Results 31 to 40 of about 2,352,522 (144)

A Security Framework for Systems of Systems

open access: yes2011 IEEE International Symposium on Policies for Distributed Systems and Networks, 2011
Systems of systems consist of a wide variety of dynamic, distributed coalitions of autonomous and heterogeneous systems that collaborate to achieve a common goal. While offering several advantages in terms of scalability and flexibility, this new paradigm has a strong impact on system interoperability and on the security requirements of collaborating ...
Trivellato, Daniel   +2 more
openaire   +3 more sources

Resource Analysis of the Log Files Storage Based on Simulation Models in a Virtual Environment

open access: yesApplied Sciences, 2021
In order to perform resource analyses, we here offer an experimental stand on virtual machines. The concept of how to measure the resources of each component is proposed.
Shamil Magomedov   +2 more
doaj   +1 more source

EPHOS Security Procurement of secure open systems [PDF]

open access: yes, 1996
This paper outlines the approach taken in the security module of the European Handbook for Procurement of Open Systems (EPHOS). EPHOS is a European Commission led development of a suite of handbooks for the procurement of open system services such as data communications, messaging, directories, EDI and operating systems.
N. H. Pope, J. G. Ross
openaire   +1 more source

Security-Minded Verification of Space Systems [PDF]

open access: yes2020 IEEE Aerospace Conference, 2020
Modern space systems are increasing in complexity. The advent of the Internet of Space Things, coupled with the commercialisation of space has resulted in an ecosystem that is difficult to control and brings about new security challenges. In such critical systems, it is common to conduct verification strategies to ensure that the underpinning software ...
Maple, Carsten   +6 more
openaire   +2 more sources

Ensuring Cyber-Security in Smart Railway Surveillance with SHIELD [PDF]

open access: yes, 2017
Modern railways feature increasingly complex embedded computing systems for surveillance, that are moving towards fully wireless smart-sensors. Those systems are aimed at monitoring system status from a physical-security viewpoint, in order to detect ...
DELLI PRISCOLI, Francesco   +6 more
core   +1 more source

Generation of an EDS Key Based on a Graphic Image of a Subject’s Face Using the RC4 Algorithm

open access: yesInformation, 2021
Modern facial recognition algorithms make it possible to identify system users by their appearance with a high level of accuracy. In such cases, an image of the user’s face is converted to parameters that later are used in a recognition process.
Alexey Semenkov   +4 more
doaj   +1 more source

Web development evolution: the assimilation of web engineering security [PDF]

open access: yes, 2005
In today’s e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security issues.
Glisson, W.B., Welland, R.
core   +1 more source

Adversarial Attacks Impact on the Neural Network Performance and Visual Perception of Data under Attack

open access: yesInformation, 2022
Machine learning algorithms based on neural networks are vulnerable to adversarial attacks. The use of attacks against authentication systems greatly reduces the accuracy of such a system, despite the complexity of generating a competitive example.
Yakov Usoltsev   +4 more
doaj   +1 more source

COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities

open access: yesDigital Communications and Networks, 2023
Although cyber technologies benefit our society, there are also some related cybersecurity risks. For example, cybercriminals may exploit vulnerabilities in people, processes, and technologies during trying times, such as the ongoing COVID-19 pandemic ...
Heba Saleous   +6 more
doaj   +1 more source

Developing a New Collision-Resistant Hashing Algorithm

open access: yesMathematics, 2022
Today, cryptographic hash functions have numerous applications in different areas. At the same time, new collision attacks have been developed recently, making some widely used algorithms like SHA-1 vulnerable and unreliable.
Larissa V. Cherckesova   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy