Journal articles on the topic 'Security systems Mathematics'

To see the other types of publications on this topic, follow the link: Security systems Mathematics.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security systems Mathematics.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Hwang, Suk Geun. "Matrix polytope and speech security systems." Korean Journal of Computational & Applied Mathematics 2, no. 2 (September 1995): 3–12. http://dx.doi.org/10.1007/bf03008959.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shevchenko, Svitlana, Yuliia Zhdanovа, Pavlo Skladannyi, and Svitlana Spasiteleva. "MATHEMATICAL METHODS IN CIBERNETIC SECURITY: GRAPHS AND THEIR APPLICATION IN INFORMATION AND CYBERNETIC SECURITY." Cybersecurity: Education, Science, Technique 1, no. 13 (2021): 133–44. http://dx.doi.org/10.28925/2663-4023.2021.13.133144.

Full text
Abstract:
This article is devoted to the problem of applying graph theory in cybersecurity systems and is an overview. Widespread penetration of mathematical methods in the development of information technology characterizes the current stage of our society. Among the mathematical methods used in information and cyber security, a large niche is graph technology. A streamlined system of special terms and symbols of graph theory allows you to easily and easily describe complex and subtle things both geometrically and algebraically. A graph is a mathematical model of a wide variety of objects, phenomena, and the relationships between them. This justifies the choice and relevance of this study. The article outlines the main elements of graph theory, the wide scope of their implementation and provides a historical perspective on the development of this theory. The analysis of scientific works allowed to determine the main directions of application of properties, characteristics of graphs and graph algorithms in information and cyber security. Among them are studies related to the use of graphs in information systems and programming; with modeling, analysis and application of attack graphs; with cryptographic transformations; with the construction of a decision tree in decision-making tasks in conditions of risk and uncertainty. It is proved that the ability to operate with the methods of graph technologies contributes to the development of software and hardware for information protection. The considered approaches to the application of graph theory in information and cyber security can be implemented during the study of the discipline "Special methods in security systems: discrete mathematics" for students majoring in 125 Cybersecurity, as well as in training in research or course work or thesis. By increasing the professional orientation of training, future cybersecurity workers gain a thorough knowledge of fundamental disciplines.
APA, Harvard, Vancouver, ISO, and other styles
3

Bokova, Oksana, Irina Drovnikova, Andrei Etepnev, Evgeniy Rogozin, and Victor Khvostov. "Methods of Estimating Reliability of Information Security Systems which Protect from Unauthorized Access in Automated Systems." SPIIRAS Proceedings 18, no. 6 (November 29, 2019): 1301–32. http://dx.doi.org/10.15622/sp.2019.18.6.1301-1332.

Full text
Abstract:
Modern methods of protecting information from unauthorized access in automated systems are based on the use of specialized information security systems from unauthorized access. Security systems are necessarily included in the form of additional software systems in the software as in a secure execution. Information security systems from unauthorized access can be developed not only in a process of automated systems design, but also complement the system-wide software of functioning systems. The use of the information security systems from unauthorized access can reduce a overall reliability of the automated systems, if they contain errors that are not detected during debugging. The reliability of the information security systems affects effectiveness of information security (confidentiality, integrity and availability). Guidelines of the Federal Service for Technical and Export Control (FSTEC) of Russia are a methodological basis for the formation of the information security systems’ image both in the process of development and in the process of modernization of the automated systems. The guidance documents of FSTEC of Russia do not contain methodological approaches to assessing the reliability of these program systems. In this regard, the actual design of techniques of estimating reliability of the information security systems from unauthorized access in automated systems in a secure execution. The structural complexity of the information security systems from unauthorized access and large number of functions performed necessitates the use of three reliability indicators that characterize the system in solving problems of confidentiality, integrity and availability of information. To develop the technique, the known methods of evaluating the reliability of complex systems are used, which do not allow their decomposition into serial and parallel connection. The developed methods were tested in assessing the reliability of the information security systems from unauthorized access with typical indicators of initial characteristics. The results of calculations and prospects of using the developed methods are presented in the paper.
APA, Harvard, Vancouver, ISO, and other styles
4

Styugin, Mikhail A., and Alexey A. Kytmanov. "Mathematical Modeling of User Perception in Information Security Systems." Journal of Siberian Federal University. Mathematics & Physics 8, no. 4 (December 2015): 454–66. http://dx.doi.org/10.17516/1997-1397-2015-8-4-454-466.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ara, Anees. "Privacy Preservation in Cloud Based Cyber Physical Systems." Journal of Computational and Theoretical Nanoscience 16, no. 10 (October 1, 2019): 4320–27. http://dx.doi.org/10.1166/jctn.2019.8520.

Full text
Abstract:
The Cyber physical systems (CPS) are integration of tightly coupled resource constrained physical and computational systems,which have several real time critical care applications. These systems depend on sensors to sense the physical environment. To overcome the limitations of computational power, CPS are supported by cloud computing systems as their backend. The enablement of cloud support to cyber physical cloud computing systemshave seamless advantages of improved efficiency, in same way this leads to major security and privacy concerns. These systems have decentralized and heterogeneous infrastructure and to fulfill all the security requirements, it is certainly a very complex task. In this paper we propose a generalized system model for securing different types of cloud based cyber physical systems, adversary model and holistic literature review of various CPS services, attacks, security challenges and the security schemes that can be applied to overcome a given attacks. At the end of the paper we discuss a case study on securing Medical CPS and compare the applicability of security schemes in this scenario.
APA, Harvard, Vancouver, ISO, and other styles
6

Bin-Faisal, Sajid, Dip Nandi, and Mashiour Rahman. "Dual Layer Encryption for IoT based Vehicle Systems over 5G Communication." International Journal of Information Technology and Computer Science 14, no. 2 (April 8, 2022): 17–30. http://dx.doi.org/10.5815/ijitcs.2022.02.02.

