Showing 21 - 40 results of 44 for search '"computer security"', query time: 0.05s Refine Results
  1. 21

    The Study of Methods for Penetration Testing in Training of Information Security Specialists by A. M. Kadan, A. K. Doronin

    Published 2016-12-01
    “…The article deals with issues related to the creation of modern educational virtual laboratory under cloud cluster platform OpenNebula for the training of specialists in the field of information security and computer security. The use of such laboratories allows teaching methods of penetration testing on examples of objects of different levels of difficulty, and also provides the possibility of rapid changes in infrastructure and characteristics of the objects.…”
    Get full text
    Article
  2. 22

    A Survey of Artificial Immune System Based Intrusion Detection by Hua Yang, Tao Li, Xinlei Hu, Feng Wang, Yang Zou

    Published 2014-01-01
    “…In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. …”
    Get full text
    Article
  3. 23
  4. 24

    Analysis of cyber incidents in Senegal from 2005 to 2023 by Ciré Sall

    Published 2024-12-01
    “…Based on the findings, the author recommends, inter alia, improved Senegalese government monitoring and reporting of cyber threats, with an emphasis on cooperation between the state’s Computer Security Incident Response Team (CSIRT-Senegal, or SNCSIRT) and the CSIRT-Universitaire established by tertiary institutions in the country.   …”
    Get full text
    Article
  5. 25

    A Program for Master of Information Technology by Kabale University

    Published 2022
    “…The Master of Information Technology (MIT) mainly deals with the Management of Information Technology focusing on a number of areas including but not limited to business process management, e-services, computer security, technology modeling and data management. …”
    Get full text
    Other
  6. 26

    Analisis Komparatif Keamanan Aplikasi Pengelola Kata Sandi Berbayar Lastpass, 1Password, dan Keeper Berdasarkan ISO/IEC 25010 by Whisnu Yudha Aditama, Ira Rosianal Hikmah, Dimas Febriyan Priambodo

    Published 2023-08-01
    “…Abstract  Authentication is one of the most important factors in the scope of computer security, passwords are the dominant authentication method applied to websites or desktops. …”
    Get full text
    Article
  7. 27

    Analysis and Practice of Cloud Computing Information Security by Detian Tong, Xudong Liu, Taofeng Guo, Jiewen Liang

    Published 2013-02-01
    “…Fina11y,a brief discussion of GMCC private cloud platform cloud computing security practice was presented.…”
    Get full text
    Article
  8. 28

    基于层次分析—模糊评价的云计算安全评估与对策 by Ai-min YANG, Fang GAO, Min-hua BIAN, Shu-lei YANG

    Published 2016-10-01
    “…With the rapid development of information technology,cloud computing has become a hot topic.More and more companies and individuals will be their computing needs and storage needs to be delivered to the cloud,so the security problem of cloud computing can not be ignored.First,the security requirements of the four key technologies,such as multi tenant,node communication,remote storage and virtualization in the cloud computing environment were analyzed,the necessity of the construction of cloud computing security was expounded.Then,according to the security requirements of cloud computing,fuzzy comprehensive evaluation model based on ana-lytic hierarchy process was established,and taking a cloud service platform as an example to evaluate its security,get the security level of the service platform is "good".Finally,according to the security requirements of cloud computing environment and the results of model evaluation,some suggestions in in virtualization security,applica-tion security and data security was put forward,in order to strengthen the cloud computing security,some direction was provided.…”
    Get full text
    Article
  9. 29

    Information Assurance Framework of Military Cloud by Baoping Guo, Jian1 Cheng, Weiping2 Liu

    Published 2015-12-01
    “…At first, the conception and feature of cloud computing security was discussed. The current situation of research and application in military cloud security was analyzed. …”
    Get full text
    Article
  10. 30

    Identity-based fully homomorphic encryption from learning with error problem by Yan GUANG, Yue-fei ZHU, Jin-long FEI, Chun-xiang GU, Yong-hui ZHENG

    Published 2014-02-01
    “…The fully homomorphic encryption schemes based on learning with errors problem own a great potential value in the cloud computing security. However, the existing schemes share a common flaw of large sized public keys, which may cause inefficiency of such schemes in the key and identity management. …”
    Get full text
    Article
  11. 31

    Survey on trusted cloud platform technology by Xinfeng HE, Junfeng TIAN, Fanming LIU

    Published 2019-02-01
    “…Information security technology confronts severe challenges because of the safety demands of cloud computing.The trustworthiness and self-safety of cloud computing platform are the foundation of cloud computing security.The confidence of cloud users is the key issue the deep development and popularization for cloud computing.The trusted cloud computing technology provides a feasible solution.From the standpoint of guaranteeing the trustworthiness of cloud computing platform,related research progresses on trusted virtualization,construction of trusted cloud platform and trusted virtual machine were introduced.Additionally,the characteristics,application scopes and effectiveness of typical schemes were analyzed and compared.Finally,current limitations and possible directions for future research were discussed.…”
    Get full text
    Article
  12. 32

    Secure OFDM transmission scheme based on two-stage chaos mapping by Ying WANG, Xiao-zhong ZHANG, Juan ZENG, Yong-ming WANG

    Published 2016-07-01
    “…Compared with tra-ditional methods like advanced encryption standard, randomization of MIMO transmission coefficients, the scheme shows favorable computation security.…”
    Get full text
    Article
  13. 33

    Overview of research on trusted attestation technology of cloud virtualization platform by Bibo TU, Jie CHENG, Haojun XIA, Kun ZHANG, Ruina SUN

    Published 2021-12-01
    “…With the rapid development of cloud computing, the security issues of cloud platforms have also attracted much attention.Trusted computing is an essential supporting technology in the cloud computing security system.Trusted attestation is an important feature in trusted computing.The use of trusted attestation technology verifies whether the cloud virtualization platform is trustworthy, thereby providing a foundation for ensuring the security of the cloud platform.Now based on the definition of trusted attestation, the research progress of key technologies such as the root of trust virtualization, platform identity authentication, platform status certification, and trusted attestation framework for virtual machines were systematically sorted out, typical schemes were analyzed and compared.Furthermore, the limitations of existing work were discussed.Finally, the future research trend of this area were pointed out.…”
    Get full text
    Article
  14. 34

    SAPA-based approach for defending DoS attacks in cloud computing by Meng YUE, Kun LI, Zhi-jun WU

    Published 2017-04-01
    “…Denial of service (DoS) attack was one of the major threats to cloud computing.Security access path algorithm (SAPA) used node route table (NRT) to compose security access path.It simplified role nodes of traditional secure overlay services (SOS),and periodically updated role nodes,and cached security access paths.Therefore,SAPA was more appropriate for cloud computing to defend DoS attacks.Based on the turn routing architecture of cloud computing,the mathematical model of SAPA was built and its performance was analyzed in theory.The performance of SAPA was tested in OMNeT++ experimental platform.Also,the Test-bed experiments were performed to evaluate the effectiveness of SAPA for defending DoS attack.Experimental results show that comparing with SOS,SAPA can degrade the impact of communication success rate caused by DoS attack effectively,and guarantees the access delay small enough.…”
    Get full text
    Article
  15. 35

    Research on security defense of mobile edge computing by Lu CHEN, Hongbo TANG, Wei YOU, Yi BAI

    Published 2021-02-01
    “…Mobile Edge Computing can solve the problem of heavy backhaul link overloaded and long delay effectively by further extending the telecommunication cellular network to other wireless access networks.However, the MEC nodes are exposed to the edge of the network whose computing resource, storage capacity and energy resource are limited, they are more vulnerable to the illegal attacks by attackers.Based on the briefly analysis of the security threats faced by mobile edge computing, some key problems and challenges of mobile edge computing for four different security subjects, device security, node security, network resources and tasks, and migration security are summed up and expounded, and the existing security solutions were summarized.Finally, the open research and future development trend of mobile edge computing security defense on three aspects that limited resource defense model in the dynamic scene, resource deployment based on comprehensive trust and user-centered service reliability assurance are discussed.…”
    Get full text
    Article
  16. 36

    BSAMS: Blockchain-Based Secure Authentication Scheme in Meteorological Systems by Yashar Salami, Seyedreza Hosseini

    Published 2023-03-01
    “…In the following, the proposed scheme is evaluated in terms of computational costs, and the evaluation results show that the proposed scheme is increasing compared to similar schemes due to the focus on computational security.…”
    Get full text
    Article
  17. 37

    Towards edge-collaborative, lightweight and privacy-preserving classification framework by Jinbo XIONG, Yongjie ZHOU, Renwan BI, Liang WAN, Youliang TIAN

    Published 2022-01-01
    “…Aiming at the problems of data leakage of perceptual image and computational inefficiency of privacy-preserving classification framework in edge-side computing environment, a lightweight and privacy-preserving classification framework (PPCF) was proposed to supports encryption feature extraction and classification, and achieve the goal of data transmission and computing security under the collaborative classification process of edge nodes.Firstly, a series of secure computing protocols were designed based on additive secret sharing.Furthermore, two non-collusive edge servers were used to perform secure convolution, secure batch normalization, secure activation, secure pooling and other deep neural network computing layers to realize PPCF.Theoretical and security analysis indicate that PPCF has excellent accuracy and proved to be security.Actual performance evaluation show that PPCF can achieve the same classification accuracy as plaintext environment.At the same time, compared with homomorphic encryption and multi-round iterative calculation schemes, PPCF has obvious advantages in terms of computational cost and communication overhead.…”
    Get full text
    Article
  18. 38

    Future vehicular fog computing networks by Ning HUI, Jie WU, Yiqing ZHOU, Ling LIU, Zhengang PAN

    Published 2020-06-01
    “…Facing the requirements of secure and reliable vehicle driving,internet of vehicles requires high real-time information transmission and processing,high data storage and security using capacity,and high flexibility and inclusiveness of network architecture.The future vehicular fog computing network can reduce the data transmission and processing delay based on the characteristics of fog computing deployed at the edge of the network,can ensure data security based on the characteristics of fog computing black box operation,and can make heterogeneous facilities connect with other devices and make sure resource sharing between vehicle nodes based on the fog computing distributed architecture.The future vehicular fog computing networks were reviewed,the architecture,challenges,and key technologies of vehicle fog computing were introduced,the communication and computing resource sharing and task collaboration in the mobile state,vehicle fog computing security,and vehicle fog computing heterogeneity of facilities were focused on .Finally,a three-level management and control architecture for vehicular fog computing networks were proposed to promote the development of internet of vehicles to on-networking collaborative decision-making and control.…”
    Get full text
    Article
  19. 39

    Speedup signing: pre-rejection sampling towards dilithium by Lianglin Yan, Ming Luo, Mingsheng Wang

    Published 2025-02-01
    “…Applying these two techniques to Dilithium, we obtain an advanced signature scheme with better efficiency, and without any other losses except some pre-computations. Security reduction demonstrates that our scheme is also SUF-CMA in QROM. …”
    Get full text
    Article
  20. 40