Articoli di riviste sul tema "Canadian Security Intelligence Service (Proposed)"

Segui questo link per vedere altri tipi di pubblicazioni sul tema: Canadian Security Intelligence Service (Proposed).

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Canadian Security Intelligence Service (Proposed)".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.

1

Weller, Geoffrey R. "The Canadian Security Intelligence Service under stress". Canadian Public Administration/Administration publique du Canada 31, n. 2 (luglio 1988): 279–302. http://dx.doi.org/10.1111/j.1754-7121.1988.tb01318.x.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Rankin, Murray. "National Security: Information, Accountability, and the Canadian Security Intelligence Service". University of Toronto Law Journal 36, n. 3 (1986): 249. http://dx.doi.org/10.2307/825575.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Senior CSIS Executive. "THREE ASPECTS OF ACCOUNTABILITY FOR THE CANADIAN INTELLIGENCE PUBLIC SERVICE". Journal of Intelligence, Conflict, and Warfare 6, n. 3 (31 gennaio 2024): 243–46. http://dx.doi.org/10.21810/jicw.v6i3.6406.

Testo completo
Abstract (sommario):
On November 17, 2023, a Senior CSIS Executive presented Three Aspects of Accountability for the Canadian Public Service for this year’s West Coast Security Conference. The presentation was followed by a question-and-answer period with questions from the audience and CASIS Vancouver Executives. The key points discussed were the themes of accountability in the Canadian Security Intelligence Service in relation to the federal court, to Canadian citizens, and within the governmental and academic spheres. Received: 01-07-2024 Revised: 01-30-2024
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Hewitt, Steve. "Intelligence at the Learneds: The RCMP, the Learneds, and the Canadian Historical Association". Ottawa 1998 9, n. 1 (9 febbraio 2006): 267–86. http://dx.doi.org/10.7202/030501ar.

Testo completo
Abstract (sommario):
Abstract Much of the history of Royal Canadian Mounted Police's (RCMP) security intelligence role has ignored domestic counter-subversion work in favour of more glamorous counter-espionage operations. “Intelligence at the Learneds: The RCMP, the Learneds, and the Canadian Historical Association” examines one small part of that neglected counter-subversion past. For nearly twenty-five years, from 1960 to 1983, members of the RCMP secretly covered and reported upon various meetings of the Learned Societies. Initially attracted by the presence of communists, by the 1970s the RCMP had changed its focus to members of the so-called New Left. Hounded by criticism in the aftermath of the McDonald Commission's final report in 1981, Mounties returned to monitoring communists. Mounted Police coverage ended in 1984, when the Canadian Security Intelligence Service (CSIS) replaced the Security Service. The paper concludes with a suggestion that CSIS may not be as free from its RCMP ancestor as some would suggest.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

West, Leah, e Craig Forcese. "Twisted into knots: Canada’s challenges in lawful access to encrypted communications". Common Law World Review 49, n. 3-4 (22 gennaio 2020): 182–98. http://dx.doi.org/10.1177/1473779519891597.

Testo completo
Abstract (sommario):
This article addresses the Canadian law governing ‘lawful access’ to potentially encrypted data-in-motion; that is, communications done through electronic means. This article begins by outlining the core agencies responsible for counterterrorism investigations in Canada, and the recent public debate and government consultation on encryption. Next, we identify how older laws designed for a different era may be leveraged to force service and platform providers to assist law enforcement and the Canadian Security Intelligence Service by decrypting communications and data. We will also touch on the legal capacity of these organizations to develop their own ‘workarounds’, including the role of Canada’s signals intelligence agency, the Communications Security Establishment. Throughout, we highlight how Canada’s long-standing ‘intelligence to evidence’ problem affects and, arguably exacerbates, the encryption-prompted ‘going dark’ phenomenon and consequently impairs Canadian counterterrorism efforts. We predict legal reform resolving the ‘going dark’ issue will be impossible without modernization of Canada’s disclosure regime.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Wilczynski, Artur. "Equity, Diversity, and Inclusion in National Security Intelligence". Journal of Intelligence, Conflict, and Warfare 4, n. 3 (27 febbraio 2022): 222–26. http://dx.doi.org/10.21810/jicw.v4i3.4197.

Testo completo
Abstract (sommario):
On November 23, 2021, Mr. Artur Wilczynski, Associate Deputy Chief at Communications Security Establishment (CSE), presented on Equity, Diversity, and Inclusion in National Security Intelligence at the 2021 CASIS Vancouver West Coast Security Conference. This presentation was followed by a question and answer period and a breakout room session with questions from the audience and CASIS Vancouver executives. The key points discussed included how a lack of diversity in intelligence can negatively contribute to Canada’s national security, how diversity broadens the effectiveness of organizations, and how Canadian national security institutions must be in service to all Canadians.
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Gratton, Phil. "Leadership, Technology and National Security". Journal of Intelligence, Conflict, and Warfare 4, n. 3 (31 gennaio 2022): 147–51. http://dx.doi.org/10.21810/jicw.v4i3.4164.

Testo completo
Abstract (sommario):
On November 26, 2021, Mr. Phil Gratton, former DG in the Directorate of Technology for the Canadian Security Intelligence Service (CSIS) and current Associate Faculty at the Canada School of Public Service, presented on Leadership, Technology and National Security at the 2021 CASIS West Coast Security Conference. The presentation was followed by a question-and-answer period and a breakout room session with questions from the audience and CASIS Vancouver executives. The key point discussed was how leadership must adapt to best support its mission and technology workforce in the face of ever-evolving technological advancements in the realm of national security.
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Young, Bob. "Foreign Interference / Influence in Canada: A Way Forward". Journal of Intelligence, Conflict, and Warfare 6, n. 2 (24 novembre 2023): 79–83. http://dx.doi.org/10.21810/jicw.v6i2.6250.

Testo completo
Abstract (sommario):
On June 15, 2023, Mr. Bob Young, security consultant and former Canadian Security Intelligence Service (CSIS) Regional Director for British Columbia and Yukon, presented Foreign Interference / Influence in Canada: A Way Forward. The presentation was followed by a question-and-answer period with questions from the audience and CASIS Vancouver Executives. The key points discussed were the characteristics of foreign interference and influence (FI), how the Chinese Community Party (CPP) conducts FI in Canada, and what actions the Canadian government and its agencies can take to better counter the threat of FI.
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Ryan, Joseph F. "Review of the Canadian security intelligence service: A suitable model for the United Kingdom?" Intelligence and National Security 5, n. 3 (luglio 1990): 200–206. http://dx.doi.org/10.1080/02684529008432070.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Park, Keundug, e Heung-Youl Youm. "Proposal of a Service Model for Blockchain-Based Security Tokens". Big Data and Cognitive Computing 8, n. 3 (12 marzo 2024): 30. http://dx.doi.org/10.3390/bdcc8030030.

Testo completo
Abstract (sommario):
The volume of the asset investment and trading market can be expanded through the issuance and management of blockchain-based security tokens that logically divide the value of assets and guarantee ownership. This paper proposes a service model to solve a problem with the existing investment service model, identifies security threats to the service model, and specifies security requirements countering the identified security threats for privacy protection and anti-money laundering (AML) involving security tokens. The identified security threats and specified security requirements should be taken into consideration when implementing the proposed service model. The proposed service model allows users to invest in tokenized tangible and intangible assets and trade in blockchain-based security tokens. This paper discusses considerations to prevent excessive regulation and market monopoly in the issuance of and trading in security tokens when implementing the proposed service model and concludes with future works.
Gli stili APA, Harvard, Vancouver, ISO e altri
11

Sarkar, Manash, Soumya Banerjee, Youakim Badr e Arun Kumar Sangaiah. "Configuring a Trusted Cloud Service Model for Smart City Exploration Using Hybrid Intelligence". International Journal of Ambient Computing and Intelligence 8, n. 3 (luglio 2017): 1–21. http://dx.doi.org/10.4018/ijaci.2017070101.

Testo completo
Abstract (sommario):
Emerging research concerns about the authenticated cloud service with high performance of security and assuring trust for distributed clients in a smart city. Cloud services are deployed by the third-party or web-based service providers. Thus, security and trust would be considered for every layer of cloud architecture. The principle objective of cloud service providers is to deliver better services with assurance of trust about clients' information. Cloud's users recurrently face different security challenges about the use of sharable resources. It is really difficult for Cloud Service Provider for adapting varieties of security policies to sustain their enterprises' goodwill. To make an optimistic decision that would be better suitable to provide a trusted cloud service for users' in smart city. Statistical method known as Multivariate Normal Distribution is used to select different attributes of different security entities for developing the proposed model. Finally, fuzzy multi objective decision making and Bio-Inspired Bat algorithm are applied to achieve the objective.
Gli stili APA, Harvard, Vancouver, ISO e altri
12

Gratton, Phil. "THREAT RESILIENCE IN THE REALM OF MISINFORMATION, DISINFORMATION, AND TRUST". Journal of Intelligence, Conflict, and Warfare 5, n. 3 (31 gennaio 2023): 96–100. http://dx.doi.org/10.21810/jicw.v5i3.5126.

Testo completo
Abstract (sommario):
On November 21, 2022, Phil Gratton, an executive public servant at the Canadian Security Intelligence Service (CSIS), currently on interchange as Associate Faculty with the Canada School of Public Service’s (CSPS) Digital Academy, gave a presentation on Threat Resilience in the Realm of Misinformation, Disinformation, and Trust at the 2022 West Coast Security Conference. The presentation was followed by a question-and-answer period with questions from the audience and CASIS-Vancouver executives. The key points discussed were the harms caused by state-sponsored disinformation campaigns, the use of artificial intelligence (AI) to facilitate and counter the spread of disinformation, as well as the importance of critical thinking and collaborative response to build resilience against these threats.
Gli stili APA, Harvard, Vancouver, ISO e altri
13

Tessier, Michelle. "LEVERAGING DIVERSITY, EQUALITY, AND INCLUSION (DEI) IN MEETING MODERN INTELLIGENCE CHALLENGES". Journal of Intelligence, Conflict, and Warfare 5, n. 3 (31 gennaio 2023): 122–25. http://dx.doi.org/10.21810/jicw.v5i3.5180.

Testo completo
Abstract (sommario):
On November 22, 2022, Ms. Michelle Tessier, Deputy Director of Operations, Canadian Security Intelligence Service (CSIS), presented on Leveraging Diversity, Equity, and Inclusion (DEI) in Meeting Modern Intelligence Challenges. The presentation was followed by a question-and-answer period with questions from the audience and CASIS Vancouver executives. The key points discussed were the ways in which DEI strategy helps the government of Canada deliver programs and services to all Canadians and examples of steps taken to ensure the implementation of such strategy. Received: 2022-12-10Revised: 2022-12-30
Gli stili APA, Harvard, Vancouver, ISO e altri
14

Velliangiri, S., P. Karthikeyan, Vinayakumar Ravi, Meshari Almeshari e Yasser Alzamil. "Intelligence Amplification-Based Smart Health Record Chain for Enterprise Management System". Information 14, n. 5 (11 maggio 2023): 284. http://dx.doi.org/10.3390/info14050284.

Testo completo
Abstract (sommario):
Medical service providers generate many healthcare records containing sensitive and private information about a patient’s health. The patient can allow healthcare service providers to generate healthcare data, which can be stored with healthcare service providers. After some time, if the patient wants to share the healthcare records of one healthcare service provider with another, we can quickly exchange the healthcare record using our approaches. The challenges faced by healthcare service providers are healthcare record sharing, tampering, and insurance fraud. We have developed Health Record Chain for Sharing Medical Data using the modified SHA-512 algorithm. We have evaluated our methods, and our method outperforms in terms of storage cost and total time consumption for health record sharing. The proposed model takes 130 ms to share 100,000 records, 32 ms faster than traditional methods. It also resists various security attacks, as verified by an automated security protocol verification tool.
Gli stili APA, Harvard, Vancouver, ISO e altri
15

Guilford, Katharine Briar. "Countering Foreign Terrorist Fighters: Warrantless Surveillance Powers of the New Zealand Security Intelligence Service". Victoria University of Wellington Law Review 47, n. 1 (1 giugno 2016): 95. http://dx.doi.org/10.26686/vuwlr.v47i1.4880.

Testo completo
Abstract (sommario):
On 9 December 2014, the New Zealand Security Intelligence Service Amendment Act 2014 amended the New Zealand Security Intelligence Service Act 1969 by removing the requirement for an intelligence or visual surveillance warrant in some situations of emergency or urgency. The warrant process is the primary mechanism for the purpose of ensuring surveillance powers are not exercised arbitrarily or unreasonably. Any departure from this process must be justified, limited and proportionate. After a brief look at the history of the Bill, this article will then consider the circumstances in which a warrantless authorisation shall be granted and information retained, with reference to the trigger concepts of "terrorist act", "foreign terrorist fighter" and "security". Amendments proposed include limiting the grounds for warrantless surveillance and information retention to countering "foreign terrorist fighters". It will then discuss the consistency of the Bill with the New Zealand Bill of Rights Act 1990, focusing on the authorisation structure and length. It will put forward a proposed amendment that restructures the power such that authorisation for surveillance in urgency will be provided by the Minister and Commissioner within 12 hours.
Gli stili APA, Harvard, Vancouver, ISO e altri
16

Park, Keundug, e Heung-Youl Youm. "Proposal of Decentralized P2P Service Model for Transfer between Blockchain-Based Heterogeneous Cryptocurrencies and CBDCs". Big Data and Cognitive Computing 6, n. 4 (19 dicembre 2022): 159. http://dx.doi.org/10.3390/bdcc6040159.

Testo completo
Abstract (sommario):
This paper proposes a solution to the transfer problem between blockchain-based heterogeneous cryptocurrencies and CBDCs, with research derived from an analysis of the existing literature. Interoperability between heterogeneous blockchains has been an obstacle to service diversity and user convenience. Many types of cryptocurrencies are currently trading on the market, and many countries are researching and testing central bank digital currencies (CBDCs). In this paper, existing interoperability studies and solutions between heterogeneous blockchains and differences from the proposed service model are described. To enhance digital financial services and improve user convenience, transfer between heterogeneous cryptocurrencies, transfer between heterogeneous CBDCs, and transfer between cryptocurrency and CBDC should be required. This paper proposes an interoperable architecture between heterogeneous blockchains, and a decentralized peer-to-peer (P2P) service model based on the interoperable architecture for transferring between blockchain-based heterogeneous cryptocurrencies and CBDCs. Security threats to the proposed service model are identified and security requirements to prevent the identified security threats are specified. The mentioned security threats and security requirements should be considered when implementing the proposed service model.
Gli stili APA, Harvard, Vancouver, ISO e altri
17

Moraboena, Srikanthyadav, Gayatri Ketepalli e Padmaja Ragam. "A Deep Learning Approach to Network Intrusion Detection Using Deep Autoencoder". Revue d'Intelligence Artificielle 34, n. 4 (30 settembre 2020): 457–63. http://dx.doi.org/10.18280/ria.340410.

Testo completo
Abstract (sommario):
The security of computer networks is critical for network intrusion detection systems (NIDS). However, concerns exist about the suitability and sustainable development of current approaches in light of modern networks. Such concerns are particularly related to increasing levels of human interaction required and decreased detection accuracy. These concerns are also highlighted. This post presents a modern intrusion prevention deep learning methodology. For unattended function instruction, we clarify our proposed Symmetric Deep Autoencoder (SDAE). Also, we are proposing our latest deep research classification model developed with stacked SDAEs. The classification proposed by the Network Security Laboratory-Knowledge Discovery in Databases (NSL-KDD) and Canadian Institute for Cybersecurity -Intrusion Detection System (CICIDS 2017) data sets was implemented in Tensor Flow, a Graphics Procedure Unit (GPU) enabled and evaluated. We implemented and tested our experiment with different batch sizes using Adam optimizer. Promising findings from our model have been achieved so far, which demonstrates improvements over current solutions and the subsequent improvement for use in advanced NIDS.
Gli stili APA, Harvard, Vancouver, ISO e altri
18

Laurin, Patrick. "Gerrymandering the National Security Narrative: A Case Study of the Canadian Security Intelligence Service’s Handling of its Bulk Metadata Exploitation Program". Surveillance & Society 18, n. 3 (19 agosto 2020): 370–86. http://dx.doi.org/10.24908/ss.v18i3.13428.