Full text
Abstract:
In modern communication scenario of the 5G era, the service quality is the greatest concern for the users. Also, the concept of security can’t be neglected in this case. In the IoT oriented services like vehicle and VANET systems, the security in the presentation layer of the network is required. This work is over the security mechanism of the service storage and fetching the files for service. A new scheme of multi layered file and content encryption has been produced in order to strengthen the security of the file and data to maintain integrity and confidentiality of the IoT enabled services implemented in 5G. The encryption scheme is designed for the password encryption through asymmetric key cryptography (RSA) along with an enhanced concern of internal content or data security with symmetric key (AES-128) cryptography. This encryption system of double layer for a file makes the study unique and differentiable than other security schemes.
APA, Harvard, Vancouver, ISO, and other styles
7

Adebayo, Olawale Surajudeen, Bashir Sulaimon Adebayo, Monday Jubril Abdullah, Omale Samuel Enemona, and Lateefah Abdulazeez. "Development of an Electronic Secure Students’ Industrial Works Experience Scheme Placement System." International Journal of Information Technology and Computer Science 14, no. 2 (April 8, 2022): 31–44. http://dx.doi.org/10.5815/ijitcs.2022.02.03.

Full text
Abstract:
This research developed a secured student industrial work experience scheme (SIWES) placement system to take care of the security challenges of the existing automated systems. There are attempts by researchers to ameliorate the challenges associated with the scheme by developing various systems. However, the developed systems are subjected to security vulnerabilities. This research, in an attempt to avert the security challenges associated with the existing automated systems, designed a new scheme which includes security architectures in the kernel and application layers. This new system was able to achieve two important tasks; first, the system automation and second, the inclusion of security architectures to cubs the application’s vulnerabilities. The present process involves students manually seeking placement to undergo the program, and due to this, students end up applying at organizations that are not relevant to what they are studying. Despite the fact there are no much existing systems that digitally caters for this component of the scheme, the available existing systems are subjected to security vulnerability. Therefore, leveraging on secure web application technologies using Unified Modelling Languages for design, HTML, CSS, JavaScript, PHP for its implementation and user privilege and password hash to ensure its security, this project developed a secure solution to this pertinent challenge. The system is tested using unit testing component of each design, integration testing and general system testing. The implementation shows the system works according to the design, by ensuring all units of the development perform necessary functions of data storage, data retrieval, error alerting, and interface/server appropriate communication. In addition, the security architecture, design and implementation of the system’s design are better than the existing ones.
APA, Harvard, Vancouver, ISO, and other styles
8

Gadsby, D., P. Twigg, N. Bowring, and I. Williams. "Ultra Wideband Positioning for Intelligent Security Systems." Measurement and Control 39, no. 4 (May 2006): 108–13. http://dx.doi.org/10.1177/002029400603900401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Stefantsov, D. A. "Implementation of security policies in programming informationprocessing systems." Prikladnaya diskretnaya matematika, no. 13 (September 1, 2011): 55–64. http://dx.doi.org/10.17223/20710410/13/4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mamatkazin, Ilya R. "SYSTEMS OF LAW AND FUNCTIONAL EQUIVALENTS IN SOCIAL SECURITY LAW." Proceedings of the Institute of State and Law of the RAS 17, no. 2 (April 29, 2022): 75–98. http://dx.doi.org/10.35427/2073-4522-2022-17-2-mamatkazin.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Zhang, Zhenyu, Anas Chaaban, and Lutz Lampe. "Physical layer security in light-fidelity systems." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 378, no. 2169 (March 2, 2020): 20190193. http://dx.doi.org/10.1098/rsta.2019.0193.

Full text
Abstract:
Light-fidelity (LiFi) is a light-based wireless communication technology which can complement radio-frequency (RF) communication technologies for indoor applications. Although LiFi signals are spatially more contained than RF signals, the broadcasting nature of LiFi also makes it susceptible to eavesdropping. Therefore, it is important to secure the transmitted data against potential eavesdroppers. In this paper, an overview of the recent developments pertaining to LiFi physical layer security (PLS) is provided, and the main differences between LiFi PLS and RF PLS are explained. LiFi achievable secrecy rates and upper bounds are then investigated under practical channel models and transmission schemes. Beamforming and jamming, which received significant research attention recently as a means to achieve PLS in LiFi, are also investigated under indoor illumination constraints. Finally, future research directions of interest in LiFi PLS are identified and discussed. This article is part of the theme issue ‘Optical wireless communication’.
APA, Harvard, Vancouver, ISO, and other styles
12

Balyuk, Aleksey, and Oleg Finko. "INFORMATION SECURITY OF CYBER-PHYSICAL SYSTEMS: AUTHENTICATION OF DIGITAL TWINS." Voprosy kiberbezopasnosti, no. 5(51) (2022): 100–113. http://dx.doi.org/10.21681/2311-3456-2022-5-100-113.

