To see the other types of publications on this topic, follow the link: Probing Security.

Journal articles on the topic 'Probing Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Probing Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Adams, Jefferson. "Probing the East German State Security Archives." International Journal of Intelligence and CounterIntelligence 13, no. 1 (January 2000): 21–34. http://dx.doi.org/10.1080/088506000304925.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Molteni, Maria Chiara, and Vittorio Zaccaria. "A relation calculus for reasoning about t-probing security." Journal of Cryptographic Engineering 12, no. 1 (February 26, 2022): 1–14. http://dx.doi.org/10.1007/s13389-022-00286-x.

Full text
Abstract:
AbstractIn the context of side-channel attacks against cryptographic circuits, t-probing security characterizes the amount of information derivable about sensitive values (e.g., keys) by observing t output/internal values. Non-interference is a useful mathematical tool used by researchers to assess the probing security of a circuit which employs Boolean masking to protect itself from attacks. However, reasoning about non-interference still requires either difficult ratiocination or complex automatic tools. In this work, we propose a novel point of view to reason about non-interference, by exploiting the Walsh transform of a Boolean function. To this end, we introduce a calculus for mechanically reasoning about the shares of a variable and show that this formalism provides a lean algebraic explanation of known compositional patterns allowing for the discovery of new ones. Eventually, we show how this formalism can be applied to study the probing security of known cryptographic gadgets.
APA, Harvard, Vancouver, ISO, and other styles
3

Bartz, Jennifer A., and Kristina Tchalova. "Probing the Opioidergic Basis of Attachment (In)security." Biological Psychiatry: Cognitive Neuroscience and Neuroimaging 6, no. 3 (March 2021): 256–58. http://dx.doi.org/10.1016/j.bpsc.2020.12.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Biswas, Liton Kumar, M. Shafkat M. Khan, Leonidas Lavdas, and Navid Asadizanjani. "Security Assessment of Nonvolatile Memory Against Physical Probing." EDFA Technical Articles 24, no. 4 (November 1, 2022): 22–29. http://dx.doi.org/10.31399/asm.edfa.2022-4.p022.

Full text
Abstract:
Abstract This article describes how physical attacks can be launched on different types of nonvolatile memory (NVM) cells using failure analysis tools. It explains how the bit information stored inside these devices is susceptible to read-out and fault injection attacks and defines vulnerability parameters to help quantify risks associated with different modalities of attack. It also presents an in-depth security analysis of emerging NVM technologies and discusses potential countermeasures.
APA, Harvard, Vancouver, ISO, and other styles
5

Rahman, M. Tanjidur, Nusrat Farzana Dipu, Dhwani Mehta, Shahin Tajik, Mark Tehranipoor, and Navid Asadizanjani. "CONCEALING-Gate: Optical Contactless Probing Resilient Design." ACM Journal on Emerging Technologies in Computing Systems 17, no. 3 (June 25, 2021): 1–25. http://dx.doi.org/10.1145/3446998.

Full text
Abstract:
Optical probing, though developed as silicon debugging tools from the chip backside, has shown its capability of extracting secret data, such as cryptographic keys and user identifications, from modern system-on-chip devices. Existing optical probing countermeasures are based on detecting any device modification attempt or abrupt change in operating conditions during asset extraction. These countermeasures usually require additional fabrication steps and cause area and power overheads. In this article, we propose a novel low-overhead design methodology to prevent optical probing. It leverages additional operational logic gates, termed as “CONCEALING-Gates,” inserted as neighbor gates of the logic gates connected to the nets carrying asset signals. The switching activity of the asset carrying logic is camouflaged with the switching activity of the concealing-gate. The input signal and placement in the layout of the concealing-gates must be selected in such a way that they remain equally effective in preventing different variants of optical probing, i.e., electro-optical frequency mapping and Electro-optical probing. The methodology is suitable for the existing ASIC/FPGA design flow and fabrication process, since designing new standard logic cells is not required. We have performed a comprehensive security evaluation of the concealing-gates using a security metric developed based on the parameters that are crucial for optical probing. The attack resiliency of the logic cells, protected by concealing-gates, is evaluated using an empirical study-based simulation methodology and experimental validation. Our analysis has shown that in the presence of concealing-gates, logic cells achieve high resiliency against optical contactless probing techniques.
APA, Harvard, Vancouver, ISO, and other styles
6

Gill, Sukhpal Singh, and Arash Shaghaghi. "Security-Aware Autonomic Allocation of Cloud Resources." Journal of Organizational and End User Computing 32, no. 3 (July 2020): 15–22. http://dx.doi.org/10.4018/joeuc.2020070102.

Full text
Abstract:
Cloud computing has emerged as a dominant platform for computing for the foreseeable future. A key factor in the adoption of this technology is its security and reliability. Here, this article addresses a key challenge which is the secure allocation of resources. The authors propose a security-based resource allocation model for execution of cloud workloads called STARK. The solution is designed to ensure security against probing, User to Root (U2R), Remote to Local (R2L) and Denial of Service (DoS) attacks whilst the execution of heterogeneous cloud workloads. Further, this paper highlights the promising directions for future research.
APA, Harvard, Vancouver, ISO, and other styles
7

Senn, Martin. "The art of constructing (in)security: probing rhetorical strategies of securitisation." Journal of International Relations and Development 20, no. 3 (May 31, 2017): 605–30. http://dx.doi.org/10.1057/jird.2016.7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bijalwan, Anchit, Vijender Kumar Solanki, and Emmanuel Shubhakar Pilli. "BOTNET FORENSIC: ISSUES, CHALLENGES AND GOOD PRACTICES." Network Protocols and Algorithms 10, no. 2 (June 28, 2018): 28. http://dx.doi.org/10.5296/npa.v10i2.13144.

Full text
Abstract:
Unethical hacking of sites, probing, click frauds, phishing, denial of services attack and many such malicious practices affects the organizational integrity and sovereignty. Such activities are direct attacks on the safety, security and confidentiality of the organization. These activities put organizational privacy at stake. Botnet forensic is utilized to strengthen the security issues by understanding the modus operandi of the attacks. The available observations can be utilized in future also to prevent a potential threat to network security. This paper enlightens the novel summary of previous survey including life cycle, classification, framework, detection, analysis and the challenges for botnet forensics.
APA, Harvard, Vancouver, ISO, and other styles
9

Lande, Dmitrii. "Construction domain model of information security by probing Google Scholar Citations service." Collection "Information technology and security" 3, no. 1 (June 30, 2015): 4–11. http://dx.doi.org/10.20535/2411-1031.2015.3.1.57678.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wangdee, Wijarn, and Roy Billinton. "Probing the Intermittent Energy Resource Contributions From Generation Adequacy and Security Perspectives." IEEE Transactions on Power Systems 27, no. 4 (November 2012): 2306–13. http://dx.doi.org/10.1109/tpwrs.2012.2204281.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Kumar, Megha S., R. Ramanathan, M. Jayakumar, and Devendra Kumar Yadav. "Secret Key Generation Schemes for Physical Layer Security." Defence Science Journal 71, no. 4 (July 1, 2021): 545–55. http://dx.doi.org/10.14429/dsj.71.15403.

Full text
Abstract:
Physical layer security (PLS) has evolved to be a pivotal technique in ensuring secure wireless communication. This paper presents a comprehensive analysis of the recent developments in physical layer secret key generation (PLSKG). The principle, procedure, techniques and performance metricesare investigated for PLSKG between a pair of users (PSKG) and for a group of users (GSKG). In this paper, a detailed comparison of the various parameters and techniques employed in different stages of key generation such as, channel probing, quantisation, encoding, information reconciliation (IR) and privacy amplification (PA) are provided. Apart from this, a comparison of bit disagreement rate, bit generation rate and approximate entropy is also presented. The work identifies PSKG and GSKG schemes which are practically realizable and also provides a discussion on the test bed employed for realising various PLSKG schemes. Moreover, a discussion on the research challenges in the area of PLSKG is also provided for future research.
APA, Harvard, Vancouver, ISO, and other styles
12

Wang, Daping. "An XML-based testing strategy for probing security vulnerabilities in the diameter protocol." Bell Labs Technical Journal 12, no. 3 (November 6, 2007): 79–93. http://dx.doi.org/10.1002/bltj.20251.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Amir, Merav, and Hagar Kotef. "In-secure identities: On the securitization of abnormality." Environment and Planning D: Society and Space 36, no. 2 (December 17, 2017): 236–54. http://dx.doi.org/10.1177/0263775817744780.

Full text
Abstract:
Highly securitized sites, such as airports, are increasingly using screening methods designed to purge racial profiling from their practices. In these contexts, not only are profiling methods seen as unlawful, but are also perceived as ineffective from a security perspective. Instead of basing security screenings on a perceived ‘dangerousness’ of social categories, these new screening methods aim to rely on automatic and objective criteria. This paper examines the shaping and effects of these security procedures, claiming that this redesigning of security technologies in accordance with practices which are presumably scientific, measurable and objective, has resulted in the creation of new categories of ‘threatening’ persons. Specifically, we show how the category of ‘normal’ has become central to security sorting and how, therefore – unintentionally yet necessarily – these procedures and technologies have become apparatuses of social normalization. People who deviate from given norms are thus singled out as potential security threats and are subjected to extended security probing, if not to outright violence. Tracing the effects of the increasing centrality of normalization processes to the management of securitized sites, this paper examines this reconfiguration of (ab)normality and explores the consequences of the securitization of social deviance.
APA, Harvard, Vancouver, ISO, and other styles
14

Zheng, Rui, Hao Ma, Qiuyun Wang, Jianming Fu, and Zhengwei Jiang. "Assessing the Security of Campus Networks: The Case of Seven Universities." Sensors 21, no. 1 (January 5, 2021): 306. http://dx.doi.org/10.3390/s21010306.

Full text
Abstract:
The network security situation of campus networks on CERNET (China Education and Research Network) has received great concern. However, most network managers have no complete picture of the network security because of its special management and the rapid growth of network assets. In this investigation, the security of campus networks belonging to seven universities in Wuhan was investigated. A tool called “WebHunt” was designed for campus networks, and with its help, the network security risks were found. Differently from existing tools for network probing, WebHunt can adopt the network scale and special rules of the campus network. According to the characteristics of campus websites, a series of functions were integrated into WebHunt, including reverse resolution of domain names, active network detection and fingerprint identification for software assets. Besides, WebHunt builds its vulnerability intelligence database with a knowledge graph structure and locates the vulnerabilities through matching knowledge graph information. Security assessments of seven universities presents WebHunt’s applicability for campus networks. Besides, it also shows that many security risks are concealed in campus networks, such as non-compliance IP addresses and domain names, system vulnerabilities and so on. The security reports containing risks have been sent to the relevant universities, and positive feedback was received.
APA, Harvard, Vancouver, ISO, and other styles
15

Gupta, Bipin Kumar, Arun Kumar, Pawan Kumar, Jaya Dwivedi, G. N. Pandey, and Garima Kedawat. "Probing on green long persistent Eu2+/Dy3+ doped Sr3SiAl4O11 emerging phosphor for security applications." Journal of Applied Physics 117, no. 24 (June 28, 2015): 243104. http://dx.doi.org/10.1063/1.4922983.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Hameiri, Shahar, and Lee Jones. "Probing the links between political economy and non-traditional security: Themes, approaches and instruments." International Politics 52, no. 4 (March 20, 2015): 371–88. http://dx.doi.org/10.1057/ip.2015.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Dasgupta, Rohee. "Section III :." Jindal Journal of International Affairs 1, no. 1 (October 1, 2011): 162–63. http://dx.doi.org/10.54945/jjia.v1i1.13.

Full text
Abstract:
The essays in this commemorative issue, speak about global responsibility and accountability which may reframe the way issues are defined between globalisation, sovereignty and security. There are increasingly visible works in international relations that invite an all too familiar mode of probing and interpretation. But this scholarly collection assigns a strategy of response to liberal orders, and situates a range of possibilities that allowably explore standard measures of global conduct of both states and non-states.
APA, Harvard, Vancouver, ISO, and other styles
18

Alterazi, Hassan A., Pravin R. Kshirsagar, Hariprasath Manoharan, Shitharth Selvarajan, Nawaf Alhebaishi, Gautam Srivastava, and Jerry Chun-Wei Lin. "Prevention of Cyber Security with the Internet of Things Using Particle Swarm Optimization." Sensors 22, no. 16 (August 16, 2022): 6117. http://dx.doi.org/10.3390/s22166117.

Full text
Abstract:
High security for physical items such as intelligent machinery and residential appliances is provided via the Internet of Things (IoT). The physical objects are given a distinct online address known as the Internet Protocol to communicate with the network’s external foreign entities through the Internet (IP). IoT devices are in danger of security issues due to the surge in hacker attacks during Internet data exchange. If such strong attacks are to create a reliable security system, attack detection is essential. Attacks and abnormalities such as user-to-root (U2R), denial-of-service, and data-type probing could have an impact on an IoT system. This article examines various performance-based AI models to predict attacks and problems with IoT devices with accuracy. Particle Swarm Optimization (PSO), genetic algorithms, and ant colony optimization were used to demonstrate the effectiveness of the suggested technique concerning four different parameters. The results of the proposed method employing PSO outperformed those of the existing systems by roughly 73 percent.
APA, Harvard, Vancouver, ISO, and other styles
19

Bou-Harb, Elias, Mourad Debbabi, and Chadi Assi. "A novel cyber security capability: Inferring Internet-scale infections by correlating malware and probing activities." Computer Networks 94 (January 2016): 327–43. http://dx.doi.org/10.1016/j.comnet.2015.11.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Ennaji, Sabrine, Nabil El Akkad, and Khalid Haddouch. "i-2NIDS Novel Intelligent Intrusion Detection Approach for a Strong Network Security." International Journal of Information Security and Privacy 17, no. 1 (February 3, 2023): 1–17. http://dx.doi.org/10.4018/ijisp.317113.