Testo completo
Abstract (sommario):
In November of 2016, the Federal Court of Canada published a scathing ruling pertaining to some of the Canadian Security Intelligence Service’s (CSIS) big data surveillance activities. Among other charges of wrongdoing, the ruling accused the agency of not having been forthcoming with the Court about the existence of its “Operational Data Analysis Center” (ODAC), an advanced analytics bulk metadata exploitation program that had been operational since 2006. The ruling also revealed that a significant portion of the metadata collected by CSIS should not have been retained in ODAC, a practice that the ruling declared illegal. Drawing from the ruling, a series of classified CSIS documents obtained via requests made under the Access to Information Act, various public reports from both CSIS and the Security Intelligence Review Committee, as well as a Senate Committee hearing transcript, this article examines CSIS’s conduct, justifications, and statements relating to its bulk metadata retention activities spanning from the year of ODAC’s inception in 2006 to the publication of the ODAC ruling in 2016. The paper demonstrates how CSIS engaged in various forms of secrecy and how it successfully constructed and disseminated its own big data related language to effectively “gerrymander” the national security narrative, thereby ultimately ensuring its tight control over the knowledge that the Court would have of big data surveillance and CSIS’s engagement with it. This would enable the Service to keep its metadata exploitation program out of sight and operational for ten years until the Court ended up declaring a significant portion of ODAC illegal in 2016.
Gli stili APA, Harvard, Vancouver, ISO e altri
19

Stepanovskyi, V. S. "The activity of The Security Service of Ukraine as a subject of ensuring national security in the conditions of martial law". Analytical and Comparative Jurisprudence, n. 3 (18 luglio 2023): 298–302. http://dx.doi.org/10.24144/2788-6018.2023.03.54.

Testo completo
Abstract (sommario):
The scientific article is intended to study the activity of the Security Service of Ukraine as a subject of ensuring national security in the conditions of martial law. At the beginning of the study, historical data on the creation of the Security Service of Ukraine and its further development were analyzed. Special attention is paid to the events of 2014, namely the annexation of the Autonomous Republic of Crimea and the occupation of large areas of the Donetsk and Luhansk regions. The Draft Law on Amendments to the Law of Ukraine “On the Security Service of Ukraine” on improving the principles of the Security Service of Ukraine dated October 26, 2020 № 3196-d was mentioned and its current state was noted. The current legal provisions of the Security Service of Ukraine, including the Constitution of Ukraine, the Law of Ukraine «On the Security Service of Ukraine», were analyzed. Separately mentioned are the provisions of other legal acts that determine the activities of the Security Service of Ukraine, namely: the Law of Ukraine «On Counterintelligence Activities», the Law of Ukraine «On Combating Terrorism», the Law of Ukraine «On Operative-Investigation Activities», the Law of Ukraine «On the organizational and legal foundations of combating organized crime», the Law of Ukraine «On National Security of Ukraine», the Law of Ukraine «On State Secrets» and others. The activity of the Security Service of Ukraine during martial law, which consists in neutralizing enemy sabotage and intelligence groups, arresting collaborators, enemy spies, participating in hostilities and cooperation with other units of the Armed Forces of Ukraine, has been studied. It is proposed to create a new Code on National Security and Defense of Ukraine, which will clearly regulate the activities of the Security Service of Ukraine and other state and law enforcement agencies in this area. It is also proposed to develop the Regulation on the list of necessary actions to counter the enemy with the definition of the duties of each body.
Gli stili APA, Harvard, Vancouver, ISO e altri
20

Guan, Allen Lim Chong, Goi Chai Lee e Peter Dell. "Increasing the Adoption of Canadian Retail Businesses’ Websites: Canadian Young Generation Consumers' Enticement". Global Disclosure of Economics and Business 10, n. 1 (20 maggio 2021): 17–36. http://dx.doi.org/10.18034/gdeb.v10i1.596.

Testo completo
Abstract (sommario):
This research contributes significantly to academic and practitioner knowledge in the areas of young generation customers' enticement for expanding the adoption of small companies and internet commerce. This is the first time that a study has been done especially on the behavioral usage of Canadian Young consumers' websites by Canadian retail businesses. The purpose of this study is to gain a better understanding of how the Canadian Young Generation engages with retail firms' websites. The research model for this study is an adaptation of the UTAUT2 paradigm. It reaffirms the literature review's usage of the modified UTAUT2 model to describe this research. This research aims to fill a need in the existing knowledge about the Canadian Young Generation's use of retail firms' websites. It is critical that additional steps to protect security and privacy, as well as to create trust, be implemented to improve the Young Generation's confidence in the retail websites of small Canadian firms. Internet costs remain high in Canada, and it is proposed that the Canadian federal government provide additional licenses to Internet Service Providers (ISPs) in order to increase competition among ISPs and therefore decrease Internet charges. Key Words: , , ,
Gli stili APA, Harvard, Vancouver, ISO e altri
21

L, Santhanalakshmi, e Sakkaravarthi R. "INTRUSION DEFENSE MECHANISM USING ARTIFICIAL IMMUNE SYSTEM IN CLOUD COMPUTING (CLOUD SECURITY USING COMPUTATIONAL INTELLIGENCE)". Asian Journal of Pharmaceutical and Clinical Research 10, n. 13 (1 aprile 2017): 153. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19602.

Testo completo
Abstract (sommario):
Cloud is a general term used in organizations that host various service and deployment models. As cloud computing offers everything a service,it suffers from serious security issues. In addition, the multitenancy facility in the cloud provides storage in the third party data center which is considered to be a serious threat. These threats can be faced by both self-providers and their customers. Hence, the complexity of the security should be increased to a great extend such that it has an effective defense mechanism. Although data isolation is one of the remedies, it could not be a total solution. Hence, a complete architecture is proposed to provide complete defense mechanism. This defense mechanism ensures that the threats are blocked before it invades into the cloud environment. Therefore, we adopt the mechanism called artificial immune system which is derived from biologically inspired computing. This security strategy is based on artificial immune algorithm.
Gli stili APA, Harvard, Vancouver, ISO e altri
22

Manin, Iaroslav, e Aleksandra Evgen'evna Klimashina. "State security of Israel: international and national legal aspects". Национальная безопасность / nota bene, n. 2 (febbraio 2023): 1–19. http://dx.doi.org/10.7256/2454-0668.2023.2.39932.

Testo completo
Abstract (sommario):
The object of the study is Israeli international and national legal relations to ensure the defense of the country and the security of the state, the subject is normative legal acts establishing the regime of protection of Israel from internal and external threats. The article discusses the international treaties of the State of Israel concerning weapons of mass destruction and the fight against terrorism, as well as Israeli documents on defense and security management. The authors pay attention to the genesis and evolution of the Israeli armed forces and special services, the peculiarities of their functioning. The institute of military duty and conscription for military service in the Israel Defense Forces (IDF), current problems of the activities of the Mossad and AMAN intelligence services, as well as the general security service - Shin Bet (SHABAK) are considered in detail. The above practice of military administration in the State of Israel is relevant in the conditions of modern militarism. The researchers propose to use the Israeli experience of legislative regulation in the field of national defense and state security in the current Russian historical conditions. The scientific novelty of the work consists in presenting the reader with original information on the subject of the article, relevant conclusions and suggestions. The main ones are the conclusions about the presence of tactical nuclear weapons in Israel, its deliberate postponement of the application of international legal acts on weapons of mass destruction in order to develop them and deter opponents. It is proposed, by analogy with Israeli legislation, to deprive Russian citizenship for crimes against the foundations of the constitutional order and security of the Russian Federation, extremism and terrorism. The article substantiates the introduction of universal military duty for Russian citizens using, by analogy, the Israeli system of deferrals from military service. It is proposed to train ordinary and non-commissioned personnel of the domestic armed forces in working professions, as in Israel, and the official granting of unlimited powers to Russian intelligence abroad.
Gli stili APA, Harvard, Vancouver, ISO e altri
23

Liu, Xinlei. "Identification of Encrypted Traffic Using Advanced Mathematical Modeling and Computational Intelligence". Mathematical Problems in Engineering 2022 (22 agosto 2022): 1–10. http://dx.doi.org/10.1155/2022/1419804.

Testo completo
Abstract (sommario):
This paper proposed a hybrid approach for the identification of encrypted traffic based on advanced mathematical modeling and computational intelligence. Network traffic identification is the premise and foundation of improving network management, service quality, and application security. It is also the focus of network behavior analysis, network planning and construction, network anomaly detection, and network traffic model research. With the increase in user and service requirements, many applications use encryption algorithms to encrypt traffic during data transmission. As a result, traditional traffic classification methods classify encrypted traffic on the network, which brings great difficulties and challenges to network monitoring and data mining. In our article, a nonlinear modified DBN method is proposed and applied to encrypted traffic identification. Firstly, based on Deep Belief Networks (DBN), this paper introduces the proposed Eodified Elliott (ME)-DBN model, analyzes the function image, and presents the ME-DBN learning algorithm. Secondly, this article designs an encrypted traffic recognition model based on the ME-DBN model. Feature extraction is carried out by training the ME-DBN model, and finally, classification and recognition are carried out by the classifier. The experimental results on the ISCX VPN-non-VPN database show that the MEDBN method proposed in this article can enhance the classification and recognition rate and has better robustness to encrypt traffic recognition from different software.
Gli stili APA, Harvard, Vancouver, ISO e altri
24

Alrubayyi, Hadeel, Moudy Sharaf Alshareef, Zunaira Nadeem, Ahmed M. Abdelmoniem e Mona Jaber. "Security Threats and Promising Solutions Arising from the Intersection of AI and IoT: A Study of IoMT and IoET Applications". Future Internet 16, n. 3 (29 febbraio 2024): 85. http://dx.doi.org/10.3390/fi16030085.

