A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-Agent Systems
[article]
2019
arXiv
pre-print
Attack-Defence Trees (ADTs) are well-suited to assess possible attacks to systems and the efficiency of counter-measures. ...
Then, ADTs are modelled as (an extension of) Asynchronous Multi-Agents Systems--EAMAS. The ADT-EAMAS transformation is performed in a systematic manner that ensures correctness. ...
Definition 3 (Extended Asynchronous Multi-Agent Systems). ...
arXiv:1906.05283v1
fatcat:5o6eihxz2fdr7pcetpvxr3zseu
Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-agent Systems
[chapter]
2020
Lecture Notes in Computer Science
. , l n
Definition 3 (Extended Asynchronous Multi-Agent Systems) . ...
AMAS Asynchronous Multi-Agent Systems (AMAS [17] ) are a modern semantic model for the study of agents' strategies in asynchronous systems. ...
doi:10.1007/978-3-030-63406-3_1
fatcat:x6prz4lpxfh6tnx34it7f56axm
Wireless Sensor Network Security
2013
International Journal of Distributed Sensor Networks
The information in this document reflects only the author's views, is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose. ...
The performance and security tradeoffs between resilient tree-based approaches and multi-path approaches such as Attack Resilient Synopsis Diffusion [27] have yet to be explored. ...
As security is a process, not a product, system designers should keep upto-date with the developments in attacks on embedded systems. ...
doi:10.1155/2013/362385
fatcat:2ph46uukonbtbdkc5q6t4mvgcq
Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis
2021
IEEE Access
Based on a multi-agent system, Połap et al. ...
In the absence of a credible security defense systems implemented on the IoT devices, they can be attacked by hackers [1] and are representing a large attack surface that is actively exploited. ...
His research interests include wireless network security, network coding security, and applied cryptography. ...
doi:10.1109/access.2021.3118642
fatcat:222fgsvt3nh6zcgm5qt4kxe7c4
Security Architecture for Sensitive Information Systems
[chapter]
2010
Convergence and Hybrid Information Technologies
As discussed in Chapter 2, long-term (master) and public keys are mainly adopted in extant approaches of sensitive information protection. ...
Distributing very long one-time pad keys is inconvenient and usually poses a significant security risk. ...
As suggested, multi-factor authentication provides stronger security for user interface. ...
doi:10.5772/9641
fatcat:cdq2t26wcfc3vc5czgqog3h5pu
Webinos Project Deliverable: Phase 2 Security Framework
2012
Zenodo
It is a companion document to the webinos system and API specifications and explains why certain security and privacy controls exist and what risks remain. ...
A key aim of the project is building a platform which is both secure and protects user privacy. ...
and defence elements might have on each other. ...
doi:10.5281/zenodo.1147031
fatcat:x53nqshe7jfqrnbq6urpvsj2ra
Organizing Classification of Application Logic Attacks in Component-based E-Commerce Systems
2021
Journal of Computer Science
Having review of two different types of attack taxonomies, a logical vulnerability classification based taxonomy is proposed. ...
This research paper addresses the topic of application logic attack taxonomy that is due to unclear and incorrect implementation in component-based applications. ...
Acknowledgment This work is based on a Research in Australia cyber Banking e-commerce security Busniess logic issues. ...
doi:10.3844/jcssp.2021.1046.1058
fatcat:mvsyj3avezforbtnvmcsc6jshm
Authentication as a service: Shamir Secret Sharing with byzantine components
[article]
2018
arXiv
pre-print
The scheme is information-theoretic secure. ...
We present a practical methodology for securing the password-based authentication scheme. ...
It provides a first feasibility study that will provide a base for structured and engineered cloud-based implementations aiming at providing an authentication-as-a-service. ...
arXiv:1806.07291v1
fatcat:sgz2smlapra2nbcuiqo7rsgr24
Federated Learning for Big Data: A Survey on Opportunities, Applications, and Future Directions
[article]
2021
arXiv
pre-print
However, this conventional approach faces critical issues in terms of data privacy as the data may include sensitive data such as personal information, governments, banking accounts. ...
Subsequently, we review the potential of FL for big data applications, such as smart city, smart healthcare, smart transportation, smart grid, and social media. ...
., Secured Multi-Party Computations (sMPC), differential privacy, and FL. ...
arXiv:2110.04160v2
fatcat:3y2kmamdbrfmrjdxv3zh47yphu
Performance investigation of secure 802.11 wireless LANs : raising the security bar to which level?
[article]
2017
Our results showed that different security mechanisms degraded WLAN performance in different ways. Network performance degradation increased as the protection of the security mechanisms increased. ...
Private WLANs are used by businesses and home users, while public WLANs have been established in areas expected to have high demand for bandwidth, such as cafes, airports, and hotels. ...
To provide at least some basic defence against attacks, shared authentication should be used instead of open system authentication. ...
doi:10.26021/5541
fatcat:htxzphmri5dqjn7nsgtk2ww3ay
Securing the Edges of IoT Networks: a Scalable SIP DDoS Defense Framework with VNF, SDN, and Blockchain
[article]
2021
Due to the magnitude of such an attack, legacy security systems are not able to provide adequate protection. The impact ranges from loss of revenue for businesses to endangering public safety. ...
My significant and original contribution to the knowledge is a scalable and collaborative defence framework that secures the edges of IoT networks with Virtual Network Function (VNF), Software-Defined ...
A hacker sends invite packets to a range of extensions, e.g., 101, 102, 103, and takes note of the response (404 vs. 401). ...
doi:10.18745/th.24127
fatcat:miik23ntg5eypgyvr6jyhzm6c4
D1.1 - State of the Art Analysis
2021
Zenodo
We also extensively discuss existing solutions for applications deployment, monitoring, runtime management, and scheduling considering the emerging Function as a Service paradigm. ...
It is found that some areas, such as component placement and design space exploration with privacy preservation and performance guarantees, are fairly under-developed, since solutions tailo [...] ...
To handle this attack, several defence mechanisms have been proposed however they still contain several limitations [Fink2011] . ...
doi:10.5281/zenodo.6372377
fatcat:f6ldfuwivbcltew4smiiwphfty
Security architecture for sensitive information systems
2017
Issues such as dynamic sensitive information ownership, group authentication and authorization and privacy protection also create challenges for the protection of sensitive information systems. ...
the security of the three major components of sensitive information systems. ...
According to [ClWi87, Pa98, SoCh05] , security threats and concerns are raised against the key aspects 4 of sensitive information, as shown in Table 1 As reported [We05] , British hacker, Gary McKinnon ...
doi:10.4225/03/587819f31a8b6
fatcat:p5xlru3rvnh47giifhmoucgxx4
Security for Service-Oriented On-Demand Grid Computing
2011
As [...] ...
Like most complex IT systems, Grid middlewares exhibit a number of security problems which are further compounded by the new on-demand Grid usage scenario. ...
Bernd Freisleben for supervising me and sharing his knowledge, insights and experiences over the course of this thesis, and for his dedication as the head of research of the Distributed Systems Group. ...
doi:10.17192/z2008.0918
fatcat:mitldrke2zdcbjrceunandd5be
Foundations of scientific research (Foundations of Research Activities)
[article]
2012
arXiv
pre-print
Objective, Concepts and History of Computer security. Methodological and categorical apparatus of scientific research. Methodology and methods of scientific research. ...
Some reasons impose the author to post it as e-print. . Author compiled material from many sources and hope that it gives various points of view on Foundations of Research Activities. ...
Hardware based access control is more secure than logging in and logging out using operating systems as operating systems are vulnerable to malicious attacks. ...
arXiv:1212.1651v1
fatcat:e3oe5neztff5vjlj4trchbi3qa
« Previous
Showing results 1 — 15 out of 45 results