Academic literature on the topic 'Security systems Mathematics'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security systems Mathematics.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security systems Mathematics"

1

Hwang, Suk Geun. "Matrix polytope and speech security systems." Korean Journal of Computational & Applied Mathematics 2, no. 2 (September 1995): 3–12. http://dx.doi.org/10.1007/bf03008959.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shevchenko, Svitlana, Yuliia Zhdanovа, Pavlo Skladannyi, and Svitlana Spasiteleva. "MATHEMATICAL METHODS IN CIBERNETIC SECURITY: GRAPHS AND THEIR APPLICATION IN INFORMATION AND CYBERNETIC SECURITY." Cybersecurity: Education, Science, Technique 1, no. 13 (2021): 133–44. http://dx.doi.org/10.28925/2663-4023.2021.13.133144.

Full text
Abstract:
This article is devoted to the problem of applying graph theory in cybersecurity systems and is an overview. Widespread penetration of mathematical methods in the development of information technology characterizes the current stage of our society. Among the mathematical methods used in information and cyber security, a large niche is graph technology. A streamlined system of special terms and symbols of graph theory allows you to easily and easily describe complex and subtle things both geometrically and algebraically. A graph is a mathematical model of a wide variety of objects, phenomena, and the relationships between them. This justifies the choice and relevance of this study. The article outlines the main elements of graph theory, the wide scope of their implementation and provides a historical perspective on the development of this theory. The analysis of scientific works allowed to determine the main directions of application of properties, characteristics of graphs and graph algorithms in information and cyber security. Among them are studies related to the use of graphs in information systems and programming; with modeling, analysis and application of attack graphs; with cryptographic transformations; with the construction of a decision tree in decision-making tasks in conditions of risk and uncertainty. It is proved that the ability to operate with the methods of graph technologies contributes to the development of software and hardware for information protection. The considered approaches to the application of graph theory in information and cyber security can be implemented during the study of the discipline "Special methods in security systems: discrete mathematics" for students majoring in 125 Cybersecurity, as well as in training in research or course work or thesis. By increasing the professional orientation of training, future cybersecurity workers gain a thorough knowledge of fundamental disciplines.
APA, Harvard, Vancouver, ISO, and other styles
3

Bokova, Oksana, Irina Drovnikova, Andrei Etepnev, Evgeniy Rogozin, and Victor Khvostov. "Methods of Estimating Reliability of Information Security Systems which Protect from Unauthorized Access in Automated Systems." SPIIRAS Proceedings 18, no. 6 (November 29, 2019): 1301–32. http://dx.doi.org/10.15622/sp.2019.18.6.1301-1332.

Full text
Abstract:
Modern methods of protecting information from unauthorized access in automated systems are based on the use of specialized information security systems from unauthorized access. Security systems are necessarily included in the form of additional software systems in the software as in a secure execution. Information security systems from unauthorized access can be developed not only in a process of automated systems design, but also complement the system-wide software of functioning systems. The use of the information security systems from unauthorized access can reduce a overall reliability of the automated systems, if they contain errors that are not detected during debugging. The reliability of the information security systems affects effectiveness of information security (confidentiality, integrity and availability). Guidelines of the Federal Service for Technical and Export Control (FSTEC) of Russia are a methodological basis for the formation of the information security systems’ image both in the process of development and in the process of modernization of the automated systems. The guidance documents of FSTEC of Russia do not contain methodological approaches to assessing the reliability of these program systems. In this regard, the actual design of techniques of estimating reliability of the information security systems from unauthorized access in automated systems in a secure execution. The structural complexity of the information security systems from unauthorized access and large number of functions performed necessitates the use of three reliability indicators that characterize the system in solving problems of confidentiality, integrity and availability of information. To develop the technique, the known methods of evaluating the reliability of complex systems are used, which do not allow their decomposition into serial and parallel connection. The developed methods were tested in assessing the reliability of the information security systems from unauthorized access with typical indicators of initial characteristics. The results of calculations and prospects of using the developed methods are presented in the paper.
APA, Harvard, Vancouver, ISO, and other styles
4