Testo completo
Abstract (sommario):
The hype of the Internet of Things as an enabler for intelligent applications and related promise for ushering accessibility, efficiency, and quality of service is met with hindering security and data privacy concerns. It follows that such IoT systems, which are empowered by artificial intelligence, need to be investigated with cognisance of security threats and mitigation schemes that are tailored to their specific constraints and requirements. In this work, we present a comprehensive review of security threats in IoT and emerging countermeasures with a particular focus on malware and man-in-the-middle attacks. Next, we elaborate on two use cases: the Internet of Energy Things and the Internet of Medical Things. Innovative artificial intelligence methods for automating energy theft detection and stress levels are first detailed, followed by an examination of contextual security threats and privacy breach concerns. An artificial immune system is employed to mitigate the risk of malware attacks, differential privacy is proposed for data protection, and federated learning is harnessed to reduce data exposure.
Gli stili APA, Harvard, Vancouver, ISO e altri
25

Mlato, Stanley, Yesaya Gabriel, Prince Chirwa e Hyunsung Kim. "Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy Commitment". International journal of Computer Networks & Communications 16, n. 2 (29 marzo 2024): 87–106. http://dx.doi.org/10.5121/ijcnc.2024.16206.

Testo completo
Abstract (sommario):
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Gli stili APA, Harvard, Vancouver, ISO e altri
26

Franchuk, Vasyl, e Volodymyr Hobela. "THE STRATEGIC VECTOR OF UKRAINE'S FINANCIAL INTELLIGENCE CONSTRUCTION". Науковий вісник Львівського державного університету внутрішніх справ (серія економічна), n. 1 (28 ottobre 2022): 3–11. http://dx.doi.org/10.32782/2311-844x/2022-1-1.

Testo completo
Abstract (sommario):
The study established the strategic vectors of the development of financial intelligence in Ukraine. Further, the study outlined several stages, in particular, established the impact of financial intelligence on the state's financial security, carried out a comparative analysis of financial intelligence of the different countries by determining their institutional features and, based on the analysis results, developed strategic directions for Ukraine's financial intelligence development. The article substantiates the expediency of scientific research aimed at determining the specifics of the financial intelligence agencies' activities and their role in ensuring the state's financial security. The paper emphasized the need to intensify financial monitoring measures to counter new challenges and threats caused by the COVID-19 pandemic, the global economic recession and the war of the Russian Federation against Ukraine, which entered an active phase in early 2022. Moreover, the research highlighted the necessity to use advanced foreign experience in the organization of the financial intelligence service, its implementation in the domestic practice of combating money laundering and the use of this experience in the work of a financial intelligence agency in modern conditions characterized by a high level of corruption risks, the shadow economy and its offshoring. The influence of financial intelligence on the state's financial security has been established by determining the main threats arising in the relevant areas of activity and analyzing the mechanism of the financial intelligence's influence on the state's financial security. Researchers carried out a comparative analysis of financial intelligence models of different world countries. The article designated institutional characteristics of different financial intelligence models by determining their type, and essential characteristics. The study proposed an algorithm for forming a strategic vector for Ukraine's financial intelligence development. Based on the research results authors presented strategic directions for Ukraine's financial intelligence development and appointed their goals and directions of implementation.
Gli stili APA, Harvard, Vancouver, ISO e altri
27

Jamil, Harun, Faiza Qayyum, Naeem Iqbal, Murad Ali Khan, Syed Shehryar Ali Naqvi, Salabat Khan e Do Hyeun Kim. "Secure Hydrogen Production Analysis and Prediction Based on Blockchain Service Framework for Intelligent Power Management System". Smart Cities 6, n. 6 (22 novembre 2023): 3192–224. http://dx.doi.org/10.3390/smartcities6060142.

Testo completo
Abstract (sommario):
The rapid adoption of hydrogen as an eco-friendly energy source has necessitated the development of intelligent power management systems capable of efficiently utilizing hydrogen resources. However, guaranteeing the security and integrity of hydrogen-related data has become a significant challenge. This paper proposes a pioneering approach to ensure secure hydrogen data analysis by integrating blockchain technology, enhancing trust, transparency, and privacy in handling hydrogen-related information. Combining blockchain with intelligent power management systems makes the efficient utilization of hydrogen resources feasible. Using smart contracts and distributed ledger technology facilitates secure data analysis (SDA), real-time monitoring, prediction, and optimization of hydrogen-based power systems. The effectiveness and performance of the proposed approach are demonstrated through comprehensive case studies and simulations. Notably, our prediction models, including ABiLSTM, ALSTM, and ARNN, consistently delivered high accuracy with MAE values of approximately 0.154, 0.151, and 0.151, respectively, enhancing the security and efficiency of hydrogen consumption forecasts. The blockchain-based solution offers enhanced security, integrity, and privacy for hydrogen data analysis, thus advancing clean and sustainable energy systems. Additionally, the research identifies existing challenges and outlines future directions for further enhancing the proposed system. This study adds to the growing body of research on blockchain applications in the energy sector, specifically on secure hydrogen data analysis and intelligent power management systems.
Gli stili APA, Harvard, Vancouver, ISO e altri
28

Siddique, Iqtiar Md, Selim Molla, MD Rakib Hasan e Anamika Ahmed Siddique. "Deployment of Advanced and Intelligent Logistics Vehicles with Enhanced Tracking and Security Features". Journal of IoT and Machine Learning 1, n. 1 (9 febbraio 2024): 22–29. http://dx.doi.org/10.48001/joitml.2024.1122-29.

Testo completo
Abstract (sommario):
This study focuses on the implementation of modern and intelligent logistics vehicles equipped with advanced tracking and security features. In response to the evolving landscape of logistics management, the proposed system integrates cutting-edge technologies to enhance efficiency and ensure the security of the entire logistics process. The core component of this implementation is the incorporation of state-of-the-art tracking mechanisms, enabling real-time monitoring of vehicle locations and movements. Furthermore, the system addresses the paramount concern of security by introducing advanced security measures. Through the utilization of sophisticated tracking technologies and security protocols, the proposed logistics vehicles aim to safeguard both customer and provider data. The implementation includes the integration of QR code concepts, creating a binary image system that conceals sensitive information and ensures access only to authorized users. In addition to tracking and security, the study delves into the realm of information mining, employing techniques such as classification, clustering, and recommendation to extract meaningful patterns from vast datasets. Collaborative filtering techniques are incorporated to enhance customer experience by recommending services based on user preferences and historical data. This abstract encapsulates the comprehensive approach of deploying modern logistics vehicles, emphasizing their intelligence through advanced tracking, robust security measures, and data-driven insights. The proposed system aims to revolutionize logistics management, providing a seamless and secure experience for both customers and service providers in the dynamic logistics landscape.
Gli stili APA, Harvard, Vancouver, ISO e altri
29

Yengkangyi, Millicent, Kwadwo Bioh Agyei e George Asumadu. "Contemporary Challenges Associated With Border Security Operations to Promote Socio-Economic Development at Aflao Border in Ghana". International Journal of Public Policy and Administration 5, n. 3 (29 novembre 2023): 46–69. http://dx.doi.org/10.47941/ijppa.1531.

Testo completo
Abstract (sommario):
Purpose: The study investigated challenges associated with border security operations to promote socio-economic development using an integrated border management model at Aflao Border in Ghana. Using a mixed method approach, which is in line with the transformative philosophical underpinning. Methodology: Both interviews and questionnaires were employed as data collection tools. The population was sampled from four security service institutions manning the operations at Afloa border. Given the premise that border security forces were selected from the four coordinated security forces. The study respectively drew 112 security personnel drawn at random from the Afloa border. Using the sampling ratio proposed by Cochran (1963: 75) to arrive at variability p = 0.5 (maximum variability) and with the desire of 95% confidence level and ±5% precision. The sampled population was composed of 106 border security personnel, and 6 senior border security personnel serving in the hierarchy of the General, Patrol, Intelligence, and Anti-Human Smuggling and Trafficking Units at the borders were interviewed to furnish the qualitative data for this study. The study adopted a descriptive research design using personnel from the Ghana Immigration Service, Customs Division of Ghana Revenue Authority, Ghana Police Service, and Ghana Armed Forces in charge of security at the Aflao border. Findings: The study concludes that specific challenges which confront the border security apparatus are, in order of priority, inadequate logistics and equipment, inadequate coordination among border officials, and inadequacy of border security personnel. Unique Contribution to Theory, Practice and Policy: Improve border control, the government should make needed resources available by providing modern equipment/gadgets and logistics for patrol teams and the operations of the security system.
Gli stili APA, Harvard, Vancouver, ISO e altri
30

Kaushik, Shivkant, Ramesh Chandra Poonia, Sunil Kumar Khatri, Debabrata Samanta e Partha Chakraborty. "Transmit Range Adjustment Using Artificial Intelligence for Enhancement of Location Privacy and Data Security in Service Location Protocol of VANET". Wireless Communications and Mobile Computing 2022 (16 settembre 2022): 1–13. http://dx.doi.org/10.1155/2022/9642774.

Testo completo
Abstract (sommario):
IoT or the internet of things is the talk of the town topic being researched in the field of information technology for more than decade. It is being in deployment stage in various developing economics, to enable driverless automobiles in the field of VANET. It helps in preventing crashes and provides urgent medical assistance in emergency case. Data security and location privacy are becoming of most importance in present IT scenario. Unauthorized access to location information of vehicles may pose a significant security threat. So, it is necessary to secure the location information of the vehicle. The proposed work aims at enhancement of location privacy data security in service location protocol of VANET’S. The primary techniques to be employed include artificial intelligence-based RF range approximation for transmission range adjustment and receive RF strength based distance estimation for trusted node location perimeters approximation, dynamic adjustment of silence period of OBU (on based unit) in conjunction with radio/RF interrupt. The unauthorized access to location information of vehicles and need of its privacy is the motivation for this work.
Gli stili APA, Harvard, Vancouver, ISO e altri
31

Pohoretskyi, M. M. "HUMAN RIGHTS AND FREEDOMS IN ACTIVITY SECURITY SERVICES OF UKRAINE: ISSUES OF GUARANTEES". Herald of criminal justice, n. 3-4 (2021): 100–111. http://dx.doi.org/10.17721/2413-5372.2021.3-4/100-111.

Testo completo
Abstract (sommario):
The article substantiates that the guarantees of rights and freedoms in the activity of the Security Service of Ukraine are: the procedure established by legislation and departmental legal acts for conducting counter-intelligence, operative-search, administrative and criminal-procedural measures by authorized structural units and their officials; effective departmental control, prosecutorial supervision, judicial, parliamentary, presidential and public control over the activities of the SBU; high professionalism and intolerance to corruption of all SBU employees; independence of the court in Ukraine. It is proven that in connection with the reform of the Security Service of Ukraine, an urgent question arises about the need for scientific research devoted to the development of guarantees of human rights and freedoms in the activities of the SBU and, on their basis, the development of relevant legal norms and their inclusion in the project of new Laws of Ukraine «On the Security Service of Ukraine», «On counter-intelligence activities», «On operational and investigative activities». At the same time, it should be taken into account that the practice of the European Court of Human Rights in verifying the legality of operational-search measures, counter-intelligence measures and covert investigative (search) actions shows that the right of the state to covert (secret) interference with the rights of citizens is recognized as permissible in if two conditions are met: 1) the intervention was carried out exclusively in the interests of national and public security or economic well-being of the country, to prevent riots or crimes, to protect health or morals, or to protect the rights and freedoms of other persons (Part 2 of Article 8 of the Convention on the Protection of Human Rights and fundamental freedoms); 2) if the intervention takes place in accordance with the law and is necessary, that is, in a way determined by a regulatory act of a non-departmental nature, but by law. It is proposed in the draft laws of Ukraine «On counter-intelligence activities» and «On operational and investigative activities» to provide for the duty of authorized bodies to notify a person whose constitutional rights were temporarily restricted during the period of the special administrative procedure or special administrative procedure, respectively, of such intervention, which will be an additional guarantee of ensuring effective control and legal protection of citizens. The current laws of Ukraine «On investigative and counter-intelligence activities» and «On counter-intelligence activities» do not fully guarantee the rights and freedoms of citizens, since persons who were subjected to investigative or counter-intelligence activities, due to their ignorance, do not have the opportunity to appeal actions related to interference in their personal life or communication. This, in turn, leads to the risk of abuse of office and violation of the rights and freedoms of citizens on the part of authorized persons to conduct investigative or counter-intelligence activities.
Gli stili APA, Harvard, Vancouver, ISO e altri
32

Buriachok, Volodymyr L., Volodymyr М. Bogush, Yurii V. Borsukovskii, Pavlo M. Skladannyi e Victoria Yu Borsukovska. "МОДЕЛЬ ПІДГОТОВКИ ФАХІВЦІВ У СФЕРІ ІНФОРМАЦІЙНОЇ ТА КІБЕРНЕТИЧНОЇ БЕЗПЕКИ В ЗАКЛАДАХ ВИЩОЇ ОСВІТИ УКРАЇНИ". Information Technologies and Learning Tools 67, n. 5 (30 ottobre 2018): 277. http://dx.doi.org/10.33407/itlt.v67i5.2347.

Testo completo
Abstract (sommario):
The most critical global security threats in the information sphere are analyzed in the article, and, as a result, it was made a conclusion about the increasing of information confrontation and infiltration of tension in relations between countries. This situation requires a new qualitative approach to IT specialists’ training, focusing their attention primarily on the practical plane in the field of information and cyber security, and taking into account the most relevant expertise that a future specialist should receive in the field of cyber security. To solve this problem, the most important priority areas for the training of such specialists are identified in the article. According to the results of the analysis of Ukrainian legislation in the field of information and cyber security, as well as the typical cyber security plan of the NATO, examples of models of training competencies for the national cyber security system are proposed in the article. Considering that the main subjects of the national system of cyber security in accordance with the Constitution and laws of Ukraine are the State Service for Special Communications and Information Protection of Ukraine, the National Police of Ukraine, the Security Service of Ukraine, the Ministry of Defence of Ukraine and the General Staff of the Armed Forces of Ukraine, intelligence agencies and the National Bank of Ukraine, the models of professional competences of the employees/personnel of these organizations training, agreed with the tasks entrusted to these structures, are proposed in the article. As a result, the proposed models of professional competences may be the basis for the development / improvement of educational programs and curricula for training specialists in the field of cyber security, especially at the first, Bachelor’s level of higher education, and may become the basis for adjusting the relevant standard agreed in 2017 by the national Agency for Quality Assurance in Higher Education. In the future, the creation of new standards for cyber-security, both in the second (master's) and in the third (educational-scientific) levels will be promoted.
Gli stili APA, Harvard, Vancouver, ISO e altri
33

Hwang, Yong-Woon, Im-Yeong Lee, Hwankuk Kim, Hyejung Lee e Donghyun Kim. "Current Status and Security Trend of OSINT". Wireless Communications and Mobile Computing 2022 (18 febbraio 2022): 1–14. http://dx.doi.org/10.1155/2022/1290129.

Testo completo
Abstract (sommario):
Recently, users have used open-source intelligence (OSINT) to gather and obtain information regarding the data of interest. The advantage of using data gathered by OSINT is that security threats arising in cyberspace can be addressed. However, if a user uses data collected by OSINT for malicious purposes, information regarding the target of an attack can be gathered, which may lead to various cybercrimes, such as hacking, malware, and a denial-of-service attack. Therefore, from a cybersecurity point of view, it is important to positively use the data gathered by OSINT in a positive manner. If exploited in a negative manner, it is important to prepare countermeasures that can minimize the damage caused by cybercrimes. In this paper, the current status and security trends of OSINT will be explained. Specifically, we present security threats and cybercrimes that may occur if data gathered by OSINT are exploited by malicious users. Furthermore, to solve this problem, we propose security requirements that can be applied to the OSINT environment. The proposed security requirements are necessary for securely gathering and storing data in the OSINT environment and for securely accessing and using the data collected by OSINT. The goal of the proposed security requirements is to minimize the damage when cybercrimes occur in the OSINT environment.
Gli stili APA, Harvard, Vancouver, ISO e altri
34

Rathod, Tejal, Nilesh Kumar Jadav, Mohammad Dahman Alshehri, Sudeep Tanwar, Ravi Sharma, Raluca-Andreea Felseghi e Maria Simona Raboaca. "Blockchain for Future Wireless Networks: A Decade Survey". Sensors 22, n. 11 (31 maggio 2022): 4182. http://dx.doi.org/10.3390/s22114182.

Testo completo
Abstract (sommario):
The emerging need for high data rate, low latency, and high network capacity encourages wireless networks (WNs) to build intelligent and dynamic services, such as intelligent transportation systems, smart homes, smart cities, industrial automation, etc. However, the WN is impeded by several security threats, such as data manipulation, denial-of-service, injection, man-in-the-middle, session hijacking attacks, etc., that deteriorate the security performance of the aforementioned WN-based intelligent services. Toward this goal, various security solutions, such as cryptography, artificial intelligence (AI), access control, authentication, etc., are proposed by the scientific community around the world; however, they do not have full potential in tackling the aforementioned security issues. Therefore, it necessitates a technology, i.e., a blockchain, that offers decentralization, immutability, transparency, and security to protect the WN from security threats. Motivated by these facts, this paper presents a WNs survey in the context of security and privacy issues with blockchain-based solutions. First, we analyzed the existing research works and highlighted security requirements, security issues in a different generation of WN (4G, 5G, and 6G), and a comparative analysis of existing security solutions. Then, we showcased the influence of blockchain technology and prepared an exhaustive taxonomy for blockchain-enabled security solutions in WN. Further, we also proposed a blockchain and a 6G-based WN architecture to highlight the importance of blockchain technology in WN. Moreover, the proposed architecture is evaluated against different performance metrics, such as scalability, packet loss ratio, and latency. Finally, we discuss various open issues and research challenges for blockchain-based WNs solutions.
Gli stili APA, Harvard, Vancouver, ISO e altri
35

Hussain, Muhammad Iftikhar, Jingsha He, Nafei Zhu, Zulfiqar Ali Zardari, Fahad Razque, Saqib Hussain e Muhammad Salman Pathan. "An archetype for mitigating the security threats in multi-cloud environment by implementing tree-based next-generation firewalls". Journal of Intelligent & Fuzzy Systems 41, n. 1 (11 agosto 2021): 125–36. http://dx.doi.org/10.3233/jifs-200835.

Testo completo
Abstract (sommario):
Cloud computing on-demand dynamicity in nature of end-user that leads towards a hybrid cloud model deployment is called a multi-cloud. Multi-cloud is a multi-tenant and multi-vendor heterogeneous cloud platform in terms of services and security under a defined SLA (service level agreement). The diverse deployment of the multi-cloud model leads to rise in security risks. In this paper, we define a multi-cloud model with hybridization of vendor and security to increase the end-user experience. The proposed model has a heterogeneous cloud paradigm with a combination of firewall tracts to overcome rising security issues. The proposed work consists of three steps, firstly, all incoming traffic from the consumer end into five major groups called ambient. Secondly, design a next-generation firewall (NGFW) topology with a mixture of tree-based and demilitarized zone (DMZ) implications. Test implementation of designed topology performed by using a simple DMZ technique in case of vendor-specific model and NGFW on hybrid vendor based multi-cloud model. Furthermore, it also defines some advantages of NGFW to overcome these concerns. The proposed work is helpful for the new consumer to define their dynamic secure cloud services under a single SLA before adopting a multi-cloud platform. Finally, results are compared in terms of throughput and CPU utilization in both cases.
Gli stili APA, Harvard, Vancouver, ISO e altri
36

Haddad, Nabeel Mahdy, Hayder Sabah Salih, Ban Salman Shukur, Sura Khalil Abd, Mohammed Hasan Ali e Rami Qais Malik. "Managing security in IoT by applying the deep neural network-based security framework". Eastern-European Journal of Enterprise Technologies 6, n. 9 (120) (30 dicembre 2022): 38–50. http://dx.doi.org/10.15587/1729-4061.2022.269221.

Testo completo
Abstract (sommario):
Security issues and Internet of Things (IoT) risks in several areas are growing steadily with the increased usage of IoT. The systems have developed weaknesses in computer and memory constraints in most IoT operating systems. IoT devices typically cannot operate complicated defense measures because of their poor processing capabilities. A shortage of IoT ecosystems is the most critical impediment to developing a secured IoT device. In addition, security issues create several problems, such as data access control, attacks, vulnerabilities, and privacy protection issues. These security issues lead to affect the originality of the data that cause to affects the data analysis. This research proposes an AI-based security method for the IoT environment (AI-SM-IoT) system to overcome security problems in IoT. This design was based on the edge of the network of AI-enabled security components for IoT emergency preparedness. The modules presented detect, identify and continue to identify the phase of an assault life span based on the concept of the cyberspace killing chain. It outlines each long-term security in the proposed framework and proves its effectiveness in practical applications across diverse threats. In addition, each risk in the borders layer is dealt with by integrating artificial intelligence (AI) safety modules into a separate layer of AI-SM-IoT delivered by services. It contrasted the system framework with the previous designs. It described the architectural freedom from the base areas of the project and its relatively low latency, which provides safety as a service rather than an embedded network edge on the internet-of-things design. It assessed the proposed design based on the administration score of the IoT platform, throughput, security, and working time
Gli stili APA, Harvard, Vancouver, ISO e altri
37

Yang, Guixing. "Optimization of University Financial Services Using the Blockchain Technology". Scientific Programming 2022 (26 aprile 2022): 1–8. http://dx.doi.org/10.1155/2022/2680366.

Testo completo
Abstract (sommario):
At present, the financial work of most colleges and universities is facing the dilemma of low intelligence level. The financial sharing mode of colleges and universities using blockchain technology can effectively supervise their financial management while solving the problems of high costs related to financial sharing services, hidden dangers of data security, and low efficiency. Therefore, this paper makes an in-depth study on the application of blockchain technology and the financial sharing service mode of colleges and universities. Firstly, the University Financial Sharing Service Center platform based on blockchain technology is constructed. Furthermore, each module of the service center platform is described. Combined with the constructed platform, university finance is deeply mined by using the mining algorithm based on certain association rules, which is convenient for effective management. Finally, an artificial intelligence algorithm is used to adaptively optimize financial management. Similarly, the planning model and fitting algorithm of the least square method are used to control the risk of the financial management so as to realize the optimization of the financial sharing service mode. The experiment results demonstrate that the proposed method can effectively improve the efficiency of the financial sharing service and reduce the potential safety problems and costs of financial management.
Gli stili APA, Harvard, Vancouver, ISO e altri
38

Yang, Guixing. "Optimization of University Financial Services Using the Blockchain Technology". Scientific Programming 2022 (26 aprile 2022): 1–8. http://dx.doi.org/10.1155/2022/2680366.

Testo completo
Abstract (sommario):
At present, the financial work of most colleges and universities is facing the dilemma of low intelligence level. The financial sharing mode of colleges and universities using blockchain technology can effectively supervise their financial management while solving the problems of high costs related to financial sharing services, hidden dangers of data security, and low efficiency. Therefore, this paper makes an in-depth study on the application of blockchain technology and the financial sharing service mode of colleges and universities. Firstly, the University Financial Sharing Service Center platform based on blockchain technology is constructed. Furthermore, each module of the service center platform is described. Combined with the constructed platform, university finance is deeply mined by using the mining algorithm based on certain association rules, which is convenient for effective management. Finally, an artificial intelligence algorithm is used to adaptively optimize financial management. Similarly, the planning model and fitting algorithm of the least square method are used to control the risk of the financial management so as to realize the optimization of the financial sharing service mode. The experiment results demonstrate that the proposed method can effectively improve the efficiency of the financial sharing service and reduce the potential safety problems and costs of financial management.
Gli stili APA, Harvard, Vancouver, ISO e altri
39

Sinha, Keshav, Annu Priya e Partha Paul. "K-RSA: Secure data storage technique for multimedia in cloud data server". Journal of Intelligent & Fuzzy Systems 39, n. 3 (7 ottobre 2020): 3297–314. http://dx.doi.org/10.3233/jifs-191687.

Testo completo
Abstract (sommario):
Cloud has become one of the most demanding services for data storage. On another hand, the security of data is one of the challenging tasks for Cloud Service Provider (CSP). Cryptography is one of the ways for securing the storage data. Cryptography is not a new approach instead of the efficient utilization of cryptographical algorithms is greatly needed. In this work, we proposed a Secure Hidden Layer (SHL) and Application Programming Interface (API) for data encryption. The SHL is consisting of two major modules (i) Key Management Server (KMS) and (ii) Share Holder Server (SHS) which is used for storing and sharing of cryptographic key. For this purpose, we proposed a server-side encryption algorithm, which is based on the asymmetric algorithm (RSA and CRT) for providing end-to-end security of multimedia data. The experimental results of text and video are evidence that the size of file is not much affected after the encryption and effectively stored at Cloud Storage Server (CSS). The parameters like ciphertext size, encryption time and throughput are considered for performance evaluation of the proposed encryption technique.
Gli stili APA, Harvard, Vancouver, ISO e altri
40

Congdon, Jenna V., Mina Hosseini, Ezekiel F. Gading, Mahdi Masousi, Maria Franke e Suzanne E. MacDonald. "The Future of Artificial Intelligence in Monitoring Animal Identification, Health, and Behaviour". Animals 12, n. 13 (1 luglio 2022): 1711. http://dx.doi.org/10.3390/ani12131711.

Testo completo
Abstract (sommario):
With many advancements, technologies are now capable of recording non-human animals’ location, heart rate, and movement, often using a device that is physically attached to the monitored animals. However, to our knowledge, there is currently no technology that is able to do this unobtrusively and non-invasively. Here, we review the history of technology for use with animals, recent technological advancements, current limitations, and a brief introduction to our proposed novel software. Canadian tech mogul EAIGLE Inc. has developed an artificial intelligence (AI) software solution capable of determining where people and assets are within public places or attractions for operational intelligence, security, and health and safety applications. The solution also monitors individual temperatures to reduce the potential spread of COVID-19. This technology has been adapted for use at the Toronto Zoo, initiated with a focus on Sumatran orangutans (Pongo abelii) given the close physical similarity between orangutans and humans as great ape species. This technology will be capable of mass data collection, individual identification, pose estimation, behaviour monitoring and tracking orangutans’ locations, in real time on a 24/7 basis, benefitting both zookeepers and researchers looking to review this information.
Gli stili APA, Harvard, Vancouver, ISO e altri
41

Sylla, Tidiane, Mohamed Aymen Chalouf, Francine Krief e Karim Samaké. "SETUCOM: Secure and Trustworthy Context Management for Context-Aware Security and Privacy in the Internet of Things". Security and Communication Networks 2021 (14 aprile 2021): 1–24. http://dx.doi.org/10.1155/2021/6632747.

Testo completo
Abstract (sommario):
IoT technologies facilitate the development and the improvement of pervasive computing by enabling effective context-awareness features. These features enable the IoT applications to detect the user’s situation and adapt their behavior. They also enable context-aware security and privacy, which consist in adapting security and privacy mechanisms’ deployment to the user’s situation. Research studies on context-aware security and privacy focus on security and privacy mechanisms’ implementation but do not consider the secure and trustworthy context management. In this paper, we introduce a new secure and trustworthy context management system for context-aware security and privacy in the smart city: “SETUCOM.” SETUCOM is the implementation of the DTM (Device Trust Management) module of the CASPaaS (Context-Aware Security and Privacy as a Service) architecture. It secures context information exchange by using a lightweight hybrid encryption system adapted to IoT devices and manages trust through artificial intelligence techniques such as Bayesian networks and fuzzy logic. A detailed description of the proposed system is provided, and its main performances are evaluated. The results prove SETUCOM feasibility in context-aware security and privacy for the smart city.
Gli stili APA, Harvard, Vancouver, ISO e altri
42

Khan, Muhammad Salman, Ken Ferens e Witold Kinsner. "A Chaotic Complexity Measure for Cognitive Machine Classification of Cyber-Attacks on Computer Networks". International Journal of Cognitive Informatics and Natural Intelligence 8, n. 3 (luglio 2014): 45–69. http://dx.doi.org/10.4018/ijcini.2014070104.

Testo completo
Abstract (sommario):
Today's evolving cyber security threats demand new, modern, and cognitive computing approaches to network security systems. In the early years of the Internet, a simple packet inspection firewall was adequate to stop the then-contemporary attacks, such as Denial of Service (DoS), ports scans, and phishing. Since then, DoS has evolved to include Distributed Denial of Service (DDoS) attacks, especially against the Domain Name Service (DNS). DNS based DDoS amplification attacks cannot be stopped easily by traditional signature based detection mechanisms because the attack packets contain authentic data, and signature based detection systems look for specific attack-byte patterns. This paper proposes a chaos based complexity measure and a cognitive machine classification algorithm to detect DNS DDoS amplification attacks. In particular, this paper computes the Lyapunov exponent to measure the complexity of a flow of packets, and classifies the traffic as either normal or anomalous, based on the magnitude of the computed exponent. Preliminary results show the proposed chaotic measure achieved a detection (classification) accuracy of about 98%, which is greater than that of an Artificial Neural Network. Also, contrary to available supervised machine learning mechanisms, this technique does not require any offline training. This approach is capable of not only detecting offline threats, but has the potential of being applied over live traffic flows using DNS filters.
Gli stili APA, Harvard, Vancouver, ISO e altri
43

Moyo, Moses, e Marianne Loock. "Conceptualising a Cloud Business Intelligence Security Evaluation Framework for Small and Medium Enterprises in Small Towns of the Limpopo Province, South Africa". Information 12, n. 3 (17 marzo 2021): 128. http://dx.doi.org/10.3390/info12030128.

Testo completo
Abstract (sommario):
The purpose of this study was to investigate security evaluation practices among small and medium enterprises (SMEs) in small South African towns when adopting cloud business intelligence (Cloud BI). The study employed a quantitative design in which 57 SMEs from the Limpopo Province were surveyed using an online questionnaire. The study found that: (1) the level of cybersecurity threats awareness among decision-makers was high; (2) decision-makers preferred simple checklists and guidelines over conventional security policies, standards, and frameworks; and (3) decision-makers considered financial risks, data and application security, and cloud service provider reliability as the main aspects to consider when evaluating Cloud BI applications. The study conceptualised a five-component security framework for evaluating Cloud BI applications, integrating key aspects of conventional security frameworks and methodologies. The framework was validated for relevance by IT specialists and acceptance by SME owners. The Spearman correlational test for relevance and acceptance of the proposed framework was found to be highly significant at p < 0.05. The study concluded that SMEs require user-friendly frameworks for evaluating Cloud BI applications. The major contribution of this study is the security evaluation framework conceptualised from the best practices of existing security standards and frameworks for use by decision-makers from small towns in Limpopo. The study recommends that future research consider end-user needs when customising or proposing new solutions for SMEs in small towns.
Gli stili APA, Harvard, Vancouver, ISO e altri
44

Manderna, Ankit, Sushil Kumar, Upasana Dohare, Mohammad Aljaidi, Omprakash Kaiwartya e Jaime Lloret. "Vehicular Network Intrusion Detection Using a Cascaded Deep Learning Approach with Multi-Variant Metaheuristic". Sensors 23, n. 21 (27 ottobre 2023): 8772. http://dx.doi.org/10.3390/s23218772.

Testo completo
Abstract (sommario):
Vehicle malfunctions have a direct impact on both human and road safety, making vehicle network security an important and critical challenge. Vehicular ad hoc networks (VANETs) have grown to be indispensable in recent years for enabling intelligent transport systems, guaranteeing traffic safety, and averting collisions. However, because of numerous types of assaults, such as Distributed Denial of Service (DDoS) and Denial of Service (DoS), VANETs have significant difficulties. A powerful Network Intrusion Detection System (NIDS) powered by Artificial Intelligence (AI) is required to overcome these security issues. This research presents an innovative method for creating an AI-based NIDS that uses Deep Learning methods. The suggested model specifically incorporates the Self Attention-Based Bidirectional Long Short-Term Memory (SA-BiLSTM) for classification and the Cascaded Convolution Neural Network (CCNN) for learning high-level features. The Multi-variant Gradient-Based Optimization algorithm (MV-GBO) is applied to improve CCNN and SA-BiLSTM further to enhance the model’s performance. Additionally, information gained using MV-GBO-based feature extraction is employed to enhance feature learning. The effectiveness of the proposed model is evaluated on reliable datasets such as KDD-CUP99, ToN-IoT, and VeReMi, which are utilized on the MATLAB platform. The proposed model achieved 99% accuracy on all the datasets.
Gli stili APA, Harvard, Vancouver, ISO e altri
45

Arroyo-Figueroa, Gustavo. "Artificial Intelligence the Strategic Key of Cybersecurity". International Journal of Combinatorial Optimization Problems and Informatics 14, n. 3 (31 dicembre 2023): 16–23. http://dx.doi.org/10.61467/2007.1558.2023.v14i3.372.

Testo completo
Abstract (sommario):
Despite the fact that digital transformation introduces multiple advantages, it also introduces crucial security challenges, since it combines heterogeneous communications, the integration of digital devices, legacy technologies. In the case of power grid, in addition to damage to the availability, integrity and confidentiality of information; there may be manipulation and take control of assets through the infection of operational systems. In this context, powerful cybersecurity schemes and mechanisms that guarantee the safe transmission of information and the safe operation of assets are required. The goal is develop cyber security schemes and mechanisms based on intelligent cyber defense mechanisms that provide flexibility and self-learning capacity to support humans in the analysis and generation of containment measures against cyber-attacks. This paper presents the developed and validation of an Intrusion Detection and Prediction System (IDPS) based on individual classifiers and ensemble algorithms. The IDPS has demonstrated be an efficient countermeasure against several cyberattacks. The proposed IDPS uses J48 (decision tree), CLONAL-G (artificial immune system), bayesian classifier and ensemble algorithm and was validated with the KDDCup databases. The attacks in the data set are categorized into four attack types: DoS (denial-of-service attacks), R2L (root-to-local attacks), U2R (user-to-root attack), and Probe (probing attacks). The results show that the individual classifiers perform well for particular attack, so it was necessary to build an ensemble algorithm that combine the information from each classifier for better performance. The idea is not to rely on a single classifier for the decision, but rather individual information from different classifiers is combined to make the final decision.
Gli stili APA, Harvard, Vancouver, ISO e altri
46

Shobowale, K. O., Z. Mukhtar, B. Yahaya, Y. Ibrahim e M. O. Momoh. "Latest Advances on Security Architecture for 5GTechnology and Services". International Journal of Software Engineering and Computer Systems 9, n. 1 (31 gennaio 2023): 27–38. http://dx.doi.org/10.15282/ijsecs.9.1.2023.3.0107.

Testo completo
Abstract (sommario):
The roll out of the deployment of the 5G technology has been ongoing globally. The deployment of the technologies associated with 5G has seen mixed reaction as regards its prospects to improve communication services in all spares of life amid its security concerns. The security concerns of 5G network lies in its architecture and other technologies that optimize the performance of its architecture. There are many fractions of 5G security architecture in the literature, a holistic security architectural structure will go a long way in tackling the security challenges. In this paper, the review of the security challenges of the 5G technology based on its architecture is presented along with their proposed solutions. This review was carried out with some keywords relating to 5G securities and architecture; this was used to retrieve appropriate literature for fitness of purpose. The 5G security architectures are majorly centered around the seven network security layers; thereby making each of the layers a source of security concern on the 5G network. Many of the 5G security challenges are related to authentication and authorization such as denial-of-service attacks, man in the middle attack and eavesdropping. Different methods both hardware (Unmanned Aerial Vehicles, field programmable logic arrays) and software (Artificial intelligence, Machine learning, Blockchain, Statistical Process Control) has been proposed for mitigating the threats. Other technologies applicable to 5G security concerns includes: Multi-radio access technology, smart-grid network and light fidelity. The implementation of these solutions should be reviewed on a timely basis because of the dynamic nature of threats which will greatly reduce the occurrence of security attacks on the 5G network.
Gli stili APA, Harvard, Vancouver, ISO e altri
47

Vimala, K., e Dr D. Maruthanayagam. "Comparative Analysis of Routing Algorithms to Enhance the Quality of Service in MANET". International Journal of Recent Technology and Engineering (IJRTE) 11, n. 1 (30 maggio 2022): 108–15. http://dx.doi.org/10.35940/ijrte.a6949.0511122.

Testo completo
Abstract (sommario):
Mobile Ad hoc Network is a self-organizing, infrastructure-free, distributed wireless networks made up of various mobile devices. Quality-of-Service routing is most difficult task in MANET due to inherent characteristics–for example frequent dynamic topology, node mobility, resource scarcity, absence of centralized control, etc as well. The QoS variables of any MANET routing algorithms determine its performance. QoS routing is process of routing packets from source (S) to destination (D) based on QoS resource constraints such as bandwidth, delay, packet loss rate, cost, security, link stability, and so on. Swarm intelligence, which mimics the collective behaviour of biological organisms to handle routing problems and improve QoS in the network, has been one of most popular studies for network routing in recent years. Particle Swarm Optimization algorithm (PSO), Genetic Algorithm (GA) and Ant Colony Optimization algorithm (ACO) have all been shown to be effective for developing routing algorithms by improving QoS metrics in ad hoc networks using Swarm Intelligence (SI). The primary objective of this comparative study paper is to improve QoS parameters by applying swarm intelligence to MANET routing algorithms. Swarm intelligence-based routing algorithms will be more promising for the specific nature of adhoc networks, outperforming in real scenarios/constraints/environmental conditions and will be tuned and simulated to obtain an efficient and effective MANET routing protocol. This paper investigates four potential pre-existing approaches proposed for MANET routing problems. These routing algorithms are evaluated using various performance metrics such as packet delivery ratio, routing overhead, link failure prevention, energy consumption, accuracy, and throughput, among others.
Gli stili APA, Harvard, Vancouver, ISO e altri
48

Najib, Warsun, Selo Sulistyo e Widyawan. "QS-Trust: An IoT ecosystem security model incorporating quality of service and social factors for trust assessment". Communications in Science and Technology 9, n. 1 (16 luglio 2024): 153–60. http://dx.doi.org/10.21924/cst.9.1.2024.1419.

Testo completo
Abstract (sommario):
In the rapidly growing and increasingly complex Internet of Things (IoT) ecosystem, securing communication and data exchanges between devices is a major concern. To address this, we proposed QS-Trust, a trust-based security model considering both Quality of Service (QoS) and social parameters. QS-Trust uses a trust value to determine the trust level between devices and employs a QoS-aware trust-based algorithm to improve the security of data transmissions. Additionally, the model incorporates intelligence parameters such as computing power, memory capacity, device behavior and context information to enhance the accuracy of trust evaluation. Our simulation results demonstrated that QS-Trust effectively improved the security of the IoT ecosystem while maintaining the high level of QoS. The execution time of QS-Trust was in the range of 21 to 128 milliseconds, which is efficient for real-time IoT applications. QS-Trust offers a promising solution for securing the IoT ecosystem. The QS-Trust model effectively addresses the challenges of maintaining accurate and up-to-date trust levels in dynamic IoT environments through its decentralized approach, multi-factor evaluations, and adaptive algorithms. By continuously monitoring device performance and interactions and dynamically adjusting trust scores, QS-Trust ensures that the IoT network remains secure and reliable.
Gli stili APA, Harvard, Vancouver, ISO e altri
49

Manikandan, Kayalvizhi, e Ramamoorthy Sriramulu. "Optimized Path Planning Strategy to Enhance Security under Swarm of Unmanned Aerial Vehicles". Drones 6, n. 11 (2 novembre 2022): 336. http://dx.doi.org/10.3390/drones6110336.

Testo completo
Abstract (sommario):
Unmanned Aerial Vehicles (UAVs) are widely deployed in military surveillance operations, especially the quadcopter UAVs which are easy to operate and considerably quieter. However, UAVs encounter problems in secure path planning during navigation and are prone to cyber security attacks. Further, due to the UAV battery capacity, the operating time for surveillance is limited. In this paper, we propose a novel Resilient UAV Path Optimization Algorithm (RUPOA) which provides an optimal path under security attacks such as denial-of-service (DoS) and Man-in-the-Middle (MITM) attacks. The performance efficiency of the proposed path planning algorithm is compared with the existing path planning algorithms based on execution time. To achieve secure path planning in UAVs and to mitigate security attacks, a blockchain-aided security solution is proposed. To prevent security attacks, smart contracts are generated where the devices are registered with gasLimit. The blockchain consensus mechanism allows for secure and tamper-free transmission of data between the Ground Control Station (GCS) and a swarm of UAVs. The performance efficiency of the blockchain model is evaluated based on network latency which is the total execution time across the blockchain network.
Gli stili APA, Harvard, Vancouver, ISO e altri
50

Zhang, Yunpeng, e Xin Liu. "An Attribute-Based Cross-Domain Access Control Model for a Distributed Multiple Autonomous Network". International Journal of Software Engineering and Knowledge Engineering 30, n. 11n12 (novembre 2020): 1851–65. http://dx.doi.org/10.1142/s0218194020500400.

Testo completo
Abstract (sommario):
The distributed multiple autonomous network has become the main trend of modern information systems, such as Cloud, Service-Oriented Architecture (SOA) and Internet of Things (IoT). Access control in such a heterogeneous and dynamic system has become a major information security challenge, which hinders the sharing of resources and information. In this work, we present an Attribute-Based Access Control (ABAC) model for cross-domain access control. The proposed access control model comprises a boundary control server designed to provide cross-domain access control capability. An eXtensible Access Control Markup Language (XACML) policy model-based implementation is introduced. Process and implementation show the proposed model alleviates the security risk on the domain boundary during the cross-domain access control process.
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!

Vai alla bibliografia