Results 41 to 50 of about 2,352,522 (144)

Patterns of information security postures for socio-technical systems and systems-of-systems [PDF]

open access: yes, 2012
This paper describes a proposal to develop patterns of security postures for computer based socio-technical systems and systems-of-systems.
Glisson, W., Renaud, K., Storer, T.
core  

Future consumer mobile phone security: a case study using the data centric security model [PDF]

open access: yes, 2008
In the interconnected world that we live in, traditional security barriers are\ud broken down. Developments such as outsourcing, increased usage of mobile\ud devices and wireless networks each cause new security problems.\ud To address the new security ...
Cleeff, Andre van
core   +5 more sources

Improvement of the Cybersecurity of the Satellite Internet of Vehicles through the Application of an Authentication Protocol Based on a Modular Error-Correction Code

open access: yesWorld Electric Vehicle Journal
The integration of the Internet of Vehicles (IoV) and low-orbit satellite Internet not only increases the efficiency of traffic management but also contributes to the emergence of new cyberattacks.
Igor Anatolyevich Kalmykov   +6 more
doaj   +1 more source

Why We Cannot (Yet) Ensure the Cybersecurity of Safety-Critical Systems [PDF]

open access: yes, 2016
There is a growing threat to the cyber-security of safety-critical systems. The introduction of Commercial Off The Shelf (COTS) software, including Linux, specialist VOIP applications and Satellite Based Augmentation Systems across the aviation ...
Johnson, Christopher W.
core  

Security of Grading Systems

open access: yesOLYMPIADS IN INFORMATICS, 2021
Programming contests often employ automatic grading of solutions. Graders need to run potentially malicious code, which brings many security issues. We discuss various attacks on grading system security and suggest counter-measures.
openaire   +1 more source

Complex Systems - Network Component Security of SCADA Systems

open access: yes2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), 2021
Over the past decade the complexity of industrial control systems (ICS) has been increasing rapidly. There are many reasons for this trend considering new technologies that offer a higher level of control and integration. In addition to that, the amount of data generated during the control of the industrial process is growing rapidly, which further ...
Šverko, Mladen, Galinac Grbac, Tihana
openaire   +3 more sources

Interpreting the management of information systems security [PDF]

open access: yes, 1995
The management of adverse events within organisations has become a pressing issue as the perceptions of risk continue to heighten. However the basic need for developing secure information systems has remained unfulfilled.
Dhillon, Gurpreet
core  

An Authorship Protection Technology for Electronic Documents Based on Image Watermarking

open access: yesTechnologies, 2020
In the field of information technology, information security technologies hold a special place. They ensure the security of the use of information technology.
Anna Melman   +2 more
doaj   +1 more source

Fast Multiple Fault Detection and Exclusion (FM-FDE) Algorithm for Standalone GNSS Receivers

open access: yesIEEE Open Journal of the Communications Society, 2021
Numerous applications and devices use Global Navigation Satellite System (GNSS)-provided position, velocity and time (PVT) information. However, unintentional interference and malicious attacks render GNSS-provided information unreliable.
Kewei Zhang, Panos Papadimitratos
doaj   +1 more source

Designing and Operating Safe and Secure Transit Systems: Assessing Current Practices in the United States and Abroad, MTI Report 04-05 [PDF]

open access: yes, 2005
Public transit systems around the world have for decades served as a principal venue for terrorist acts. Today, transit security is widely viewed as an important public policy issue and is a high priority at most large transit systems and at smaller ...
Cavanagh, Ellen   +7 more
core   +1 more source

Home - About - Disclaimer - Privacy