Styugin, Mikhail A., and Alexey A. Kytmanov. "Mathematical Modeling of User Perception in Information Security Systems." Journal of Siberian Federal University. Mathematics & Physics 8, no. 4 (December 2015): 454–66. http://dx.doi.org/10.17516/1997-1397-2015-8-4-454-466.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ara, Anees. "Privacy Preservation in Cloud Based Cyber Physical Systems." Journal of Computational and Theoretical Nanoscience 16, no. 10 (October 1, 2019): 4320–27. http://dx.doi.org/10.1166/jctn.2019.8520.

Full text
Abstract:
The Cyber physical systems (CPS) are integration of tightly coupled resource constrained physical and computational systems,which have several real time critical care applications. These systems depend on sensors to sense the physical environment. To overcome the limitations of computational power, CPS are supported by cloud computing systems as their backend. The enablement of cloud support to cyber physical cloud computing systemshave seamless advantages of improved efficiency, in same way this leads to major security and privacy concerns. These systems have decentralized and heterogeneous infrastructure and to fulfill all the security requirements, it is certainly a very complex task. In this paper we propose a generalized system model for securing different types of cloud based cyber physical systems, adversary model and holistic literature review of various CPS services, attacks, security challenges and the security schemes that can be applied to overcome a given attacks. At the end of the paper we discuss a case study on securing Medical CPS and compare the applicability of security schemes in this scenario.
APA, Harvard, Vancouver, ISO, and other styles
6

Bin-Faisal, Sajid, Dip Nandi, and Mashiour Rahman. "Dual Layer Encryption for IoT based Vehicle Systems over 5G Communication." International Journal of Information Technology and Computer Science 14, no. 2 (April 8, 2022): 17–30. http://dx.doi.org/10.5815/ijitcs.2022.02.02.

Full text
Abstract:
In modern communication scenario of the 5G era, the service quality is the greatest concern for the users. Also, the concept of security can’t be neglected in this case. In the IoT oriented services like vehicle and VANET systems, the security in the presentation layer of the network is required. This work is over the security mechanism of the service storage and fetching the files for service. A new scheme of multi layered file and content encryption has been produced in order to strengthen the security of the file and data to maintain integrity and confidentiality of the IoT enabled services implemented in 5G. The encryption scheme is designed for the password encryption through asymmetric key cryptography (RSA) along with an enhanced concern of internal content or data security with symmetric key (AES-128) cryptography. This encryption system of double layer for a file makes the study unique and differentiable than other security schemes.
APA, Harvard, Vancouver, ISO, and other styles
7

Adebayo, Olawale Surajudeen, Bashir Sulaimon Adebayo, Monday Jubril Abdullah, Omale Samuel Enemona, and Lateefah Abdulazeez. "Development of an Electronic Secure Students’ Industrial Works Experience Scheme Placement System." International Journal of Information Technology and Computer Science 14, no. 2 (April 8, 2022): 31–44. http://dx.doi.org/10.5815/ijitcs.2022.02.03.

Full text
Abstract:
This research developed a secured student industrial work experience scheme (SIWES) placement system to take care of the security challenges of the existing automated systems. There are attempts by researchers to ameliorate the challenges associated with the scheme by developing various systems. However, the developed systems are subjected to security vulnerabilities. This research, in an attempt to avert the security challenges associated with the existing automated systems, designed a new scheme which includes security architectures in the kernel and application layers. This new system was able to achieve two important tasks; first, the system automation and second, the inclusion of security architectures to cubs the application’s vulnerabilities. The present process involves students manually seeking placement to undergo the program, and due to this, students end up applying at organizations that are not relevant to what they are studying. Despite the fact there are no much existing systems that digitally caters for this component of the scheme, the available existing systems are subjected to security vulnerability. Therefore, leveraging on secure web application technologies using Unified Modelling Languages for design, HTML, CSS, JavaScript, PHP for its implementation and user privilege and password hash to ensure its security, this project developed a secure solution to this pertinent challenge. The system is tested using unit testing component of each design, integration testing and general system testing. The implementation shows the system works according to the design, by ensuring all units of the development perform necessary functions of data storage, data retrieval, error alerting, and interface/server appropriate communication. In addition, the security architecture, design and implementation of the system’s design are better than the existing ones.
APA, Harvard, Vancouver, ISO, and other styles
8

