Academia.eduAcademia.edu

Computers Security

2,284 papers
681 followers
AI Powered
Computer security, also known as cybersecurity, is the practice of protecting computer systems, networks, and data from theft, damage, unauthorized access, and disruption. It encompasses a range of technologies, processes, and policies designed to safeguard information integrity, confidentiality, and availability against cyber threats.
LUCELG and Cramer-Shoup are examples of public key cryptosystem. LUCELG uses a special group based on the Lucas function, also known as second order linear recurrence relation but the first practical Lucas function in a cryptosystem is... more
oxydée tend à indiquer un lessivage du stock d'or d'environ 40 % lié aux phénomènes d'altération supergène.
Traceable sensor calibration constitutes a foundational step that underpins operational safety in the Industrial Internet of Things. Traceability is the property that ensures reliability of sensed data by ensuring sensor accuracy is... more
Many governments consider the use of remote computing, communications and storage services provided by external service providers to process, store or transmit sensitive government data to increase scalability and decrease costs of... more
The results of botnet detection methods are usually presented without any comparison. Although it is generally accepted that more comparisons with third-party methods may help to improve the area, few papers could do it. Among the factors... more
Background and Objective: Information security is a vital issue in the field of health and medicine. In most of the research conducted in this field, the human factor has been ignored and a kind of technical view and approach has been... more
by F. J.A
Cyber warfare is a manifestation of conflict in the information age, where battlesare waged not with kinetic force but through asymmetric computational power and algorithmic subterfuge.
We examine the issue of password length leakage via encrypted traffic i.e., bicycle attacks. We aim to quantify both the prevalence of password length leakage bugs as well as the potential harm to users. In an observational study, we find... more
This report is an a&is of the 1989 12th U.S. Nitional Compu_ter Security Conference using the SIIS project's cybernetic analysis methodology SBC. The papers presented at the conference are classified using the SBC static classification... more
Techniques to hide valuable information within seemingly harmless messages have been widely used for centuries. Typically, their use is appropriate when encryption is not available or not adequate (e.g. when available cryptography is too... more
In this paper, initial results of an attitude survey on rhe security of medical information systems in Greece are reported. Greece for the moment lacks a gcncric data prorection act; therefore a systematic approach to introducing secure... more
In todays world ,the most imp thing is data ,and to keep this data safe from different type of attack we need to encrypt this data .There are various techniques for encrption,so after comparing the available techniques the most secured... more
Cloud computing is a new and most demandable technology in communication environment. Where computing resources such as hardware or/and software are processed as service over networks. SCADA implementation within cloud environment is... more
In this research, we propose to implement Secure Real Time Transport Protocol (SRTP) on VoIP services in campus environment. Today, the deployment of VoIP in campus environment over wireless local area network (WLAN) is not considered on... more
In this research, we propose to implement Secure Real Time Transport Protocol (SRTP) on VoIP services in campus environment. Today, the deployment of VoIP in campus environment over wired is not considered on security during communication... more
The default Java implementation for security policies based on policy files doesn't comply with the specific needs of metacomputing environments. Managing a large number of policy files for all Java runtime systems in the metacomputing... more
Handling and mitigating the cybercrime incidents (CIs) have attracted significant research attention, over the last years, due to their increasing frequency of occurrence. However, the term cybercrime is often used interchangeably with... more
Browser extensions are third-party add-ons that provide myriads of features to their users while browsing on the Web. Extensions often interact with the websites a user visits and perform various operations such as DOM-based manipulation,... more
This report is intended to provide a conceptual framework for assessing the security risk to power systems assets and operations related to malicious attacks. The problem is analysed with reference to all the actors involved and the... more
Digitalization has interwoven the systems of various industries and rendered them interdependent, for the sake of the convenience of consumers in their products and services. Significantly however, this is accompanied by the increasing... more
Bu çalışma, İslam'ın bir din olarak bireye ve topluma dair olan görüşünün hac temelinde araştırılmasını öngörmektedir. Dini tecrübe, kimlik, kutsal zaman ve kutsal mekân gibi kavram ve olguların merkezinde sembolik bir dille ifadesini... more
Empirical analysis of cyber-attacks to an indoor real time localization system for autonomous robots, Computers & Security (2017),
In this paper we present a new behavior-based anomaly detection system for detecting meaningful deviations in a mobile application's network behavior. The main goal of the proposed system is to protect mobile device users and cellular... more
Cloud computing provides enormous business opportunities, but at the same time is a complex and challenging paradigm. The major concerns for users adopting the cloud are the loss of control over their data and the lack of transparency.... more
Recent studies show that deep neural networks (DNNs) are vulnerable to backdoor attacks. A backdoor DNN model behaves normally with clean inputs, whereas outputs attacker's expected behaviors when the inputs contain a pre-defined pattern... more
Machine learning-based malware detection dominates current security defense approaches for Android apps. However, due to the evolution of Android platforms and malware, existing such techniques are widely limited by their need for... more
Purpose of the paper: The research goal was exploratory. Its main objective was to collect data and describe the current state of selected aspects of establishing and maintaining ISMS in Polish manufacturing enterprises. In particular,... more
Cyber Physical Systems (CPS) are networked systems of cyber (computation and communication) and physical (sensors and actuators) components that interact in a feedback loop with the possible help of human intervention, interaction and... more
In January 2005, the Mexican Tributary Administration System (SAT) introduced an official norm that stipulates how to generate electronic invoices that were termed by SAT, Comprobante Fiscal Digital (CFD). Supporting the CFD service... more
As the use of internet increasing users need more and more secure network for communication. For maintaining the security of network it has been monitor actively. The detection of threat is must for any network before it will affects to... more
He has presented his work at several conferences, including AMCIS and HICSS. He has served as a reviewer for several IS journals and conferences.
The endowment effect is the term used to describe a phenomenon that manifests as a reluctance to relinquish owned artifacts, even when a viable or better substitute is offered. It has been confirmed by multiple studies when it comes to... more
This paper proposes a unique information security training and awareness approach (ISTAAP) that can be used to instil an information security-positive culture which will assist in addressing the risk that human behaviour poses to the... more
The ideal or strong information security culture can aid in minimising the threat of humans to information protection and thereby aid in reducing data breaches or incidents in organisations. This research sets out to understand how... more
When considering an information security culture in an organisation, researchers have to consider the possibility of several information security subcultures that could be present in the organisation. This means that different... more
In this paper, we propose a novel and efficient way to improve the computational complexity of the Elliptic Curve Cryptography [ECC] algorithm. ECC is a public key cryptography system, where the underlying calculations are performed over... more
6LoWPAN (modified version of IPv6 for low power devices) inherits security threats from its predecessor protocols, IPv4 and IPv6. IP spoofing is one such classic attack. There are vulnerabilities in 6LoWPAN and associated routing... more
This research paper explores the significant transformative potential of Mixed Reality (MR) technology as enabler of the metaverse, specifically aimed at enhancing mental health therapies. The emerging world of the metaverse, a multiuser,... more
In a lab-based empirical study, we examined how individual differences and an aspect of national culture impacted on participants' responses to phishing and spear-phishing emails. Results showed that the strongest predictor of the... more
In a lab-based empirical study, we examined how individual differences and an aspect of national culture impacted on participants’ responses to phishing and spear-phishing emails. Results showed that the strongest predictor of the... more
Internet services heavily rely on CAPTCHAs for determining whether or not a user is a human being. The recent advances in ML and AI make the efficacy of CAPTCHAs in strengthening Internet services against bots questionable. In this paper,... more
Internet services heavily rely on CAPTCHAs for determining whether or not a user is a human being. The recent advances in ML and AI make the efficacy of CAPTCHAs in strengthening Internet services against bots questionable. In this paper,... more
Authentication in service oriented computing is vulnerable to various security concerns. The core concept of authentication is dependent on credentials offered at the present moment without verifying how or when the credential was... more
Cloaking-based location privacy preserving mechanisms have been widely adopted to protect users' location privacy when using location-based services. A fundamental limitation of such mechanisms is that users and their location information... more
In this work we propose a graph-based model that, utilizing relations between groups of System-calls, distinguishes malicious from benign software samples and classifies the detected malicious samples to one of a set of known malware... more
In this paper we describe an approach to resolve strategic games in which players can assume differ-ent types along the game. Our goal is to infer which type the opponent is adopting at each moment so that we can increase the player’s... more
Networks are evolving rapidly into huge, omnipresent, multiservice entities. They are connected worldwide into an Internet that has many different administrations, purposes, resource owners, and users. As the network grows, design... more