Results 21 to 30 of about 922,831 (255)
Model-Driven Cyber Range Training: A Cyber Security Assurance Perspective [PDF]
Security demands are increasing for all types of organisations, due to the ever-closer integration of computing infrastructures and smart devices into all aspects of the organisational operations.
Fysarakis, K.+3 more
core +1 more source
Picking battles: The impact of trust assumptions on the elaboration of security requirements [PDF]
This position paper describes work on trust assumptions in the con-text of security requirements. We show how trust assumptions can affect the scope of the analysis, derivation of security requirements, and in some cases how functionality is realized. An
Haley, Charles B.+3 more
core +4 more sources
Reinforcing Security and Usability of Crypto-Wallet with Post-Quantum Cryptography and Zero-Knowledge Proof [PDF]
Crypto-wallets or digital asset wallets are a crucial aspect of managing cryptocurrencies and other digital assets such as NFTs. However, these wallets are not immune to security threats, particularly from the growing risk of quantum computing. The use of traditional public-key cryptography systems in digital asset wallets makes them vulnerable to ...
arxiv
The ubiquity of mobile computing devices in the workplace has created a vast landscape of opportunity in rural communities centered on the increased population access owing to the improved mobility. Healthcare workers are able to reach previously disconnected communities and homesteads to deliver health related services through the use of custom mobile
Kevin Tatenda Kativu, Dalenca Pottas
openaire +3 more sources
Do GANs leave artificial fingerprints?
In the last few years, generative adversarial networks (GAN) have shown tremendous potential for a number of applications in computer vision and related fields.
Gragnaniello, Diego+3 more
core +1 more source
THE IMPORTANCE OF PHYSICAL CULTURE IN EDUCATION OF STUDENTS
Introduction: physical health of a person is a natural state of an organism caused by normal functioning of all its organs and systems. It is an invaluable asset for the entire community.Training sessions in the discipline "Elective courses in physical ...
S. E. Volozhanin
doaj +1 more source
Enhancing security incident response follow-up efforts with lightweight agile retrospectives [PDF]
Security incidents detected by organizations are escalating in both scale and complexity. As a result, security incident response has become a critical mechanism for organizations in an effort to minimize the damage from security incidents.
Glisson, William Bradley+2 more
core +2 more sources
Towards Security Goals in Summative E-Assessment Security
The general security goals of a computer system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats.
Apampa, K.M, Argles, D, Wills, G.B
core +1 more source
Decentralized Cross-Blockchain Asset Transfers [PDF]
Today, several solutions for cross-blockchain asset transfers exist. However, these solutions are either tailored to specific assets or neglect finality guarantees that prevent assets from getting lost in transit. In this paper, we present a cross-blockchain asset transfer protocol that supports arbitrary assets and adheres to finality requirements ...
arxiv
Quantitative System-Level Security Verification of the IoV Infrastructure [PDF]
The Internet of Vehicles (IoV) equips vehicles with connectivity to the Internet and the Internet of Things (IoT) to support modern applications such as autonomous driving. However, the consolidation of complex computing domains of vehicles, the Internet, and the IoT limits the applicability of tailored security solutions.
arxiv