Filters








18,368 Hits in 9.0 sec

The Insecurity of Wireless Networks

Frederick T. Sheldon, John Mark Weber, Seong-Moo Yoo, W. David Pan
2012 IEEE Security and Privacy  
These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics.  ...  Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2.  ...  Accordingly, the USG retains a nonexclusive, royalty-free license to publish or reproduce the published form of this contribution, or allow others to do so, for USG purposes.  ... 
doi:10.1109/msp.2012.60 fatcat:nhceyc2rcndf5mrs3xsfge3sfa

Designing an MVC Model for Rapid Web Application Development

Dragos-Paul Pop, Adam Altar
2014 Procedia Engineering  
This model was implemented using the PHP programming language, but it can be implemented in other development languages and environments using the same concepts.  ...  This model is based on the Model-View-Controller architecture (MVC) and has several other useful components like security, form generation and validation, database access and routing.  ...  /55287 "Ph.D. for a career in interdisciplinary economic research at the European standards".  ... 
doi:10.1016/j.proeng.2014.03.106 fatcat:5pwzgkwqvfayzfqmftmsuau5ka

Spider-Man, Hubris, and the Future of Security and Privacy

Shari Lawrence Pfleeger
2015 IEEE Security and Privacy  
Like Spider-Man, with our great computing power comes great responsibility-to use our power wisely, to design high-quality security and privacy applications, and to quickly correct errors and improve results  ...  The bad answer is that lots of other cars have them now, so any new model will want one. The good answer is that computer networks are transforming the world, and in many ways to our benefit.  ...  I recognize that my code will be attacked by talented and persistent adversaries who threaten our physical, economic and national security. I recognize these things-and I choose to be rugged.  ... 
doi:10.1109/msp.2015.133 fatcat:la2f3pjimjfq5fqxtbzz5ooyme

Mutual authentication protocols for RFID systems

Ashrar A. Omer, Johnson P. Thomas, Ling Zhu
2008 International Journal of Automation and Computing  
We do not consider physical attacks on legitimate readers, tags or tag-item attachment and denial of service attacks in this supply chain.  ...  System Setup: We consider using protocol 4 with some modifications for this application as its more secure than the other proposed protocols. Master keys transmission between the  ...  Man-in-the-middle Attack: A man-in-the-middle attack is possible.  ... 
doi:10.1007/s11633-008-0348-9 fatcat:esa2yloa4rgebf4ccuur7rcmo4

Necessity of data science for enhanced Cybersecurity

Shiv Hari Tewari
2021 International Journal of Data Science and Big Data Analytics  
protect our system from known and unknown cyber attacks.  ...  Extracting security incident patterns or insights from cybersecurity data and building corresponding data-driven model, is the key to make a security system automated and intelligent.  ...  , DDoS or DoS attacks and man in middle attacks, and we can train our systems to detect such attacks even if the firewall or cyber guard of the system compromises they can let us know the moment of compromise  ... 
doi:10.51483/ijdsbda.1.1.2021.63-79 fatcat:ycciwntsd5aodjp4tjzmhn4odu

Drifting Keys: Impersonation detection for constrained devices

Kevin D. Bowers, Ari Juels, Ronald L. Rivest, Emily Shen
2013 2013 Proceedings IEEE INFOCOM  
Thus a clone device created by the attacker will emit DKs that randomly diverge from those in the original, valid device over time, alerting a trusted verifier to the attack.  ...  DKs enable detection of complete compromise by an attacker of the device and its secret state, e.g., cryptographic keys. A DK evolves within a device randomly over time.  ...  FORMAL MODEL In this section, we lay out a formal security model for Drifting Keys. We first define a timeline, the set of time intervals between events in an attack.  ... 
doi:10.1109/infcom.2013.6566892 dblp:conf/infocom/BowersJRS13 fatcat:w7elqqqwvzamvenpg722amlhoa

Cybsersecurity Issues in Robotics

Giovanni Lacava, Angelica Marotta, Fabio Martinelli, Andrea Saracino, Antonio La Marra, Endika Gil-Uriarte, Victor Mayoral Vilches
2021 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
In this paper, we identify existing problems in managing cyber-security in robotics and provide an overview of the critical cyber-security countermeasures in robotics.  ...  An increase in cyber-attacks, combined with the development of automated processes, introduces new threats that must be addressed to secure information assets and promote trust in robotics systems.  ...  Additionally, according to [69] , safety features are subject to man-in-the-middle or interface-manipulation attacks.  ... 
doi:10.22667/jowua.2021.09.30.001 dblp:journals/jowua/LacavaMMSMGV21 fatcat:pycytfqn4bd45hlmdpkmwlfddy

A Calamity in the Neighborhood: Women's Participation in the Rwandan Genocide

Reva N Adler, Cyanne E Loyle, Judith Globerman
2007 Genocide Studies and Prevention: An International Journal  
The unique combination of these factors that motivated each female genocide participant in Rwanda in 1994 would shift and evolve with new situations.  ...  In addition, respondents described four experiential pressures that shaped their choices to participate in the 1994 genocide: (1) a disaster mentality; (2) fear of the new social order; (3) confusion or  ...  Acknowledgments The authors recognize the following individuals for their invaluable contributions in carrying out the research reported in this paper. Notes  ... 
doi:10.1353/gsp.2011.0042 fatcat:yfzenatbgvaypl74zqqll3t4fe

A Calamity in the Neighborhood: Women's Participation in the Rwandan Genocide

Reva N Adler, Cyanne E Loyle, Judith Globerman
2007 Genocide Studies and Prevention: An International Journal  
The unique combination of these factors that motivated each female genocide participant in Rwanda in 1994 would shift and evolve with new situations.  ...  In addition, respondents described four experiential pressures that shaped their choices to participate in the 1994 genocide: (1) a disaster mentality; (2) fear of the new social order; (3) confusion or  ...  Acknowledgments The authors recognize the following individuals for their invaluable contributions in carrying out the research reported in this paper. Notes  ... 
doi:10.3138/gsp.2.3.209 fatcat:5ohf7yxhhfgtjfj7k3svijmdma

Towards Security-Aware Mutation Testing

Thomas Loise, Xavier Devroey, Gilles Perrouin, Mike Papadakis, Patrick Heymans
2017 2017 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)  
Yet, the use of mutation analysis in tackling security issues has received little attention. In view of this, we design security aware mutation operators to support mutation analysis.  ...  Using a known set of common security vulnerability patterns, we introduce 15 security-aware mutation operators for Java. We then implement them in the PIT mutation engine and evaluate them.  ...  Goal: the RHNV operator removes this authentication, making the application vulnerable to man-in-the-middle attacks.  ... 
doi:10.1109/icstw.2017.24 dblp:conf/icst/LoiseDPPH17 fatcat:4o7mhirkr5cqjk7447tyse6jua

Practice-Oriented Provable Security and the Social Construction of Cryptography

Phillip Rogaway
2016 IEEE Security and Privacy  
I will use the story of practice-oriented provable security as the backdrop with which to make the case for what might be called a "social constructionist" view of our field.  ...  Traditionally, "provable security" was tied in the minds cryptographers to public-key cryptography, asymptotic analyses, number-theoretic primitives, and proof-of-concept designs.  ...  But this statement holds for any definition or model in cryptography-most definitely including our esteemed "standard" model.  ... 
doi:10.1109/msp.2016.122 fatcat:l3n5cbifljfhnfrguljksmytre

Gerald L. Epstein, PhD: Director, Center for Science, Technology, and Security Policy, American Association for the Advancement of Science (AAAS)

Madeline Drexler
2009 Biosecurity and Bioterrorism  
A: I'm thinking: What is it that something with the name ''Center for Science, Technology and Security Policy'' can't possibly not be in the middle of?  ...  But being comforted by the fact that they weren't very far along reminds me of the joke about a man walking in a park who sees a guy playing chess with his dog.  ... 
doi:10.1089/bsp.2009.1201 pmid:20028243 fatcat:rydn5o5amvg2pihiyqyxzuq6xi

Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks [chapter]

Toni Perković, Ivo Stančić, Luka Mališa, Mario Čagalj
2009 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
We implemented the proposed protocols on the Meshnetics wireless sensor platform. The proposed protocols are cheap to implement, secure in the very strong attacker model, easy to use and scalable.  ...  A notable feature of the proposed "public key"-based key deployment protocol is that it is designed to be secure in a very strong attacker model, where an attacker can eavesdrop, jam and modify transmitted  ...  Acknowledgment The authors would like to thank the anonymous reviewers for their thorough reviews and helpful suggestions.  ... 
doi:10.1007/978-3-642-05284-2_13 fatcat:vqytfia5dnaubp34ycohgizega

A silver bullet?

Rose Esmander, Pascal Lafourcade, Marius Lombard-Platet, Claudia Negri Ribalta
2020 Proceedings of the 15th International Conference on Availability, Reliability and Security  
highlight the different approaches to transparency and trust between the selected groups, the challenges of blockchain and the potential effects of this technology in accounting.  ...  This exploratory paper intends to drive preliminary insights on the different mental models accountants and blockchain developers have on the implementation of blockchain for accounting.  ...  Particularly, the automatization of the accountant's job and the elimination of the middle-man.  ... 
doi:10.1145/3407023.3409193 dblp:conf/IEEEares/Esmander0LR20 fatcat:ntmfimjiqfblxipn6724kou7qy

Book Reviews

Michael D. Kohn, Edward M. Roche, Keely M. Fahoum, David G. Popp, Donald J. Goldstein, Stephen Iannucci, Mark J. Roberts
2009 Journal of Strategic Security  
Not the pre-war intelligence about which war critics still complain, but, instead, the intelligence used in fighting the insurgents and other foes that arose after the fall of Baghdad.  ...  With a war that has lasted six years, one must ask how good was the intelligence in Iraq?  ...  In Chapter 2, Amy Blizzard (ECU) examines U.S. Homeland Security interests, including protecting people, infrastructure, the economy and our form of government.  ... 
doi:10.5038/1944-0472.2.1.5 fatcat:qdtb7ym44zcr7pye36azkn2awa
« Previous Showing results 1 — 15 out of 18,368 results