A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Survey on Future Internet Security Architectures
2016
IEEE Access
In order to obtain a thorough knowledge of security in future Internet architecture, we review a number of well-known projects, including named data networking, Content Aware Searching Retrieval and sTreaming ...
These projects aim to move away from the traditional host-centric networks and replace them with content-centric, mobilitycentric, or service-centric networks. ...
Content-centric networks even do not involve the addresses of the source and destination and just specify data names. ...
doi:10.1109/access.2016.2596705
fatcat:ny3dd4naaref7ktsmu32xzosbe
Security education within the IT curriculum
2003
Proceeding of the 4th conference on Information technology education - CITC '03
All of the respondents to this study felt that they needed to increase the amount of security content in their IT programs. ...
This study is designed to gain a better understanding of the extent to which IT programs and the interest areas within them have changed to include a greater security component, and the means by which ...
Networking and System Administration: Following the paradigm that much of security is keeping the bad guys out at the perimeter the Networking and System Administration group has taken the need to include ...
doi:10.1145/947121.947179
dblp:conf/sigite/BorderH03
fatcat:5s4p3shimzctllqin4463dhu2i
Secure Scuttlebutt
2019
Proceedings of the 6th ACM Conference on Information-Centric Networking - ICN '19
We also provide a comparison with Named Data Networking (NDN), an existing information-centric networking architecture, to motivate a larger exploration of the design space for information-centric networking ...
Secure Scuttlebutt (SSB) is a novel peer-to-peer event-sharing protocol and architecture for social apps. ...
COMPARING SSB WITH NAMED DATA NETWORKING (NDN) In this section, after a brief introduction to NDN
Named Data Networking NDN is an evolution of the Content-Centric Networking proposal that was publicly ...
doi:10.1145/3357150.3357396
dblp:conf/acmicn/TarrLMT19
fatcat:aekfffnurnci3psc7sc7bl7u4u
Ethics of Security
[chapter]
2021
Advances in Information Security, Privacy, and Ethics
This chapter aims to identify and analyse the ethical problems of security, particularly cyber and digital threats. The concepts of security and safety are defined based on existing literature. ...
The chapter addresses the key results and research gaps in the field (i.e., security issues in different areas) and future challenges, both theoretical and empirical. ...
Human-centric cyber security focuses on how an end-user interacts with data and extends security controls into all data systems. ...
doi:10.4018/978-1-7998-4117-3.ch004
fatcat:p54rb2nfkffctjgjenktaqyb4y
Trust Metric based Soft Security in Mobile Pervasive Environment
2014
International Journal of Computer Network and Information Security
In the vision of pervasive computing where mobile applications are growing immensely with the potential of low cost, high performance, and user centric solutions. ...
Despite advances in the technology, there is still a lack of methods to measure the security and level of trust and framework for the assessment and calculation of the degree of the trustworthiness. ...
states that trusting behavior occurs when an individual (node) perceives an ambiguous path, the result of which could be good or bad, and the occurrence of the good or bad result is contingent on the ...
doi:10.5815/ijcnis.2014.10.08
fatcat:ufhtyz33rnclvlxt64rwpcxdae
Semantic Insecurity: Security and the Semantic Web
2017
International Semantic Web Conference
Strangely enough, the Semantic Web has fallen behind the rest of the Web in terms of security. ...
TLS is not in use currently for the majority of URIs on the Semantic Web, and this leads to a number of potential attacks on the network, web, and even semantic level. ...
Acknowledgments This work is funded in part by the European Commission H2020 European Commission through the NEXTLEAP Project (Grant No. 6882). ...
dblp:conf/semweb/Halpin17
fatcat:px35zugik5abjpbwhmvusoeqyq
Improving security in data-centric storage for wireless sensor networks
2013
Proceedings of the 10th ACM symposium on Performance evaluation of wireless ad hoc, sensor, & ubiquitous networks - PE-WASUN '13
WSN, Data-Centric Storage (DCS), Security. ...
This paper proposes a novel mechanism to provide with se-curity to existing Data-Centric Storage (DCS) solutions for Wireless Sensor Networks. ...
The research leading to these results has been partially funded by the Spanish MEC under the CRAMNET project (TEC2012-38362-C03-01) and by the General Directorate of Universities and Research of the Regional ...
doi:10.1145/2507248.2507252
dblp:conf/pe-wasun/CuevasB13
fatcat:jukvr7iwkjdjhbfoo4lan7lloa
Applications of social network analysis in behavioural information security research: Concepts and empirical analysis
2017
Computers & security
& Security (2017), http://dx.doi.org/Abstract: The rapid digital transformation and technological disruption in modern organisations demand the development of people-centric security workplaces, whereby ...
the employees can build up their security awareness and accountability for their actions via participation in the organisation's social networks. ...
Applications of SNA in preventing violations and malware outbreak In behavioural security research, good and bad security behaviours are of equal importance. ...
doi:10.1016/j.cose.2017.03.010
fatcat:nzv7shoa3bfghclqhfzyxwwcii
Patterns and Interactions in Network Security
[article]
2020
arXiv
pre-print
Although cryptographic protocols hide the data contents of packets, they cannot hide packet headers. ...
This article is a concise tutorial on the large subject of networks and security, written for all those interested in networking, whether their specialty is security or not. ...
party we consider good or bad. ...
arXiv:1912.13371v2
fatcat:qfhdtj2pi5cmjk67h2gq53vzem
Improving Smartphone Security and Reliability
2017
Journal of Interconnection Networks (JOIN)
Next, we present several security applications of our infrastructure: a permission evolution study on the Android ecosystem; understanding and quantifying the risk posed by URL accesses in benign and malicious ...
Users are increasingly relying on smartphones, hence concerns such as mobile app security, privacy, and correctness have become increasingly pressing. ...
Research was sponsored by the Army Research Laboratory and was accomplished under Cooperative Agreement Number W911NF-13-2-0045 (ARL Cyber Security CRA). ...
doi:10.1142/s0219265917400023
fatcat:yq7yda6d4ras7a75jr33mzm3la
Distributed Systems Security Knowledge Area
[article]
2019
Zenodo
Consequently, distributed systems security [...] ...
These include (a) data flows across the collection of authorised inputs (regulated via Access/Admission Control), (b) transportation of the data to/across the distributed resources (Data Transport functionality ...
The security issues requires dealing with data-at-rest (static storage) and data-in-transit (dynamic R/W ops). ...
doi:10.5281/zenodo.3941852
fatcat:ag6uugbkybg65iacezz6yjmemq
Self-aware Services of NGSDP: Using Bayesian Networks for Measuring Quality of Convergent Services
2011
Journal of Internet Services and Information Security
The resultant probabilistic assessment can be transported via network protocols in the convergent services and it enables non-hierarchical communications about the quality of service elements. ...
The quality engine combines domain independent statistical analysis and probabilistic reasoning technology (Bayesian networks) with domain dependent measurement collection and evaluation methods. ...
The measurement name has the form MMS.MM4readRESsnt.
Journal of Internet Services and Information Security, volume: 1, number: 1, pp. 46-58 ...
doi:10.22667/jisis.2011.05.31.046
dblp:journals/jisis/LuoWZ11
fatcat:nexlofrusra5ffvq4yd25vkciu
User, Usage and Usability: Redefining Human Centric Cyber Security
2021
Frontiers in Big Data
In this paper, we survey advancements made in the development and design of the human centric cyber security domain. ...
The aim of this survey is to provide both users and system designers with insights into the workings and applications of human centric cyber security. ...
To this end, Giacobe and Xu (2011) proposed a visualization tool for network security using GeoViz. The idea is to divide the whole IT network into zones and visualise the log data based on zones. ...
doi:10.3389/fdata.2021.583723
pmid:33748750
pmcid:PMC7968726
fatcat:y4aztmzsfjbzpfpiroomhmuhjm
Qualitative and Quantitative Results of Enterprise Security Visualization Requirements Analysis through Surveying
2019
Proceedings of the 14th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications
In order to find gaps or missing points in any domain, examination of the literature work is necessary and provides a good amount of information. ...
In this work, a security visualization requirement analysis survey with 30 information security experts is done. The paper presents the qualitative and quantitative results of this survey. ...
as the network traffic data. ...
doi:10.5220/0007255401750182
dblp:conf/grapp/SonmezG19
fatcat:d4fps3eghnfxrke7k3d2qc4e24
SETUCOM: Secure and Trustworthy Context Management for Context-Aware Security and Privacy in the Internet of Things
2021
Security and Communication Networks
It secures context information exchange by using a lightweight hybrid encryption system adapted to IoT devices and manages trust through artificial intelligence techniques such as Bayesian networks and ...
Research studies on context-aware security and privacy focus on security and privacy mechanisms' implementation but do not consider the secure and trustworthy context management. ...
Conflicts of Interest e authors declare that there are no conflicts of interest regarding the publication of this paper. ...
doi:10.1155/2021/6632747
doaj:a40f52a87a864ecf8981de6a4cf7c65f
fatcat:y63ffv44qzccdgrpwihup3ijka
« Previous
Showing results 1 — 15 out of 9,947 results