Full text
Abstract:
Formulation of the problem: the main catalysts for the development of cyber-physical systems are currently the growth of artificial intelligence and the creation of digital twins that have a complex vertical structure and exchange data for joint learning. At the same time, the empowerment of digital twins as data owners can lead to critical consequences in the field of ensuring the security of data systems. The development of evolutionary methods for ensuring information security, and in particular, methods for authenticating digital twins, is a fundamental issue on the way to the development of cyber-physical systems. Objective: analysis of aspects and principles of building a system and the process of authenticating digital twins in dynamic and scalable cyber-physical systems, organizing the process under study, indicators of its effectiveness and criteria for their evaluation. Methods used: system analysis, tuple algebra, methods for designing and evaluating the efficiency of complex systems. Novelty: the use of a multi-agent structure of the digital twin authentication system, which makes it possible to achieve guaranteed awareness of the security status of the system as a whole and respond appropriately in case of compromising events. The implementation of intelligent authentication management is proposed to be carried out using the application capabilities of tuple algebra, which takes into account differences in the structures of traditional and intelligent systems, as well as the difficulties of parallelization in distributed systems. To increase the stability of the multi-agent authentication system, the possibility of using cryptocode protocols is considered, which makes it possible to ensure the restoration of reliable authentication data in case of failures. Result: substantiation of new principles and technological solutions in the field of high-level design of cyber- physical systems.
APA, Harvard, Vancouver, ISO, and other styles
13

Yazov, Yury, Sergey Soloviev, and Mikhail Tarelkin. "Logical-Linguistic Modeling of Security Threats Information in Information Systems." Voprosy kiberbezopasnosti, no. 4(50) (2022): 13–25. http://dx.doi.org/10.21681/2311-3456-2022-4-13-25.

Full text
Abstract:
Purpose: assessment of the possibility, definition of conditions and a brief description of the relational languages of logical-linguistic modeling for a formalized description and presentation of the processes of implementing information security threats in information systems. Method: application of the logical-linguistic modeling apparatus, which makes it possible to formally describe information security threats and a set of actions performed in the course of their implementation, taking into account the capabilities of relational description languages, such as Codd’s language, context-free plex-language, RX-code language, syntagmatic chains and semantic networks. Result: a brief description and comparative analysis of relational description languages and features that affect the possibility of their use for describing threats to information security and logical-linguistic modeling of their implementation processes are given. The expediency of such modeling is shown when creating promising expert systems designed for automated and automatic analysis of threats, when maintaining a data bank of threats based on the results of monitoring publications about them on the Internet. Examples of constructing formal logical-linguistic descriptions of well-known threats of computer attacks on information systems using RX-code languages and semantic networks are given, proposals are made for expanding the language of semantic networks to describe threats, taking into account new data on threats and methods for their implementation. It is noted that the proposed approach to modeling the processes of implementation of information security threats, as a rule, is applicable in the absence of the need to take into account the time factor when assessing the possibilities of their implementation.
APA, Harvard, Vancouver, ISO, and other styles
14

Öğüt, Hulisi. "The configuration and detection strategies for information security systems." Computers & Mathematics with Applications 65, no. 9 (May 2013): 1234–53. http://dx.doi.org/10.1016/j.camwa.2012.05.015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Xu, Li, Elisa Bertino, and Yi Mu. "Security of new generation computing systems." Concurrency and Computation: Practice and Experience 26, no. 8 (September 12, 2013): 1475–76. http://dx.doi.org/10.1002/cpe.3128.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Langar, Mahjoub, Mohamed Mejri, and Kamel Adi. "Formal enforcement of security policies on concurrent systems." Journal of Symbolic Computation 46, no. 9 (September 2011): 997–1016. http://dx.doi.org/10.1016/j.jsc.2011.05.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Et. al., Rohit Chawla,. "Study of Security Threats and Challenges in Internet of Things Systems." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 1154–66. http://dx.doi.org/10.17762/turcomat.v12i2.1137.

Full text
Abstract:
The interpretability and secured communication are major challenge in internet of things. The embedding of wireless device has low energy and bandwidth. The low energy and bandwidth cannot effort computational overhead and compromised with security threats. Primary the conventional cryptography algorithm is applied for generation and sharing of key for mode of communication. The conventional cryptography algorithms have several bottleneck issues related to generation of key and distribution of key. The NIST models provides the secured communication channel in the environments of mobility. Lack of integrity, confidentiality and authorization process of data transmitted over the network of internet of things used the concept of key generation and allocation. The process of key generation and authentication provides the authorization and authentication of data over the internet of things. In this paper present the review of security threats of internet of things.
APA, Harvard, Vancouver, ISO, and other styles
18

Rajawat, Anand Singh, Pradeep Bedi, S. B. Goyal, Piyush Kumar Shukla, Sajjad Shaukat Jamal, Adel R. Alharbi, and Amer Aljaedi. "Securing 5G-IoT Device Connectivity and Coverage Using Boltzmann Machine Keys Generation." Mathematical Problems in Engineering 2021 (October 8, 2021): 1–10. http://dx.doi.org/10.1155/2021/2330049.

Full text
Abstract:
In terms of growth, effect, and capability, the 5G-enabled Internet of Things (IoT) is incredible. The volume of data distributed and processed by IoT (Internet of Things) systems that trust connectivity and coverage raises some security problems. As IoT technology is directly used in our daily lives, the threats of present cyberspace may grow more prominent globally. Extended network life, coverage, and connectivity are all required for securing IoT-based 5G network devices. As a result of these failures, there are flaws that lead to security breaches. Because purposeful faults can quickly render the entire network dysfunctional, they are more difficult to identify than unexpected failures. Securing IoT-based 5G Network Device Connectivity and Coverage for expending Encryption and Authentication Scheme (EAS) framework is proposed in this study, which uses novel security flaws. In this research, we proposed a Boltzmann machine (BMKG)-based encryption algorithm for securing 5G-enabled IoT device network environment and compared various asymmetric algorithms for key exchange.
APA, Harvard, Vancouver, ISO, and other styles
19

Lee, Adrian J., Laura A. McLay, and Sheldon H. Jacobson. "Designing Aviation Security Passenger Screening Systems Using Nonlinear Control." SIAM Journal on Control and Optimization 48, no. 4 (January 2009): 2085–105. http://dx.doi.org/10.1137/070707014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Et. al., Zakoldaev D. A. ,. "Confidentiality assurance in Multi-agent Robotic System." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 2659–63. http://dx.doi.org/10.17762/turcomat.v12i2.2283.

