Showing 501 - 520 results of 529 for search '"information security"', query time: 0.10s Refine Results
  1. 501
  2. 502
  3. 503

    An Intelligent Big Data Security Framework Based on AEFS-KENN Algorithms for the Detection of Cyber-Attacks from Smart Grid Systems by Sankaramoorthy Muthubalaji, Naresh Kumar Muniyaraj, Sarvade Pedda Venkata Subba Rao, Kavitha Thandapani, Pasupuleti Rama Mohan, Thangam Somasundaram, Yousef Farhaoui

    Published 2024-06-01
    “…The main obstacles in turning the heterogeneous large dataset into useful results are computational burden and information security. The original contribution of this paper is to develop a new big data framework for detecting various intrusions from the smart grid systems with the use of AI mechanisms. …”
    Get full text
    Article
  4. 504

    Using Blockchain in the Registration and Authentication of a Carpooling Application: From Review to Proposal by Lina Sofía Cardona Martínez, Cesar Andrés Sandoval Muñoz, Ricardo Salazar-Cabrera, Álvaro Pachón de la Cruz, Juan Manuel Madrid Molina

    Published 2025-01-01
    “…This proposed research explores the benefits of improving the authentication processes for passengers and drivers within a shared transportation system to minimize information security risks. A thorough literature review was conducted on shared transportation, user registration, authentication processes within these systems, and technologies that could enhance security, such as blockchain. …”
    Get full text
    Article
  5. 505

    Patterned Lead‐Free Double Perovskite/Polymer Fluorescent Piezoelectric Composite Films for Advanced Anti‐Counterfeiting by Jindou Shi, Zeyu Wang, Nanxiang Jia, Minqiang Wang, Youlong Xu, Xiangming Li, Jinyou Shao

    Published 2025-01-01
    “…A multifunctional anti‐counterfeiting device has been further developed by integrating patterned optical and electrical responses onto flexible CFs, achieving synergistic protection of information security in cross fields and bringing a significant advancement to the high‐level anti‐counterfeiting market.…”
    Get full text
    Article
  6. 506

    Metode Deteksi Intrusi Menggunakan Algoritme Extreme Learning Machine dengan Correlation-based Feature Selection by Sulandri Sulandri, Achmad Basuki, Fitra Abdurrachman Bachtiar

    Published 2021-02-01
    “…Abstract Intrusion detection of computer networks is a very important activity carried out to maintain data and information security. Intrusion detection is the process of monitoring traffic on a network to detect any data patterns that are considered suspicious, which allows network attacks. …”
    Get full text
    Article
  7. 507
  8. 508

    Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption by Rebwar Khalid Muhammed, Ribwar Rashid Aziz, Alla Ahmad Hassan, Aso Mohammed Aladdin, Shaida Jumaah Saydah, Tarik Ahmed Rashid, Bryar Ahmad Hassan

    Published 2024-05-01
    “…Encrypt has grown into an answer that has become an essential element of information security systems. To ensure the security of shared data, including text, images, or videos, it is essential to employ various methods and strategies. …”
    Get full text
    Article
  9. 509

    Pengamanan Citra Berwarna Menggunakan Kriptografi Visual Skema Meaningful Shares dan Steganografi LSB by Fariz Abid Darmawan, Ari Kusyanti, Rakhmadhanny Primananda

    Published 2022-12-01
    “…Dengan melakukan serangan menggunakan Autopsy dan Stegspy hanya 3 dari 30 stego image yang dapat dideteksi citra sharesnya, ini baru sebatas citra shares, dan untuk merekonstruksi ulang citra secretnya dibutuhkan sepasang shares, jadi diambil kesimpulan bahwa penggabungan metode ini berhasil mengamankan informasi didalamnya.   Abstract Information security is important so that files that are confidential can be protected from unauthorized persons, therefor there is Cryptography and Steganograph. …”
    Get full text
    Article
  10. 510

    Security of Smart Grid: Cybersecurity Issues, Potential Cyberattacks, Major Incidents, and Future Directions by Mohammad Ahmed Alomari, Mohammed Nasser Al-Andoli, Mukhtar Ghaleb, Reema Thabit, Gamal Alkawsi, Jamil Abedalrahim Jamil Alsayaydeh, AbdulGuddoos S. A. Gaid

    Published 2025-01-01
    “…The categorization of smart grid cyberattacks, while taking into account key information security characteristics, can help make it possible to provide organized and effective solutions for the present and potential attacks in smart grid applications. …”
    Get full text
    Article
  11. 511

    5G Networks Security Mitigation Model: An ANN-ISM Hybrid Approach by Rafiq Ahmad Khan, Habib Ullah Khan, Hathal Salamah Alwageed, Hussein Al Hashimi, Ismail Keshta

    Published 2025-01-01
    “…The proposed model includes state-of-the-art machine learning with traditional information security paradigms to offer an integrated solution to the emerging complex security issues related to 5G. …”
    Get full text
    Article
  12. 512
  13. 513

    DEVELOPING INFORMATION AND TECHNOLOGICAL COMPETENCE OF PROSPECTIVE MILITARY SAILORS by Ruslan Shevchenko, Oleh Cherniavskyi, Vasyl Shemchuk, Olena Zlobina, Natalia Benkovska, Nataliia Terentieva, Андрій Гуралюк