Full text
Abstract:
The potential of machine learning mechanisms played a key role in improving the intrusion detection task. However, other factors such as quality of data, overfitting, imbalanced problems, etc. may greatly affect the performance of an intelligent intrusion detection system (IDS). To tackle these issues, this paper proposes a novel machine learning-based IDS called i-2NIDS. The novelty of this approach lies in the application of the nested cross-validation method, which necessitates using two loops: the outer loop is for hyper-parameter selection that costs least error during the run of a small amount of training set and the inner loop for the error estimation in the test set. The experiments showed significant improvements within NSL-KDD dataset with a test accuracy rate of 99.97%, 99.79%, 99.72%, 99.96%, and 99.98% in detecting normal activities, DDoS/DoS, Probing, R2L and U2R attacks, respectively. The obtained results approve the efficiency and superiority of the approach over other recent existing experiments.
APA, Harvard, Vancouver, ISO, and other styles
21

Indramawan, Andrian, Jacob Donald Tan, and John Tampil Purba. "Probing Into E-commerce Logistics: A Strategic Growth Option of Serbada Company." Jurnal Ilmu Manajemen & Ekonomika 10, no. 2 (September 26, 2018): 51. http://dx.doi.org/10.35384/jime.v10i2.79.

Full text
Abstract:
E-commerce marketplace is prominent in today ‘s society era of buying and selling products without having to leave the doorsteps. One important stakeholder group involved in the process of e-commerce is logistics. Logistic companies facilitate the delivery from one destination to another with punctuality and security of the products keys in establishing trust between the buyer, seller, and the e-commerce hubs. Hence by means of participant observation, this case study research investigates the key success factors of how an e-commerce firm manages its collaborations with logistic partners, as well as how the firm utilizes its strengths and opportunities take advantage of the market while minimizing its weaknesses and threats. The researchers used Business Model Canvas and TOWS in their analytical process
APA, Harvard, Vancouver, ISO, and other styles
22

Liu, Yuxin, Ming Ma, Xiao Liu, Neal N. Xiong, Anfeng Liu, and Ying Zhu. "Design and Analysis of Probing Route to Defense Sink-Hole Attacks for Internet of Things Security." IEEE Transactions on Network Science and Engineering 7, no. 1 (January 1, 2020): 356–72. http://dx.doi.org/10.1109/tnse.2018.2881152.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Dandira, Martin. "Delays in probing case irks workers, AMARA, Zimbabwe." Emerald Emerging Markets Case Studies 2, no. 8 (October 17, 2012): 1–3. http://dx.doi.org/10.1108/20450621211295596.

Full text
Abstract:
Subject area Business management, corporate ethics and management of change. Study level/applicability The case study is relevant for undergraduate and post-graduate management degrees. It includes courses such as Business Management, Corporate Ethics and Management of Change. Case overview AMARA, a leading parts dealer and a subsidiary company of MTD Holdings has been hit by allegations of corruption which involved a ring of senior employees who are said to have swindled the company out of spare parts worth millions of US dollars with the help of a few security guards who were authorising illegal movements at check points. The workers' committee who blew the whistle on the scandal were now impatient that the investigations ordered in December last year 2011 have not taken off as management appears not keen on them. Management was dragging its feet when it comes to dealing effectively with the allegations. There was no proper strategy on how the allegations were going to be dealt with. There was also victimisation of workers. Senior managers who have been tasked to investigate the issue were suspected to be involved in the scandal thus that is why they were dragging their feet in the investigation. Expected learning outcomes Students can focus on the importance of good corporate governance as a cornerstone of good business practice. The importance of an active board of directors is also vital for the smooth running of a business. Students will also appreciate the importance of making quality decisions by top management as an important ingredient for the success of an organisation. The issue of an effective control system in an organisation is also important to avoid leakages which will cost an organisation millions of dollars. Supplementary materials Teaching notes are available, please contact your librarian to access.
APA, Harvard, Vancouver, ISO, and other styles
24

Thomas, Deborah A. "Can Black Lives Matter in a Black Country?" Social Text 40, no. 3 (September 1, 2022): 17–35. http://dx.doi.org/10.1215/01642472-9771035.

Full text
Abstract:
Abstract This essay probes the project of security (defined as the protection of whiteness, class hierarchy, and heteropatriarchy) in relation to the desire for safety (glossed as “having somebody”). In probing this relation within a context in which police violence and extrajudicial killing are not typically seen as part of the global phenomenon of anti-Black racism, it seeks to contribute to a conversation in which raciality is not tethered to physicality, but instead is grounded in both historical-ideological and onto-epistemological phenomena that produce whiteness as the apex of humanity in the modern West. The essay explores the relation between security and safety through the rubric of diaspora in two senses—first as a phenomenon of Western modernity via plantation-based New World slavery, which catalyzed the development of enduring categories of (non)personhood and their elaboration into hierarchies of humanity; and second as a phenomenon of migration and the constitution of transnational sociocultural spheres. Diaspora, thus, generates forms of pan-Africanism and Black consciousness as much as it produces agendas related to transnational governance and global security infrastructures. The essay argues that to more complexly understand security from the South, these two notions of diaspora must be held in productive tension. In this way, security is revealed as a racializing project grounded in coloniality, even within majority Black spaces. The essay concludes by illuminating other terrains on which to build accountability and safety.
APA, Harvard, Vancouver, ISO, and other styles
25

Bin Tarik, Farhan, Azadeh Famili, Yingjie Lao, and Judson D. Ryckman. "Robust optical physical unclonable function using disordered photonic integrated circuits." Nanophotonics 9, no. 9 (July 3, 2020): 2817–28. http://dx.doi.org/10.1515/nanoph-2020-0049.

Full text
Abstract:
AbstractPhysical unclonable function (PUF) has emerged as a promising and important security primitive for use in modern systems and devices, due to their increasingly embedded, distributed, unsupervised, and physically exposed nature. However, optical PUFs based on speckle patterns, chaos, or ‘strong’ disorder are so far notoriously sensitive to probing and/or environmental variations. Here we report an optical PUF designed for robustness against fluctuations in optical angular/spatial alignment, polarization, and temperature. This is achieved using an integrated quasicrystal interferometer (QCI) which sensitively probes disorder while: (1) ensuring all modes are engineered to exhibit approximately the same confinement factor in the predominant thermo-optic medium (e. g. silicon), and (2) constraining the transverse spatial-mode and polarization degrees of freedom. This demonstration unveils a new means for amplifying and harnessing the effects of ‘weak’ disorder in photonics and is an important and enabling step toward new generations of optics-enabled hardware and information security devices.
APA, Harvard, Vancouver, ISO, and other styles
26

Mishra, Amitabh, Thomas Reichherzer, Ezhil Kalaimannan, Norman Wilde, and Ruben Ramirez. "Trade-offs involved in the choice of cloud service configurations when building secure, scalable, and efficient Internet-of-Things networks." International Journal of Distributed Sensor Networks 16, no. 2 (February 2020): 155014772090819. http://dx.doi.org/10.1177/1550147720908199.

Full text
Abstract:
This article focuses on results obtained from two cloud-based models that examine trade-offs between security, scalability, and efficiency of data collection for Internet-of-Things sensor networks. This work can provide insight for Internet-of-Things systems designers in choosing security controls and scalability features when working with cloud services. The results were obtained from a smart home Internet-of-Things prototype system in which data records from in-home sensors are transmitted wirelessly to an in-home hub, which forwards them to a cloud web service for storage and analysis. We consider different configurations and security controls on the wireless (in-home) and on the wired (home-to-web) sides. The configuration on the wireless side includes encrypted or plain-text transmission from the wireless sensors to the in-home hub for probing if software encryption of sensor data adds appreciable delay to the transmission time. The configuration on the wired side includes encryption or plain-text transmission, with or without authentication, with or without scalable cloud services. For each configuration, we measure end-to-end latency, transmission latency, and processing latency at the web service. Results of the experiments on the wired side showed much greater latencies and variability of latencies when using scalable cloud services.
APA, Harvard, Vancouver, ISO, and other styles
27

Luo, Lan, Yue Zhang, Bryan Pearson, Zhen Ling, Haofei Yu, and Xinwen Fu. "On the Security and Data Integrity of Low-Cost Sensor Networks for Air Quality Monitoring." Sensors 18, no. 12 (December 16, 2018): 4451. http://dx.doi.org/10.3390/s18124451.

