Results 31 to 40 of about 760,777 (341)
N-Trans: Parallel Detection Algorithm for DGA Domain Names
Domain name generation algorithms are widely used in malware, such as botnet binaries, to generate large sequences of domain names of which some are registered by cybercriminals.
Cheng Yang+4 more
doaj +1 more source
Paradoxes in Information Security
In this article, we approach information security from a novel perspective as we examine its unintended ramifications and its paradoxes. Information security and cybersecurity are necessities of modern societies. Simply put, services that are based on information and communication technologies would not function without information security.
Jukka Vuorinen, Pekka Tetri
openaire +3 more sources
Secure physical layer network coding versus secure network coding [PDF]
Secure network coding realizes the secrecy of the message when the message is transmitted via noiseless network and a part of edges or a part of intermediate nodes are eavesdropped. In this framework, if the channels of the network has noise, we apply the error correction to noisy channel before applying the secure network coding.
arxiv +1 more source
Mathematical approximator based on basic spline approximation [PDF]
The article considers the problem of constructing a mathematical piecewise linear approximator based on approximation by basis splines. An algorithm has been developed designed to implement a class of special functions and create parallel ...
Turdimatov Mamirjon+5 more
doaj +1 more source
THE GENERATING RANDOM SEQUENCES WITH THE INCREASED CRYPTOGRAPHIC STRENGTH
Random sequences are used in various applications in construction of cryptographic systems or formations of noise-type signals. For these tasks there is used the program generator of random sequences which is the determined device. Such a generator, as a
Volodymyr Korchynskyi+3 more
doaj +1 more source
Information Security Games: A Survey [PDF]
We introduce some preliminaries about game theory and information security. Then surveying a subset of the literature, we identify opportunities for future research.
arxiv
The defintions of information and security; history of information security development
Taking into consideration its historical evolvement, it is evident that information security is not a new concept. Starting from the very moment of writing down the information, it presents by itself a data that can be protected, stolen, or destroyed.
openaire +3 more sources
Information Security Management [PDF]
Abstract Information security management is a very important issue for anyone working in the field of technology, or for anyone at risk of security breach, who understands the implications of these vulnerabilities. Many organizations are always on the constant threat of a security breach.
Santosh Yalamanchili+2 more
openaire +3 more sources
Influence Maximization with Priority in Online Social Networks
The Influence Maximization (IM) problem, which finds a set of k nodes (called seedset) in a social network to initiate the influence spread so that the number of influenced nodes after propagation process is maximized, is an important problem in ...
Canh V. Pham+4 more
doaj +1 more source
With the argument that society needs to have certain products and / or services, the constituted powers create public bodies that are properly structured to act in a certain line of activity, such as education, security, health, social welfare, etc. In this way, they provide products and / or services directly to the population, who pay for them by ...
openaire +1 more source