Full text
Abstract:
In this paper, the authors consider the feasibility of using quantum encryption in a multi-agent robotic system. The authors consider examples of such systems, describe the functional structure of the system in question, describe the scheme for ensuring information security. Finally, the authors see the use of quantum cryptographic algorithms appropriate for resolving the issue of confidentiality in multi-agent robotic systems and believe that this method has the potential for further scientific developments in the field of security in multi-agent robotic systems.
APA, Harvard, Vancouver, ISO, and other styles
21

Sun, Ling, and Dali Gao. "Security Attitude Prediction Model of Secret-Related Computer Information System Based on Distributed Parallel Computing Programming." Mathematical Problems in Engineering 2022 (March 25, 2022): 1–13. http://dx.doi.org/10.1155/2022/3141568.

Full text
Abstract:
In recent years, there has been an upward trend in the number of leaked secrets. Among them, secret-related computers or networks are connected to the Internet in violation of regulations, cross-use of mobile storage media, and poor security management of secret-related intranets, which are the main reasons for leaks. Therefore, it is of great significance to study the physical isolation and protection technology of classified information systems. Physical isolation is an important part of the protection of classified information systems, which cuts off the possibility of unauthorized outflow of information from the network environment. To achieve the physical isolation of the network environment and build a safe and reliable network, it is necessary to continuously improve the level of network construction and strengthen network management capabilities. At present, the realization of physical isolation technology mainly relies on security products such as firewall, intrusion detection, illegal outreach, host monitoring, and auditing. This study analyzes network security systems such as intrusion detection, network scanning, and firewall. Establishing a model based on network security vulnerabilities and making up for network security hidden dangers caused by holes are generally a passive security system. In a network, the leader of network behavior—human behavior—needs to be constrained according to the requirements of the security management system and monitoring. Accordingly, this study proposes a security monitoring system for computer information network involving classified computer. The system can analyze, monitor, manage, and process the network behavior of the terminal computer host in the local area network, to achieve the purpose of reducing security risks in the network system. Based on the evaluation value sequence, the initial prediction value sequence is obtained by sliding adaptive triple exponential smoothing method. The time-varying weighted Markov chain is used for error prediction, the initial prediction value is corrected, and the accuracy of security situation prediction is improved. According to the security protection requirements of secret-related information systems, a complete, safe, reliable, and controllable security protection system for secret-related information systems is constructed, and the existing security risks and loopholes in secret-related information systems are eliminated to the greatest extent possible. This enables the confidentiality, integrity, and availability of confidential data and information in the computer information system to be reliably protected.
APA, Harvard, Vancouver, ISO, and other styles
22

Andrade, Roberto, Iván Ortiz, María Cazares, Gustavo Navas, and María Isabel Sánchez-Pazmiño. "Defining Cyber Risk Scenarios to Evaluate IoT Systems." Games 14, no. 1 (December 20, 2022): 1. http://dx.doi.org/10.3390/g14010001.

Full text
Abstract:
The growth of the Internet of Things (IoT) has accelerated digital transformation processes in organizations and cities. However, it has also opened new security challenges due to the complexity and dynamism of these systems. The application of security risk analysis methodologies used to evaluate information technology (IT) systems have their limitations to qualitatively assess the security risks in IoT systems, due to the lack of historical data and the dynamic behavior of the solutions based on the IoT. The objective of this study is to propose a methodology for developing a security risk analysis using scenarios based on the risk factors of IoT devices. In order to manage the uncertainty due to the dynamics of IoT behaviors, we propose the use of Bayesian networks in conjunction with the Best Worst Method (BWM) for multi-criteria decision-making to obtain a quantitative security risk value.
APA, Harvard, Vancouver, ISO, and other styles
23

Kachanov, M. A. "SECURITY ANALYSIS OF INFORMATION FLOWS IN GNU/LINUX OPERATING SYSTEMS." Prikladnaya diskretnaya matematika, no. 9 (September 1, 2010): 77–89. http://dx.doi.org/10.17223/20710410/9/7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Kruglikov, Sergey, Sergey Kasanin, and Yuri Kuleshov. "Methodical Approach to the Complex Description of Information Protection Object." Voprosy kiberbezopasnosti, no. 4(50) (2022): 39–51. http://dx.doi.org/10.21681/2311-3456-2022-4-39-51.

Full text
Abstract:
Purpose: on the basis of analysis of a comprehensive approach to the assessment of threats to information security to substantiate a methodological approach to a comprehensive description of the object of information protection with an assessment of its risks. Offer a tool for building private models and information security management system. Research method: use of partial integral index of security, which reflects the average risk of damage during the implementation of a threat of a certain type and characterizes the degree of danger. Analysis of the architecture of the object of assessment in relation to possible violations of information security, information security risk assessment using the apparatus of the theory of fuzzy sets when considering the methodological approach to a comprehensive description of the object of information security with an assessment of its risks. Result: proposed a comprehensive approach to assessing threats to the security of information. The assessment of the state of the protection object in case of violation of security is carried out with the help of particular integral index of security, which characterizes the possibility of inflicting damage in its implementation, according to which the ranking is made. On the basis of this methodical approach to complex description of the object of information protection with an assessment of its risks, using analysis of architecture of the object in application to possible violations of information security, and also making an assessment of risk using the apparatus of the theory of fuzzy sets is substantiated. This methodical approach is a formal tool for building private models and information security management system as a whole. On the basis of these models, it is possible to develop: methods of quantitative estimation of security; methods and approaches to the description of the factors influencing security; methods of security estimation of operating systems with use of the methodological approach to information systems security.
APA, Harvard, Vancouver, ISO, and other styles
25