Gadsby, D., P. Twigg, N. Bowring, and I. Williams. "Ultra Wideband Positioning for Intelligent Security Systems." Measurement and Control 39, no. 4 (May 2006): 108–13. http://dx.doi.org/10.1177/002029400603900401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Stefantsov, D. A. "Implementation of security policies in programming informationprocessing systems." Prikladnaya diskretnaya matematika, no. 13 (September 1, 2011): 55–64. http://dx.doi.org/10.17223/20710410/13/4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mamatkazin, Ilya R. "SYSTEMS OF LAW AND FUNCTIONAL EQUIVALENTS IN SOCIAL SECURITY LAW." Proceedings of the Institute of State and Law of the RAS 17, no. 2 (April 29, 2022): 75–98. http://dx.doi.org/10.35427/2073-4522-2022-17-2-mamatkazin.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Security systems Mathematics"

1

Singh, Gurpreet. "Statistical Modeling of Dynamic Risk in Security Systems." Thesis, KTH, Matematisk statistik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-273599.

Full text
Abstract:
Big data has been used regularly in finance and business to build forecasting models. It is, however, a relatively new concept in the security industry. This study predicts technology related alarm codes that will sound in the coming 7 days at location $L$ by observing the past 7 days. Logistic regression and neural networks are applied to solve this problem. Due to the problem being of a multi-labeled nature logistic regression is applied in combination with binary relevance and classifier chains. The models are trained on data that has been labeled with two separate methods, the first method labels the data by only observing location $L$. The second considers $L$ and $L$'s surroundings. As the problem is multi-labeled the labels are likely to be unbalanced, thus a resampling technique, SMOTE, and random over-sampling is applied to increase the frequency of the minority labels. Recall, precision, and F1-score are calculated to evaluate the models. The results show that the second labeling method performs better for all models and that the classifier chains and binary relevance model performed similarly. Resampling the data with the SMOTE technique increases the macro average F1-scores for the binary relevance and classifier chains models, however, the neural networks performance decreases. The SMOTE resampling technique also performs better than random over-sampling. The neural networks model outperforms the other two models on all methods and achieves the highest F1-score.
Big data har använts regelbundet inom ekonomi för att bygga prognosmodeller, det är dock ett relativt nytt koncept inom säkerhetsbranschen. Denna studie förutsäger vilka larmkoder som kommer att låta under de kommande 7 dagarna på plats $L$ genom att observera de senaste 7 dagarna. Logistisk regression och neurala nätverk används för att lösa detta problem. Eftersom att problemet är av en multi-label natur tillämpas logistisk regression i kombination med binary relevance och classifier chains. Modellerna tränas på data som har annoterats med två separata metoder. Den första metoden annoterar datan genom att endast observera plats $L$ och den andra metoden betraktar $L$ och $L$:s omgivning. Eftersom problemet är multi-labeled kommer annoteringen sannolikt att vara obalanserad och därför används resamplings metoden, SMOTE, och random over-sampling för att öka frekvensen av minority labels. Recall, precision och F1-score mättes för att utvärdera modellerna. Resultaten visar att den andra annoterings metoden presterade bättre för alla modeller och att classifier chains och binary relevance presterade likartat. Binary relevance och classifier chains modellerna som tränades på datan som använts sig av resamplings metoden SMOTE gav ett högre macro average F1-score, dock sjönk prestationen för neurala nätverk. Resamplings metoden SMOTE presterade även bättre än random over-sampling. Neurala nätverksmodellen överträffade de andra två modellerna på alla metoder och uppnådde högsta F1-score.
APA, Harvard, Vancouver, ISO, and other styles
2

Bengtsson, Mattias. "Mathematical foundation needed for development of IT security metrics." Thesis, Linköping University, Department of Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-9766.

