Results 21 to 30 of about 922,831 (255)

Model-Driven Cyber Range Training: A Cyber Security Assurance Perspective [PDF]

open access: yes, 2020
Security demands are increasing for all types of organisations, due to the ever-closer integration of computing infrastructures and smart devices into all aspects of the organisational operations.
Fysarakis, K.   +3 more
core   +1 more source

Picking battles: The impact of trust assumptions on the elaboration of security requirements [PDF]

open access: yes, 2003
This position paper describes work on trust assumptions in the con-text of security requirements. We show how trust assumptions can affect the scope of the analysis, derivation of security requirements, and in some cases how functionality is realized. An
Haley, Charles B.   +3 more
core   +4 more sources

Reinforcing Security and Usability of Crypto-Wallet with Post-Quantum Cryptography and Zero-Knowledge Proof [PDF]

open access: yesarXiv, 2023
Crypto-wallets or digital asset wallets are a crucial aspect of managing cryptocurrencies and other digital assets such as NFTs. However, these wallets are not immune to security threats, particularly from the growing risk of quantum computing. The use of traditional public-key cryptography systems in digital asset wallets makes them vulnerable to ...
arxiv  

A Community Assets Infrastructure for the Secure Use of Mobile Computing Devices in the Rural Health Landscape

open access: yes, 2016
The ubiquity of mobile computing devices in the workplace has created a vast landscape of opportunity in rural communities centered on the increased population access owing to the improved mobility. Healthcare workers are able to reach previously disconnected communities and homesteads to deliver health related services through the use of custom mobile
Kevin Tatenda Kativu, Dalenca Pottas
openaire   +3 more sources

Do GANs leave artificial fingerprints?

open access: yes, 2018
In the last few years, generative adversarial networks (GAN) have shown tremendous potential for a number of applications in computer vision and related fields.
Gragnaniello, Diego   +3 more
core   +1 more source

THE IMPORTANCE OF PHYSICAL CULTURE IN EDUCATION OF STUDENTS

open access: yesВестник Мининского университета, 2018
Introduction: physical health of a person is a natural state of an organism caused by normal functioning of all its organs and systems. It is an invaluable asset for the entire community.Training sessions in the discipline "Elective courses in physical ...
S. E. Volozhanin
doaj   +1 more source

Enhancing security incident response follow-up efforts with lightweight agile retrospectives [PDF]

open access: yes, 2017
Security incidents detected by organizations are escalating in both scale and complexity. As a result, security incident response has become a critical mechanism for organizations in an effort to minimize the damage from security incidents.
Glisson, William Bradley   +2 more
core   +2 more sources

Towards Security Goals in Summative E-Assessment Security

open access: yes, 2009
The general security goals of a computer system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats.
Apampa, K.M, Argles, D, Wills, G.B
core   +1 more source

Decentralized Cross-Blockchain Asset Transfers [PDF]

open access: yesarXiv, 2020
Today, several solutions for cross-blockchain asset transfers exist. However, these solutions are either tailored to specific assets or neglect finality guarantees that prevent assets from getting lost in transit. In this paper, we present a cross-blockchain asset transfer protocol that supports arbitrary assets and adheres to finality requirements ...
arxiv  

Quantitative System-Level Security Verification of the IoV Infrastructure [PDF]

open access: yesarXiv, 2021
The Internet of Vehicles (IoV) equips vehicles with connectivity to the Internet and the Internet of Things (IoT) to support modern applications such as autonomous driving. However, the consolidation of complex computing domains of vehicles, the Internet, and the IoT limits the applicability of tailored security solutions.
arxiv  

Home - About - Disclaimer - Privacy