    Published 2024-06-01
    “…Among these components are the skills of searching, storing, processing and transmitting information; ability to work with high-tech devices; knowledge of the basics of information security and data protection; the ability to monitor technological innovations in professional competences, etc. …”
    Get full text
    Article
  14. 514

    Analisis Pengaruh Citra Terhadap Kombinasi Kriptografi RSA dan STEGANOGRAFi LSB by Agus Rakhmadi Mido, Erik Iman Heri Ujianto

    Published 2022-02-01
    “…Abstract Data and information security are currently an important aspect in the process of exchanging messages through the internet network. …”
    Get full text
    Article
  15. 515

    Designing a cyber insurance implementation model using foundational data theory by Behzad Esmaeilifar, manouchehr Ansari

    Published 2024-05-01
    “…Furthermore, the emergence of various softwares, the risk of information theft in cyberspace, intrusion into individual lives and sometimes government systems has increased, and such a situation has jeopardized information security (Kshetri et al, 2020). Until now, in Iran, specific and comprehensive coverage for cyber risk has not been provided, and the main reasons for not providing it by insurance companies can be attributed to the lack of information and technical knowledge in the field of providing the plan, the lack of knowledge of these organizations about this type of insurance coverage, and also, lack of sufficient financial transparency on the part of companies applying for such insurance policies. …”
    Get full text
    Article
  16. 516

    A Model for Bank Management Performance Appraisal with the Advanced Technologies Approach (Meta-Synthesis Method) by Ehsan Kiani Ghalehno, Habibollah Salarzehi, Bahareh Naseri, Abdolali Keshtegar

    Published 2024-12-01
    “…These emerging dynamic technologies are dangerous even if they have positive effects on financial institutions and bank managers cannot protect their information assets against any attack on information security (Okoht , 2020).Case studyAssessing the performance of managers in branches of melli Bank of Sistan and Baluchistan province.Materials and MethodsWe have great development in this space using IR 0. 4 as setting new records or applying for personal credits in advanced banks enables buyers to do banking operations using available strategic tools. …”
    Get full text
    Article
  17. 517

    Investigating and prioritizing the factors affecting the success of e-commerce using the best and worst (BWM) technique. by shayan mohammadpour mir, shiba masoumi, seyed mojtaba kavoosi davoodi

    Published 2024-05-01
    “…Effective factors include the components of 1- infrastructure (access to the Internet network, electronic storage of information, security systems and electronic payments), 2- payment system (payment authorization, various customer payment methods, settlement operations), 3- Knowledge and awareness (customer notification system, customer privacy consideration, company's response to customers' frequent questions), 4- Customer satisfaction (variety of products and advertisements, company's seasonal auctions, timely delivery of goods, building trust). …”
    Get full text
    Article
  18. 518

    Survey on trusted cloud platform technology by Xinfeng HE, Junfeng TIAN, Fanming LIU

    Published 2019-02-01
    “…Information security technology confronts severe challenges because of the safety demands of cloud computing.The trustworthiness and self-safety of cloud computing platform are the foundation of cloud computing security.The confidence of cloud users is the key issue the deep development and popularization for cloud computing.The trusted cloud computing technology provides a feasible solution.From the standpoint of guaranteeing the trustworthiness of cloud computing platform,related research progresses on trusted virtualization,construction of trusted cloud platform and trusted virtual machine were introduced.Additionally,the characteristics,application scopes and effectiveness of typical schemes were analyzed and compared.Finally,current limitations and possible directions for future research were discussed.…”
    Get full text
    Article
  19. 519

    Analysis of cyberspace security based on game theory by Jian-ming ZHU, Qin WANG

    Published 2015-12-01
    “…Information security economics is an important research area and game theory is one of the main basic theories and tools of cyberspace security.Based on game theory,the main problems of cyberspace securing were analyzed which including network attack and defense,cryptographic protocol design,and security technology con-figuration.The conflicts between attackers and defenders as well as the dependence among defenders were mainly analyzed on network and defense.Game theory’s applications in secret sharing and secure multi-party computation were emphasized on cryptographic protocol design.The game theory’s applications in intrusion detection system and firewall technology were analyzed on security technology configuration.Finally,the limitations of current re-searches and carries on the forecast to the future research directions were pointed out.…”
    Get full text
    Article
  20. 520

    Research on safety supervision data sharing of railway construction projects based on edge computing by Liang YANG, Chunhui PIAO, Yuhong LIU, Meimei JI

    Published 2020-06-01
    “…Information security monitoring system is widely used in railway construction projects,but the existing safety supervision model has problems such as high server load,heavy network bandwidth pressure,monitoring data can’t be effectively shared,key monitoring data may be tampered,and security accident responsibility is difficult to determine.A credible sharing model of safety supervision data for railway construction projects based on edge computing was proposed.On one hand,the construction of a safety monitoring edge computing framework for construction projects was constructed,and the data processing flow of edge nodes was described; on the other hand,a trusted data sharing framework based on blockchain was established,and a safety supervision data sharing process was designed and trusted sharing data was implemented through smart contracts.The proposed solution combined with edge computing and blockchain technology,which not only could strengthen the safety supervision of railway construction projects by industry authorities,but also provide new opportunities for stakeholders to share safety monitoring data in real time.…”
    Get full text
    Article