Results 41 to 50 of about 1,916,317 (370)
Coded Computing for Secure Boolean Computations [PDF]
The growing size of modern datasets necessitates splitting a large scale computation into smaller computations and operate in a distributed manner. Adversaries in a distributed system deliberately send erroneous data in order to affect the computation for their benefit.
Chien-Sheng Yang, A. Salman Avestimehr
openaire +3 more sources
Keamanan pada Grid Computing~Survey Paper
Grid computing provides high computing power, enormous data storage, and collaboration possibilities to its users. Grid computing is currently in the midst of evolving standards, inheriting and customizing from those developed in the high performance ...
Ghufran Ibnu Yasa
doaj +1 more source
Serverless computing: a security perspective
AbstractIn this article we review the current serverless architectures, abstract and categorize their founding principles, and provide an in-depth security analysis. In particular, we: show the security shortcomings of the analyzed serverless architectural paradigms; point to possible countermeasures; and, highlight several research directions for ...
Marin, Eduard+2 more
openaire +3 more sources
Proposed Method to Enhance the Security of Blowfish Algorithm [PDF]
The selective application of technological and related procedural safeguards is an important responsibility of every organization in providing adequate security to its electronic data systems.
Shaimaa H. Shaker
doaj +1 more source
YOLOAL: Focusing on the Object Location for Detection on Drone Imagery
Object detection in drone-captured scenarios, which can be considered as a task of detecting dense small objects, is still a challenge. Drones navigate at different altitudes, causing significant changes in the size of the detected objects and posing a ...
Xinting Chen+4 more
doaj +1 more source
On the Equivalence of Two Security Notions for Hierarchical Key Assignment Schemes in the Unconditional Setting [PDF]
The access control problem in a hierarchy can be solved by using a hierarchical key assignment scheme, where each class is assigned an encryption key and some private information. A formal security analysis for hierarchical key assignment schemes has been traditionally considered in two different settings, i.e., the unconditionally secure and the ...
arxiv +1 more source
Neural network based single index evaluation for SQL injection attack detection in health care data
In recent years, there are a lot of security risks in the network, and there is the combination intersection between the computer network security problems and security evaluation.
N. Nagabhooshanam+4 more
doaj
Some Fundamental Cybersecurity Concepts
The results of successful hacking attacks against commercially available cybersecurity protection tools that had been touted as secure are distilled into a set of concepts that are applicable to many protection planning scenarios.
Kelce S. Wilson, Muge Ayse Kiy
doaj +1 more source
A Multi-Vocal Review of Security Orchestration [PDF]
Organizations use diverse types of security solutions to prevent cyberattacks. Multiple vendors provide security solutions developed using heterogeneous technologies and paradigms. Hence, it is a challenging rather impossible to easily make security solutions to work an integrated fashion. Security orchestration aims at smoothly integrating multivendor
arxiv +1 more source
Abstract Model Counting: A Novel Approach for Quantification of Information Leaks [PDF]
acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo theories, symbolic execution location: Kyoto, Japan numpages: 10acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo ...
ASIA CCS '14 Proceedings of the 9th ACM symposium on Information, computer and communications security+2 more
core +1 more source