-
421
Advancing GAN Deepfake Detection: Mixed Datasets and Comprehensive Artifact Analysis
Published 2025-01-01Get full text
Article -
422
ASSESSMENT AND ANALYSIS OF DIGITAL TRANSFORMATION OF REGIONAL ECONOMIC SYSTEMS OF THE RUSSIAN FEDERATION: METHODOLOGICAL APPROACHES AND THEIR APPROBATION
Published 2020-02-01“…A distinctive aspect of the proposed algorithm is the orientation of the developed tools to study the five main directions of digitalization, defined by the Order of the Government of the Russian Federation of July 28, 2017 (No. 1632-r): regulatory regulation, personnel for the digital economy, formation of research competencies and technological foundations, information infrastructure, information security. Based on the results of the study, the main qualitative and quantitative characteristics have been identified, that assess the development of the digital economy in the constituent entities of the Russian Federation at the present stage of development; a toolkit has been offered, that allows you to determine key areas of regional policy aimed at intensifying the processes of digitalization of business processes.…”
Get full text
Article -
423
Revealing Traces of Image Resampling and Resampling Antiforensics
Published 2017-01-01Get full text
Article -
424
Efficient and fully simulated oblivious transfer protocol on elliptic curve
Published 2023-02-01“…Oblivious transfer protocol, an important technology in secure multi-party computation, is the research hotspot on network and information security.Based on the bilinear pairs and the difficult problems on elliptic curves, an efficient 1-out-of-N oblivious transfer protocol in the semi-honest model and in the standard malicious model were proposed respectively.The protocol in semi-honest model was designed.It only needed two rounds of interaction.The receiver needed two times of bilinear pair arithmetic and one time of multi point arithmetic, and the sender needed n times of multi point arithmetic and n times of modular exponentiation.The security of the protocol was based on the discrete logarithm problem on elliptic curves.A zero-knowledge proof protocol and the oblivious transfer protocol in the standard malicious model were proposed respectively.The oblivious transfer protocol only needed four rounds of interaction.The receiver needed three times of bilinear pair arithmetic and three times of multi point arithmetic, and the sender needed n+1 times of multi point arithmetic and n+1 times of modular exponentiation.Besides, it can resist malicious behaviors of the party.The results show that the average running time of the protocol in the semi-honest model and in the standard malicious model were 0.787 9 s and 1.205 6 s respectively, which can further demonstrate the efficiency of the protocol.…”
Get full text
Article -
425
Formation of the concept of holistic management of assets and value of organizations in conditions of economic instability
Published 2024-12-01“…The new reality requires the realization that there is nothing permanent in the surrounding world, which forces to apply completely new approaches to corporate governance, information security, strengthening competitive positions and attracting investments. …”
Get full text
Article -
426
Image Encryption Based on Dynamic Filtering and Bit Cuboid Operations
Published 2019-01-01“…And hence how to enhance the security of images has become a hot topic in the field of information security. However, due to some intrinsic characteristics of images, image security is still a challenging task. …”
Get full text
Article -
427
Accelerating the SM3 hash algorithm with CPU‐FPGA Co‐Designed architecture
Published 2021-11-01“…Abstract SM3 hash algorithm developed by the Chinese Government is used in various fields of information security, and it is being widely used in commercial security products. …”
Get full text
Article -
428
A New Highly Secure Optical Image Security Technique Using Gyrator Transform for Image Security-Related Applications
Published 2022-01-01“…New methods and apparatuses for information security have evolved as a result of the rapid expansion of optical information processing. …”
Get full text
Article -
429
Vehicle Attribute Recognition for Normal Targets and Small Targets Based on Multitask Cascaded Network
Published 2019-01-01Get full text
Article -
430
Contextual access control based on attribute-based encryption with hidden lattice structure for removable storage media
Published 2014-04-01“…It also can be applied to information security management in other ubiquitous environments.…”
Get full text
Article -
431
High-performance directional fuzzing scheme based on deep reinforcement learning
Published 2023-04-01“…With the continuous growth and advancement of the Internet and information technology, continuous growth and advancement of the Internet and information technology.Nevertheless, these applications’ vulnerabilities pose a severe threat to information security and users’ privacy.Fuzzing was widely used as one of the main tools for automatic vulnerability detection due to its ease of vulnerability recurrence and low false positive errors.It generates test cases randomly and executes the application by optimization in terms of coverage or sample generation to detect deeper program paths.However, the mutation operation in fuzzing is blind and tends to make the generated test cases execute the same program path.Consequently, traditional fuzzing tests have problems such as low efficiency, high randomness of inputs generation and limited pertinence of the program structure.To address these problems, a directional fuzzing based on deep reinforcement learning was proposed, which used deep reinforcement learning networks with information obtained by staking program to guide the selection of the inputs.Besides, it enabled fast approximation and inspection of the program paths that may exist vulnerabilities.The experimental results showed that the proposed approach had better performance than the popular fuzzing tools such as AFL and AFLGO in terms of vulnerability detection and recurrence on the LAVA-M dataset and real applications like LibPNG and Binutils.Therefore, the approach can provide support for further vulnerability mining and security research.…”
Get full text
Article -
432
Evolution of Biotechnology and Information Technology and Its Impact on Human Security
Published 2015-10-01“…The detailed description of the main directions of the use of biometric technology in the foreign policy and consular practices is provided, the challenges and threats to information security associated with biometrics are analyzed, arising from widespread biotechnology are the main challenges and threats to as well as human security threats arising at the present stage of development and application of these technologies. …”
Get full text
Article -
433
IMPACT OF ELECTRONIC RECORDS MANAGEMENT SYSTEM ON THE SECURITY OF RECORDS AMONG ADMINISTRATIVE STAFF
Published 2023-12-01“…The study will be underpinned by the Information Security Model to ascertain the confidentiality, integrity and availability of the records. …”
Get full text
Article -
434
Medical Image Encryption and Decryption Based on DNA: A Survey
Published 2023-09-01“…DNA Digital coding is the most popular form of cryptographic technology, and it is frequently employed to strengthen information security, and the most prevalent constraints of DNA cryptographic schemes feature a high degree of temporal and algor. …”
Get full text
Article -
435
The Importance of Security Awareness in Combating Phishing Attacks: A Case Study of Bank Rakyat Indonesia
Published 2024-11-01“…Therefore, enhancing security awareness to prevent phishing is crucial for both individuals and banks to protect information security and avoid becoming victims of digital crimes such as phishing.…”
Get full text
Article -
436
FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review
Published 2021-03-01“…The DES and the AES provide information security. DES and AES have the distinction of being introduced in both hardware and applications. …”
Get full text
Article -
437
A cross-layer approach to message authentication based on sparse representation for wireless body area networks
Published 2017-03-01“…Due to personal privacy, information security is a particularly important issue in wireless body area networks. …”
Get full text
Article -
438
Contracting account audit on social networks
Published 2022-01-01“…Social network account audit is an independent review of social network activities to express a professional opinion on the fulfillment of objectives, business compliance, and information security of orders on social networks. It is in principle a voluntary activity and is not subject to legal obligation like some other types of audit such as the audit of financial statements. …”
Get full text
Article -
439
Cybercrime and Digital Transformation
Published 2021-04-01“…Cyberspace crime is a critical threat to the information security of the state and civil society institutions. …”
Get full text
Article -
440
New Generation of Smart Highway: Framework and Insights
Published 2021-01-01“…Several urgent problems in the current stage are pointed out in terms of system compatibility, standard specification, and information security. This paper provides new insights for sustainable and reproducible highway reformation, drawing some implications for NGSH design.…”
Get full text
Article