Full text
Abstract:

IT security metrics are used to achieve an IT security assessment of certain parts of the IT security environment. There is neither a consensus of the definition of an IT security metric nor a natural scale type of the IT security. This makes the interpretation of the IT security difficult. To accomplish a comprehensive IT security assessment one must aggregate the IT security values to compounded values.

When developing IT security metrics it is important that permissible mathematical operations are made so that the information are maintained all the way through the metric. There is a need for a sound mathematical foundation for this matter.

The main results produced by the efforts in this thesis are:

• Identification of activities needed for IT security assessment when using IT security metrics.

• A method for selecting a set of security metrics in respect to goals and criteria, which also is used to

• Aggregate security values generated from a set of security metrics to compounded higher level security values.

• A mathematical foundation needed for development of security metrics.

APA, Harvard, Vancouver, ISO, and other styles
3

Seotsanyana, Motlatsi. "Formal specification and verification of safety interlock systems : a comparative case study /." Thesis, Link to the online version, 2007. http://hdl.handle.net/10019/710.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Ling Feng. "An image encryption system based on two-dimensional quantum random walks." Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3950660.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Agarwal, Akash. "A Study of Communication Link Removal in Static and Dynamic Teams." The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu1510680159436136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Terashima, Robert Seth. "Tweakable Ciphers: Constructions and Applications." PDXScholar, 2015. https://pdxscholar.library.pdx.edu/open_access_etds/2484.

Full text
Abstract:
Tweakable ciphers are a building block used to construct a variety of cryptographic algorithms. Typically, one proves (via a reduction) that a tweakable-cipher-based algorithm is about as secure as the underlying tweakable cipher. Hence improving the security or performance of tweakable ciphers immediately provides corresponding benefits to the wide array of cryptographic algorithms that employ them. We introduce new tweakable ciphers, some of which have better security and others of which have better performance than previous designs. Moreover, we demonstrate that tweakable ciphers can be used directly (as opposed to as a building block) to provide authenticated encryption with associated data in a way that (1) is robust against common misuses and (2) can, in some cases, result in significantly shorter ciphertexts than other approaches.
APA, Harvard, Vancouver, ISO, and other styles
7

Goeschel, Kathleen. "Feature Set Selection for Improved Classification of Static Analysis Alerts." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1091.

Full text
Abstract:
With the extreme growth in third party cloud applications, increased exposure of applications to the internet, and the impact of successful breaches, improving the security of software being produced is imperative. Static analysis tools can alert to quality and security vulnerabilities of an application; however, they present developers and analysts with a high rate of false positives and unactionable alerts. This problem may lead to the loss of confidence in the scanning tools, possibly resulting in the tools not being used. The discontinued use of these tools may increase the likelihood of insecure software being released into production. Insecure software can be successfully attacked resulting in the compromise of one or several information security principles such as confidentiality, availability, and integrity. Feature selection methods have the potential to improve the classification of static analysis alerts and thereby reduce the false positive rates. Thus, the goal of this research effort was to improve the classification of static analysis alerts by proposing and testing a novel method leveraging feature selection. The proposed model was developed and subsequently tested on three open source PHP applications spanning several years. The results were compared to a classification model utilizing all features to gauge the classification improvement of the feature selection model. The model presented did result in the improved classification accuracy and reduction of the false positive rate on a reduced feature set. This work contributes a real-world static analysis dataset based upon three open source PHP applications. It also enhanced an existing data set generation framework to include additional predictive software features. However, the main contribution is a feature selection methodology that may be used to discover optimal feature sets that increase the classification accuracy of static analysis alerts.
APA, Harvard, Vancouver, ISO, and other styles
8

Fung, Charles Way Hun. "Multi-marcação de vídeo baseada em marca d'água LWT-SVD usando abordagem lateral." Universidade Tecnológica Federal do Paraná, 2012. http://repositorio.utfpr.edu.br/jspui/handle/1/328.

