Results 31 to 40 of about 2,352,522 (144)
A Security Framework for Systems of Systems
Systems of systems consist of a wide variety of dynamic, distributed coalitions of autonomous and heterogeneous systems that collaborate to achieve a common goal. While offering several advantages in terms of scalability and flexibility, this new paradigm has a strong impact on system interoperability and on the security requirements of collaborating ...
Trivellato, Daniel +2 more
openaire +3 more sources
Resource Analysis of the Log Files Storage Based on Simulation Models in a Virtual Environment
In order to perform resource analyses, we here offer an experimental stand on virtual machines. The concept of how to measure the resources of each component is proposed.
Shamil Magomedov +2 more
doaj +1 more source
EPHOS Security Procurement of secure open systems [PDF]
This paper outlines the approach taken in the security module of the European Handbook for Procurement of Open Systems (EPHOS). EPHOS is a European Commission led development of a suite of handbooks for the procurement of open system services such as data communications, messaging, directories, EDI and operating systems.
N. H. Pope, J. G. Ross
openaire +1 more source
Security-Minded Verification of Space Systems [PDF]
Modern space systems are increasing in complexity. The advent of the Internet of Space Things, coupled with the commercialisation of space has resulted in an ecosystem that is difficult to control and brings about new security challenges. In such critical systems, it is common to conduct verification strategies to ensure that the underpinning software ...
Maple, Carsten +6 more
openaire +2 more sources
Ensuring Cyber-Security in Smart Railway Surveillance with SHIELD [PDF]
Modern railways feature increasingly complex embedded computing systems for surveillance, that are moving towards fully wireless smart-sensors. Those systems are aimed at monitoring system status from a physical-security viewpoint, in order to detect ...
DELLI PRISCOLI, Francesco +6 more
core +1 more source
Generation of an EDS Key Based on a Graphic Image of a Subject’s Face Using the RC4 Algorithm
Modern facial recognition algorithms make it possible to identify system users by their appearance with a high level of accuracy. In such cases, an image of the user’s face is converted to parameters that later are used in a recognition process.
Alexey Semenkov +4 more
doaj +1 more source
Web development evolution: the assimilation of web engineering security [PDF]
In today’s e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security issues.
Glisson, W.B., Welland, R.
core +1 more source
Machine learning algorithms based on neural networks are vulnerable to adversarial attacks. The use of attacks against authentication systems greatly reduces the accuracy of such a system, despite the complexity of generating a competitive example.
Yakov Usoltsev +4 more
doaj +1 more source
COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities
Although cyber technologies benefit our society, there are also some related cybersecurity risks. For example, cybercriminals may exploit vulnerabilities in people, processes, and technologies during trying times, such as the ongoing COVID-19 pandemic ...
Heba Saleous +6 more
doaj +1 more source
Developing a New Collision-Resistant Hashing Algorithm
Today, cryptographic hash functions have numerous applications in different areas. At the same time, new collision attacks have been developed recently, making some widely used algorithms like SHA-1 vulnerable and unreliable.
Larissa V. Cherckesova +3 more
doaj +1 more source

