Results 41 to 50 of about 2,352,522 (144)
Patterns of information security postures for socio-technical systems and systems-of-systems [PDF]
This paper describes a proposal to develop patterns of security postures for computer based socio-technical systems and systems-of-systems.
Glisson, W., Renaud, K., Storer, T.
core
Future consumer mobile phone security: a case study using the data centric security model [PDF]
In the interconnected world that we live in, traditional security barriers are\ud broken down. Developments such as outsourcing, increased usage of mobile\ud devices and wireless networks each cause new security problems.\ud To address the new security ...
Cleeff, Andre van
core +5 more sources
The integration of the Internet of Vehicles (IoV) and low-orbit satellite Internet not only increases the efficiency of traffic management but also contributes to the emergence of new cyberattacks.
Igor Anatolyevich Kalmykov +6 more
doaj +1 more source
Why We Cannot (Yet) Ensure the Cybersecurity of Safety-Critical Systems [PDF]
There is a growing threat to the cyber-security of safety-critical systems. The introduction of Commercial Off The Shelf (COTS) software, including Linux, specialist VOIP applications and Satellite Based Augmentation Systems across the aviation ...
Johnson, Christopher W.
core
Programming contests often employ automatic grading of solutions. Graders need to run potentially malicious code, which brings many security issues. We discuss various attacks on grading system security and suggest counter-measures.
openaire +1 more source
Complex Systems - Network Component Security of SCADA Systems
Over the past decade the complexity of industrial control systems (ICS) has been increasing rapidly. There are many reasons for this trend considering new technologies that offer a higher level of control and integration. In addition to that, the amount of data generated during the control of the industrial process is growing rapidly, which further ...
Šverko, Mladen, Galinac Grbac, Tihana
openaire +3 more sources
Interpreting the management of information systems security [PDF]
The management of adverse events within organisations has become a pressing issue as the perceptions of risk continue to heighten. However the basic need for developing secure information systems has remained unfulfilled.
Dhillon, Gurpreet
core
An Authorship Protection Technology for Electronic Documents Based on Image Watermarking
In the field of information technology, information security technologies hold a special place. They ensure the security of the use of information technology.
Anna Melman +2 more
doaj +1 more source
Fast Multiple Fault Detection and Exclusion (FM-FDE) Algorithm for Standalone GNSS Receivers
Numerous applications and devices use Global Navigation Satellite System (GNSS)-provided position, velocity and time (PVT) information. However, unintentional interference and malicious attacks render GNSS-provided information unreliable.
Kewei Zhang, Panos Papadimitratos
doaj +1 more source
Designing and Operating Safe and Secure Transit Systems: Assessing Current Practices in the United States and Abroad, MTI Report 04-05 [PDF]
Public transit systems around the world have for decades served as a principal venue for terrorist acts. Today, transit security is widely viewed as an important public policy issue and is a high priority at most large transit systems and at smaller ...
Cavanagh, Ellen +7 more
core +1 more source