Yang, Qian, Hui-Ming Wang, Yi Zhang, and Zhu Han. "Physical Layer Security in MIMO Backscatter Wireless Systems." IEEE Transactions on Wireless Communications 15, no. 11 (November 2016): 7547–60. http://dx.doi.org/10.1109/twc.2016.2604800.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Zhang, Baowen, Xiao Chang, and Jianhua Li. "A Generalized Information Security Model SOCMD for CMD Systems." Chinese Journal of Electronics 29, no. 3 (May 1, 2020): 417–26. http://dx.doi.org/10.1049/cje.2020.02.017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Germanova, Svetlana E., Vadim G. Pliushchikov, Tatiana V. Magdeeva, Tatiana A. Ryzhova, and Nikolay V. Petukhov. "Environmental security issues in mining areas." Revista de la Universidad del Zulia 13, no. 36 (December 30, 2021): 323–38. http://dx.doi.org/10.46925//rdluz.36.21.

Full text
Abstract:
In today's economy, it is necessary to explore the environmental impact of mining. Coal mining greatly affects all environmental parameters of the environment: home, production, hydrodynamics. The environmental situation in the area of the mining company can be changed if environmental contamination is monitored and environmental protection plans and measures are developed. The purpose of this work is the analysis of systems and models of these processes in the ecosystem. The main systemic hypothesis of the research is that the variety of criteria and methods of risk assessment is a necessary condition of order in the system. The main results of the work are the following: 1) a systematic analysis of the problems of environmental security, geodynamics of the mining areas, aspects of the balance of the sustainable process and the cause of the increase in danger was carried out; 2) Proposed approaches (models) for the assessment of evolutionary ecological potential and health risks, as well as adaptive situational modeling of the ecosystem. It is important to note, the study results do not suggest complex environmental monitoring studies.
APA, Harvard, Vancouver, ISO, and other styles
28

Zhao, R., G. H. Qin, H. P. Chen, J. Qin, and J. Yan. "Security-Aware Scheduling for FlexRay-Based Real-Time Automotive Systems." Mathematical Problems in Engineering 2019 (June 13, 2019): 1–17. http://dx.doi.org/10.1155/2019/4130756.

Full text
Abstract:
FlexRay is a hybrid communication protocol tailored to the requirements of safety-critical distributed real-time automotive systems, providing support for the transmission of time-critical periodic frames in a static segment and event-triggered frames in a dynamic segment. With the development of intelligence and networking of vehicles, such systems are becoming increasingly connected to external environments; thus, security has become a pressing issue in system design. However, FlexRay-based architecture does not have direct support for secure communication. When deploying the security mechanisms on these architectures, a primary challenge is to guarantee the schedulability of systems, given the tight resource constraints and strict timing constraints. In this paper, we apply an authentication mechanism based on the delayed exposure of one-way key chains to protect the authenticity of messages on FlexRay and make a slight modification to reduce the authentication delay. On that basis, we propose a mixed integer linear programming formulation for solving the scheduling problem of FlexRay-based real-time automotive systems subject to both authentication mechanism constraints and other traditional design constraints. Experimental results demonstrate the effectiveness and efficiency of the proposed method in system design and indicate the necessity of collaborative design between security and other functionalities.
APA, Harvard, Vancouver, ISO, and other styles
29

Bertozzi, Andrea L., Shane D. Johnson, and Michael J. Ward. "Mathematical modelling of crime and security: Special Issue of EJAM." European Journal of Applied Mathematics 27, no. 3 (April 28, 2016): 311–16. http://dx.doi.org/10.1017/s0956792516000176.

Full text
Abstract:
This special issue of the European journal of applied mathematics features research articles that involve the application of mathematical methodologies to the modelling of a broad range of problems related to crime and security. Some specific topics in this issue include recent developments in mathematical models of residential burglary, a dynamical model for the spatial spread of riots initiated by some triggering event, the analysis and development of game-theoretic models of crime and conflict, the study of statistically based models of insurgent activity and terrorism using real-world data sets, models for the optimal strategy of police deployment under realistic constraints, and a model of cyber crime as related to the study of spiking behaviour in social network cyberspace communications. Overall, the mathematical and computational methodologies employed in these studies are as diverse as the specific applications themselves and the scales (spatial or otherwise) to which they are applied. These methodologies range from statistical and stochastic methods based on maximum likelihood methods, Bayesian equilibria, regression analysis, self-excited Hawkes point processes, agent-based random walk models on networks, to more traditional applied mathematical methods such as dynamical systems and stability theory, the theory of Nash equilibria, rigorous methods in partial differential equations and travelling wave theory, and asymptotic methods that exploit disparate space and time scales.
APA, Harvard, Vancouver, ISO, and other styles
30

Soewito, Benfano, and Ning Weng. "Concurrent workload mapping for multicore security systems." Concurrency and Computation: Practice and Experience 21, no. 10 (July 2009): 1281–306. http://dx.doi.org/10.1002/cpe.1423.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Martin, Tania, Dimitrios Geneiatakis, Ioannis Kounelis, Stéphanie Kerckhof, and Igor Nai Fovino. "Towards a Formal IoT Security Model." Symmetry 12, no. 8 (August 5, 2020): 1305. http://dx.doi.org/10.3390/sym12081305.

