Security
What's worse than getting hit with a security breach? Getting hit with an easily preventable one.
-
Password Hardened Biometric: A Complete Solution of Online Security
In present paper, secure online access to enterprises resources is very important for any organization. To protect valuable data become one of the big challenge for today's business as enterprise cust...
Provided By mecs-press
-
A Robust Fault Detection Scheme for the Advanced Encryption Standard
Fault attacks are powerful and efficient cryptanalysis techniques to find the secret key of the Advanced Encryption Standard (AES) algorithm. These attacks are based on injecting faults into the struc...
Provided By mecs-press
-
On the Feasibility of Online Malware Detection with Performance Counters
The proliferation of computers in any domain is followed by the proliferation of malware in that domain. Systems, including the latest mobile platforms, are laden with viruses, rootkits, spyware, adwa...
Provided By Association for Computing Machinery
-
Rethinking Your Enterprise Security: Critical Priorities to Consider
In this informative white paper, explore the changing landscape of enterprise security. Learn why traditional security approaches fall short in the face of new and emerging workplace trends, and see h...
Provided By Hewlett Packard
-
Towards a Networks-of-Networks Framework for Cyber Security
Networks-of-Networks (NoN) is a graph-theoretic model of interdependent networks that have distinct dynamics at each network (layer). By adding special edges to represent relationships between nodes i...
Provided By Cornell University
-
Symmetric Key Generation Algorithm Using Sum of Subset N-P Problem
Information security is the process of protecting information. It protects its availability, privacy and integrity. Access to stored information on computer databases has increased greatly. More compa...
Provided By Galgotias College Of Engineering And Technology
-
Detection and Resolution of Anomalies in Firewall Policy Rules
A firewall is a system acting as an interface of a network to one or more external networks. It implements the security policy of the network by deciding which packets to let through based on rules de...
Provided By Galgotias College Of Engineering And Technology
-
Efficient and Secure Authentication by Using 3-Path Transmission in Ad Hoc Networks
Ad hoc networks are created dynamically and maintained by the individual nodes comprising the network. They do not require a pre-existing architecture for communication purposes and do not rely on any...
Provided By Interscience Open Access Journals
-
Location of Sensor in Network-Based Intrusion Detection and Prevention System
With the increase in networks connecting each and every computer, their security is gaining equal significance. An important problem to network services is cyber attacks. Intrusion detection is the ac...
Provided By Galgotias College Of Engineering And Technology
-
Security Issues of SIP Based VoIP System
In this booming world of internet, telephone traffic is just another application running over it. Voice over Internet Protocol, also known as VoIP, is a technology used for transferring voice informat...
Provided By Galgotias College Of Engineering And Technology
-
Maximizing the Lifetime and Security of Wireless Sensor Networks
Recent technological advances have facilitated the widespread use of Wireless Sensor Networks in many applications such as battle field surveillance, environmental observations, biological detection a...
Provided By Interscience Open Access Journals
-
A Case for Societal Digital Security Culture
Information and communication technology systems, such as remote health care monitoring and smart mobility applications, have become indispensable parts of the users' lives. Security vulnerabilities i...
Provided By Eindhoven University of Technology
-
Research on Security Issues and Solutions of IEC 61850 Communication Protocol Architecture
IEC 61850 Communication Protocol Architecture is widely used in China's electricity system for communication between the substation automatic systems. Due to the lacking of corresponding security spec...
Provided By JATIT
-
Algorithm on Embedded Fingerprint Identification System
Fingerprint identification technology is a kind of important biological identity recognition technology; it is also the most mature branch of biological recognition technology development. Comparing w...
Provided By JATIT
-
Dynamic Group Signature Scheme Based on Non-Interactive Proof
Combined with identity-based signature technology and non-interactive proof, a dynamic group signature scheme was built based on the standard group scheme model. This scheme overcame the shortcoming o...
Provided By JATIT
-
Two Trivial Attacks on A5/1: A GSM Stream Cipher
Stream ciphers play an important role in those applications where high throughput remains critical and resources are very restricted e.g. in Europe and North America, A5/1 is widely used stream cipher...
Provided By Cornell University
-
Process Firewalls: Protecting Processes During Resource Access
Processes retrieve a variety of resources from the operating system in order to execute properly, but adversaries have several ways to trick processes into retrieving resources of the adversaries' cho...
