoding or encoding data to make it incomprehensible using mathematical operations. DNA cryptography is a new branch of DNA computation that represents a new era of technology in security for data transfer over the internet. In this paper, a Novel Algorithm Based on DNA Cryptography and Combination with One Time Pad and Caesar cipher has been introduced. The output of the algorithm is the tested using National Institute of Standards and Technology (NIST) statistical test suite much time to check the strength of an algorithm with the encrypted text. The algorithm has shown promising results.
APA, Harvard, Vancouver, ISO, and other styles
21

Le, Ngoc Thuy, and Doan B. Hoang. "A Threat Computation Model using a Markov Chain and Common Vulnerability Scoring System and its Application to Cloud Security." Journal of Telecommunications and the Digital Economy 7, no. 1 (March 30, 2019): 37–56. http://dx.doi.org/10.18080/jtde.v7n1.181.

Full text
Abstract:
Securing cyber infrastructures has become critical because they are increasingly exposed to attackers while accommodating a huge number of IoT devices and supporting numerous sophisticated emerging applications. Security metrics are essential for assessing the security risks and making effective decisions concerning system security. Many security metrics rely on mathematical models, but are mainly based on empirical data, qualitative methods, or compliance checking, and this renders the outcome far from satisfactory. Computing the probability of an attack, or more precisely a threat that materialises into an attack, forms an essential basis for a quantitative security metric. This paper proposes a novel approach to compute the probability distribution of cloud security threats based on a Markov chain and Common Vulnerability Scoring System. Moreover, the paper introduces the method to estimate the probability of security attacks. The use of the new security threat model and its computation is demonstrated through their application to estimating the probabilities of cloud threats and types of attacks.
APA, Harvard, Vancouver, ISO, and other styles
22

Lin, Xiuchun. "Network Security Technology of Supply Chain Management Based on Internet of Things and Big Data." Computational Intelligence and Neuroscience 2022 (June 21, 2022): 1–12. http://dx.doi.org/10.1155/2022/7753086.

Full text
Abstract:
In order to improve the network security of supply chain management based on the Internet of Things and big data, this paper studies the Internet of Things and big data technology and analyzes the data processing process of the Internet of Things. On the premise that the terminal device meets the requirements of delay and energy consumption, a data offloading encryption model is established to offload data to multiple edge servers for encryption. In addition, this paper proposes an optimization problem including overall security, delay, and equipment energy consumption and establishes a mathematical model that maximizes overall security under the condition of satisfying the requirements of delay and equipment energy consumption. From the simulation data, it can be seen that the network security technology of supply chain management based on the Internet of Things and big data proposed in this paper can achieve effective management and control of supply chain nodes and improve their information security.
APA, Harvard, Vancouver, ISO, and other styles
23

HRYTSUN, Viktoriia. "STATISTICAL SECURITY OF ECONOMIC MANAGEMENT." Herald of Khmelnytskyi National University. Economic sciences 318, no. 3 (May 25, 2023): 180–85. http://dx.doi.org/10.31891/2307-5740-2023-318-3-28.

Full text
Abstract:
Modern integrated economic statistics is a set of economic and statistical data that reflect a consistent and holistic picture of economic activity for political, commercial and other analytical purposes. In analyzing the historical aspect of the emergence and development of statistical practice, we have shown that its origin occurred around the time when the state emerged. There is information about the elementary recount (census) of population and land, which was conducted several millennia ago. With the formation of a centralized state and especially with its development, the scope of statistics has expanded significantly. It is established that the statistical support of effective development of enterprises of Ukraine in the scale of a particular industry can be realized according to official statistics, namely: statistical observations of the volume of sold industrial products and operating costs of sold products. It is emphasized that today the volume and structure of data presented on the official website of statistics of Ukraine, is considered insufficient for full information support of management processes of industrial enterprises. The approaches of scholars to the interpretation of the role of statistical methods of analysis for successful economic management are considered. The basic mathematical and statistical methods are listed and their short characteristic is given. It is established that the profitability indicator is chosen as a general indicator of efficiency and technological level of enterprises of the studied industries. Construction of the economic and mathematical model of profitability of products of separate industries made it possible to reveal production reserves to increase the efficiency of the enterprises. For mechanical engineering it means reducing the capital intensity of products used funds (depreciation). For metallurgy it means a reduction in material and labor intensity of products. For the production of chemical products it is reducing material consumption. When choosing statistical methods for studying socio-economic phenomena, it is necessary to take into account their interconnectedness and interdependence. Based on the results, the priority for the development of management decisions for the effective development of processing enterprises should be to increase the degree of processing of raw materials (to increase the technological level of production), increase productivity of fixed assets and increase final consumption.
APA, Harvard, Vancouver, ISO, and other styles
24

Dormidontov, A. V., L. V. Mironova, and V. S. Mironov. "POSSIBILITY OF THE MATHEMATICAL MODEL OF COUNTERACTION APPLICATION TO THE ASSESSMENT OF TRANSPORT INFRASTRUCTURE SECURITY LEVEL." Civil Aviation High TECHNOLOGIES 21, no. 3 (July 3, 2018): 67–77. http://dx.doi.org/10.26467/2079-0619-2018-21-3-67-77.