Full text
Abstract:
The heterogeneity of Internet of Things (IoT) systems has so far prevented the definition of adequate standards, hence making it difficult to compare meaningfully the security degree of diverse architectural choices. This task can be nonetheless achieved with formal methodologies. However, the dedicated IoT literature shows no evidence of a universal model allowing the security evaluation of any arbitrary system. Based on these considerations, we propose a new model that aims at being global and all-encompassing. Our model can be used to fairly analyse the security level of different IoT systems and compare them in a significant way. It is designed to be adaptive with realistic definitions of the adversary’s (1) actions of interacting with IoT systems; (2) capabilities of accessing the data generated by and exchanged in IoT systems with established rules; and (3) objectives of attacking IoT systems according to the four recognised security properties of confidentiality, integrity, availability and soundness. Such a design enables the straightforward characterization of new adversaries. It further helps in providing a fine-grained security evaluation of IoT systems by either accurately describing attacks against the analysed systems or formally proving their guaranteed level of security.
APA, Harvard, Vancouver, ISO, and other styles
32

Et. al., G. Ravi Kumar,. "Security and Privacy Protection in Datamining." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 1313–18. http://dx.doi.org/10.17762/turcomat.v12i2.1218.

Full text
Abstract:
Security and Privacy protection have been a public approach worry for quite a long time. Notwithstanding, quick innovative changes, the fast development of the internet and electronic business, and the improvement of more modern techniques for gathering, investigating, and utilizing individual information have made privacy a significant public and government issues. The field of data mining is acquiring importance acknowledgment to the accessibility of a lot of data, effortlessly gathered and put away through PC systems. Data mining procedures, while permitting the people to remove shrouded information on one hand, present various privacy dangers then again. In this paper, we concentrate a portion of these issues alongside an itemized conversation on the utilizations of different data mining strategies for giving security. This paper gives an outline of data mining field and security information event management system. We will perceive how different data
APA, Harvard, Vancouver, ISO, and other styles
33

Sarumi, J. A., O. B. Longe, and F. O. Adelodun. "An Empirical Evaluation of the Effectiveness of the Computer-Based Network Security and Firewall in Banking Systems." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 1 (January 30, 2022): 21–31. http://dx.doi.org/10.22624/aims/maths/v10n1p3.

Full text
Abstract:
As more banking operations are migrated into the digital platform, customers have continued to enjoy better seamless banking services. In consonance with this, concerns have also continued to rise about the effectiveness of the strategies adopted by banks to mitigate different forms of attackers targeted at operational platforms by unscrupulous elements. Using a case study, this paper evaluates the effectiveness of the Computer-Based Network Security and Firewall In banking Systems. This study employed the use of online questionnaires as a means of data collection. Our study adopted the survey method to access the subject matter. Findings from the research showed that Nigerian banks rarely experience malicious attacks of any form on their systems and equally identified network security strategies adopted by Nigerian Banks. An application was developed using C# to further contribute towards the security of banking systems Keywords: Banks, Systems, Security, network, cybercrime, Fraud, Cyber Criminals DOI: dx.doi.org/ Available online at www.isteams.net/mathematics-computationaljournal.
APA, Harvard, Vancouver, ISO, and other styles
34

Obregón-Pulido, G., A. Torres-González, R. Cárdenas-Rodríguez, and G. Solís-Perales. "Encryption in Chaotic Systems with Sinusoidal Excitations." Mathematical Problems in Engineering 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/782629.

Full text
Abstract:
In this contribution an encryption method using a chaotic oscillator, excited by “n” sinusoidal signals, is presented. The chaotic oscillator is excited by a sum of “n” sinusoidal signals and a message. The objective is to encrypt such a message using the chaotic behavior and transmit it, and, as the chaotic system is perturbed by the sinusoidal signal, the transmission security could be increased due to the effect of such a perturbation. The procedure is based on the regulation theory and consider that the receiver knows the frequencies of the perturbing signal, with this considerations the algorithm estimates the excitation in such a way that the receiver can cancel out the perturbation and all the undesirable dynamics in order to produce only the message. In this way we consider that the security level is increased.
APA, Harvard, Vancouver, ISO, and other styles
35

Tripathy, Asis Kumar, Tapan Kumar Das, and Navaneethan C. "Data cryptography based on musical notes on a fingerboard along with a dice." Indonesian Journal of Electrical Engineering and Computer Science 14, no. 3 (June 1, 2019): 1286. http://dx.doi.org/10.11591/ijeecs.v14.i3.pp1286-1290.

Full text
Abstract:
<p>The security of an online system is the foremost necessity nowadays. With huge growth of the IT power and with the invention of new technologies, the number of threats a user faces is growing exponentially. Cryptography is a combination of security engineering and mathematics. It is the best technology for securing distributed systems. Cryptography consists in processing plain information by applying a cipher and producing encoded output, unknown to a third-party who does has no idea about the key. In cryptography both encryption and decryption phase are processed by one or more keys. Encryption is extremely important for a safe and secure environment for the computers and the Internet.</p>
APA, Harvard, Vancouver, ISO, and other styles
36

Et.al, E. Shirisha. "IOT Based Home Security And Automation Using Google Assistant." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 11, 2021): 117–22. http://dx.doi.org/10.17762/turcomat.v12i6.1275.