Provided By Association for Computing Machinery
-
Enhancing Network Security Using Ant Colony Optimization
Security of the information in the computer networks has been one of the most important research area. To preserve the secure condition it is essential to be aware of the behavior of the incoming data...
Provided By Global Journals
-
Digital Document Delivery and Management: Achieving Compliance, Security and Improved Patient Care
Healthcare IT News conducted a survey in January 2012 on behalf of the OpenText Fax and Document Distribution Group, the global market leader in fax and electronic document delivery solutions, to iden...
Provided By OpenText
-
Secure Optical Networks Based on Quantum Key Distribution and Weakly Trusted Repeaters
In this paper, the authors explore how recent technologies can improve the security of optical networks. In particular, they study how to use Quantum Key Distribution (QKD) in common optical network i...
Provided By Academy & Industry Research Collaboration Center
-
Case Study: QlikView Deployment for Big Data Analytics at King.com
Learn how King.com, a worldwide leader in online gaming, uses QlikView to analyze millions of rows of customer data every day.
Provided By QlikTech
-
In Control at Layer 2: a Tectonic Shift in Network Security
This paper analyses the threats to fibre optic Ethernet networks – both at the LAN and WAN level. Due to a number of known optical hacking methods, and several documented cases of corporate and govern...
Provided By senetas AU
-
Verifying Information Flow Properties of Hybrid Systems
With incidents such as Stuxnet attacking SCADA systems, the security of embedded control systems has come to the limelight. One of the most fundamental security properties is confidentiality, i.e., th...
Provided By Association for Computing Machinery
-
An Overview and Competitive Analysis of the One Time Password (OTP) Market
In the face of an ever-changing threat landscape and an increasingly dispersed workforce, one-time password (OTP) authentication -- even in its state of maturity -- continues to play an integral role ...
Provided By EMC
-
2013 Cisco Annual Security Report
Cybercriminals are taking advantage of the rapidly expanding attack surface found in today’s "any-to-any" world, where individuals are using any device to access business applications in a network env...
Provided By Cisco
-
Authentication that Addresses a Changing IT Environment
From mobile computing and the cloud, to diverse users and access points, to the polarizing trend of BYOD – today's changing IT environment presents organizations and users with more choices than ever ...
Provided By EMC
-
Miercom Lab Testing Summary Report
Cisco engaged Miercom to evaluate the performance of the newly launched ASA 5500-X Series of Adaptive Security Appliances against comparable products selected on the basis of intended markets and pric...
Provided By Cisco
-
KISS: "Key It Simple and Secure" Corporate Key Management
Deploying a corporate key management system faces fundamental challenges, such as fine-grained key usage control and secure system administration. None of the current commercial systems (either based ...
Provided By Carnegie Mellon University
-
Maximal Profit Service Task Partition and Allocation in Computer Grid Considering Service Reliability and Security
The paper considers grid computing systems in which the Resource Management Systems (RMS) divides a service tasks into Execution Blocks (EBs) and sends these blocks to different available resources. T...
Provided By JATIT
-
Enterprise Anti-Virus Protection - Analyst Report by Dennis Technology Labs
The results are in. Symantec Endpoint Protection rated best overall in total accuracy in independent, real-world tests recently published by Dennis Technology Labs.This report by Dennis Technology Lab...
Provided By Symantec
-
Secure End-to-End Communication with Optimal Throughput in Unreliable Networks
The authors demonstrate the feasibility of end-to-end communication in highly unreliable networks. Modeling a network as a graph with vertices representing nodes and edges representing the links betwe...
Provided By Cornell University
-
Data-Base Security Using Different Techniques: A Survey
In many organizations, Database Security plays an important issue for their safe & secure environment. Performance of the organization or any enterprise should depend on Database Security, i.e. Inside...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Secure Multi Party Computation For Participating Parties
Internet and distributed computer provides joint computations. SMC is a mechanism is used for joint computations in distributed environment. It can be defined as, to provide computations in a secure m...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Is Your Network Ready for Threat Defense?
Dramatic network changes, such as BYOD and cloud computing, have significantly increased risk while also changing how and where security is deployed in the network. Most organizations have security bu...
Provided By Cisco
-
Is Your Network Ready for Threat Defense?
Dramatic network changes, such as BYOD and cloud computing, have significantly increased risk while also changing how and where security is deployed in the network. Most organizations have security bu...
Provided By Cisco
-
Cisco ASA CX delivers context-aware security
The 'appification' of the web and the consumerization of IT are radically changing the enterprise security landscape. The security apparatus at today’s enterprises needs to be aware not only of applic...
Provided By Cisco
-
Good for security, good for business
Cyber threats continue to increase. Criminals are getting smarter, but when it comes to small businesses they are getting an easy ride. Symantec's 2012 National Small Business Study found that 83% of ...
Provided By Symantec
-
Transmission Network Expansion with Transmission Loading Relief
Transmission planning should seek to maintain or improve system security over time and facilitate robust wholesale power markets by improving transmission capacity for bulk power transfers across wide...
Provided By Interscience Open Access Journals
-
Gartner reveals the key players in Next-Generation Network IPS
Enterprises face an increasingly complex and dangerous barrage of security threats. Every time you upgrade your defences a new attack counters your efforts. View this on-demand video and learn how Gar...
Provided By AU: McAfee
-
Design, Implementation and Verification of an EXtensible and Modular Hypervisor Framework
The authors present the design, implementation, and verification of XMHF - an eXtensible and Modular Hypervisor Framework. XMHF is designed to achieve three goals - modular extensibility, automated ve...
Provided By Carnegie Mellon University
-
Legal Protection in the Field of Information Technology in the EU
Information and Communication Technologies (ICTs) are increasingly intertwined in the authors' daily activities. Some of these ICT systems, services, networks and infrastructures (in short, ICT infras...
Provided By NORTH ATLANTIC UNIVERSITY UNION
-
A Non-Secure Information Systems and the Isolation Solution
In this paper, the authors define intrusion confinement through isolation to address such security issue, its importance and finally present an isolation protocol. Security has emerged as the biggest ...
Provided By NORTH ATLANTIC UNIVERSITY UNION
-
Open-Source Security Solution for False Antiviruses Removing
One of the goals of existing strategies in companies and organizations regarding the security of information systems is to protect computer networks against attacks caused by viruses. For detection, a...
Provided By NORTH ATLANTIC UNIVERSITY UNION
-
Secure and Privacy-Preserving, Timed Vehicular Communications
The authors consider the problem of privacy (anonymity) and security in vehicular (V2V) communication, in particular securing routine safety messages. Traditional public key mechanisms are not appropr...
Provided By Ionian University
-
A Harmonical Model for Approximating the Identity in Min-Plus Convolution
Min-plus convolution is an algebra system that has applications to computer networks. Mathematically, the identity of min-plus convolution plays a key role in theory. On the other hand, the mathematic...
Provided By NORTH ATLANTIC UNIVERSITY UNION
-
Password Strength: An Empirical Analysis
It is a well known fact that user-chosen passwords are somewhat predictable: by using tools such as dictionaries or probabilistic models, attackers and password recovery tools can drastically reduce t...
Provided By EURECOM
-
Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments
The exchange of user-related sensitive data within a Pervasive Computing Environment (PCE) raises security and privacy concerns. On one hand, service providers require user authentication and authoriz...
Provided By Ionian University
-
High Rate Data Hiding in ACELP Speech Codecs
A new method for hiding digital data in the bit-stream of an ACELP speech codec is proposed in this paper. The key element of the authors' method is an alternative search strategy for the ACELP codebo...
Provided By Institute of Electrical & Electronic Engineers
-
False Data Injection Attacks with Incomplete Information Against Smart Power Grids
False data injection attacks have recently been introduced as an important class of cyber attacks against smart grid's wide area measurement and monitoring systems. These attacks aim to compromise the...
Provided By Institute of Electrical & Electronic Engineers
-
Accuracy and Power Consumption Tradeoffs in Video Rate Adaptation for Computer Vision Applications
This paper analyzes and compares the rate-accuracy and rate-energy characteristics of various video rate adaptation techniques in computer vision applications. The analyzed rate adaptation techniques ...
Provided By Institute of Electrical & Electronic Engineers
-
Learning Boltzmann Distance Metric for Face Recognition
The authors introduce a new method for face recognition using a versatile probabilistic model known as Restricted Boltzmann Machine (RBM). In particular, they propose to regularise the standard data l...
Provided By Institute of Electrical & Electronic Engineers
-
Rule Mode Selection in Intrusion Detection and Prevention Systems
Protection and performance are the major requirements for any Intrusion Detection and/or Prevention System (IDPS). Existing IDPSs do not seem to provide a satisfactory method of achieving these two co...
Provided By Institute of Electrical & Electronic Engineers
-
A Distributed Sequential Algorithm for Collaborative Intrusion Detection Networks
Collaborative intrusion detection networks are often used to gain better detection accuracy and cost efficiency as compared to a single host-based Intrusion Detection System (IDS). Through cooperation...
Provided By Institute of Electrical & Electronic Engineers
-
Characterization and Solution to a Stateful IDS Evasion
Stateful Intrusion Detection Systems (IDSs) use stateful signatures to simulate the behavior of the application protocol they are protecting and to identify malicious behavior. However, due to complex...
Provided By Institute of Electrical & Electronic Engineers
-
P2P-AIS: A P2P Artificial Immune Systems Architecture for Detecting DDoS Flooding Attacks
The Human Immune System (HIS) plays an important role in protecting the human body from various intruders ranging from naive germs to the most sophisticated viruses. It acts as an Intrusion Detection ...
Provided By Institute of Electrical & Electronic Engineers
-
Applying Kernel Methods to Anomaly Based Intrusion Detection Systems
Intrusion detection systems constitute a crucial cornerstone in securing computer networks especially after the recent advancements in attacking techniques. IDSes can be categorized according to the n...
Provided By Institute of Electrical & Electronic Engineers
-
Alert Prioritization in Intrusion Detection Systems
Intrusion Detection Systems (IDSs) are designed to monitor user and/or network activity and generate alerts whenever abnormal activities are detected. The number of these alerts can be very large; mak...
Provided By Institute of Electrical & Electronic Engineers
-
Large In-Memory Cyber-Physical Security-Related Analytics Via Scalable Coherent Shared Memory Architectures
Cyber-physical security-related queries and analytics run on traditional relational databases can take many hours to return. Furthermore, programming analytics on distributed databases requires great ...
Provided By Institute of Electrical & Electronic Engineers
-
Optimizing the Rekeying Cost for Contributory Group Key Agreement Schemes
Although a contributory group key agreement is a promising solution to achieve access control in collaborative and dynamic group applications, the existing schemes have not achieved the performance lo...
Provided By Institute of Electrical & Electronic Engineers
-
Risk-Distortion Analysis for Video Collusion Attack
Collusion attack is a cost-effective attack against digital fingerprint. To develop an efficient collusion-resistant fingerprint scheme, it is very important for the detector to study the behavior of ...
Provided By Institute of Electrical & Electronic Engineers
-
Optimal Power Allocation Strategy Against Jamming Attacks Using the Colonel Blotto Game
Cognitive radio technologies have become a promising approach to increase the efficiency of spectrum utilization. Although cognitive radio has been intensively studied in recent years, only a few work...
Provided By Institute of Electrical & Electronic Engineers
-
A New Anonymity Measure Based on Partial Entropy
With the development of Internet applications, a number of anonymous communication systems have been realized to protect the identity of communication participants. Therefore, it is essential to give ...
Provided By Institute of Electrical & Electronic Engineers
-
A New Development of Symmetric Key Cryptosystem
Security issues have become a main concern modern life. A powerful cryptosystem has to be practical, secure and able to be implemented on different platforms. The goal of this paper is to develop a ba...
Provided By Institute of Electrical & Electronic Engineers
-
Differentiating Data Security and Network Security
Data security, since antiquity, relies on cryptography. Cryptography is as good as the inability of a person or a computing machine to "Break" the generated cipher code. It has been demonstrated that ...
Provided By Institute of Electrical & Electronic Engineers
-
Page Ranking Algorithms for Web Mining
As the web is growing rapidly, the users get easily lost in the web's rich hyper structure. The primary goal of the web site owner is to provide the relevant information to the users to fulfill their ...
Provided By Institute of Electrical & Electronic Engineers
-
Side-Channel Analysis of Grostl and Skein
This paper provides a detailed study of two finalists of the SHA-3 competition from the side-channel analysis point of view. For both functions when used as a MAC, this paper presents detected strateg...
Provided By Institute of Electrical & Electronic Engineers
-
Per-Se Privacy Preserving Distributed Optimization
Distributed optimization is a fundamental mathematical theory for parallel and distributed systems. Several applications are normally designed based on such a theory, where parties cooperatively excha...
Provided By Institute of Electrical & Electronic Engineers
-
AT: An Origin Verification Mechanism Based on Assignment Track for Securing BGP
Due to the lack of the mechanism within BGP to verify the authority of an Autonomous System (AS) to announce Network Layer Reachable Information (NLRI), a specific IP prefix may be hijacked by a suspi...
Provided By Institute of Electrical & Electronic Engineers
-
NoTabNab: Protection Against the "Tabnabbing Attack"
In recent years phishing attacks have become one of the most important problems of online security. Aza Raskin, the creative lead of Mozilla Firefox team, proposed a new type of phishing attack, "Tabn...
Provided By Institute of Electrical & Electronic Engineers
-
Scalable and Efficient Approach for Secure Group Communication
Multicast is a scalable solution for group communication. In order to offer security for multicast applications, a group key has to be changed whenever a member joins or leaves the group. This incurs ...
Provided By Institute of Electrical & Electronic Engineers
-
Using Simple Relays to Improve Physical-Layer Security
This paper studies different uses of two cooperating relays to improve the secrecy rate of a wiretap channel. These two relays are assumed to perform only simple functions: either Amplify-and-Forward ...
Provided By Institute of Electrical & Electronic Engineers
-
Protecting Cloud Web Services From HX-DoS Attacks Using Decision Theory
With the coming of Cloud computing, web services provider are now looking to move their services over to it. Amazon EC2 is an example of such a provider. With this move over to the Cloud, cloud web se...
Provided By Institute of Electrical & Electronic Engineers
-
A Security Scheme of MISO Broadband System
To achieve the perfect physical layer security of the Multiple-Input Single-Output (MISO) broadband systems with a passive eavesdropper, the Random Beamforming Security (RBS) scheme is presented, wher...
Provided By Institute of Electrical & Electronic Engineers
-
On Secure Network Coding With Uniform Wiretap Sets
This paper shows determining the secrecy capacity of a unicast network with uniform wiretap sets is at least as difficult as the k-unicast problem. In particular, the authors show that a general k-uni...
Provided By Institute of Electrical & Electronic Engineers
-
Information-Theoretically Secure Three-Party Computation with One Active Adversary
A special three-party secure computation problem is studied in which one of three pairwise interacting parties is required to compute a function of the sequences held by the other two when one of the ...
Provided By Institute of Electrical & Electronic Engineers
-
A Two-Stage Deanonymization Attack Against Anonymized Social Networks
Digital traces left by users of online social networking services, even after anonymization, are susceptible to privacy breaches. This is exacerbated by the increasing overlap in user-bases among vari...
Provided By Institute of Electrical & Electronic Engineers
-
Effect of Stealthy Bad Data Injection on Network Congestion in Market Based Power System
In a smart grid, the strong coupling between cyber and physical operations makes power systems vulnerable to cyber attacks. Changing the traditional structure of power systems and integrating communic...
Provided By Institute of Electrical & Electronic Engineers
-
A Secure and Privacy-Preserving Communication Protocol for V2G Networks
The concept of Vehicle-To-Grid (V2G) is that Electric Vehicles (EVs) communicate with the smart grid to sell demand response services by delivering electricity into the grid. The operation of V2G netw...
Provided By Institute of Electrical & Electronic Engineers
-
FoSBaS: A Bi-Directional Secrecy and Collusion Resilience Key Management Scheme for BANs
Body Area Network (BAN) consists of various types of small physiological sensors, transmission modules and low computational components and can thus form an E-health solution for continuous all-day an...
Provided By Institute of Electrical & Electronic Engineers
-
Secure Diversity-Multiplexing Tradeoff of Zero-Forcing Transmit Scheme at Finite-SNR
In this paper, the authors address the finite Signal-to-Noise Ratio (SNR) Diversity-Multiplexing Tradeoff (DMT) of the Multiple Input Multiple Output (MIMO) wiretap channel, where a Zero-Forcing (ZF) ...
Provided By Institute of Electrical & Electronic Engineers