Full text
Abstract:
CAPES
Vídeos digitais se tornaram uma forma de comunicação altamente utilizada na rede, entretanto estes dados são facilmente copiados e distribuídos. Isto se deve ao crescente número de ferramentas que surgiram com este objetivo, causando quebra dos direitos autorais e distribuição ilegal de conteúdo. A solução mais estudada para este problema são as marcas d'água digitais, que provêm segurança em forma de autenticação e verificação de violação. Neste trabalho, foi desenvolvido um novo método de inserção e extração de marcas d'água em um vídeo, usando o processo chamado abordagem lateral. Este possibilita a marcação em blocos de frames. As diversas marcas inseridas são usadas como redundância para aumentar a robustez contra ataques. Os testes realizados seguiram o padrão dos benchmarks Vidmark e Stirmark, os quais demonstram a eficiência do método em manter a marca d'água mesmo após ataques.
Digital videos have become the most used way to communicate, however these data are easily copied and distributed. That happen due the growing number of tools that are create with this goal, causing breach of copyright and illegal distribution of content. The most studied solution that can solve this problem are the digital watermarks that provide security like authentication and tamper detection. In this work, we developed a new method of embedding and extracting watermarks in a video using a process called side view. This process allows watermark a block of frames. The several watermarks embedded can be used like redundance to grow the robustness of the method against attacks. The tests followed the standard benchmarks Vidmark and Stirmark that show the performance of the method in keep the watermark even after attacks.
APA, Harvard, Vancouver, ISO, and other styles
9

Ma, Chunyan. "Mathematical security models for multi-agent distributed systems." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2568.

Full text
Abstract:
This thesis presents the developed taxonomy of the security threats in agent-based distributed systems. Based on this taxonomy, a set of theories is developed to facilitate analyzng the security threats of the mobile-agent systems. We propose the idea of using the developed security risk graph to model the system's vulnerabilties.
APA, Harvard, Vancouver, ISO, and other styles
10

Suriadi, Suriadi. "Strengthening and formally verifying privacy in identity management systems." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/39345/1/Suriadi_Suriadi_Thesis.pdf.

Full text
Abstract:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Security systems Mathematics"

1

Anderson, Ross. Security engineering: A guide to building dependable distributed systems. 2nd ed. Indianapolis, IN: Wiley Technology Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Security engineering: A guide to building dependable distributed systems. 2nd ed. Indianapolis, IN: Wiley Technology Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Anderson, Ross. Security engineering: A guide to building dependable distributed systems. 2nd ed. Indianapolis, IN: Wiley Technology Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Security engineering: A guide to building dependable distributed systems. New York: Wiley, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

1955-, Kachyns'kyi A. B., ed. Systemno-kont︠s︡eptualʹni zasady stratehiï nat︠s︡ionalʹnoï bezpeky Ukraïny. Kyïv: I︠E︡vroatlantykinform, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

International Workshop on Computational Intelligence in Security for Information Systems (2008 Genoa, Italy). Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008. Berlin: Springer, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

International Workshop on Computational Intelligence in Security for Information Systems (2008 Genoa, Italy). Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008. Berlin: Springer, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

1972-, Ito Takayuki, ed. Rational, robust, and secure negotiations in multi-agent systems. Berlin: Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Paolo, Gastaldo, Zunino Rodolfo, Corchado Emilio, and SpringerLink (Online service), eds. Computational Intelligence in Security for Information Systems: CISIS’09, 2nd International Workshop Burgos, Spain, September 2009 Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pierre, Plamondon, International Labour Office, and International Social Security Association, eds. Actuarial practice in social security. Geneva: International Labour Office, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Security systems Mathematics"

1

Walter, Max, and Carsten Trinitis. "Quantifying the Security of Composed Systems." In Parallel Processing and Applied Mathematics, 1026–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11752578_124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Panagopoulos, D., and S. Hassapis. "A Short Exposition of Topological Applications to Security Systems." In Applications of Mathematics and Informatics in Science and Engineering, 189–98. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04720-1_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gąsior, Jakub, Franciszek Seredyński, and Andrei Tchernykh. "A Security-Driven Approach to Online Job Scheduling in IaaS Cloud Computing Systems." In Parallel Processing and Applied Mathematics, 156–65. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-78054-2_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Eickmann, Jonas, Christian Bredtmann, and Albert Moser. "Security-Constrained Optimization Framework for Large-Scale Power Systems Including Post-contingency Remedial Actions and Inter-temporal Constraints." In Trends in Mathematics, 47–63. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-51795-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Vert, Gregory, Ann Leslie Claesson-Vert, Jesse Roberts, and Erica Bott. "A Technology for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine and Vector Mathematics." In Computer and Network Security Essentials, 41–64. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Green, Sam, Craig M. Vineyard, and Çetin Kaya Koç. "Mathematical Optimizations for Deep Learning." In Cyber-Physical Systems Security, 69–92. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98935-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Prajapati, Apeksha. "Mathematical Analysis of Effectiveness of Security Patches in Securing Wireless Sensor Network." In Advances in Intelligent Systems and Computing, 143–55. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-8222-2_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gollmann, Dieter. "Security for Cyber-Physical Systems." In Mathematical and Engineering Methods in Computer Science, 12–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36046-6_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Katal, A. "Security and Privacy in Mobile Cloud Computing." In Mathematical Modeling for Intelligent Systems, 17–33. Boca Raton: Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003291916-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Franzen, Dietmar. "Incomplete Contracts and Security Design." In Lecture Notes in Economics and Mathematical Systems, 45–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/978-3-642-56932-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security systems Mathematics"

1

Feng Liu and Guodong Shi. "Nonlinear mathematics model and stability for social security systems." In 2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering (ISKE). IEEE, 2010. http://dx.doi.org/10.1109/iske.2010.5680846.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tarek, Nouioua, and Belbachir Ahmed Hafid. "The Quantum Computer and the Security of Information Systems." In 2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI). IEEE, 2021. http://dx.doi.org/10.1109/icrami52622.2021.9585929.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kapralyakov, Petko, George Venkov, Ralitza Kovacheva, and Vesela Pasheva. "Security of Data, Stored in Information Systems of Bulgarian Municipal Administrations." In APPLICATIONS OF MATHEMATICS IN ENGINEERING AND ECONOMICS (AMEE '11): Proceedings of the 37th International Conference. AIP, 2011. http://dx.doi.org/10.1063/1.3664389.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Abdulmunem, Al-Sudani Mustafa Qahtan, and Vyacheslav S. Kharchenko. "Availability and Security Assessment of Smart Building Automation Systems: Combining of Attack Tree Analysis and Markov Models." In 2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI). IEEE, 2016. http://dx.doi.org/10.1109/mcsi.2016.062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bijelić, Zdravko, Biljana Milanović, and Mitar Bijelić. "Model of Optimal System Management in the Military Process Industry in the Conditions of the COVID-19 Pandemic." In 34th International Congress on Process Industry. SMEITS, 2021. http://dx.doi.org/10.24094/ptk.021.34.1.67.

Full text
Abstract:
The paper deals with the problem of research related to the systemic problem of optimal management related to the military process industry in the environment covid-19. The developed model enables the application of soft mathematics technology to make reliable decisions related to the field of business of the military process industry. Using the method of analogy, the developed model for optimal process industry management can be used for systems in other areas as well. Unlike various models that were developed before the covid-19 pandemic, this model puts the health safety factor in the first place in terms of evaluation.With the appearance of the covid-19 pandemic, a security factor in the military industry, and above all the process is further complicated, and thus the system optimization of management. The paper shows the possible application of the model on a specific production system in the field of military process industry. Research shows that at all levels of management in the conditions of the covid-19 pandemic, there was no systematic approach to management optimization in which the safety factor is in the first place.Successful modeling of such complex systems is not possible without the application of multidisciplinary knowledge such as: engineering-technical, medical-health, security, economic, socio-psychological, educational and soft mathematics. In the education system, developmental changes are needed in the function of educating a larger number of staff who possess multidisciplinary knowledge.
APA, Harvard, Vancouver, ISO, and other styles
6

