A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Hide and Seek: An Architecture for Improving Attack-Visibility in Industrial Control Systems
[chapter]
2019
Lecture Notes in Computer Science
In its basic form, a security monitor is deployed somewhere in the industrial control network, observes a time-series of the operation of the system, and identifies anomalies in those measurements in order ...
In the past years we have seen an emerging field of research focusing on using the "physics" of a Cyber-Physical System to detect attacks. ...
Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon. ...
doi:10.1007/978-3-030-21568-2_9
fatcat:7mjxvrjdrjbsxjfy7jsbyhevcq
Secure Image Hiding Algorithm using Cryptography and Steganography
2013
IOSR Journal of Computer Engineering
In the present scenario, any communication of internet and networks application requires security.Lots of data security and data hiding algorithms have been developed in the last decade.Cryptography and ...
Our proposed model gives two layers of security for secret data, which fully satisfy the basic key factors of information security system that includes: Confidentiality, Authenticity, Integrity and Non ...
Acknowledgment We take this opportunity to express our deep sense of gratitude and sincere thanks to Mr S. T. Valunjkar, Director In-Charge, NIELIT centre, Aurangabad. ...
doi:10.9790/0661-1350106
fatcat:ufv3vx7pd5banok7b5eh7bup7y
Key terrain in cyberspace: Seeking the high ground
2014
2014 6th International Conference On Cyber Conflict (CyCon 2014)
Key terrain might include a hill that overlooks a valley an enemy wants to control or a crossing point over a river that must be traversed before launching an attack. ...
In military doctrine, key terrain refers to areas which, if seized, afford an advantage to an attacker or defender. When applied to geographic terrain, this definition is clear. ...
Furthermore, by filtering malicious packets from traffic destined to a system visible on the network, cyberspace obstacles sometimes put target systems out of range of an attackers cyber weapons. ...
doi:10.1109/cycon.2014.6916409
dblp:conf/cycon/RaymondCCN14
fatcat:6ctm44aebreo7gdycqzlsc7d34
A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents
2018
Security and Communication Networks
In addition, various types of attacks are described and their effects are analyzed in order to highlight the advantages and weaknesses of current techniques. ...
Therefore, copyrights protection of plain texts is still a remaining issue that must be improved in order to provide proof of ownership and obtain the desired accuracy. ...
Acknowledgments This work was supported in part by National Natural Sci- ...
doi:10.1155/2018/5325040
fatcat:ah5kszr7i5dxvia4ciz3km27xi
Epiphany: A location hiding architecture for protecting critical services from DDoS attacks
2012
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012)
To protect them we propose Epiphany, an architecture that hides the service IP addresses so that attackers cannot locate and target them. ...
Clients in clean networks are not affected by attackers in other networks. Data proxies are assigned to clients based on their trust. ...
INTRODUCTION As critical systems such as emergency response, industrial control systems, government and banking systems are moving to the public Internet, they become susceptible to threats such as DDoS ...
doi:10.1109/dsn.2012.6263945
dblp:conf/dsn/KambhampatiPM12
fatcat:z6i673oparcabhozdxmkxdlcqy
Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search
2016
2016 IEEE Symposium on Security and Privacy (SP)
An interesting observation we make in our research is that such an attack almost always incurs a great semantic gap between the infected domain (e.g., a university site) and the content it promotes (e.g ...
Promotional infection is an attack in which the adversary exploits a website's weakness to inject illicit advertising content. ...
more visible to the user. ...
doi:10.1109/sp.2016.48
dblp:conf/sp/LiaoYWPYCDDAAXB16
fatcat:cxeuazg3mrclheqyy4v7cp5gpq
"Recreations for leisure hours": Popular Entertainment in Collins's Hide and Seek
unpublished
The detailed analysis of amusement he carries out in Hide and Seek is a significant step in the accomplishment of his objective, paving the way to the rise of sensation fiction, which, he seems to imply ...
Collins's Hide and Seek (1854), is a valuable contribution to the Victorian debate on popular entertainment, punctuated as it is by references to the circus, the music hall and the painting exhibition. ...
Moreover around 1854, while writing Hide and Seek, he launched an attack on the classicism of Claude and Poussin, of which Valentine's pictures appear to be a poor imitation. ...
fatcat:jpdc2ryp5vab7itfn2mpitx254
League Structure & Stadium Rent Seeking - The Role of Antitrust Revisited
2012
Social Science Research Network
In most of the world, competitive merit determines entrance into leagues via a system known as promotion-and-relegation, whereby the worst performing teams in one competitive tier are demoted to the next ...
We argue that no inherent cultural or political cross-Atlantic variations cause the differences; rather, it is the industrial organization of sports in the two countries-the structure of league control-that ...
It is true that athletes in English soccer are also very well paid, but for reasons that are independent of promotion-and-relegation. ...
doi:10.2139/ssrn.1983447
fatcat:bocggzc5hjctnn6xhdaw46lgke
Seeking the Will of God: The Information Seeking Experiences of the Leaders of Nova Scotia Churches in Transition
2014
Social Science Research Network
In his own study he proposed that the pastor operates in a closed system when world and role are significantly dependent upon each other and in an open system of information seeking when world and role ...
for improving engagement" (p. 125). ...
In this study I would be seeking to gather ethnographic data about the church, and to interview in groups and individually leaders involved in shaping and implementing the vision for the church. ...
doi:10.2139/ssrn.2505083
fatcat:dnepiqqrkfggtkqrk3jyazqr4y
Deployment of Blockchain Technology in Software Defined Networks: A survey
2020
IEEE Access
In SDN, the network intelligence is centralized in a software entity so-called SDN controller, which enables network administrators to dynamically manage, secure, and optimize network resources and programmatically ...
Despite the impressive benefits SDN has brought to network architecture, it introduces new security challenges and prompts different implementation strategies to spread attack vectors. ...
ACKNOWLEDGMENT The author would like to thank the Deanship of Scientific Research at Majmaah University for supporting this work under Project R-1441-58. ...
doi:10.1109/access.2020.2964751
fatcat:4ctdrthqozfnjiwxounred7gwm
Assessing Threats and Vulnerable Attacks of Health Care Data in Cloud-Based Environment
2019
International journal of recent technology and engineering
Relaxations in access control architectures will compromise the security of entire architecture and practice. ...
This becomes a mandatory requirement for designing and implementing an access control mechanism to identify intention of users who enter into the environment. ...
Provided with risk management strategies and access controlling mechanisms, this model will be a secure solution for this industry. ...
doi:10.35940/ijrte.b1610.078219
fatcat:vhw3s5szfjfpjkcvpskif36vcm
The problem isn't attribution
2010
Proceedings of the Re-Architecting the Internet Workshop on - ReARCH '10
As a result of increasing spam, DDoS attacks, cybercrime, and data exfiltration from corporate and government sites, there have been multiple calls for an Internet architecture that enables better network ...
We analyze the different types of Internet-based attacks, and observe the role that currently available alternatives to attribution already play in deterrence and prosecution. ...
INTRODUCTION As a result of increasing spam, DDoS attacks, cybercrime, and data exfiltration from corporate and government sites, there have been multiple calls for an Internet architecture that enables ...
doi:10.1145/1921233.1921247
fatcat:jxotll6fe5fxrpieuncab5kloi
Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model
2021
Symmetry
Most organizations deploy an intrusion detection system (IDS) or next-generation firewall that picks up known attacks or attempts to pattern match for identification. ...
Detection controls are usually placed to augment prevention at the perimeter, and not as consistently deployed for in-network threat detection. ...
Security architecture is the design of artifacts that describe how security controls are positioned and how they relate to the overall system architecture. ...
doi:10.3390/sym13040597
fatcat:6thxnfbz4zf7jhi4lnenghqiqq
The Trusted Cloud: Addressing Security and Compliance
[chapter]
2014
Building the Infrastructure for Cloud Security
The intent is to improve visibility, control, and compliance for cloud services. ...
Attackers are evolving from being hackers working on their own and looking for personal fame into organized, sophisticated attackers targeting specific types of data and seeking to gain and retain control ...
doi:10.1007/978-1-4302-6146-9_2
fatcat:k2wmlqogxzfbvhr6mle2wuwgze
Improving Software Defined Cognitive and Secure Networking
[article]
2020
arXiv
pre-print
The resulting networks comprise distributed control plane architectures that are complex in nature, difficult to integrate and operate, and are least efficient in terms of resource usage. ...
Therefore, this thesis finds potential security vulnerabilities in SDN, studies proposed security platforms and architectures for those vulnerabilities, and presents future directions for unresolved security ...
networks, leading to security compromises. • Denial of Service (DoS) attacks on the infrastructure: Lack of mechanisms to hide visible network control elements, and unencrypted control channels. • Signaling ...
arXiv:2007.05296v1
fatcat:pda2czqmxbavhpc6bk3bdciyay
« Previous
Showing results 1 — 15 out of 9,001 results