A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
The Insecurity of Wireless Networks
2012
IEEE Security and Privacy
These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. ...
Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. ...
Accordingly, the USG retains a nonexclusive, royalty-free license to publish or reproduce the published form of this contribution, or allow others to do so, for USG purposes. ...
doi:10.1109/msp.2012.60
fatcat:nhceyc2rcndf5mrs3xsfge3sfa
Designing an MVC Model for Rapid Web Application Development
2014
Procedia Engineering
This model was implemented using the PHP programming language, but it can be implemented in other development languages and environments using the same concepts. ...
This model is based on the Model-View-Controller architecture (MVC) and has several other useful components like security, form generation and validation, database access and routing. ...
/55287 "Ph.D. for a career in interdisciplinary economic research at the European standards". ...
doi:10.1016/j.proeng.2014.03.106
fatcat:5pwzgkwqvfayzfqmftmsuau5ka
Spider-Man, Hubris, and the Future of Security and Privacy
2015
IEEE Security and Privacy
Like Spider-Man, with our great computing power comes great responsibility-to use our power wisely, to design high-quality security and privacy applications, and to quickly correct errors and improve results ...
The bad answer is that lots of other cars have them now, so any new model will want one. The good answer is that computer networks are transforming the world, and in many ways to our benefit. ...
I recognize that my code will be attacked by talented and persistent adversaries who threaten our physical, economic and national security. I recognize these things-and I choose to be rugged. ...
doi:10.1109/msp.2015.133
fatcat:la2f3pjimjfq5fqxtbzz5ooyme
Mutual authentication protocols for RFID systems
2008
International Journal of Automation and Computing
We do not consider physical attacks on legitimate readers, tags or tag-item attachment and denial of service attacks in this supply chain. ...
System Setup: We consider using protocol 4 with some modifications for this application as its more secure than the other proposed protocols. Master keys transmission between the ...
Man-in-the-middle Attack: A man-in-the-middle attack is possible. ...
doi:10.1007/s11633-008-0348-9
fatcat:esa2yloa4rgebf4ccuur7rcmo4
Necessity of data science for enhanced Cybersecurity
2021
International Journal of Data Science and Big Data Analytics
protect our system from known and unknown cyber attacks. ...
Extracting security incident patterns or insights from cybersecurity data and building corresponding data-driven model, is the key to make a security system automated and intelligent. ...
, DDoS or DoS attacks and man in middle attacks, and we can train our systems to detect such attacks even if the firewall or cyber guard of the system compromises they can let us know the moment of compromise ...
doi:10.51483/ijdsbda.1.1.2021.63-79
fatcat:ycciwntsd5aodjp4tjzmhn4odu
Drifting Keys: Impersonation detection for constrained devices
2013
2013 Proceedings IEEE INFOCOM
Thus a clone device created by the attacker will emit DKs that randomly diverge from those in the original, valid device over time, alerting a trusted verifier to the attack. ...
DKs enable detection of complete compromise by an attacker of the device and its secret state, e.g., cryptographic keys. A DK evolves within a device randomly over time. ...
FORMAL MODEL In this section, we lay out a formal security model for Drifting Keys. We first define a timeline, the set of time intervals between events in an attack. ...
doi:10.1109/infcom.2013.6566892
dblp:conf/infocom/BowersJRS13
fatcat:w7elqqqwvzamvenpg722amlhoa
Cybsersecurity Issues in Robotics
2021
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
In this paper, we identify existing problems in managing cyber-security in robotics and provide an overview of the critical cyber-security countermeasures in robotics. ...
An increase in cyber-attacks, combined with the development of automated processes, introduces new threats that must be addressed to secure information assets and promote trust in robotics systems. ...
Additionally, according to [69] , safety features are subject to man-in-the-middle or interface-manipulation attacks. ...
doi:10.22667/jowua.2021.09.30.001
dblp:journals/jowua/LacavaMMSMGV21
fatcat:pycytfqn4bd45hlmdpkmwlfddy
A Calamity in the Neighborhood: Women's Participation in the Rwandan Genocide
2007
Genocide Studies and Prevention: An International Journal
The unique combination of these factors that motivated each female genocide participant in Rwanda in 1994 would shift and evolve with new situations. ...
In addition, respondents described four experiential pressures that shaped their choices to participate in the 1994 genocide: (1) a disaster mentality; (2) fear of the new social order; (3) confusion or ...