Full text
Abstract:
Internet of Things (IOT) is an important technology that affects the internet and communication technology. IOT allows people and objects to be connected anytime, anywhere, in any way/shape and function. Earth's mechanical systems have become very popular in the last few decades and improved living conditions. This project provides the structure and model of an automated earth system. The most important feature is the Raspberry pi, which has an internal Wi-Fi module that allows you to control your device over the Internet. It supports a variety of earth tools, such as energy management systems. Besides, the application is built where the user can control the device using Google Assistant. The IOT project also aims to build a wireless home protection system that uses the ESP32 camera Node MCU module to send alerts to owners if anyone takes a picture of the door and sends it to the owner.
APA, Harvard, Vancouver, ISO, and other styles
37

Hutter, Dieter, Heiko Mantel, Ina Schaefer, and Axel Schairer. "Security of multi-agent systems: A case study on comparison shopping." Journal of Applied Logic 5, no. 2 (June 2007): 303–32. http://dx.doi.org/10.1016/j.jal.2005.12.015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Lei, Min, Guang Meng, and Zhengjin Feng. "Security analysis of chaotic communication systems based on Volterra–Wiener–Korenberg model." Chaos, Solitons & Fractals 28, no. 1 (April 2006): 264–70. http://dx.doi.org/10.1016/j.chaos.2005.05.040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Bai, Jian, Zhuo Zhang, and Bingshen Shen. "Internet of vehicles security situation awareness based on intrusion detection protection systems." Journal of Computational Methods in Sciences and Engineering 22, no. 1 (January 26, 2022): 189–95. http://dx.doi.org/10.3233/jcm-215889.

Full text
Abstract:
With the rise of technologies such as mobile Internet, 5G networks and artificial intelligence, the development of Internet of Vehicle Information Security (ICVS) has become the mainstream and direction for the future development of the automotive industry. ICVS, people, roads, clouds, and APP constitute a complex network of vehicles. As part of the Internet, vehicle networking will inevitably face various complex information security threats and risks. This paper aims to design a kind of security situation awareness of Internet of vehicles based on intrusion detection protection systems (IDPS). By collecting the security data of car, app and private cloud for big data analysis, the whole smart car security situation awareness system is constructed. The system can be used to analyze potential threats, send out warnings, and carry out emergency responses.
APA, Harvard, Vancouver, ISO, and other styles
40

Smith, Derek H., Richard P. Ward, and Stephanie Perkins. "Gold codes, Hadamard partitions and the security of CDMA systems." Designs, Codes and Cryptography 51, no. 3 (December 19, 2008): 231–43. http://dx.doi.org/10.1007/s10623-008-9257-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Bukin, Alexander, Alexander Samonov, and Edward Tihonov. "DETECTING INFORMATION SECURITY INCIDENTS BASED ON NEURAL NETwORK TECHNOLOGY." Voprosy kiberbezopasnosti, no. 5(51) (2022): 61–73. http://dx.doi.org/10.21681/2311-3456-2022-5-61-73.

Full text
Abstract:
Objective: develop model, algorithmic and software for detecting in real time attempts to disrupt the correct functioning of critical information infrastructure systems with neural network technologies. Methods analysis of modern machine learning methods and neural network technologies, synthesis and modeling of correct behavior of programs, algorithmization of learning processes and application of neural networks, experimental studies of developed algorithms and programs on the stand. Study results: The characteristics of machine learning methods and neural network technologies used to detect software and technical impacts and information security incidents are given. The method for solving this problem based on neural networks with LSTM and FFN architectures has been developed. The description of the algorithm and fragments of the software implementation of the method in the programming languages Python3 and Go using Tensorflow and Keras libraries is given. An important advantage of the proposed approach is the possibility of adapting the neural network in the event of a change in the mode and conditions of operation of the system. The results obtained during the experiments indicate the possibility and expediency of using this approach to detect software and technical impacts on critical information infrastructure systems on a time scale close to real with a high level of reliability. Scientific novelty: consists in the application of deep learning technology based on a long-term short-term neural network LSTM, which has the ability to adapt to changing modes and conditions, to solve the problem of detecting signs of a violation of the correct functioning of nodes of information and telecommunications systems in real time.
APA, Harvard, Vancouver, ISO, and other styles
42

Ahanger, Tariq Ahamed, Usman Tariq, Atef Ibrahim, Imdad Ullah, Yassine Bouteraa, and Fayez Gebali. "Securing IoT-Empowered Fog Computing Systems: Machine Learning Perspective." Mathematics 10, no. 8 (April 14, 2022): 1298. http://dx.doi.org/10.3390/math10081298.

Full text
Abstract:
The Internet of Things (IoT) is an interconnected network of computing nodes that can send and receive data without human participation. Software and communication technology have advanced tremendously in the last couple of decades, resulting in a considerable increase in IoT devices. IoT gadgets have practically infiltrated every aspect of human well-being, ushering in a new era of intelligent devices. However, the rapid expansion has raised security concerns. Another challenge with the basic approach of processing IoT data on the cloud is scalability. A cloud-centric strategy results from network congestion, data bottlenecks, and longer response times to security threats. Fog computing addresses these difficulties by bringing computation to the network edge. The current research provides a comprehensive review of the IoT evolution, Fog computation, and artificial-intelligence-inspired machine learning (ML) strategies. It examines ML techniques for identifying anomalies and attacks, showcases IoT data growth solutions, and delves into Fog computing security concerns. Additionally, it covers future research objectives in the crucial field of IoT security.
APA, Harvard, Vancouver, ISO, and other styles
43

Xu, Weifeng, Bin Yu, Liguo Weng, and Jianguo Zhou. "Security-Based Asynchronous Control for Discrete-Time Markov Switching Power Systems ⋆." Mathematical Problems in Engineering 2022 (May 5, 2022): 1–11. http://dx.doi.org/10.1155/2022/2779623.

Full text
Abstract:
This paper addresses the asynchronous control problem for power systems subject to abrupt variations and cyber-attacks. In the sequel, the transient faults of circuit breakers can be described as the Markov process. In light of these situations, the power systems are transmitted to discrete-time Markov switching systems. Meanwhile, the deception attacks with time-varying delays in dispatchers are regulated by a Markov process. The controller and dispatcher are mode-dependent and their modes are nonsynchronous with those of power systems, which are modeled by the hidden Markov models. On the basis of the deception attacks, sufficient conditions are presented to guarantee the stochastic mean-square stability of the closed-loop dynamic. Finally, the proposed control design strategy is testified via a simulation result.
APA, Harvard, Vancouver, ISO, and other styles
44

J. Gokulraj, J. Deepika,. "Internet of Things Device Enabled Smart Home Integrated Architecture with Security Services." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 5, 2021): 2614–23. http://dx.doi.org/10.17762/turcomat.v12i6.5708.

