Formal Analysis of QUIC Handshake Protocol Using Symbolic Model Checking
This work presents a security analysis of the QUIC handshake protocol based on symbolic model checking. As a newly proposed secure transport protocol, the purpose of QUIC is to improve the transport performance of HTTPS traffic and enable rapid ...
Jingjing Zhang +5 more
doaj +1 more source
Strategic deterrence: The key competences of the state bodies of the Republic of Serbia [PDF]
In the post-Cold War period, contemporary studies of strategic deterrence have expanded from traditional ones to contents that are much broader in terms of content and topics.
Blagojević Veljko, Radanović Tihomir
doaj +1 more source
Research on non-standard industrial control protocol formats reverse
Correct non-standard protocol format recognition is the foundation of protocol security analysis, which is an important part of industrial control system(ICS) information security content.
Cheng Bicheng +3 more
doaj +1 more source
RESEARCH FRAMEWORK FOR SYSTEM SECURITY OF TECHNOLOGICAL & INNOVATION SYSTEMS [PDF]
The purpose of this study is to consider the main aspects of system security theoretical concept and practical aspect within the technological & innovation systems research methodology development according to their considering as structurally ...
Olha Kudrina, Vitaliy Omelyanenko
doaj +1 more source
Security component of states’ stability on a national and international level [PDF]
The paper analyses the issue of political stability in the context of changes in the positions of major political actors. The altered role of the nation-state in the conditions of globalisation inevitably reflects on the understanding of the security ...
Žarko Obradović, Miroslav Mladenović
doaj +1 more source
OVERLOAD AND TRAFFIC MANAGEMENT OF MESSAGE SOURCES WITH DIFFERENT PRIORITY OF SERVICE
The scheme of dynamic management of traffic and activity of message sources with different priority of service is considered. The scheme is built on the basis of the neuroprognostic analysis model and the gradient descent method.
Valerii Kozlovskyi +4 more
doaj +1 more source
Quantifying Privacy Risks for Continuous Trait Data
In the context of life sciences, the rapid biotechnical development leads to the creation of huge amounts of biological data. The use of such data naturally brings concerns on human genetic privacy breaches, which also discourage biological data sharing.
Muqing He +5 more
doaj +1 more source
Cyberdomains in Ukrainian National Security System
The identification of cyber domains is of significant importance for national cybersecurity as it ensures the protection of critical infrastructure, enhances the effectiveness of cyber threat intel-ligence processes, improves situational awareness, promotes cooperation in the field of cyber-security, information exchange, efficient response to cyber ...
A.V. Davydiuk, Yu.Ye. Khokhlacheva
openaire +1 more source
Reviving egalitarianism in the Global Transformation: Building occupational security [PDF]
The world is in the midst of a Global Transformation, reflecting the painful creation of a global market society. Globalization was the disembedded phase, in which inequalities and insecurities multiplied as national systems of regulation, social ...
Standing, Guy
core +1 more source
Information Security in the National Security System in the Modem Age
This article provides a legal analysis of information security as a critical regulatory institution in the contemporary digital age. The relevance of this study lies in the recognition that information and its sources, along with their protective ...
Hussein Vakhaevich Idrisov
doaj +1 more source