Acknowledgments The authors recognize the following individuals for their invaluable contributions in carrying out the research reported in this paper.
Notes ...
doi:10.1353/gsp.2011.0042
fatcat:yfzenatbgvaypl74zqqll3t4fe
A Calamity in the Neighborhood: Women's Participation in the Rwandan Genocide
2007
Genocide Studies and Prevention: An International Journal
The unique combination of these factors that motivated each female genocide participant in Rwanda in 1994 would shift and evolve with new situations. ...
In addition, respondents described four experiential pressures that shaped their choices to participate in the 1994 genocide: (1) a disaster mentality; (2) fear of the new social order; (3) confusion or ...
Acknowledgments The authors recognize the following individuals for their invaluable contributions in carrying out the research reported in this paper.
Notes ...
doi:10.3138/gsp.2.3.209
fatcat:5ohf7yxhhfgtjfj7k3svijmdma
Towards Security-Aware Mutation Testing
2017
2017 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)
Yet, the use of mutation analysis in tackling security issues has received little attention. In view of this, we design security aware mutation operators to support mutation analysis. ...
Using a known set of common security vulnerability patterns, we introduce 15 security-aware mutation operators for Java. We then implement them in the PIT mutation engine and evaluate them. ...
Goal: the RHNV operator removes this authentication, making the application vulnerable to man-in-the-middle attacks. ...
doi:10.1109/icstw.2017.24
dblp:conf/icst/LoiseDPPH17
fatcat:4o7mhirkr5cqjk7447tyse6jua
Practice-Oriented Provable Security and the Social Construction of Cryptography
2016
IEEE Security and Privacy
I will use the story of practice-oriented provable security as the backdrop with which to make the case for what might be called a "social constructionist" view of our field. ...
Traditionally, "provable security" was tied in the minds cryptographers to public-key cryptography, asymptotic analyses, number-theoretic primitives, and proof-of-concept designs. ...
But this statement holds for any definition or model in cryptography-most definitely including our esteemed "standard" model. ...
doi:10.1109/msp.2016.122
fatcat:l3n5cbifljfhnfrguljksmytre
Gerald L. Epstein, PhD: Director, Center for Science, Technology, and Security Policy, American Association for the Advancement of Science (AAAS)
2009
Biosecurity and Bioterrorism
A: I'm thinking: What is it that something with the name ''Center for Science, Technology and Security Policy'' can't possibly not be in the middle of? ...
But being comforted by the fact that they weren't very far along reminds me of the joke about a man walking in a park who sees a guy playing chess with his dog. ...
doi:10.1089/bsp.2009.1201
pmid:20028243
fatcat:rydn5o5amvg2pihiyqyxzuq6xi
Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks
[chapter]
2009
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
We implemented the proposed protocols on the Meshnetics wireless sensor platform. The proposed protocols are cheap to implement, secure in the very strong attacker model, easy to use and scalable. ...
A notable feature of the proposed "public key"-based key deployment protocol is that it is designed to be secure in a very strong attacker model, where an attacker can eavesdrop, jam and modify transmitted ...
Acknowledgment The authors would like to thank the anonymous reviewers for their thorough reviews and helpful suggestions. ...
doi:10.1007/978-3-642-05284-2_13
fatcat:vqytfia5dnaubp34ycohgizega
A silver bullet?
2020
Proceedings of the 15th International Conference on Availability, Reliability and Security
highlight the different approaches to transparency and trust between the selected groups, the challenges of blockchain and the potential effects of this technology in accounting. ...
This exploratory paper intends to drive preliminary insights on the different mental models accountants and blockchain developers have on the implementation of blockchain for accounting. ...
Particularly, the automatization of the accountant's job and the elimination of the middle-man. ...
doi:10.1145/3407023.3409193
dblp:conf/IEEEares/Esmander0LR20
fatcat:ntmfimjiqfblxipn6724kou7qy
Book Reviews
2009
Journal of Strategic Security
Not the pre-war intelligence about which war critics still complain, but, instead, the intelligence used in fighting the insurgents and other foes that arose after the fall of Baghdad. ...
With a war that has lasted six years, one must ask how good was the intelligence in Iraq? ...
In Chapter 2, Amy Blizzard (ECU) examines U.S. Homeland Security interests, including protecting people, infrastructure, the economy and our form of government. ...
doi:10.5038/1944-0472.2.1.5
fatcat:qdtb7ym44zcr7pye36azkn2awa
« Previous
Showing results 1 — 15 out of 18,368 results