Full text
Abstract:
The emerging connected, low-cost, and easy-to-use air quality monitoring systems have enabled a paradigm shift in the field of air pollution monitoring. These systems are increasingly being used by local government and non-profit organizations to inform the public, and to support decision making related to air quality. However, data integrity and system security are rarely considered during the design and deployment of such monitoring systems, and such ignorance leaves tremendous room for undesired and damaging cyber intrusions. The collected measurement data, if polluted, could misinform the public and mislead policy makers. In this paper, we demonstrate such issues by using a.com, a popular low-cost air quality monitoring system that provides an affordable and continuous air quality monitoring capability to broad communities. To protect the air quality monitoring network under this investigation, we denote the company of interest as a.com. Through a series of probing, we are able to identify multiple security vulnerabilities in the system, including unencrypted message communication, incompetent authentication mechanisms, and lack of data integrity verification. By exploiting these vulnerabilities, we have the ability of “impersonating” any victim sensor in the a.com system and polluting its data using fabricated data. To the best of our knowledge, this is the first security analysis of low-cost and connected air quality monitoring systems. Our results highlight the urgent need in improving the security and data integrity design in these systems.
APA, Harvard, Vancouver, ISO, and other styles
28

Xu, Li Wen, Li Juan Qiao, Xun Yong Ou, and Kun Zhang. "Study of Intrusion Detection Based on Genetic Algorithm and Rule." Applied Mechanics and Materials 602-605 (August 2014): 1797–802. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.1797.

Full text
Abstract:
The rapid increase of information technology usage demands the high level of security in order to keep the data resources and equipments of the user secure. In this current era of networks, there is an eventual stipulate for development which is consistent, extensible and easily manageable, with low maintenance cost solutions for Intrusion Detection. Network Intrusion Detection based on rules formulation is an efficient approach to classify various types of attack. DoS or Probing attack are relatively more common, and can be detected more accurately if contributing parameters are formulated in terms of rules. Genetic Algorithm is used to devise such rule. It is found that accuracy of rule based learning increases with the number of iteration.
APA, Harvard, Vancouver, ISO, and other styles
29

Ahmed, Ashfaq, Usman ,. Qais, Muhammad Dawood ,. Kakar, and Atta Muhammad. "China’s Economic Growth: Threats and Challenges to Chinese Economy and Energy Security." WSEAS TRANSACTIONS ON POWER SYSTEMS 17 (July 4, 2022): 187–95. http://dx.doi.org/10.37394/232016.2022.17.19.

Full text
Abstract:
Despite global pandemic Chinese economic growth rate was 2.3 percent in 2020. GDP surpassed US $ 15 trillion and growth rate raised to 6.5 percent in fourth quarter of 2020 and US $ 17 trillion GDP was recorded in first quarter of 2021. People Republic China’s (PRC) gigantic military budget and revolution in military affairs (RMA) creates senese of hegemonic ambitions in its neighbours. Contrarily, United States (US) sights PRC has ambitions to expand its political influence, gain access to economic markets, change international order by replacing US. This potential asymmetrical and imbalanced relationship locks America in typical Thucydides trap. Washington reached conclusion that economic growth and military might are intertwined. However, it is dependent on China’s energy supplies. PRC’s rise can be slowed down by stopping or interrupting the flow of energy supplies. Range of threats are posed to PRC oil imports i.e. US aerial strike on PRC oil//gas pipelines, use of proxies specially ast Turkestan Islamic Movement (ETIM) to disrupt oil supplies, terrorist attacks on oil containers on land and naval blockade in Persian Gulf. The inference drawn is energy security dependent on Strait of Malacca is Achilles Heel of China. This paper aims at probing Washington’s capacity to disrupt or stop energy supplies to PRC in Malacca strait, Persian Gulf, land routes in Pakistan. It discusses various strategies including direct naval blockade, use of proxies and direct military strikes.
APA, Harvard, Vancouver, ISO, and other styles
30

Hu, Daiming, Bülent Tezkan, Mingxin Yue, Xiaodong Yang, Xiaoping Wu, and Guanqun Zhou. "Prediction of Conductive Anomalies Ahead of the Tunnel by the 3D-Resitivity Forward Modeling in the Whole Space." Geofluids 2021 (December 21, 2021): 1–12. http://dx.doi.org/10.1155/2021/7301311.

Full text
Abstract:
Water inrush in tunneling poses serious harm to safe construction, causing economic losses and casualties. The prediction of water hazards before tunnel excavations becomes an urgent task for governments or enterprises to ensure security. The three-dimensional (3D) direct current (DC) resistivity method is widely used in the forward-probing of tunnels because of its low cost and highly sensitive response to water-bearing structures. However, the different sizes of the tunnel will distort the distribution of the potential field, which causes an inaccurate prediction of water-bearing structures in front of the tunnels. Some studies have pointed out that the tunnel effect must be considered in the quantitative interpretation of the data. However, there is rarely a predicted model considering the tunnel effect to be reported in geophysical literature. We developed a predicted model algorithm by considering the tunnel effect for forward-probing in tunnels. The algorithm is proven to be feasible using a slab analytic model. By simulating a large number of models with different tunnel sizes, we propose an equation, which considers the tunnel effect and can predict the water-bearing structures ahead of the tunnel face. The Monte Carlo method is used to evaluate the quality of the predicted model by simulating and comparing 10,000 random models. The results show that the proposed method is accurate to forecast the water-rich structures with small errors.
APA, Harvard, Vancouver, ISO, and other styles
31

Subathra, P., S. Sivagurunathan, and N. Ramaraj. "Detection and Prevention of Single and Cooperative Black Hole Attacks in Mobile Ad Hoc Networks." International Journal of Business Data Communications and Networking 6, no. 1 (January 2010): 38–57. http://dx.doi.org/10.4018/jbdcn.2010010103.

Full text
Abstract:
A Mobile Ad hoc Network (MANET) is a collection of wireless computers (nodes) communicating over multi-hop paths, without infrastructures such as base stations and access points. Nodes must cooperate to provide necessary network functionalities. The Dynamic Source Routing (DSR) protocol is a principal routing protocol in MANET, where security can be compromised by a “Black Hole” attack. In this attack, a malicious node claims to have the shortest path to the destination and attracts all traffic and drops all packets sent for forwarding, leading to performance degradation in the network. The situation becomes even more severe when two or more nodes cooperate and perform an attack called the “Cooperative Black Hole” attack. This article proposes a solution based on probing to identify and prevent such attacks. The proposed solution discovers a secure route between the source and destination by identifying and isolating both single and cooperative black holes, making the MANET resistant against such attacks. Simulation results show that the protocol provides better security and performance in terms of detection time, packet delivery ratio and false negative probability in comparison with trust and probe based schemes.
APA, Harvard, Vancouver, ISO, and other styles
32

Agorsah, Michael Kodjo. "A Survey Of Packet Analysis For Network Forensics." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 26, 2022): 263–66. http://dx.doi.org/10.22624/aims/crp-bk3-p42.

