32,893 Hits in 3.8 sec

5G based Blockchain network for authentic and ethical keyword search engine

Poongodi M, Mohit Malviya, Mounir Hamdi, Vijayakumar V, Mazin Abed Mohammed, Hafiz Tayyab Rauf, Kawther A. Al‐Dhlan
2021 IET Communications  
One of the multiplexed real-time enterprise applications is a keyword search engine where the integrity of user data files and keyword searches are bound to come under cyber hackers.  ...  On the one hand, it was found that when a 5G-based blockchain emulated network gets deployed with intact encryption techniques, the entire system facilitates to give reliable, efficient, and risk-free  ...  CONCLUSION In this paper, we were successfully able to carry out a proposed 5G based blockchain network architecture for encrypted keyword search engine.  ... 
doi:10.1049/cmu2.12251 fatcat:hdhpiwzmprcv3grdk7oq4wh2vq

Facebook's Cyber–Cyber and Cyber–Physical Digital Twins

John Ahlgren, Kinga Bojarczuk, Sophia Drossopoulou, Inna Dvortsova, Johann George, Natalija Gucevska, Mark Harman, Maria Lomeli, Simon M. M. Lucas, Erik Meijer, Steve Omohundro, Rubmary Rojas (+2 others)
2021 Evaluation and Assessment in Software Engineering  
A cyber-cyber digital twin is a simulation of a software system. By contrast, a cyber-physical digital twin is a simulation of a nonsoftware (physical) system.  ...  Cyber-cyber digital twins can be twins of other cyber-cyber digital twins, leading to a hierarchy of twins.  ...  community.  ... 
doi:10.1145/3463274.3463275 fatcat:tx6bsam52jbofpxp5se34borni

Cyber reconnaissance techniques

Wojciech Mazurczyk, Luca Caviglione
2021 Communications of the ACM  
Another possible reconnaissance mechanism mixes the aforementioned technique for "Googling the Internet," that is, using search engines to gather information on endpoints involved in a communication without  ...  To this aim, two main techniques exist: challenge-based 36 and measurement-based. 37 n challenge-based methods, the defender provokes a reply from the (supposed) sniffing machine by using adhoc crafted  ... 
doi:10.1145/3418293 fatcat:sr2bgsg5nzetnlc6zndivy3gti

Cyber Security Countermeasures to Combat Cyber Terrorism [chapter]

Lachlan MacKinnon, Liz Bacon, Diane Gan, Georgios Loukas, David Chadwick, Dimitrios Frangiskatos
2013 Strategic Intelligence Management  
Search engines such as Google and Bing search through the text on Web pages to find what the user is looking for.  ...  How is Shodan different from other search engines that crawl the Web looking for data in Web pages?  ... 
doi:10.1016/b978-0-12-407191-9.00020-x fatcat:2isjzw2yifgalkqykyw6hhk6eu

Cyber Physical Vehical System

2017 International Journal of Recent Trends in Engineering and Research  
A cyber-physical system (CPS) is made up of tightly-integrated computation, communication and physical elements.  ...  A cyber-physical vehicle system (CPVS), which are ranging from automobile to aircraft and marine craft, is composed of tightly-coupled locomotion, computational and communication components.  ...  The planning layer typically requires combinatoric search to optimize a continuous, discrete or hybrid state-space based on goals, constraints and metrics.  ... 
doi:10.23883/ijrter.2017.3193.y7u0d fatcat:nj23rflcjza2ncuipllglhrzwy

Cyber Security and Analysis of Cyber-Crime Laws to Restrict Cyber Crime in Pakistan

Qamar Atta Ul Haq
2019 International Journal of Computer Network and Information Security  
It explores the challenges for Cyber security belongs to privacy and data protection.  ...  This research report analyses the plebeian interest and tension hostility between privacy and cyber security in Pakistan.  ...  The schedule discussion for cyber security of Pakistan is to search as entirely the interior or internal and extraneous or international community of interests admitting ICANN, APNIC, Internet social club  ... 
doi:10.5815/ijcnis.2019.01.06 fatcat:dgpfih72zreqrcw6xdrg7wbxnm

Cyber Crime- Techniques, Prevention and Cyber Insurance

Saba Shoukat et. al.
2018 International Journal of Computing and Network Technology  
With digital revolution, these criminals need not to commit the crime physically; rather they can reach every corner of the world virtually using a computer, internet and communication medium.  ...  This paper presents different types of cybercrimes like cyber extortion, cyber stalking etc.  ...  CYBER INSURANCE It is an insurance product used to protect businesses and individual users from Internet based risks.  ... 
doi:10.12785/ijcnt/060103 fatcat:j575axv6tndypiwkbcvg6gmiei

Attribution of Cyber Attacks [chapter]

Klaus-Peter Saalbach
2019 Information Technology for Peace and Security  
Again, it can be helpful to enter the cover name of a hacker into a search engine to get further clues.  ...  For domains and IP addresses, a so-called WHOIS registration exists, often simply available with free search engines.  ... 
doi:10.1007/978-3-658-25652-4_13 fatcat:bjmhfvcbyjavrbdfbnelbcpedq

V-model based development of cyber-physical systems and cyber-physical production systems

Iris Gräßler, Dominik Wiechel, Daniel Roesmann, Henrik Thiele
2021 Procedia CIRP  
Based on Datum Flow Chain, the physical structure of the products is analyzed. Functional subassemblies are identified, and a functional analysis is performed.  ...  Changes are primarily due to increased product complexity and the connection to the internet of things and services, enabling Cyber-Physical Systems (CPS) and Cyber-Physical Production Systems (CPPS).  ...  Based on the literature analysis the following search terms were used: "integrated product development", "simultaneous engineering", "concurrent engineering", "production system development", "cyber physical  ... 
doi:10.1016/j.procir.2021.05.119 fatcat:f4ik63qsczexfcwdajlifj57oa

Modeling Cyber Threat Intelligence

Siri Bromander, Morton Swimmer, Martin Eian, Geir Skjotskift, Fredrik Borg
2020 Proceedings of the 6th International Conference on Information Systems Security and Privacy  
The Emergence of CTI Exploring available search engine data shows that the term "cyber threat intelligence" has had growth since 2013, while "threat intelligence" has been searched for continuously, but  ...  It is possible to use descriptive logic to initialize a process of weak supervision and then a knowledge base drawn partially from the same description to serve as the supervisor for the ML engine.  ... 
doi:10.5220/0008875302730280 dblp:conf/icissp/BromanderSESB20 fatcat:han5vxdbpffhdnm7caoqy2ourm

Improving Cyber Security and Mission Assurance Via Cyber Preparedness (Cyber Prep) Levels

Deborah J. Bodeau, Richard Graubart, Jennifer Fabius-Greene
2010 2010 IEEE Second International Conference on Social Computing  
This paper provides recommendations on how to characterize an organization's cyber threat environment and identifies a number of defensive tools and techniques that will provide a solid start for improving  ...  The nature of cyber threats in general -and advanced cyber threats in particular -requires a longer-term commitment from senior leadership, including vision, strategy, and investment prioritization as  ...  Periodic open source searches and defensive adjustments for information.  ... 
doi:10.1109/socialcom.2010.170 dblp:conf/socialcom/BodeauGF10 fatcat:2lclhqxhhveqhm6bnjjs23yrmu

Cyber Physical Energy System

None Oladosu Samuel
2019 Zenodo  
Cyber Physical Energy System (CPES) are intelligent systems that allow us to add new capabilities to energy systems by integration of communication, computation, information and control.  ...  This paper presents some benefits, challenges and major faults introduced by incorporating cyber physical systems to energy systems.  ...  Study in CPES shows a remarkable prospect to develop projects in different areas of engineering.  ... 
doi:10.5281/zenodo.3562116 fatcat:2ofhmc7wanevxet4qiwo5jefci

Cyber Physical Energy System

Oladosu Samuel
2019 Zenodo  
Cyber Physical Energy System (CPES) are intelligent systems that allow us to add new capabilities to energy systems by integration of communication, computation, information and control.  ...  This paper presents some benefits, challenges and major faults introduced by incorporating cyber physical systems to energy systems.  ...  The structural design and proof in a CPES development is the key works. In this paper, a new Cyber-Physical System(CPS) is a future intelligent system based on the plan of network and rooted system.  ... 
doi:10.5281/zenodo.4422536 fatcat:brty532ocje5bbrghzamenot2q

The cyber arms race

Mikko Hypponen
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
Almost all of the common internet services, search engines, webmails, web browsers and mobile operating systems come from the USA.  ...  And when these people use US-based services, they are legally under surveillance.  ... 
doi:10.1145/2508859.2516756 dblp:conf/ccs/Hypponen13 fatcat:fjng5vwxxfemnlg5mifxwyegkm

Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence [article]

Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song
2021 arXiv   pre-print
query execution engine to search the big audit logging data.  ...  Log-based cyber threat hunting has emerged as an important solution to counter sophisticated attacks.  ...  OSCTI is a form of evidence-based knowledge and has received growing attention from the community, enabling companies and organizations to gain visibility into the fastevolving threat landscape [16] .  ... 
arXiv:2010.13637v2 fatcat:2dt52vj7a5fhbbwkb33jwwx7mu
« Previous Showing results 1 — 15 out of 32,893 results