Full text
Abstract:
The innovative internet technology of domestic automation applications is widely distributed. Home automation systems have become increasingly sophisticated by providing access to all people irrespective of time or place. Home automation devices, known as smart home systems, are supplied with wireless communication technologies via cell phones and microcontrollers for a remote control of wired non-computers at home. In this digital age, the home automation system was developed to target a broad range of applications for new digital consumers. Smart home systems with Internet connectivity of objects and security services, incorporation of intelligence into sensors and actuators, networking of intelligent elements that enable interactions between intelligent devices allow easy access at different locations, increased calculation power, storage capacity and efficient data sharing.
APA, Harvard, Vancouver, ISO, and other styles
45

Chang, Ping-Teng, and Kuo-Chen Hung. "Applying the fuzzy-weighted-average approach to evaluate network security systems." Computers & Mathematics with Applications 49, no. 11-12 (June 2005): 1797–814. http://dx.doi.org/10.1016/j.camwa.2004.10.042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Muhammad, Aina’u Shehu, and Fatih Özkaynak. "SIEA: Secure Image Encryption Algorithm Based on Chaotic Systems Optimization Algorithms and PUFs." Symmetry 13, no. 5 (May 8, 2021): 824. http://dx.doi.org/10.3390/sym13050824.

Full text
Abstract:
One of the general problems in modern digital society is undoubtedly the information security topic. It is critical to ensure the security of information transferred, processed, and stored throughout digital channels. Among this information, digital images draw attention in terms of frequency of use in digital channels. In this study, a new image encryption algorithm is proposed to address the security problems of digital images. The aspect that differentiates the proposed algorithm from thousands of image encryption algorithms in the literature is that it is designed within the framework of the provable security design principle. The provable security design approach has ensured that the proposed algorithm is theoretically secure with mathematical proof techniques. In addition to addressing the proposed architecture security concerns, the hybrid random number generator used as the key generator constitutes another unique aspect. This generator, which was designed using chaotic systems, physical unclonable functions, and optimization algorithms, stands out as the innovative aspect of the study. The statistical randomness properties of the proposed random number generator were tested using the NIST SP 800-22 Statistical Test Suite. Successful results were obtained for 15 tests in the test package. In addition, the success of these outputs was tested on a new image encryption algorithm. The security of the proposed algorithm was tested from different angles using various experimental analyzes and a 12-step provable security analysis roadmap. Successful analysis results and performance measurements indicate that the proposed cryptographic components can be used in many information security applications and many future designs.
APA, Harvard, Vancouver, ISO, and other styles
47

Savić, Dušan, Dejan Simić, and Siniša Vlajić. "Extended Software Architecture Based on Security Patterns." Informatica 21, no. 2 (January 1, 2010): 229–46. http://dx.doi.org/10.15388/informatica.2010.285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

ZHANG, YI-SHAN, and HSIAO-DONG CHIANG. "LOCAL BIFURCATION BOUNDARY AND STEADY-STATE SECURITY BOUNDARY IN LARGE ELECTRIC POWER SYSTEMS: NUMERICAL STUDIES." International Journal of Bifurcation and Chaos 21, no. 03 (March 2011): 647–62. http://dx.doi.org/10.1142/s0218127411028878.

Full text
Abstract:
The local bifurcation boundary and steady-state security boundary of parameter-dependent electric power system models are computed and studied. A computational procedure for numerically constructing the local bifurcation boundary and the steady-state security boundary is proposed. Then the proposed computational procedure is applied to large power systems to compute the local bifurcation boundary and steady-state security boundary. Numerical studies reveal the characteristics and the convexity properties of these boundaries. The impact of the physical limitation of the generator reactive capability on the local bifurcation boundary and the steady-state security boundary are also investigated.
APA, Harvard, Vancouver, ISO, and other styles
49

Et.al, Ahmad Faiz Ghazali. "A Survey of Malware Risk Detection Techniques in Cloud." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 11, 2021): 868–76. http://dx.doi.org/10.17762/turcomat.v12i3.797.

Full text
Abstract:
This article aims to contribute in securing information technology (IT) systems and processes for information security by utilizing malware risk detection for decision-making processes to mitigate cyber-attacks. It has potential to be a real threat to the businesses and industrial applications. The risk management is an essential component where it can present a new information security model for supporting decision making. The current ideologies such as the anti-virus, malware and firewalls detection and protection are proving to be ineffective as they were not specifically designed for multi-tenant cloud environments. Therefore, this article presents a survey of malware risk detection techniques in cloud. The survey was conducted on publications from Scopus from the last 5 years. The findings indicate the current malware detection techniques are not enough to effectively detect and protect the cloud environments.
APA, Harvard, Vancouver, ISO, and other styles
50

He, Anping, Jinzhao Wu, Shihan Yang, Yongquan Zhou, and Juan Wang. "Automata-Based Analysis of Stage Suspended Boom Systems." Journal of Applied Mathematics 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/739253.

Full text
Abstract:
A stage suspended boom system is an automatic steeve system orchestrated by the PLC (programmable logic controller). Security and fault-recovering are two important properties. In this paper, we analyze and verify the boom system formally. We adopt the hybrid automaton to model the boom system. The forward reachability is used to verify the properties with the reachable states. We also present a case study to illustrate the feasibility of the proposed verification.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography