45 Hits in 6.0 sec

Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-Agent Systems [article]

Jaime Arias, Carlos E. Budde, Wojciech Penczek, Laure Petrucci, Mariëlle Stoelinga
2019 arXiv   pre-print
Attack-Defence Trees (ADTs) are well-suited to assess possible attacks to systems and the efficiency of counter-measures.  ...  Then, ADTs are modelled as (an extension of) Asynchronous Multi-Agents Systems--EAMAS. The ADT-EAMAS transformation is performed in a systematic manner that ensures correctness.  ...  Definition 3 (Extended Asynchronous Multi-Agent Systems).  ... 
arXiv:1906.05283v1 fatcat:5o6eihxz2fdr7pcetpvxr3zseu

Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-agent Systems [chapter]

Jaime Arias, Carlos E. Budde, Wojciech Penczek, Laure Petrucci, Teofil Sidoruk, Mariëlle Stoelinga
2020 Lecture Notes in Computer Science  
. , l n Definition 3 (Extended Asynchronous Multi-Agent Systems) .  ...  AMAS Asynchronous Multi-Agent Systems (AMAS [17] ) are a modern semantic model for the study of agents' strategies in asynchronous systems.  ... 
doi:10.1007/978-3-030-63406-3_1 fatcat:x6prz4lpxfh6tnx34it7f56axm

Wireless Sensor Network Security

An Liu, Mihui Kim, Leonardo B. Oliveira, Hailun Tan
2013 International Journal of Distributed Sensor Networks  
The information in this document reflects only the author's views, is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose.  ...  The performance and security tradeoffs between resilient tree-based approaches and multi-path approaches such as Attack Resilient Synopsis Diffusion [27] have yet to be explored.  ...  As security is a process, not a product, system designers should keep upto-date with the developments in attacks on embedded systems.  ... 
doi:10.1155/2013/362385 fatcat:2ph46uukonbtbdkc5q6t4mvgcq

Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis

Mohamed Amine Ferrag, Othmane Friha, Leandros Maglaras, Helge Janicke, Lei Shu
2021 IEEE Access  
Based on a multi-agent system, Połap et al.  ...  In the absence of a credible security defense systems implemented on the IoT devices, they can be attacked by hackers [1] and are representing a large attack surface that is actively exploited.  ...  His research interests include wireless network security, network coding security, and applied cryptography.  ... 
doi:10.1109/access.2021.3118642 fatcat:222fgsvt3nh6zcgm5qt4kxe7c4

Security Architecture for Sensitive Information Systems [chapter]

Xianping Wu, Phu Dung, Balasubramaniam Srinivas
2010 Convergence and Hybrid Information Technologies  
As discussed in Chapter 2, long-term (master) and public keys are mainly adopted in extant approaches of sensitive information protection.  ...  Distributing very long one-time pad keys is inconvenient and usually poses a significant security risk.  ...  As suggested, multi-factor authentication provides stronger security for user interface.  ... 
doi:10.5772/9641 fatcat:cdq2t26wcfc3vc5czgqog3h5pu

Webinos Project Deliverable: Phase 2 Security Framework

Webinos Consortium
2012 Zenodo  
It is a companion document to the webinos system and API specifications and explains why certain security and privacy controls exist and what risks remain.  ...  A key aim of the project is building a platform which is both secure and protects user privacy.  ...  and defence elements might have on each other.  ... 
doi:10.5281/zenodo.1147031 fatcat:x53nqshe7jfqrnbq6urpvsj2ra

Organizing Classification of Application Logic Attacks in Component-based E-Commerce Systems

Faisal Nabi, Jianming Yong, Xiaohui Tao, Muhammad Farhan, Nauman Naseem
2021 Journal of Computer Science  
Having review of two different types of attack taxonomies, a logical vulnerability classification based taxonomy is proposed.  ...  This research paper addresses the topic of application logic attack taxonomy that is due to unclear and incorrect implementation in component-based applications.  ...  Acknowledgment This work is based on a Research in Australia cyber Banking e-commerce security Busniess logic issues.  ... 
doi:10.3844/jcssp.2021.1046.1058 fatcat:mvsyj3avezforbtnvmcsc6jshm

Authentication as a service: Shamir Secret Sharing with byzantine components [article]

Andrea Bissoli, Fabrizio d'Amore
2018 arXiv   pre-print
The scheme is information-theoretic secure.  ...  We present a practical methodology for securing the password-based authentication scheme.  ...  It provides a first feasibility study that will provide a base for structured and engineered cloud-based implementations aiming at providing an authentication-as-a-service.  ... 
arXiv:1806.07291v1 fatcat:sgz2smlapra2nbcuiqo7rsgr24

Federated Learning for Big Data: A Survey on Opportunities, Applications, and Future Directions [article]

Thippa Reddy Gadekallu, Quoc-Viet Pham, Thien Huynh-The, Sweta Bhattacharya, Praveen Kumar Reddy Maddikunta, Madhusanka Liyanage
2021 arXiv   pre-print
However, this conventional approach faces critical issues in terms of data privacy as the data may include sensitive data such as personal information, governments, banking accounts.  ...  Subsequently, we review the potential of FL for big data applications, such as smart city, smart healthcare, smart transportation, smart grid, and social media.  ...  ., Secured Multi-Party Computations (sMPC), differential privacy, and FL.  ... 
arXiv:2110.04160v2 fatcat:3y2kmamdbrfmrjdxv3zh47yphu

Performance investigation of secure 802.11 wireless LANs : raising the security bar to which level? [article]

Jenne Wong, University Of Canterbury
Our results showed that different security mechanisms degraded WLAN performance in different ways. Network performance degradation increased as the protection of the security mechanisms increased.  ...  Private WLANs are used by businesses and home users, while public WLANs have been established in areas expected to have high demand for bandwidth, such as cafes, airports, and hotels.  ...  To provide at least some basic defence against attacks, shared authentication should be used instead of open system authentication.  ... 
doi:10.26021/5541 fatcat:htxzphmri5dqjn7nsgtk2ww3ay

Securing the Edges of IoT Networks: a Scalable SIP DDoS Defense Framework with VNF, SDN, and Blockchain [article]

Aldo Kiki Febro, UH Research Archive
Due to the magnitude of such an attack, legacy security systems are not able to provide adequate protection. The impact ranges from loss of revenue for businesses to endangering public safety.  ...  My significant and original contribution to the knowledge is a scalable and collaborative defence framework that secures the edges of IoT networks with Virtual Network Function (VNF), Software-Defined  ...  A hacker sends invite packets to a range of extensions, e.g., 101, 102, 103, and takes note of the response (404 vs. 401).  ... 
doi:10.18745/th.24127 fatcat:miik23ntg5eypgyvr6jyhzm6c4

D1.1 - State of the Art Analysis

Danilo Ardagna
2021 Zenodo  
We also extensively discuss existing solutions for applications deployment, monitoring, runtime management, and scheduling considering the emerging Function as a Service paradigm.  ...  It is found that some areas, such as component placement and design space exploration with privacy preservation and performance guarantees, are fairly under-developed, since solutions tailo [...]  ...  To handle this attack, several defence mechanisms have been proposed however they still contain several limitations [Fink2011] .  ... 
doi:10.5281/zenodo.6372377 fatcat:f6ldfuwivbcltew4smiiwphfty

Security architecture for sensitive information systems

Xianping Wu
Issues such as dynamic sensitive information ownership, group authentication and authorization and privacy protection also create challenges for the protection of sensitive information systems.  ...  the security of the three major components of sensitive information systems.  ...  According to [ClWi87, Pa98, SoCh05] , security threats and concerns are raised against the key aspects 4 of sensitive information, as shown in Table 1 As reported [We05] , British hacker, Gary McKinnon  ... 
doi:10.4225/03/587819f31a8b6 fatcat:p5xlru3rvnh47giifhmoucgxx4

Security for Service-Oriented On-Demand Grid Computing

Matthew Smith, Freisleben, Bernd (Prof. Dr.), Mathematik Und Informatik
As [...]  ...  Like most complex IT systems, Grid middlewares exhibit a number of security problems which are further compounded by the new on-demand Grid usage scenario.  ...  Bernd Freisleben for supervising me and sharing his knowledge, insights and experiences over the course of this thesis, and for his dedication as the head of research of the Distributed Systems Group.  ... 
doi:10.17192/z2008.0918 fatcat:mitldrke2zdcbjrceunandd5be

Foundations of scientific research (Foundations of Research Activities) [article]

N. M. Glazunov
2012 arXiv   pre-print
Objective, Concepts and History of Computer security. Methodological and categorical apparatus of scientific research. Methodology and methods of scientific research.  ...  Some reasons impose the author to post it as e-print. . Author compiled material from many sources and hope that it gives various points of view on Foundations of Research Activities.  ...  Hardware based access control is more secure than logging in and logging out using operating systems as operating systems are vulnerable to malicious attacks.  ... 
arXiv:1212.1651v1 fatcat:e3oe5neztff5vjlj4trchbi3qa
« Previous Showing results 1 — 15 out of 45 results