Goodman, Jacob M., Jinho Kim, S. Andrew Gadsden, and Stephen A. Wilkerson. "System and mathematical modeling of quadrotor dynamics." In SPIE Defense + Security, edited by Robert E. Karlsen, Douglas W. Gage, Charles M. Shoemaker, and Grant R. Gerhart. SPIE, 2015. http://dx.doi.org/10.1117/12.2185196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Novikov, O. P., and M. O. Novikov. "Mathematical model of the frame security system." In Global science. Development and novelty. L-Journal, 2020. http://dx.doi.org/10.18411/gsdn-25-12-2020-07.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Яркова, Ольга Николаевна, Анастасия Сергеевна Яркова, and Алена Владимировна Труфанова. "MATHEMATICAL MODELING OF INVESTMENT ALLOCATION STRATEGY FOR INFORMATION SECURITY SYSTEM ORGANIZATION." In Сборник избранных статей по материалам научных конференций ГНИИ “Нацразвитие” (Санкт-Петербург, Апрель 2020). Crossref, 2020. http://dx.doi.org/10.37539/apr290.2020.51.32.009.

Full text
Abstract:
В работе предложен алгоритм формирования стратегии распределения инвестиций на улучшение защитных свойств системы по уровням доступа, обеспечивающей, при выделенных финансовых средствах, наилучший уровень надежности многоуровневой системы защиты информации в целом. In this article, we propose an algorithm for forming a strategy for allocating investments to improve the security properties of the system by access levels, which provides the best level of reliability of a multi-level information security system as a whole with allocated financial resources.
APA, Harvard, Vancouver, ISO, and other styles
9

Duisebekova, K. S., and T. Duisebekov. "Utilization of Fuzzy Mathematics for Security Model of a System." In 2018 IEEE 12th International Conference on Application of Information and Communication Technologies (AICT). IEEE, 2018. http://dx.doi.org/10.1109/icaict.2018.8747158.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Zhongwen, and Yang Xiang. "Mathematical Analysis of Active DDoS Defense Systems." In 2006 International Conference on Computational Intelligence and Security. IEEE, 2006. http://dx.doi.org/10.1109/iccias.2006.295324.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security systems Mathematics"

1

Perdigão, Rui A. P. Beyond Quantum Security with Emerging Pathways in Information Physics and Complexity. Synergistic Manifolds, June 2022. http://dx.doi.org/10.46337/220602.

Full text
Abstract:
Information security and associated vulnerabilities have long been a pressing challenge, from the fundamental scientific backstage to the frontline across the most diverse sectors of society. At the tip of the iceberg of this problem, the citizens immediately feel that the reservation of privacy and the degradation of the quality and security of the information and communication on which they depend for the day-to-day activities, already of crucial relevance, are at stake. Naturally though, the challenges do not end there. There is a whole infrastructure for storing information, processing and communication, whose security and reliability depend on key sectors gearing modern society – such as emergency communication systems (medical, civil and environmental protection, among others), transportation and geographic information, the financial communications systems at the backbone of day-to-day transactions, the information and telecommunications systems in general. And crucially the entire defence ecosystem that in essence is a stalwart in preventing our civilisation to self-annihilate in full fulfilment of the second principle of thermodynamics. The relevance of the problem further encompasses the preservation of crucial values such as the right to information, security and integrity of democratic processes, internal administration, justice, defence and sovereignty, ranging from the well-being of the citizen to the security of the nation and beyond. In the present communication, we take a look at how to scientifically and technically empower society to address these challenges, with the hope and pragmatism enabled by our emerging pathways in information physics and complexity. Edging beyond classical and quantum frontiers and their vulnerabilities to unveil new principles, methodologies and technologies at the core of the next generation system dynamic intelligence and security. To illustrate the concepts and tools, rather than going down the road of engineered systems that we can ultimately control, we take aim at the bewildering complexity of nature, deciphering new secrets in the mathematical codex underlying its complex coevolutionary phenomena that so heavily impact our lives, and ultimately bringing out novel insights, methods and technologies that propel information physics and security beyond quantum frontiers.
APA, Harvard, Vancouver, ISO, and other styles
2

Unal, Beyza, Julia Cournoyer, Calum Inverarity, and Yasmin Afina. Uncertainty and complexity in nuclear decision-making. Royal Institute of International Affairs, March 2022. http://dx.doi.org/10.55317/9781784135157.

Full text
Abstract:
Complex systems modelling is already implemented in critical policy areas such as climate change and health. It could also play an important role in the nuclear weapons sphere – by opening alternative pathways that may help mitigate risks of confrontation and escalation – but such modelling has yet to be fully embraced by policymakers in this community. By applying a complexity lens, policy- and decision-makers at all stages along the nuclear chain of command might better understand how their actions could have significant consequences for international security and peace. Nuclear decision-making is shaped by, and interacts with, the ever-changing international security environment and nuclear weapons policy. Tackling problems in the nuclear weapons policy field requires the implementation of ‘system of systems’ design principles, mathematical modelling approaches and multidisciplinary analysis. This research paper presents nuclear weapons decision-making as a complex endeavour, with individual decisions being influenced by multiple factors such as reasoning, intuition (gut feeling), biases and system-level noise. At a time of crisis, these factors may combine to cause risks of escalation. The authors draw on past examples of near nuclear use to examine decision-making in the nuclear context as a ‘wicked problem’, with multi-layered, interacting and constantly fluctuating elements.
APA, Harvard, Vancouver, ISO, and other styles
3

Semerikov, Serhiy, Illia Teplytskyi, Yuliia Yechkalo, Oksana Markova, Vladimir Soloviev, and Arnold Kiv. Computer Simulation of Neural Networks Using Spreadsheets: Dr. Anderson, Welcome Back. [б. в.], June 2019. http://dx.doi.org/10.31812/123456789/3178.

Full text
Abstract:
The authors of the given article continue the series presented by the 2018 paper “Computer Simulation of Neural Networks Using Spreadsheets: The Dawn of the Age of Camelot”. This time, they consider mathematical informatics as the basis of higher engineering education fundamentalization. Mathematical informatics deals with smart simulation, information security, long-term data storage and big data management, artificial intelligence systems, etc. The authors suggest studying basic principles of mathematical informatics by applying cloud-oriented means of various levels including those traditionally considered supplementary – spreadsheets. The article considers ways of building neural network models in cloud-oriented spreadsheets, Google Sheets. The model is based on the problem of classifying multi-dimensional data provided in “The Use of Multiple Measurements in Taxonomic Problems” by R. A. Fisher. Edgar Anderson’s role in collecting and preparing the data in the 1920s-1930s is discussed as well as some peculiarities of data selection. There are presented data on the method of multi-dimensional data presentation in the form of an ideograph developed by Anderson and considered one of the first efficient ways of data visualization.
APA, Harvard, Vancouver, ISO, and other styles
4

Data Encryption Standard. Gaithersburg, MD: National Institute of Standards and Technology, 1988. http://dx.doi.org/10.6028/nist.fips.46-1.

Full text
Abstract:
The selective application of technological and related procedural safeguards is an important responsibility of every Federal organization in providing adequate security to its ADP systems. This publication provides a standard to be used by Federal organizations when these organizations specify that cryptographic protection ia to be used for 11emitive or valuable computer data. Protection of computer data during transmission between electronic components or while in storage may be necessary to maintain the confidentiality and integrity of the Information represented by that data. The standard specifies an encryption algorithm which is to be implemented in an el.ectronJc device for use in Federal ADP systems and networks. The algorithm uniquely defines the mathematical steps required to transform computer data into a cryptographic cipher. It also specifies the steps required to transform the cipher back to its original form. A device performing this algorithm may be used in many applications areas where cryptographic data protection is needed. Within the context of a total security program comprising physical security procedures, good information management practices and computer system/network access controls, the Data Encryption Standard is being made available for use by Federal agencies. This revision supersedes FIPS 46.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography