Results 21 to 30 of about 462,961 (193)

The Security of IP-Based Video Surveillance Systems

open access: yesSensors, 2020
Over the last decade, video surveillance systems have become a part of the Internet of Things (IoT). These IP-based surveillance systems now protect industrial facilities, railways, gas stations, and even one’s own home.
Naor Kalbo   +3 more
doaj   +1 more source

Protecting SOME/IP Communication via Authentication Ticket

open access: yesSensors, 2023
Designed using vehicle requirements, Scalable service-Oriented MiddlewarE over IP (SOME/IP) has been adopted and used as one of the Ethernet communication standard protocols in the AUTomotive Open System Architecture (AUTOSAR).
Seulhui Lee, Wonsuk Choi, Dong Hoon Lee
doaj   +1 more source

METHODS FOR ENHANCING SECURITY IN IP TELEPHONY

open access: yesInformation and Telecommunication Sciences
Background. The widespread adoption of IP telephony in corporate and operator networks has led to an increased risk of cyber threats such as fraud, eavesdropping, service interruptions and unauthorised access.
Serhii Fedorov, Rina Novogrudskaya
doaj   +1 more source

Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2012
An overview of supervisory control and data acquisition (SCADA) systems is presented and relevant security concerns are addressed. To secure IP-based SCADA systems, it is vital to implement secure architectures which prevent access to the SCADA from ...
HyungJun Kim
doaj   +1 more source

Network architecture with intrinsic security

open access: yesDianxin kexue, 2019
IP network brings big benefits for human’s life by connecting most devices all over the world,but its security and privacy issues make people frustrating when using end to end communication.Without intrinsic security design of the network,it is difficult
Weiyu JIANG, Bingyang LIU, Chuang WANG
doaj   +2 more sources

An n-sided polygonal model to calculate the impact of cyber security events [PDF]

open access: yes, 2016
This paper presents a model to represent graphically the impact of cyber events (e.g., attacks, countermeasures) in a polygonal systems of n-sides. The approach considers information about all entities composing an information system (e.g., users, IP ...
F Cuppens   +6 more
core   +2 more sources

A survey on security analysis of machine learning-oriented hardware and software intellectual property

open access: yesHigh-Confidence Computing, 2023
Intellectual Property (IP) includes ideas, innovations, methodologies, works of authorship (viz., literary and artistic works), emblems, brands, images, etc. This property is intangible since it is pertinent to the human intellect. Therefore, IP entities
Ashraful Tauhid   +3 more
doaj   +1 more source

Cryptographically Secure Shield for Security IPs Protection [PDF]

open access: yesIEEE Transactions on Computers, 2016
Probing attacks are serious threats on integrated circuits. Security products often include a protective layer called shield that acts like a digital fence. In this article, we demonstrate a new shield structure that is cryptographically secure. This shield is based on the lightweight block cipher and independent mesh lines to ensure the security ...
Ngo, Xuan Thuy   +6 more
openaire   +2 more sources

SIM: a secure IP protocol for MANET

open access: yesTongxin xuebao, 2013
According to the core logic of IP Sec, a secure IP protocol was proposed for Mobile Ad Hoc network. Security deal to the packets in and out of the network protocol stack was done by adding a transparent secure layer between trans-port-layer and link ...
Rong-sen LI, Wen-hua DOU
doaj   +2 more sources

Complexity and Unwinding for Intransitive Noninterference [PDF]

open access: yes, 2013
The paper considers several definitions of information flow security for intransitive policies from the point of view of the complexity of verifying whether a finite-state system is secure. The results are as follows.
Eggert, Sebastian   +3 more
core  

Home - About - Disclaimer - Privacy