Full text
Abstract:
Network forensics is a branch of the network security paradigm (a collection of rules and configurations for protecting the integrity, confidentiality, and accessibility of computer networks and data using both software and hardware technologies) that focuses on network attack prevention and detection. It solves the present model's lack of specific investigation tools for probing harmful activities in networks. It also monitors the network for attacks and analyzes the attackers' characteristics. Packet analysis is the most common technique in network forensics, and it may replay the whole network traffic for a given period if the packet characteristics gathered are sufficiently detailed. The data collected can be utilized to track down traces of illegal internet activity, data breaches, unauthorized website access, malware infection, and so on across the network. This article provides a thorough packet analysis approach with extensive network traffic categorization and pattern detection capabilities, as well as a broad examination of the use of packet analysis in network forensics. Because not all network data can be used in court, the categories of digital evidence that may be acceptable are described in depth. The features of both hardware appliances and packet analyzer software are examined in light of their potential applications in network forensics. Keywords: Network Forensics, Computer & Network Security, Digital Forensics, Local and Wide Area Network, Internet BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Tsatsu, K. Sabblah (2022): Analysis of Attack Intention Recognition Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 263-266 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P42
APA, Harvard, Vancouver, ISO, and other styles
33

Chen, Shuai, Yang Yin, Zheng Wang, and Fan Gui. "Low-altitude protection technology of anti-UAVs based on multisource detection information fusion." International Journal of Advanced Robotic Systems 17, no. 5 (September 1, 2020): 172988142096290. http://dx.doi.org/10.1177/1729881420962907.

Full text
Abstract:
Nowadays, unmanned aerial vehicles (UAVs) have achieved massive improvement, which brings great convenience and advantage. Meanwhile, threats posed by them may damage public security and personal safety. This article proposes an architecture of intelligent anti-UAVs low-altitude defense system. To address the key problem of discovering UAVs, research based on multisensor information fusion is carried out. Firstly, to solve the problem of probing suspicious targets, a fusion method is designed, which combines radar and photoelectric information. Subsequently, single shot multibox detector model is introduced to identify UAV from photoelectric images. Moreover, improved spatially regularized discriminative correlation filters algorithm is used to elevate real-time and stability performance of system. Finally, experimental platform is constructed to demonstrate the effectiveness of the method. Results show better performance in range, accuracy, and success rate of surveillance.
APA, Harvard, Vancouver, ISO, and other styles
34

Thoret, E., C. Gauriau, T. Andrillon, D. Pressnitzer, and D. Leger. "0293 Sleep Deprivation Affects the Acoustic Properties of Human Speech." Sleep 43, Supplement_1 (April 2020): A111. http://dx.doi.org/10.1093/sleep/zsaa056.290.

Full text
Abstract:
Abstract Introduction Lack of sleep drastically affects many aspects of human behavior. The early detection of sleepiness is thus a major challenge for health and security reasons. Here we investigated the effect of sleep deprivation on the acoustic properties of human speech. Methods Twenty-four participants were sleep deprived for two days (two successive nights with only 3 hours of sleep). They were recorded reading a short text aloud before and after sleep deprivation. An auditory model, based on spectro-temporal modulations, was used to analyse the acoustic properties of their speech and served as a front-end to machine-learning classifiers. Results Results showed that sleepiness could be accurately detected with individually-trained classifiers. However,we were not able to fit a generic classifier for all participants. As we relied on an auditory-inspired model,we could identify and interpret the acoustic features impacted by sleep deprivation. Again,no simple diagnostic feature could be easily identified in the group- level analyses of the speech signals. We therefore developed a novel probing method, combining signal detection theory and noise activation of the classifier, to understand what made the classifier successful for each participant. This led to a diagnostic map for each participant, specifying which frequency region and modulation rates were impacted by sleep deprivation for this particular individual Conclusion In addition to suggesting a practical machine learning algorithm to detect sleep deprivation, combining our probing method with considerations about voice production could help uncover the physiological impact of sleep deprivation at the level of each individual. Support
APA, Harvard, Vancouver, ISO, and other styles
35

Shamseddine, Maha, Wassim Itani, Ali Chehab, and Ayman Kayssi. "Network Programming and Probabilistic Sketching for Securing the Data Plane." Security and Communication Networks 2018 (June 28, 2018): 1–23. http://dx.doi.org/10.1155/2018/2905730.

Full text
Abstract:
This paper presents VISKA, a cloud security service for dynamically detecting malicious switching elements in software defined networking (SDN) infrastructures. The main contributions of VISKA lie in (1) utilizing network programming and secure probabilistic sketching in SDN environments to dynamically detect and isolate parts of the data plane that experience malicious behavior, (2) applying a set of focused packet probing and sketching mechanisms on isolated network partitions/views rather than focusing the security mechanisms on the whole physical network, (3) efficiently analyzing the network behavior of the resulting views by recursively partitioning them in a divide-and-conquer fashion to logarithmically reduce the problem size in order to localize abnormal/malicious switching units, and (4) providing an attack categorization module that analyzes live ingress/egress traffic of the maliciously detected switch(es) solely to identify the specific type of attack, rather than inspecting the whole network traffic as is done in traditional intrusion detection systems. This significantly enhances the performance of attack detection and reduces the load on the controller. A testbed prototype implementation is realized on the Mininet network emulator. The experimental analysis corroborated the algorithms’ convergence property using the linear and FatTree topologies with network sizes of up to 250 switches. Moreover, an implementation of the attack categorization module is realized and achieved an accuracy rate of over 90% for the different attack types supported.
APA, Harvard, Vancouver, ISO, and other styles
36

Veale, Michael, Reuben Binns, and Lilian Edwards. "Algorithms that remember: model inversion attacks and data protection law." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 376, no. 2133 (October 15, 2018): 20180083. http://dx.doi.org/10.1098/rsta.2018.0083.

Full text
Abstract:
Many individuals are concerned about the governance of machine learning systems and the prevention of algorithmic harms. The EU's recent General Data Protection Regulation (GDPR) has been seen as a core tool for achieving better governance of this area. While the GDPR does apply to the use of models in some limited situations, most of its provisions relate to the governance of personal data, while models have traditionally been seen as intellectual property. We present recent work from the information security literature around ‘model inversion’ and ‘membership inference’ attacks, which indicates that the process of turning training data into machine-learned systems is not one way, and demonstrate how this could lead some models to be legally classified as personal data. Taking this as a probing experiment, we explore the different rights and obligations this would trigger and their utility, and posit future directions for algorithmic governance and regulation. This article is part of the theme issue ‘Governing artificial intelligence: ethical, legal, and technical opportunities and challenges’.
APA, Harvard, Vancouver, ISO, and other styles
37

Ahmad, Abu Umar Faruq. "Shari'ah Parameters of Musharakah Mutanaqisah in Islamic Finance: The Experience of Australian Institutions Offering Islamic Financial Services." ISRA International Journal of Islamic Finance 3, no. 2 (December 15, 2011): 7–40. http://dx.doi.org/10.55188/ijif.v3i2.130.

Full text
Abstract:
The paper’s purpose is threefold: (1) probing what makes Islamic financing so important for the largest Muslim minority in a highly diversified multicultural Australia, (2) realising musharakah mutanaqisah (MM) as the real alternative for interest-based conventional finance and (3) evaluating the practice of MM by Australian Institutions offering Islamic Financial Services (AIIFS) from Islamic legal perspectives. By comparing the two systems - Islamic and conventional finance - the study finds that the latter is exploitative and thus creates conflict, stress and insecurity, while contributing to greater disparities of income and wealth. The practice of Islamic finance, on the other hand, is found to reduce conflict, stress and insecurity and make for a more harmonious and equitable society. In this context, the paper recommends that the regulatory impediments are removed to facilitate AIIFS to provide greater security, liquidity and diversity in order to meet the demand of investors in the Muslim community in Australia.
APA, Harvard, Vancouver, ISO, and other styles
38

Kalyoncu, Mehmet. "Uzbekistan and the United States." American Journal of Islam and Society 23, no. 1 (January 1, 2006): 102–5. http://dx.doi.org/10.35632/ajis.v23i1.1646.

Full text
Abstract:
Uzbek president Islam Karimov has gotten away relatively easily with hisbrutal suppression of the Andijon uprising (May 13-14, 2005), in which thestate security forces opened fire on protesters and killed about 700 of them.Despite the fact that this book was written before this event, ShahramAkbarzadeh’s Uzbekistan and the United States: Authoritarianism,Islamism & Washington’s Security Agenda articulates quite well howKarimov came to the point where he could find the courage to becomeincreasingly authoritarian despite Uzbekistan’s bad record of human rightsabuses and failed democratic reforms. The author argues that Karimov’salready existing authoritarianism has intensified and yet has been relativelyignored as a result of his close cooperation with the United States in theAmerican-led “war-on-terror.” He argues that the common threat of Islamist extremism has brought the United States and Uzbekistan togetherand has become a pretext for the latter to continue its repressive policies,which have caused Uzbekistan’s human rights and democratization recordsto falter even further.Akbarzadeh takes the reader through a series of sociopolitical transformationsby which Karimov has sought to consolidate his power. Theseinclude the domestic restructuring of the Uzbek political system in the post-Soviet era; regional alignments and power struggles, most notably againstRussia; and, finally, Tashkent’s long-sought bilateral relations with theUnited States, which gained a whole new dimension after 9/11 and throughoutthe American-led “war on terror.” The author concludes that the cooperationbetween Tashkent and Washington in the fight against Islamistextremism and, consequently, the latter’s downplaying its concerns aboutdemocratic reforms in Uzbekistan, would only encourage Karimov to bemore repressive and less accountable toward the citizens of Uzbekistan.The book contributes to the understanding of political developments in thenewly independent states by probing the interaction between Uzbek domesticpolitics and the international political and security agendas ...
APA, Harvard, Vancouver, ISO, and other styles
39

Li, Chengcheng. "Penetration Testing Curriculum Development in Practice." Journal of Information Technology Education: Innovations in Practice 14 (2015): 085–99. http://dx.doi.org/10.28945/2189.

Full text
Abstract:
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity professionals nationwide throughout the next decade. To fill this job shortage we need a workforce with strong hands-on experience in the latest technologies and software tools to catch up with the rapid evolution of network technologies. It is vital that the IT professionals possess up-to-date technical skills and think and act one step ahead of the cyber criminals who are constantly probing and exploring system vulnerabilities. There is no perfect security mechanism that can defeat all the cyber-attacks; the traditional defensive security mechanism will eventually fail to the pervasive zero-day attacks. However, there are steps to follow to reduce an organization’s vulnerability to cyber-attacks and to mitigate damages. Active security tests of the network from a cyber-criminal’s perspective can identify system vulnerabilities that may lead to future breaches. “If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. But if you know the enemy and know yourself, you need not fear the result of hundred battles” (Sun, 2013). Penetration testing is a discipline within cybersecurity that focuses on identifying and exploiting the vulnerabilities of a network, eventually obtaining access to the critical business information. The pentesters, the security professionals who perform penetration testing, or ethical hackers, break the triad of information security - Confidentiality, Integrity, and Accountability (CIA) - as if they were a cyber-criminal. The purpose of ethical hacking or penetration testing is to know what the “enemy” can do and then generate a report for the management team to aid in strengthening the system, never to cause any real damages. This paper introduces the development of a penetration testing curriculum as a core class in an undergraduate cybersecurity track in Information Technology. The teaching modules are developed based on the professional penetration testing life cycle. The concepts taught in the class are enforced by hands-on lab exercises. This paper also shares the resources that are available to institutions looking for teaching materials and grant opportunities to support efforts when creating a similar curriculum in cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
40

Hyder, M. F., and M. A. Ismail. "INMTD: Intent-based Moving Target Defense Framework using Software Defined Networks." Engineering, Technology & Applied Science Research 10, no. 1 (February 3, 2020): 5142–47. http://dx.doi.org/10.48084/etasr.3266.

Full text
Abstract:
Intent-Based Networking (IBN) is an emerging networking paradigm while Moving Target Defense (MTD) is an active security technique. In this paper, the Intent-based Moving Target Defense (INMTD) framework using Software Defined Networks is proposed. INMTD is the first effort in exploiting IBN for the design of an efficient Moving Target Defense (MTD) framework. INMTD uses the concept of shadow servers in order to counter the first stage of cyber-attacks, i.e. reconnaissance attacks targeted against servers running in SDN networks. INMTD comprises of an MTD application running on an SDN controller. The MTD application has reconnaissance detection, MTD movement, and MTD monitoring modules. The MTD application is integrated with the intent-based northbound API of SDN controller. INMTD not only provides protection against probing attacks, but it also provides high availability due to shadow servers. The proposed framework was implemented using Mininet and ONOS SDN controller. The proposed framework was assessed in terms of defender cost, attacker’s effort, and introduced complexity in the system. The results substantiate the efficient protection against reconnaissance attacks at lower computational cost.
APA, Harvard, Vancouver, ISO, and other styles
41

Muanenda, Yonas. "Recent Advances in Distributed Acoustic Sensing Based on Phase-Sensitive Optical Time Domain Reflectometry." Journal of Sensors 2018 (2018): 1–16. http://dx.doi.org/10.1155/2018/3897873.

Full text
Abstract:
Distributed acoustic sensing (DAS) using coherent Rayleigh backscattering in an optical fiber has become a ubiquitous technique for monitoring multiple dynamic events in real time. It has continued to constitute a steadily increasing share of the fiber-optic sensor market, thanks to its interesting applications in many safety, security, and integrity monitoring systems. In this contribution, an overview of the recent advances of research in DAS based on phase-sensitive optical time domain reflectometry (ϕ-OTDR) is provided. Some advanced techniques used to enhance the performance of ϕ-OTDR sensors for measuring backscattering intensity changes through reduction of measurement noise are presented, in addition to methods used to increase the dynamic measurement capacity of ϕ-OTDR schemes beyond conventional limits set by the sensing distance. Recent ϕ-OTDR configurations which significantly enhance the measurement spatial resolution, including those which decouple it from the probing pulse width, are also discussed. Finally, a review of recent advances in more precise quantitative measurement of an external impact based on frequency shift and phase demodulation methods using simple direct detection ϕ-OTDR schemes is given.
APA, Harvard, Vancouver, ISO, and other styles
42

Janjua, Kanwal, Munam Ali Shah, Ahmad Almogren, Hasan Ali Khattak, Carsten Maple, and Ikram Ud Din. "Proactive Forensics in IoT: Privacy-Aware Log-Preservation Architecture in Fog-Enabled-Cloud Using Holochain and Containerization Technologies." Electronics 9, no. 7 (July 19, 2020): 1172. http://dx.doi.org/10.3390/electronics9071172.

Full text
Abstract:
Collecting and preserving the smart environment logs connected to cloud storage is challenging due to the black-box nature and the multi-tenant cloud models which can pervade log secrecy and privacy. The existing work for log secrecy and confidentiality depends on cloud-assisted models, but these models are prone to multi-stakeholder collusion problems. This study proposes ’PLAF,’ a holistic and automated architecture for proactive forensics in the Internet of Things (IoT) that considers the security and privacy-aware distributed edge node log preservation by tackling the multi-stakeholder issue in a fog enabled cloud. We have developed a test-bed to implement the specification, as mentioned earlier, by incorporating many state-of-the-art technologies in one place. We used Holochain to preserve log integrity, provenance, log verifiability, trust admissibility, and ownership non-repudiation. We introduced the privacy preservation automation of log probing via non-malicious command and control botnets in the container environment. For continuous and robust integration of IoT microservices, we used docker containerization technology. For secure storage and session establishment for logs validation, Paillier Homomorphic Encryption, and SSL with Curve25519 is used respectively. We performed the security and performance analysis of the proposed PLAF architecture and showed that, in stress conditions, the automatic log harvesting running in containers gives a 95% confidence interval. Moreover, we show that log preservation via Holochain can be performed on ARM-Based architectures such as Raspberry Pi in a very less amount of time when compared with RSA and blockchain.
APA, Harvard, Vancouver, ISO, and other styles
43

Abdulrezzak, Sarah, and Firas Sabir. "An Empirical Investigation on Snort NIDS versus Supervised Machine Learning Classifiers." Journal of Engineering 29, no. 2 (February 1, 2023): 164–78. http://dx.doi.org/10.31026/j.eng.2023.02.11.

Full text
Abstract:
With the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade the detection rates of current NIDSs, thorough analyses are essential to identify where ML predictors outperform them. The first step is to provide assessment of most used NIDS worldwide, Snort, and comparing its performance with ML classifiers. This paper provides an empirical study to evaluate performance of Snort and four supervised ML classifiers, KNN, Decision Tree, Bayesian net and Naïve Bays against network attacks, probing, Brute force and DoS. By measuring Snort metric, True Alarm Rate, F-measure, Precision and Accuracy and compares them with the same metrics conducted from applying ML algorithms using Weka tool. ML classifiers show an elevated performance with over 99% correctly classified instances for most algorithms, While Snort intrusion detection system shows a degraded classification of about 25% correctly classified instances, hence identifying Snort weaknesses towards certain attack types and giving leads on how to overcome those weaknesses. es.
APA, Harvard, Vancouver, ISO, and other styles
44

ŠKORIĆ, BORIS. "Quantum readout of Physical Unclonable Functions." International Journal of Quantum Information 10, no. 01 (February 2012): 1250001. http://dx.doi.org/10.1142/s0219749912500013.

Full text
Abstract:
Physical unclonable functions (PUFs) are physical structures that are hard to clone and have a unique challenge-response behavior. The term PUF was coined by Pappu et al. in 2001. That work triggered a lot of interest, and since then a substantial number of papers has been written about the use of a wide variety of physical structures for different security purposes such as identification, authentication, read-proof key storage, key distribution, tamper evidence, anti-counterfeiting, software-to-hardware binding and trusted computing. In this paper we propose a new security primitive: the quantum-readout PUF (QR-PUF). This is a classical PUF, without internal quantum degrees of freedom, which is challenged using a quantum state, e.g. a single-photon state, and whose response is also a quantum state. By the no-cloning property of unknown quantum states, attackers cannot intercept challenges or responses without noticeably disturbing the readout process. Thus, a verifier who sends quantum states as challenges and receives the correct quantum states back can be certain that he is probing a specific QR-PUF without disturbances, even if the QR-PUF is far away "in the field" and under hostile control. For PUFs whose information content is not exceedingly large, all currently known PUF-based authentication and anti-counterfeiting schemes require trusted readout devices in the field. Our quantum readout scheme has no such requirement. Furthermore, we show how the QR-PUF authentication scheme can be interwoven with quantum key exchange (QKE), leading to an authenticated QKE protocol between two parties. This protocol has the special property that it requires no a priori secret shared by the two parties, and that the quantum channel is the authenticated channel, allowing for an unauthenticated classical channel. We provide security proofs for a limited class of attacks. The proofs depend on the physical unclonability of PUFs and on the practical infeasibility of building a quantum computer.
APA, Harvard, Vancouver, ISO, and other styles
45

Geissler, Erhard, and Robert Hunt Sprinkle. "Were our critics right about the Stasi?" Politics and the Life Sciences 38, no. 1 (2019): 32–61. http://dx.doi.org/10.1017/pls.2018.27.

Full text
Abstract:
Background. Disinformation, now best known generically as “fake news,” is an old and protean weapon. Prominent in the 1980s was AIDS disinformation, including the HIV-from-Fort-Detrick myth, for whose propagation some figures ultimately admitted blame while others shamelessly claimed credit. In 2013 we reported a comprehensive analysis of this myth, finding leading roles for the Soviet Union’s state security service, the KGB, and for biologist and independent conspiracy theorist Jakob Segal but not for East Germany’s state security service, the Stasi. We found Stasi involvement had been much less extensive and much less successful than two former Stasi officers had begun claiming following German reunification. In 2014 two historians crediting the two former Stasi officers coauthored a monograph challenging our analysis and portraying the Stasi as having directed Segal, or at least as having used him as a “conscious or unconscious multiplier,” and as having successfully assisted a Soviet bloc AIDS-disinformation conspiracy that they soon inherited and thenceforth led. In 2017 a German appellate court found our 2013 analysis persuasive in a defamation suit brought by a filmmaker whose work the 2014 monograph had depicted as co-funded by the Stasi.Question and methods. Were our critics right about the Stasi? We asked and answered ten subsidiary questions bearing upon our critics’ arguments, reassessing our own prior work and probing additional sources including archives of East Germany’s Partei- und Staatsführung [party-and-state leadership] and the recollections of living witnesses.Findings. Jakob Segal transformed and transmitted the myth without direction from the KGB or the Stasi or any element of East Germany’s party-and-state leadership. The Stasi had trouble even tracking Segal’s activities, which some officers feared would disadvantage East Germany scientifically, economically, and politically. Three officers in one Stasi section did show interest in myth propagation, but their efforts were late, limited, inept, and inconsequential.Conclusion. The HIV-from-Fort-Detrick myth, most effectively promoted by Jakob Segal acting independently of any state’s security service, was not, contrary to claims, a Stasi success.
APA, Harvard, Vancouver, ISO, and other styles
46

Giannelli, Paul C. "Forensic Science." Journal of Law, Medicine & Ethics 33, no. 3 (2005): 535–44. http://dx.doi.org/10.1111/j.1748-720x.2005.tb00516.x.

Full text
Abstract:
The United States Supreme Court has long recognized the value of scientific evidence - especially when compared to other types of evidence such as eyewitness identifications, confessions, and informant testimony. For example, in Escobedo v. Illinois, the Court observed: “We have learned the lesson of history, ancient and modern, that a system of criminal law enforcement which comes to depend on the ‘confession’ will, in the long run, be less reliable and more subject to abuses than a system which depends on extrinsic evidence independently secured through skillful investigation.” Similarly, in Davis v. Mississippi, the Court commented:Detention for fingerprinting may constitute a much less serious intrusion upon personal security than other types of police searches and detentions. Fingerprinting involves none of the probing into an individual's private life and thoughts that marks an interrogation or search. Nor can fingerprint detention be employed repeatedly to harass any individual, since the police need only one set of each person's prints. Furthermore, fingerprinting is an inherently more reliable and effective crime-solving tool than eyewitness identifications or confessions and is not subject to such abuses as the improper line-up and the “third degree.”
APA, Harvard, Vancouver, ISO, and other styles
47

Giannelli, Paul C. "Forensic Science." Journal of Law, Medicine & Ethics 34, no. 2 (2006): 310–19. http://dx.doi.org/10.1111/j.1748-720x.2006.00036.x.

Full text
Abstract:
The United States Supreme Court has long recognized the value of scientific evidence – especially when compared to other types of evidence such as eyewitness identifications, confessions, and informant testimony. For example, in Escobedo v. Illinois, the Court observed: “We have learned the lesson of history, ancient and modern, that a system of criminal law enforcement which comes to depend on the –confession— will, in the long run, be less reliable and more subject to abuses than a system which depends on extrinsic evidence independently secured through skillful investigation.” Similarly, in Davis v. Mississippi, the Court commented:Detention for fingerprinting may constitute a much less serious intrusion upon personal security than other types of police searches and detentions. Fingerprinting involves none of the probing into an individual's private life and thoughts that marks an interrogation or search. Nor can fingerprint detention be employed repeatedly to harass any individual, since the police need only one set of each person's prints. Furthermore, fingerprinting is an inherently more reliable and effective crime-solving tool than eyewitness identifications or confessions and is not subject to such abuses as the improper line-up and the “third degree.”
APA, Harvard, Vancouver, ISO, and other styles
48

Anyaoha, Christian Okechukwu, Uyokei Uba, Ejiro Onotugoma, Semon Mande, Vernon Gracen, and Nnabue Ikenna. "Farmers’ Preferred Traits and Perceptions of Drought Stress on Rainfed Upland Rice Production across Two Rice Growing States of Nigeria." Journal of Agricultural Studies 7, no. 2 (August 19, 2019): 160. http://dx.doi.org/10.5296/jas.v7i3.15302.

Full text
Abstract:
The intermittent and widespread occurrence of drought in rainfed upland rice fields across sub-Sahara Africa has led to tremendous decrease in food security in the region. Although high yielding, drought tolerant varieties have been developed over years to mitigate this trend, limited adoption had been recorded for most of these materials. This study investigated farmers’ perceptions on drought stress and their preferred traits in new upland rice varieties across two major upland rice growing states in Nigeria. Participatory Rural Appraisal was conducted among 119 rice farmers using comparative approach, probing and semi structured interviews. Result based on farmers knowledge of changes in rainfall pattern and preferred traits such as plant architecture and grain shapes in a new upland rice variety differed significantly across the two state. The results identified drought stress as one of the main constraints to upland rice production across communities. The ideal upland rice variety desired by most respondents in both states should be of medium plant height (115-130cm) characterized by white, long and bold grains. This study has demonstrated the importance of understanding farmer’s desired traits in a new upland rice variety and the need to incorporate identified traits in creation of resilient new upland rice varieties adaptable to rain-fed upland rice growing regions of Nigeria.
APA, Harvard, Vancouver, ISO, and other styles
49

Kumar, Abhishek, Manoj Gupta, Prakash Pitchappa, Yi Ji Tan, Nan Wang, and Ranjan Singh. "Topological sensor on a silicon chip." Applied Physics Letters 121, no. 1 (July 4, 2022): 011101. http://dx.doi.org/10.1063/5.0097129.

Full text
Abstract:
An ultrasensitive photonic sensor is vital for sensing matter with absolute specificity. High specificity terahertz photonic sensors are essential in many fields, including medical research, clinical diagnosis, security inspection, and probing molecular vibrations in all forms of matter. Widespread photonic sensing technology detects small frequency shifts due to the targeted specimen, thus requiring ultra-high quality ( Q) factor resonance. However, the existing terahertz waveguide resonating structures are prone to defects, possess limited Q-factor, and lack the feature of chip-scale CMOS integration. Here, inspired by the topologically protected edge state of light, we demonstrate a silicon valley photonic crystal based ultrasensitive, robust on-chip terahertz topological insulator sensor that consists of a topological waveguide critically coupled to a topological cavity with an ultra-high quality ( Q) factor of [Formula: see text]. Topologically protected cavity resonance exhibits strong resilience against disorder and multiple sharp bends. Leveraging on the extremely narrow linewidth (2.3 MHz) of topological cavity resonance, the terahertz sensor shows a record-high figure of merit of [Formula: see text]. In addition to the spectral shift, the intensity modulation of cavity resonance offers an additional sensor metric through active tuning of critical coupling in the waveguide-cavity system. We envision that the ultra-high Q photonic terahertz topological sensor could have chip-scale biomedical applications such as differentiation between normal and cancerous tissues by monitoring the water content.
APA, Harvard, Vancouver, ISO, and other styles
50

Abudu, Ramat Tobi. "A Human Rights View of Maritime Piracy Law: Exploring the Gulf of Guinea." Groningen Journal of International Law 9, no. 1 (September 28, 2021): 1–22. http://dx.doi.org/10.21827/grojil.9.1.1-22.

Full text
Abstract:
As a result of pirates’ unique modus operandi in the Gulf of Guinea (GoG), the current approach to counter-piracy is mainly securitised and repressive. This approach follows the international provisions on piracy framed based on the customary international law categorising pirates as “enemy of mankind”; which, considering the vicious nature of the crime, is quite justified. Moreover, the increase in piracy activities at sea within the GoG is foreseeable considering the economic recession faced by countries within the region due to the Covid-19 pandemic. This prediction calls for the strengthening of law enforcement operations at sea, which must be justifiable in international human rights law in order to ensure the protection of all persons. Thus, reviewing the current piracy laws and their coherence with international human rights law is a requisite. This paper recognises the repressive counter-piracy approach’s success, but takes a glance from a human rights lens, which raises questions relating to “lawfulness”. Consequently, this paper builds on the existing literature criticising the repressive policy towards countering piracy in the GoG. It also advances the research probing the alignment of counter-piracy operations with human rights obligations. This paper additionally takes it a step further by evaluating the piracy laws in the GoG and their alignment with human rights provisions. These findings set a new course towards a more sustainable approach to countering piracy in the GoG, balancing rights and security approaches towards ensuring the protection of lives at sea.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography