RSA authentication mechanisms in control grid computing environment using Gridsim toolkit [PDF]
There are security concerns when our sensitive data is placed in the third party infrastructure such as in the Grid Computing environment. As such, it is difficult to be assured that our data is in the safe hands.Thus, authentication has become the most
Ismail, Saiful Adli+4 more
core +2 more sources
A Mobile Ambients-based Approach for Network Attack Modelling and Simulation [PDF]
Attack Graphs are an important support for assessment and subsequent improvement of network security. They reveal possible paths an attacker can take to break through security perimeters and traverse a network to reach valuable assets deep inside the ...
Franqueira, Virginia Nunes Leal+2 more
core +5 more sources
Natural Hazards / Micro-sized enterprises: vulnerability to flash floods [PDF]
in dt. Sprache nicht verf\ufcgbarIn the framework of risk assessment for flash floods, vulnerability is a key concept to assess the susceptibility of elements at risk.
Fuchs, Sven+4 more
core +1 more source
ERMOCTAVE: A Risk Management Framework for IT Systems Which Adopt Cloud Computing
Many companies are adapting cloud computing technology because moving to the cloud has an array of benefits. During decision-making, having processed for adopting cloud computing, the importance of risk management is progressively recognized.
Masky Mackita+2 more
doaj +1 more source
Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE [PDF]
As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are ...
AS Sodiya+12 more
core +1 more source
Troubling Vulnerability: Designing with LGBT Young People's Ambivalence Towards Hate Crime Reporting [PDF]
HCI is increasingly working with ?vulnerable? people yet there is a danger that the label of vulnerability can alienate and stigmatize the people such work aims to support.
Briggs, J+4 more
core +2 more sources
DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments [PDF]
With the growing popularity of cloud computing, the exploitation of possible vulnerabilities grows at the same pace; the distributed nature of the cloud makes it an attractive target for potential intruders. Despite security issues delaying its adoption,
Joshi, JBD, Takabi, H, Zargar, ST
core +2 more sources
Coverage-oriented and target-oriented fuzzing are widely used in vulnerability detection. Compared with coverage-oriented fuzzing, target-oriented fuzzing concentrates more computing resources on suspected vulnerable points to improve the testing ...
Chen Chen, Han Xu, Baojiang Cui
doaj +1 more source
Introduction to Computer Network Vulnerabilities [PDF]
System vulnerabilities are weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network. Vulnerabilities exist not only in the hardware and software that constitute a computer system but also in policies and procedures, especially security policies and procedures,
openaire +2 more sources
Revisiting Employment Vulnerability Index Using Principal Component Analysis
The share of workers in vulnerable employment is directly linked to the share of people living in poverty. The statement recalls why understanding the employment vulnerability index (EVI) of a nation based on the present situations is very relevant.
Glecil Joy Dalupo, Gary Garcia
doaj +1 more source