Full text
Abstract:
The air transport infrastructure objects security is the state level problem as the part of national and public security of the country. One of the directions in this field is the vulnerability assessment procedure for transport infrastructure objects and on the basis of this procedure the elaboration of ensuring their safety recommendations takes place. The mathematical substantiation of recommendations and their possible implementation is an important part of the marked problem. The possibility of mathematical model of counteraction application, which assesses the offender’s potential and the security’s potential based on evaluative dimensions of the offender and the security system, is under consideration. Assume as a basis the mathematical description model of interaction nature between defender-offender system components, the model known as the competition predator-prey model with quantitative qualitative characteristic parameters of the two systems is taken. The model is modified classical model of Lotka-Volterra competition, which allows us to estimate changes in the danger level formation with reference to the transport infrastructure object and the object security level. The analysis of possible model states is made. The control parameters of the model are described. The mathematical apparatus, which is able to evaluate the danger level, the level of transport infrastructure objects protection, to reveal parameters reducing security system potential and to perform the control parameters data is given. The presented mathematical model identifies the parameters which reduce the security system potential and controls these parameters. The management can be carried out for the purpose of system transfer from one steady state to another, preservation of its operability, increase of its operation cycle and compliance to modern safety requirements. The system of Defender-offender equations correct usage allows us to justify the configurable security system of transport infrastructure objects on the basis of the specified security level.
APA, Harvard, Vancouver, ISO, and other styles
25

Akhramovych, Volodymyr. "Method of calculating of the information in social networks protection depending on the number of communities." Collection "Information Technology and Security" 11, no. 1 (June 29, 2023): 15–26. http://dx.doi.org/10.20535/2411-1031.2023.11.1.279868.

Full text
Abstract:
A mathematical model (linear system of differential equations) was developed and a research of the model of personal data protection against the number of communities and the intensity of data transfer in social networks was conducted. The linear system of information protection in social networks in the mathematical sense of this term is considered. When described by linear models, the object should be linear, at least approximately. This approach makes it quite simple to consider mathematical models. If such a thing is not noticed, it is necessary to examine the security system for linearity. Such dependecies has been studied: the dependence of the amount of information flow in the social network on the components of information protection, the amount of personal data, and the speed of the data flow; the security of the system on the size of the system (as well as on the amount of personal data); information security threats on the number of communities, and also calculated: – coefficient representing the impact of information protection measures; – coefficient representing the impact of data leakage rate; – the coefficient representing the influence of the amount of data on its leakage; – the coefficient representing the influence of the system size on system security; – coefficient representing the impact of system security on data leakage; – the number of connections in the social networks; – number of vertices in the social networks; – the parameter can be used to configure the network partitioning algorithm. The solution has been obtained - the harmonic oscillator equation, which breaks down into three cases: pre-resonance zone, resonance zone and post-resonance zone. So, the impact of the parameters of the number of communities on the parameters of the social network security system was investigated. Such a study is useful and important from the point of view of information protection in the network, since the parameters of the number of communities has significant influence, up to 100%, per protection indicator. As the result of research, it was established that social network security systems are non-linear.
APA, Harvard, Vancouver, ISO, and other styles
26

Milian, Yanuar Chris, and Wiwin Sulistyo. "Model Pengembangan Keamanan Data dengan Algoritma ROT 13 Extended Vernam Cipher dan Stream Cipher." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 7, no. 2 (April 1, 2023): 208–16. http://dx.doi.org/10.35870/jtik.v7i2.716.

Full text
Abstract:
This research focuses on the importance of data security in maintaining confidentiality, particularly for sensitive and critical information that should only be accessed by certain parties. Cryptography is a mathematical method used to secure data. Several methods are available, including ROT13, Vernam Cipher, and Stream Cipher. This study combines these three methods to achieve a higher level of data security. The analysis shows that the combination of these algorithms results in a stronger and more complex encryption process than using a single method. The process involves encrypting plaintext using ROT13, followed by encrypting the result using Vernam Cipher with an inputted key, and then encrypting the output again using Stream Cipher. The advantages of this combination model include enhanced data security, as demonstrated by the three-stage encryption and decryption process.
APA, Harvard, Vancouver, ISO, and other styles
27

Setti, Sunil, Indra Gunawan, Bahrudi Efendi Damanik, Sumarno Sumarno, and Ika Okta Kirana. "Implementasi Algoritma Advanced Encryption Standard dalam Pengamanan Data Penjualan Ramayana Department Store." JURIKOM (Jurnal Riset Komputer) 7, no. 1 (February 15, 2020): 182. http://dx.doi.org/10.30865/jurikom.v7i1.1960.

Full text
Abstract:
Ramayana Department Store is one of the companies engaged in the business of retail supermarket. The company uses computer science technology applied in servicing activities, particularly in the sales data storage. Sales data is the information generated from sales transaction activities that obtained by the company through marketing activities to make profits. The use of computers in storing sales data is used to improve data security so that the valuable information can be confidentiality guaranteed. To avoid data theft and data manipulation,we need to implement a security system. Cryptography is a science that uses mathematical equations to keep the information secure such as data confidentiality, data validity, data integrity, and data authentication. A method that can be used to secure messages / information is the Advanced Encryption Standard (AES). The application of the AES cryptography algorithm in securing the sales data of the Ramayana Department Store shows that the algorithm can make encryption that cannot be read or understood by humans and make decryption that exactly same with the initial plaintext input. The difference of the key and the size of a file also affecting the time required to perform the encryption and decryption process
APA, Harvard, Vancouver, ISO, and other styles
28

Yang, Min. "Information Security Risk Management Model for Big Data." Advances in Multimedia 2022 (August 8, 2022): 1–10. http://dx.doi.org/10.1155/2022/3383251.

Full text
Abstract:
In the current society of rapid expansion of information, big data have achieved vigorous development in all walks of life, considerably promoting data transmission and information sharing. Meanwhile, individuals are becoming increasingly reliant on big data and the Internet, but at the same time, the threat of information security posed by big data is becoming increasingly visible. As a result, how to protect the information security of big data has piqued the interest of both government and businesses. The essence of information security management is risk management, which is closely related to each other. Therefore, this study focuses on the following two aspects of research work. On the one hand, most existing risk management models merely describe risk management in the abstract from a macro-level, and they lack research on risk assessment, making them ineffective. This research builds a novel information security risk management model on the basis of existing risk management models based on the concept of multidimensional risk management. To achieve multidimensional dynamic management of big data risks and to keep them within an acceptable range as much as possible, the model is divided into five levels and two dimensions. On the other hand, this research also optimizes and improves the fuzzy mathematical analysis method and proposes a fuzzy comprehensive assessment method as the core algorithm for the risk assessment layer in the model. As a post-event risk assessment method, the advantage of this method is that it can comprehensively consider factors affecting risk and can quantify some assessment factors in the real network to achieve an effective combination of qualitative and quantitative, thereby providing a basis for decision-making in risk analysis and risk control. Finally, the effectiveness of the risk model in the real application is verified by example analysis, and it is intended that the study work would provide assistance and assurance for big data information security management.
APA, Harvard, Vancouver, ISO, and other styles
29

Mazur, Katarzyna, Bogdan Ksiezopolski, and Adam Wierzbicki. "On Security Management: Improving Energy Efficiency, Decreasing Negative Environmental Impact, and Reducing Financial Costs for Data Centers." Mathematical Problems in Engineering 2015 (2015): 1–19. http://dx.doi.org/10.1155/2015/418535.

Full text
Abstract:
Security management is one of the most significant issues in nowadays data centers. Selection of appropriate security mechanisms and effective energy consumption management together with caring for the environment enforces a profound analysis of the considered system. In this paper, we propose a specialized decision support system with a multilevel, comprehensive analysis scheme. As a result of the extensive use of mathematical methods and statistics, guidelines and indicators returned by the proposed approach facilitate the decision-making process and conserve decision-maker’s time and attention. In the paper we utilized proposed multilevel analysis scheme to manage security-based data flow in the example data center. Determining the most secure, energy-efficient, environmental friendly security mechanisms, we implemented the role-based access control method in Quality of Protection Modeling Language (QoP-ML) and evaluated its performance in terms of mentioned factors.
APA, Harvard, Vancouver, ISO, and other styles
30

Glushchenko, L. A., V. A. Golovkov, M. G. Karin, K. K. Morgunov, and V. I. Tupota. "Mathematical model of security of the information circulating in the open optical data link channel." Optical Memory and Neural Networks 19, no. 4 (December 2010): 338–43. http://dx.doi.org/10.3103/s1060992x10040120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Lukova-Chuiko, N. V., O. A. Laptev, O. V. Barabash, A. P. Musienko, and V. M. Akhramovich. "THE METHOD OF CALCULATION OF PERSONAL DATA PROTECTION ON THE BASIS OF A SET OF SPECIFIC PARAMETERS OF SOCIAL NETWORKS." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 76 (2022): 54–68. http://dx.doi.org/10.17721/2519-481x/2022/76-05.

Full text
Abstract:
In Ukraine, the right to protection of personal data is a constitutional guarantee, and the protection of personal data is one of the areas in which such a guarantee should be implemented. The subject of our research will not be objects in general, but dynamic systems of information protection in social networks in the mathematical sense of the term. The study developed a linear mathematical model and conducted a survey of the model of protection of personal data from a set of specific network parameters and the intensity of data transmission in social networks. Dependencies are considered: the amount of information flow in the social network from the components of information protection, personal data, and data flow rate; security of the system from the size of the system and from the amount of personal data; information security threats from a set of specific network parameters.A system of linear equations is obtained, which consists of the equation: rate of change of information flow from social network security and coefficients that reflect the impact of security measures, amount of personal data, leakage rate, changes in information protection from a set of specific network parameters, its size, personal data protection As a result of solving the system of differential equations, mathematical and graphical dependences of the indicator of personal data protection in the social network on various components are obtained. Considering three options for solving the equation near the steady-state of the system, we can conclude that, based on the conditions of the ratio of dissipation and natural frequency, the attenuation of the latter to a specific value is carried out periodically, with attenuation: amplitude, or exponentially fading law. A more visual analysis of the system behavior is performed, moving from the differential form of equations to the discrete one and modeling some interval of the system's existence. Mathematical and graphical dependences of the frequency of natural oscillations of the system, the period of oscillations, and the attenuation coefficient are presented. Simulation modeling for values with deviation from the stationary position of the system is performed. As a result of the simulation, it is proved that the social network protection system is nonlinear.
APA, Harvard, Vancouver, ISO, and other styles
32

Kotenko, Igor, and Igor Parashchuk. "Multi-criteria security assessment of control and diagnostic data on the technological processes." MATEC Web of Conferences 298 (2019): 00071. http://dx.doi.org/10.1051/matecconf/201929800071.

Full text
Abstract:
A mathematical model of the dynamics of changes in the state of security indicators of control and diagnostic data on the technological process is proposed. It is constructed using Markov chains and takes into account the probabilistic-temporal mechanism for changing the state of data protection indicators of this class. Based on this model, a methodological approach has been developed for multi-criteria assessment of the security of control and diagnostic data on the technological process. The approach is based on the analysis of current deviations of the values of data protection indicators from the requirements for them, takes into account and eliminates the uncertainty of the initial diagnostic information. The proposed methodological approach also allows one to take into account transients that affect security when introducing control over the structure, parameters and modes of collection and processing of control and diagnostic data about the technological process in various conditions.
APA, Harvard, Vancouver, ISO, and other styles
33

Siregar, Al Zimy. "Implementation Of ADFGVX Cipher And RSA On TXT And Doc File Security." Journal Basic Science and Technology 10, no. 3 (October 30, 2021): 105–10. http://dx.doi.org/10.35335/jbst.v10i3.1764.

Full text
Abstract:
In data communication, the aspect of security and confidentiality data is needed. To maintain the security and confidentiality of the data is by using cryptography. Cryptography is the science of mathematical techniques related to aspects of information security such as data confidentiality, data authenticity, data integrity, and authentication data. Text security is done by a hybrid cryptography in a text file that is first performed using ADFGVX Cipher encryption, then the results of ADFGVX Cipher encryption is encrypted using the RSA. Testing primes using the Fermat algorithm. Implementation of the system using C# programming language in Microsoft Visual Studio 2010. The system on RSA was tested with a maximum key length of 256 bits to 32 bits intervals.
APA, Harvard, Vancouver, ISO, and other styles
34

Bertozzi, Andrea L., Shane D. Johnson, and Michael J. Ward. "Mathematical modelling of crime and security: Special Issue of EJAM." European Journal of Applied Mathematics 27, no. 3 (April 28, 2016): 311–16. http://dx.doi.org/10.1017/s0956792516000176.

Full text
Abstract:
This special issue of the European journal of applied mathematics features research articles that involve the application of mathematical methodologies to the modelling of a broad range of problems related to crime and security. Some specific topics in this issue include recent developments in mathematical models of residential burglary, a dynamical model for the spatial spread of riots initiated by some triggering event, the analysis and development of game-theoretic models of crime and conflict, the study of statistically based models of insurgent activity and terrorism using real-world data sets, models for the optimal strategy of police deployment under realistic constraints, and a model of cyber crime as related to the study of spiking behaviour in social network cyberspace communications. Overall, the mathematical and computational methodologies employed in these studies are as diverse as the specific applications themselves and the scales (spatial or otherwise) to which they are applied. These methodologies range from statistical and stochastic methods based on maximum likelihood methods, Bayesian equilibria, regression analysis, self-excited Hawkes point processes, agent-based random walk models on networks, to more traditional applied mathematical methods such as dynamical systems and stability theory, the theory of Nash equilibria, rigorous methods in partial differential equations and travelling wave theory, and asymptotic methods that exploit disparate space and time scales.
APA, Harvard, Vancouver, ISO, and other styles
35

Smirnova, Galina I., and Maria E. Listopad. "Economic and Mathematical Modeling of Russia’s Economic Security in the Period Under Sanctions." Economic Strategies 152 (March 25, 2020): 32–39. http://dx.doi.org/10.33917/es-2.168.2020.32-39.

Full text
Abstract:
For the study, the time period of introducing economic sanctions against the Russian Federation was selected. In consideration are taken the data of Rosstat in terms of finding the values of indicators of our state’s economic security (2013–2017). A correlation and regression analysis of this system, consisting of 15 indicators, was carried out. An economic-mathematical model of the sanctions impact on the economic security of Russia was compiled. To solve this problem, the authors used a correlation-regression analysis, the regression equation was found and statistical significance of the constructed model was substantiated. The findings were recommended to specialists in the sphere of improving the state’s economic security.
APA, Harvard, Vancouver, ISO, and other styles
36

Pham, Hai, Rainer Steinwandt, and Adriana Suárez Corona. "Integrating Classical Preprocessing into an Optical Encryption Scheme." Entropy 21, no. 9 (September 7, 2019): 872. http://dx.doi.org/10.3390/e21090872.

Full text
Abstract:
Traditionally, cryptographic protocols rely on mathematical assumptions and results to establish security guarantees. Quantum cryptography has demonstrated how physical properties of a communication channel can be leveraged in the design of cryptographic protocols, too. Our starting point is the AlphaEta protocol, which was designed to exploit properties of coherent states of light to transmit data securely over an optical channel. AlphaEta aims to draw security from the uncertainty of any measurement of the transmitted coherent states due to intrinsic quantum noise. We present a technique to combine AlphaEta with classical preprocessing, taking into account error-correction for the optical channel. This enables us to establish strong provable security guarantees. In addition, the type of hybrid encryption we suggest, enables trade-offs between invoking a(n inexpensive) classical communication channel and a (more complex to implement) optical channel, without jeopardizing security. Our design can easily incorporate fast state-of-the-art authenticated encryption, but in this case the security analysis requires heuristic reasoning.
APA, Harvard, Vancouver, ISO, and other styles
37

Semenov, Serhii, Zhang Liqiang, Cao Weiling, and Viacheslav Davydov. "Development a mathematical model for the software security testing first stage." Eastern-European Journal of Enterprise Technologies 3, no. 2 (111) (June 30, 2021): 24–34. http://dx.doi.org/10.15587/1729-4061.2021.233417.

Full text
Abstract:
This paper reports an analysis of the software (SW) safety testing techniques, as well as the models and methods for identifying vulnerabilities. An issue has been revealed related to the reasoned selection of modeling approaches at different stages of the software safety testing process and the identification of its vulnerabilities, which reduces the accuracy of the modeling results obtained. Two steps in the process of identifying software vulnerabilities have been identified. A mathematical model has been built for the process of preparing security testing, which differs from the known ones by a theoretically sound choice of the moment-generating functions when describing transitions from state to state. In addition, the mathematical model takes into consideration the capabilities and risks of the source code verification phase for cryptographic and other ways to protect data. These features generally improve the accuracy of modeling results and reduce input uncertainty in the second phase of software safety testing. An advanced security compliance algorithm has been developed, with a distinctive feature of the selection of laws and distribution parameters that describe individual state-to-state transitions for individual branches of Graphical Evaluation and Review Technique networks (GERT-networks). A GERT-network has been developed to prepare for security testing. A GERT-network for the process of checking the source code for cryptographic and other data protection methods has been developed. A graphic-analytical GERT model for the first phase of software safety testing has been developed. The expressions reported in this paper could be used to devise preliminary recommendations and possible ways to improve the effectiveness of software safety testing algorithms
APA, Harvard, Vancouver, ISO, and other styles
38

Syahir, Ahmad, and Chuah Chai Wen. "Secure Login Mechanism for Online Banking." JOIV : International Journal on Informatics Visualization 2, no. 3-2 (June 6, 2018): 179. http://dx.doi.org/10.30630/joiv.2.3-2.136.

Full text
Abstract:
Login is one of the important security features in online banking. This research investigates the mechanism for an existing online banking in Malaysia including the design of the login mechanism, the encryption algorithm used for the password and the security level of the login mechanism. This research provides a result of analyzing data between five online banking in terms of their security features. These analyzing data will be used for proposing secure password encryption in online banking. The mathematic is used to evaluate the security level for these secure login applications. Output from the mathematical analysis is the probability that the adversary may break the security of login application.
APA, Harvard, Vancouver, ISO, and other styles
39

Lachikhina, A. B., and A. A. Petrakov. "Data integrity as a criterion for assessing the security of corporate information systems resources." Issues of radio electronics, no. 11 (November 20, 2019): 77–81. http://dx.doi.org/10.21778/2218-5453-2019-11-77-81.

Full text
Abstract:
The paper considers the information resources protection assessing in the information security management in an industrial enterprise. The main aspects of information security as a process are given. It is proposed to use data integrity as a criterion for resources security assessing of the corporate information system, defined as the probability of a possible violation of the integrity in the corresponding process of processing information. The groups of technological operations related to the process of information processing are considered. An approximate set of probabilities of possible events that contribute to maintaining data integrity is given. For the mathematical formulation of the problem, each of the events is considered as an alternative with a given optimization criterion. The introduction of a target function for a variety of alternatives allows you to select the best one and determine the cause of the integrity violation. The dependence of the total probability of integrity violation on a priori probability distribution is noted.
APA, Harvard, Vancouver, ISO, and other styles
40

VORONIN, EVGENY A., SERGEY V. KOZLOV, and ALEXANDER N. KUBANKOV. "IDENTIFICATION OF THREATS BASED ON A LIMITED SET OF DATA IN THE ASSESSMENT SECURITY SYSTEMS AND MEASURES FOR THEIR IMPLEMENTATION." H&ES Research 14, no. 3 (2022): 41–48. http://dx.doi.org/10.36724/2409-5419-2022-14-3-41-48.

Full text
Abstract:
Introduction. In order to ensure the operational and effective security of complex technical systems and measures for their implementation, it is necessary to apply methods of forecasting threats and maintaining the optimal strategy to prevent their consequences. Security threats regarding the life cycle of systems created in the digital economy are usually determined by the level and probability of external conditions, influencing factors on stability and operability of the support system for their life cycle, in the respect the economic system is considered. The aim of the study. In systems theory and system analysis, these factors are commonly referred to as environmental state variables. They are random in nature and, when described mathematically, can be continuous, discrete, or categorical. Methods. Continuous variables are presented in the form of graphs or register records. For statistical and mathematical processing, they are transformed into a table format or a discrete form. Results. Discrete values of environmental variables are recorded in the form of tables or numerical sequences. Categorical variables have the meaning of logical or Boolean values and are recorded in the form of tables. Practical significance. The prediction of categorical variables, based on the mathematical definition of the security, must be carried out by assessing the probability of their occurrence and impact on the life cycle support system of systems and activities as complex technical systems. The main problem is the insufficient statistical data to obtain estimations with a sufficient level of confidence and the tight deadlines for decision-making. Discussion. The paper presents a Bayesian approach and a method for assessing the probabilities of threats on a limited set of data. Given the universal nature of the presented methodological approach to assessing the level of threats on a limited set of data in relation to assessing the safety of the on-board systems life cycle support system, it is possible to obtain its current assessments and, on their basis, timely develop the necessary measures to adjust organizational, resource, technical and technological processes in the life cycle of systems.
APA, Harvard, Vancouver, ISO, and other styles
41

Yang, Ai Wen. "The Evaluation Model Analysis on Credit Crisis Based on Data Mining and Nonlinear Regression Method." Applied Mechanics and Materials 427-429 (September 2013): 2898–902. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2898.

Full text
Abstract:
As a result of government's macroeconomic regulation, some regions of China have suffering financial disturbance,which makes some small enterprises close down because of capital chain rupture.The guarantee industry is an part of the construction of social credit system, and its survival and development are a very serious challenge now.Medium-sized enterprise security crisis which happened over the past two years in Zhejiang province is overall analyzed in this paper.This paper digs out its internal factors which mainly reflect in two aspects,and analyzes two primary causes why security crisis happens by using mathematical model.And it puts forward corresponding measures to solve the credit risks in order to provide feasible suggestions for ensuring the safety guarantee.
APA, Harvard, Vancouver, ISO, and other styles
42

Hossain, Md Alam, Ahsan Ul-Ambia, Nazmul Hossain, Mustafizur Rahman Akhond, Nasim Adnan, and Sayed Md Galib. "Mathematical Solution of ULTE Based Salt Generation Password Based Key Derivation Function (PBKDF)." American Journal of Agricultural Science, Engineering, and Technology 6, no. 2 (July 7, 2022): 8–17. http://dx.doi.org/10.54536/ajaset.v6i2.368.

Full text
Abstract:
In modern life, users use the cloud spaces for storing important data and valuable information. To avoid security problems, every cloud storage provider requires help from several security mechanisms. Every mechanism has its own security scheme. Most of them use the PBKDF (Password-Based Key Derivation Function) and Salt for generating encryption keys. By analyzing, we found that unique and random Salt plays a vital role for generating keys. But to create powerful keys, we must avoid pseudorandom generators for making salt because hackers can easily crack the key by using it. We have to take inputs from beyond expected sources. We proposed an algorithm by which we can generate Salt by using the client’s real-time environmental information known as Location Information of user, User Time Information with Entropy Data at key generation time. In this paper, we focus on simulation result and compare each algorithm with the proposed algorithm ULTE. Simulation result represents the whole statistical distribution as stated in the algorithm. The result shows that ULTE has provided excellent performance than other algorithms.
APA, Harvard, Vancouver, ISO, and other styles
43

Kotenko, Igor Vitalievich, and Igor Borisovich Parashchuk. "Model of security information and event management system." Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics 2020, no. 2 (April 30, 2020): 84–94. http://dx.doi.org/10.24143/2072-9502-2020-2-84-94.

Full text
Abstract:
The article is focused on the development of a mathematical model of functioning the security information and event management system known as the SIEM system. This model is a formalized analytical description (in terms of a Markov chain in the form of stochastic differential equations) of the dynamics of the changing states of quality indicators characterizing the essential properties of functioning the security information and events management system in the state space. The model is a system of equations of state and observation, traditional for the Markov chain in the form of finite differences. The scientific task is to improve (modify) the algorithms for converting excitation noise used in the model. A mechanism is proposed for determining the values of the mathematical expectation increment of the simulated process, obtained on the basis of a priori data on the Markov chain, in relation to the mathematical expectation of white Gaussian noise exciting this process. Based on simple calculations the mechanism helps to decide what values can be taken by the elements of the vector of compensation additives in the equation of state of the auxiliary indicator vector of this modified model, taking into account the conversion of the excitation noise. This allows simplifying the model and reducing its computational complexity without significant losses in accuracy (adequacy). The practical application of an improved model is possible both in the framework of the research and in the systems of automated control of information security.
APA, Harvard, Vancouver, ISO, and other styles
44

Tao, Q., Q. Chen, H. Ding, I. Adnan, X. Huang, and X. Cui. "Cross-Department Secures Data Sharing in Food Industry via Blockchain-Cloud Fusion Scheme." Security and Communication Networks 2021 (March 27, 2021): 1–18. http://dx.doi.org/10.1155/2021/6668339.

Full text
Abstract:
The barriers of food enterprises and departments caused information asymmetry, which is the root cause of food safety incidents. Simultaneously, it is challenging to solve the information asymmetry by the existing cloud-based food supply-chain regulation system. Establishing a secure and reliable data sharing environment is an effective solution to the information island. Blockchain can construct a security network based on mathematical algorithms, eliminating the third party’s potential security risk, and realize transparently share data. In this paper, on the principle of metadata remaining in the food enterprises, we propose a blockchain-cloud fusion scheme based on Decentralized Attribute-Based Signature (DABS) to realize secure data sharing between departments. It constructs a decentralized and trusting environment for data owners to share data and achieves social co-governance of food safety based on the smart contract. It can also preserve the existing system architecture and complement the performance disadvantage of blockchain and cloud storage. The result achieved from security analysis shows that our scheme supports unconditional full anonymity and can resist collusion attacks of N-1 out of N corrupted attribute authorities.
APA, Harvard, Vancouver, ISO, and other styles
45

Akhramovych, Volodymyr, German Shuklin, Yuriy Pepa, Tetiana Muzhanova, and Serhii Zozulia. "Devising a procedure to determine the level of informational space security in social networks considering interrelations among users." Eastern-European Journal of Enterprise Technologies 1, no. 9(115) (February 28, 2022): 63–74. http://dx.doi.org/10.15587/1729-4061.2022.252135.

Full text
Abstract:
+ Linear and dynamic models of the system of information security in social networks, taking into consideration the relationships between users, were studied and the resistance of the security system was analyzed. There is a practical interest in studying dependence of the behavior of the system of social network security on the parameters of users’ interaction. Dynamic systems of information security in social networks in the mathematical sense of this term were considered. A dynamic system refers to any object or process, for which the concept of state as a totality of certain magnitudes at a given time is unambiguously defined and the law that describes a change (evolution) of the initial state over time was assigned. The network of social interactions consists of a totality of social users and a totality of the relations between them. Individuals, social groups, organizations, cities, countries can act as users. Relations imply not only communication interactions between users but also relations of the exchange of various resources and activities, including conflict relations. As a result of research, it was found that the security systems of a social network are nonlinear. Theoretical study of the dynamic behavior of an actual object requires the creation of its mathematical model. The procedure for developing a model is to compile mathematical equations based on physical laws. These laws are stated in the language of differential equations. Phase portraits of the data security system in the MATLAB/Multisim program, which indicate the stability of a security system in the working range of parameters even at the maximum value of the impacts, were determined. Thus, the influence of users’ interaction parameters on the parameters of the system of social network security was explored. Such study is useful and important in terms of information security in the network, since the parameters of users’ interaction significantly affect, up to 100 %, the security indicator.
APA, Harvard, Vancouver, ISO, and other styles
46

Feng, Feng, Xiabing Zhou, Bin Li, and Qinglei Zhou. "Modelling the Mimic Defence Technology for Multimedia Cloud Servers." Security and Communication Networks 2020 (November 27, 2020): 1–22. http://dx.doi.org/10.1155/2020/8819958.

Full text
Abstract:
A current research trend is to combine multimedia data with artificial intelligence and process them on cloud servers. In this context, ensuring the security of multimedia cloud servers is critical, and the cyber mimic defence (CMD) technology is a promising approach to this end. CMD, which is an innovative active defence technology developed in China, can be applied in many scenarios. However, although the mathematical model is a key component of CMD, a universally acceptable mathematical model for theoretical CMD has not been established yet. In this work, the attack problems and modelling difficulties were extensively examined, and a comprehensive modelling theory and concepts were clarified. By decoupling the model from the input and output of the specific system scene, the modelling difficulties were effectively avoided, and the mathematical expression of the CMD mechanism was enhanced. Furthermore, the process characteristics of the attack behaviour were identified by using a specific mathematical mapping method. Finally, based on the decomposition problem of large prime factors and convolution operations, an intuitive and exclusive CMD mathematical model was proposed. The proposed model could clearly express the CMD mechanism and transform the problems of attack and defence in the CMD domain into corresponding mathematical problems. These aspects were considered to qualitatively assess the CMD security, and it was noted that a high level of security can be realized. Furthermore, the overhead of CMD was analyzed. Moreover, the proposed model can be directly programmed.
APA, Harvard, Vancouver, ISO, and other styles
47

Vivchar, Oksana. "SPECIFIC FEATURES OF ECONOMIC SECURITY ASSESSMENT OF ENTERPRISES UNDER CURRENT CONDITIONS OF BUSINESS MACROTRENDS: A REGIONAL APPROACH." Regional’ni aspekti rozvitku produktivnih sil Ukraїni, no. 24 (2019): 15–23. http://dx.doi.org/10.35774/rarrpsu2019.24.015.

Full text
Abstract:
Goal. The goal of the article is to substantiate the theoretical and applied aspects of economic security complex assessment on the example of regional business structures with the use of the apparatus of mathematical modeling in Economics in modern conditions of business macro trends. The assessment of the state of economic security of enterprises is carried out through a system of criteria and indicators. The criterion of enterprises economic security is a measure of the state of the entity in terms of compliance with the established indicators of its activity with pre-established indicators reflecting the essence of economic security. On the basis of this goal, the question arises of solving such problems as: the possibility of developing a unified conceptual approach and tools for assessing the impact of indicators on the of regional business structures’s economic security; developing measures to improve the economic component of regional business structures. Research methods. Structural methods, comparative analysis of empirical data, abstract-logical generalization and mathematical modeling in Economics were applied to solve this scientific problem. Results. In the work on the basis of the methodological approach the model of assessment formation of the enterprise’s economic security has been grounded on the basis of impact of economic security indicators by means of logit and probit-functions. The model does not take into account group effects, that is, there is no analysis of fixed effects. In order to avoid cross-effects, when not only the variable itself influences the likelihood of a crisis, but the public crisis begins to affect the behavior of the variable, two groups of models are built: for the first group of regressions from the sample, all observations after the first year of crises are excluded; for the second group of regressions all data were used except for the crisis years after the first year of the crisis. Conclusions. The fundamental provisions of the scientific investigation will enable domestic regional enterprises to apply the algorithm of forming the economic security assessment of the enterprise using the apparatus of mathematical modeling in Economics.
APA, Harvard, Vancouver, ISO, and other styles
48

Aulia, Rachmat, Haida Dafitri, Bayu Irwandi, and Rizko Liza. "Penerapan Algoritma Vertical Bit Rotation Dalam Pengamanan Data Sekolah." Building of Informatics, Technology and Science (BITS) 3, no. 4 (March 31, 2022): 713–18. http://dx.doi.org/10.47065/bits.v3i4.1340.

Full text
Abstract:
Cryptography is a science based on mathematical techniques related to security and information such as confidentiality, data integrity and entity authentication. In other words, it means to conduct the process of encoding libraries that act as ciphers, and converting the original text into illegal it. The implementation of encryption process requires a public and a secret key. One of the cryptography techniques applied in the research is the Algorithm of Vertical Bit Rotation (VBR). The VBR is a technique that implements an asymmetric key, which it has a same value in term of data encryption and decryption. The technique is also applied in the shape of an application designed in this research, then have ability to run encryption and decryption process in the format of text file, that providing data security to avoid eavesdropping and illegal access from irresponsible parties. The result done by using VBR is it may run well so have ability to restore the condition of the data in plaintext, then in addition information, encrypted data cannot be returned to its pure form without using a valid key
APA, Harvard, Vancouver, ISO, and other styles
49

Suwarjono, Suwarjono, Lilik Sumaryanti, and Lusia Lamalewa. "Cryptography Implementation for electronic voting security." E3S Web of Conferences 328 (2021): 03005. http://dx.doi.org/10.1051/e3sconf/202132803005.

Full text
Abstract:
Electronic voting is done by recording election data centrally and presenting it into fast digital information. E-voting is an internet technology, which aims to improve the performance of the voting process, and is expected to be a breakthrough in technological development that helps human work. Security constraints in e-voting include the distribution of voting, for example voters who distribute voting rights, are illegitimate and can abuse voters’ rights, because they know the voter’s account to access the system. This study implements cryptographic methods as a password security for voter accounts, and the results of voting, so that the secrecy of the voters’ data and the results of voting are maintained. RSA algorithm to implement cryptographic techniques based on two mathematical problems, namely factorization and modulo operations on composite numbers, which use two different keys for encryption and decryption processes. The public key is used encryption process to encode text, and the private key is used description process, namely translating ciphertext into plaintext.
APA, Harvard, Vancouver, ISO, and other styles
50

Snishchenko, R. H., V. I. Hrynchutskyi, Yu M. Nikolchuk, O. O. Lopatovska, and L. M. Krot. "Financial security of macro regions in the period of military aggression." Naukovyi Visnyk Natsionalnoho Hirnychoho Universytetu, no. 4 (August 2023): 157–63. http://dx.doi.org/10.33271/nvngu/2023-4/157.

Full text
Abstract:
Purpose. Formulation of the main factors affecting the internal migration of the population during the period of military aggression, creation of an economic-mathematical model that will reproduce the number of internally displaced persons (IDPs) for forecasting the financial support of macro-regions. Methodology. The research used general scientific and special research methods: the method of critical analysis, scientific abstraction and generalization of scientific experience of modern theoretical studies, methods of statistical analysis, expert evaluations, system-complex approach. Findings. The main differences in the reasons for the country citizens’ migration are identified in peacetime and in wartime. The factors that increase the behavioral uncertainty of displaced persons are outlined. It is proposed to create economic and mathematical models that will reproduce the dynamics of the number of displaced persons people to forecast the financial provision of macro-regions using the method of correlation-regression analysis. Invariable indicators that have the greatest impact on the number are determined for new arrivals in the specified territories. Originality. The economic and mathematical models presented in the article reproduce the dynamics of the number of internally displaced persons based on statistical data of a representative survey. Unlike the existing ones, they take into account the main factors that affect the internal migration of the population during the period of military aggression. Practical value. The economic-mathematical models presented in the article can be applied in practice in the methods for calculating the financial needs of regions, individual regions and settlements to forecast the number of forced migrants. The method proposed in the article for calculating the forecast quantity of internal migrants allows timely adjustment of the components of economic and mathematical models, which contributes to increasing their reliability.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography