-
441
Cloud Trust-Driven Hierarchical Sharing Method of Internet of Things Information Resources
Published 2021-01-01“…This paper sorts according to the value of the Internet information security model, obtains the optimal model to avoid human tampering, and designs the information resource acquisition process to ensure the reliability of the source data. …”
Get full text
Article -
442
Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing
Published 2014-01-01“…However, it is difficult to ensure privacy information security because of its opening, virtualization, and service outsourcing features. …”
Get full text
Article -
443
Authenticated encryption mode with blocks skipping
Published 2021-10-01“…Block symmetric ciphers are one of the most important components of modern information security systems. At the same time, in addition to the structure of the applied block symmetric cipher, the cryptographic strength and performance of the information protection system is largely determined by the applied encryption mode. …”
Get full text
Article -
444
Efficient anomaly detection in tabular cybersecurity data using large language models
Published 2025-01-01“…Abstract In cybersecurity, anomaly detection in tabular data is essential for ensuring information security. While traditional machine learning and deep learning methods have shown some success, they continue to face significant challenges in terms of generalization. …”
Get full text
Article -
445
Analysis of global experience in creating digital platforms and related risks
Published 2020-10-01“…The following types of digital risks have been considered: information security risks, organized cybercrime risks, reputational risks, legal risks, operational risks and risks of instability of participants’ income. …”
Get full text
Article -
446
Trust evaluation model of social internet of things based on implicit social relationship
Published 2023-04-01“…The social internet of things (SIoT) is a new paradigm that combines social networks and the internet of things to enhance network scalability and navigability.However, with increased openness and mobility of intelligent objects, there are rising security risks related to information security and reliable service delivery, which poses a significant challenge to the SIoT.Trust is a critical factor in providing secure and reliable services.Therefore, a new trust assessment model was proposed from the perspective of social relationships.A trust transfer algorithm was proposed based on the explicit social relationships and potential features between nodes.The algorithm can tap and establish the implicit social relationships among nodes to solve the SIoT sparsity and cold start problem.Additionally, the social relations were fine-grained and divided to build a single-relationship sub-network.Multiple single-relationship sub-networks were fused to build a multiple-relationship composite network.Thus, the impact of multiple dynamically changing social relationships among nodes on trust evaluation can be effectively fused.The comprehensive trust assessment of intelligent objects was conducted based on three indicators: direct trust, indirect recommendation trust, and service satisfaction.The experimental results on real smart city datasets demonstrate the model’s robustness in non-sparse and sparse network scenarios.It can effectively evaluate trusted and untrusted objects in the network and improve the accuracy and convergence of trust evaluation.…”
Get full text
Article -
447
Designing Attack Surface in Early Childhood Education System Environment using Risk Assessment and Enterprise Architecture Approach
Published 2024-11-01“…ISO 27005 provides a systematic methodology for identifying, assessing, and mitigating information security risks, ensuring compliance with the Indonesian Personal Data Protection Law (UUPDP). …”
Get full text
Article -
448
Performance evaluation of the SM4 cipher based on field‐programmable gate array implementation
Published 2021-03-01“…Abstract Information security is essential to ensure security of exchanged sensitive data in resource‐constrained devices (RCDs) because they are used widely in the Internet of things (IoT). …”
Get full text
Article -
449
A novel and highly efficient botnet detection algorithm based on network traffic analysis of smart systems
Published 2022-03-01Get full text
Article -
450
Selected Topics on Information Management in Complex Systems: Editorial Introduction to Issue 24 of CSIMQ
Published 2020-10-01“…The articles, which have been recommended by reviewers for this issue of CSIMQ, present contributions in different aspects of information management in complex systems, namely, implementation of harmful environment monitoring and data transmitting by Internet-of-Things (IoT) systems, analysis of technological and organizational means for mitigating issues related to information security and users’ privacy that can lead to changes in corresponding systems’ processes, organization and infrastructure, as well as assessment of potential benefits that a controlled (i.e. based on the up-to-date information) change process can bring to an enterprise.…”
Get full text
Article -
451
TYPOLOGYCAL VARIETIES OF STRATEGIES IN SOCIAL MEDIA
Published 2024-12-01“…Given the military-political context, the paper analyzes key varieties of strategies: (1) disinformation strategies, propaganda strategies that create alternative realities, information operation strategies utilizing bots, doxing strategies, strategies for factual manipulation, ideological polarization strategies, and strategies that evade the truth and distort information, strategy "neglect, distort, distract, discourage"; (2) strategies for countering disinformation (strategy of technological solutions, development of media literacy, state and international initiatives), strategy of information security. In conclusion, it is noted that manipulative technologies encompass a wide range of strategies, while the strategies of countering manipulations still require further theoretical development typological classification.…”
Get full text
Article -
452
-
453
Enhancing Industrial Cybersecurity: Insights From Analyzing Threat Groups and Strategies in Operational Technology Environments
Published 2025-01-01“…We aim to provide relevant stakeholders (manufacturers, asset owners and system integrators), including Chief Information Security Officers, with information on emerging threat groups, attack victims and their locations, the origins of attacks, the tools and types of tools used, and the motivations behind these attacks. …”
Get full text
Article -
454
Detection of network intelligence features with the decision tree model
Published 2022-03-01“…Early detection of network intelligence allows to reduce the risks of information security of organizations. The study was carried out to develop software module for detecting the features of network intelligence by machine learning methods.M e t h o d s . …”
Get full text
Article -
455
Digital technologies in territorial development: Opportunities and challenges of application in state and municipal administration
Published 2025-01-01“…To ensure effective digitalization of territories at different levels, it is necessary to define the boundaries and standards for the use of digital technologies, develop technical com petencies of decision-makers, guarantee information security and protection of personal data, and reduce fraud risk.…”
Get full text
Article -
456
-
457
Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition
Published 2023-06-01“…Financial security, an important part of national security, is critical for the stable and healthy development of the economy.Digital image watermarking technology plays a crucial role in the field of financial information security, and the anti-screen watermarking algorithm has become a new research focus of digital image watermarking technology.The common way to achieve an invisible watermark in existing watermarking schemes is to modify the carrier image, which is not suitable for all types of images.To solve this problem, an end-to-end robust watermarking scheme based on deep learning was proposed.The algorithm achieved both visual quality and robustness of the watermark image.A random binary string served as the input of the encoder network in the proposed end-to-end network architecture.The encoder can generate the watermark information overlay, which can be attached to any carrier image after training.The ability to resist screen shooting noise was learned by the model through mathematical methods incorporated in the network to simulate the distortion generated during screen shooting.The visual quality of the watermark image was further improved by adding the image JND loss based on just perceptible difference.Moreover, an embedding hyperparameter was introduced in the training phase to balance the visual quality and robustness of the watermarked image adaptively.A watermark model suitable for different scenarios can be obtained by changing the size of the embedding hyperparameter.The visual quality and robustness performance of the proposed scheme and the current state-of-the-art algorithms were evaluated to verify the effectiveness of the proposed scheme.The results show that the watermark image generated by the proposed scheme has better visual quality and can accurately restore the embedded watermark information in robustness experiments under different distances, angles, lighting conditions, display devices, and shooting devices.…”
Get full text
Article -
458
A dual benchmarking study of facial forgery and facial forensics
Published 2024-12-01“…Abstract In recent years, visual facial forgery has reached a level of sophistication that humans cannot identify fraud, which poses a significant threat to information security. A wide range of malicious applications have emerged, such as deepfake, fake news, defamation or blackmailing of celebrities, impersonation of politicians in political warfare, and the spreading of rumours to attract views. …”
Get full text
Article -
459
Enhancing User Differentiation in the Electronic Personal Synthesis Behavior (EPSBV01) Algorithm by Adopting the Time Series Analysis
Published 2025-02-01“…The progress of contemporary technology has rendered information systems essential in our everyday existence, underscoring the crucial necessity to safeguard information security and privacy. In password authentication, the Electronic Personal Synthesis Behaviour (EPSB) heightens the accuracy of authorizing an authenticated user based on three parameters: EPSBERROR, EPSBTime, and EPSBStyle. …”
Get full text
Article -
460
An adaptive neuro-fuzzy inference system for multinomial malware classification
Published 2025-02-01“… Malware detection and classification are important requirements for information security because malware poses a great threat to computer users. …”
Get full text
Article