823,592 Hits in 3.9 sec

Using Strategy Objectives for Network Security Analysis [chapter]

Elie Bursztein, John C. Mitchell
2010 Lecture Notes in Computer Science  
Finally we show that anticipation games with strategy objectives can be used in practice even on large networks by evaluating the performance of our prototype.  ...  In this paper we address this issue by introducing a new kind of goal called "strategy objectives". Strategy objectives mix logical constraints and numerical ones.  ...  Strategy objectives allow security analysts to express naturally many network security goals.  ... 
doi:10.1007/978-3-642-16342-5_25 fatcat:xuy3fuaznvehlnaznekikpn6ny

A comprehensive objective network security metric framework for proactive security configuration

Ehab Al-Shaer, Latifur Khan, Mohammad Salim Ahmed
2008 Proceedings of the 4th annual workshop on Cyber security and informaiton intelligence research developing strategies to meet the cyber security and information intelligence challenges ahead - CSIIRW '08  
In order to create secure and dependable systems and information intelligence, it is a major challenge to determine the security level of the network.  ...  An effective means to address this is to identify security metrics that measure the quality of security configuration objectively and dynamically.  ...  a powerful means to analyze and evaluate security policies objectively.  ... 
doi:10.1145/1413140.1413189 fatcat:swpm724q7vcu5muodz6wsp2jza

Towards a New Algorithm to Optimize IPv6 Neighbor Discovery Security for Small Objects Networks

Ali El Ksimi, Cherkaoui Leghris
2018 Security and Communication Networks  
However, this process is subject to many attacks and the security is willing to be the most important issues in Small Object Networks with IPv6.  ...  When receiving the secure message, the existing nodes decrypt it. Our algorithm is going to secure the DAD process by using a digital signature.  ...  In this paper, we have developed a new algorithm to secure the DAD process in IPv6 network for the small objects in an IPv6 network. This method is based on the security of NS and NA messages.  ... 
doi:10.1155/2018/1816462 fatcat:7vxfpu24ebg5lijevhlrefnauq

Design of Security Method for Augmented Object Network Rendering

Donghyun Kim, Seoksoo Kim
2017 Journal of Security Engineering  
Therefore, in this paper, we propose a security method to render a rendering resource file transmitted from a server and render it by decoding it.  ...  As augmented reality technologies for providing realistic contents are gradually spreading, a network rendering technique for reducing resources of data is being studied.  ...  [그림 1] 증강객체 네트워크 랜더링을 위한 보안 기법 구조도 [Fig. 1] Structure of augmented object network rendering 3.1 영상 전처리 및 객체 인식 모바일 디바이스에서 현실 대상 객체가 있는 입력영상에서 식 (2)를 이용하여 임계치를 도출하 고 이를 이용하여 영상을 이진화[7]한다.  ... 
doi:10.14257/jse.2017.06.04 fatcat:waajnir3ovfh7cyayz5vjwpoqi

Secure multi-objective distributed generation planning in distribution network

A. Habibi, M. Nayeripour, J. Aghaei
2013 2013 21st Iranian Conference on Electrical Engineering (ICEE)  
This paper presents a new multi-objective model for distributed generation planning in distribution networks.  ...  The proposed method is tested on a 33-bus network and results show the effectiveness of the proposed model.  ...  The technical data of the network are given in [21] . The network is connected to the grid through transformers. The design short-circuit capacity for 12.66 kV network is assumed to be 200 MVA.  ... 
doi:10.1109/iraniancee.2013.6599824 fatcat:cabpvqfkvjggppp4dulxp7b5py

Controlling the Security Objects Properties for Networks in Windows 2000

Dhuha Abdullah, Abd-Alnaseer Ahmed
2005 ˜Al-œRafidain journal for computer sciences and mathematics  
in network security embedded in it.  ...  Information security occupies a wide area in designing network operating systems.  ...  objects) ‫را‬ ‫ال‬ ‫روع‬ ‫الن‬ ‫رن‬ ‫م‬ ‫ب‬ ‫ي‬ ‫الباقية‬ ‫اةلر‬ ‫ثة‬ ‫الث‬ ‫أما‬ ، ‫لاصة‬ ‫ات‬ ‫حليا‬ (object-specific) ‫رتح‬ ‫ال‬ ‫األغ‬ ‫رو‬ ‫ق‬ ‫رب‬ ‫ي‬ ‫ر‬ ‫ي‬ ‫ر‬ ‫توج‬ ‫أ‬ ‫رن‬ ‫يمل‬ ‫رب‬ ‫الت‬  ... 
doi:10.33899/csmj.2005.164072 fatcat:o6u2iajo2zhdzfg5cgnaqvexgm

A Task of Multi-objective Selection of Network Security Systems in Accordance with Information Security Policies

Dmitry Sergeevich Chernyavskiy
2015 Bezopasnostʹ Informacionnyh Tehnologij  
The paper discusses methods for selection of network security systems and presents a multi-objective selection model.  ...  A selection task of network security systems in accordance with information security policies is a topical network security concern due to increasing number of information security policies in computer  ... 
doaj:2377df94dfdf4e06b39e0cf66535d212 fatcat:xuttwhnikbem3lrotgliks5nti

Secure Implementation in Economies with Indivisible Objects and Money

Yuji Fujinaka, Takuma Wakayama
2007 Social Science Research Network  
objects with monetary transfers.  ...  We then establish that on any minimally rich domain, only constant social choice functions are securely implementable.  ...  Conclusion In this study, we applied the notion of secure implementation to the problem of allocating indivisible objects with monetary transfers.  ... 
doi:10.2139/ssrn.1021648 fatcat:gmmj4vsqgzaipbbkrvtoeejkxa

Modelling adversaries and security objectives for routing protocols in wireless sensor networks

Gergely Ács, Levente Buttyán, István Vajda
2006 Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks - SASN '06  
of secure routing in sensor networks.  ...  The literature is very broad considering routing protocols in wireless sensor networks (WSNs). However, security of these routing protocols has fallen beyond the scope so far.  ...  Formalization of a simple attack A simple security objective is to guarantee the correctness of all routing entries in the network.  ... 
doi:10.1145/1180345.1180352 dblp:conf/sasn/AcsBV06 fatcat:uitrjii3nbdktfuc7ibd25avye

Prediction of Malicious Objects in Computer Network and Defense

Hemraj Sainia, Panda, Minaketan Panda
2011 International journal of network security and its applications  
The paper envisages defense of critical information used in Computer Networks those are using Network Topologies such as Star Topology.  ...  However, the second part of the problem provides a framework for the treatment of predicted malicious traffic with detailed discussion of security measures.  ...  Security & Its Applications (IJNSA), Vol.3, No.6, November 2011 163 equation-(a) and equation-(8) we have- are no malicious objects in the network and the possibility of malicious objects in the further  ... 
doi:10.5121/ijnsa.2011.3612 fatcat:ksp4m75ur5harfkummcq463wcu

Multi-Objective Resource Allocation for Secure Communication in Cognitive Radio Networks with Wireless Information and Power Transfer [article]

Derrick Wing Kwan Ng, Ernest S. Lo, Robert Schober
2015 arXiv   pre-print
The secondary system provides simultaneous wireless power and secure information transfer to the secondary receivers.  ...  We consider cognitive radio networks where the secondary receivers are able to harvest energy from the radio frequency when they are idle.  ...  Multi-Objective Resource Allocation for Secure Communication in Cognitive Radio Networks with Wireless Information and Power Transfer Derrick Wing Kwan Ng, Ernest S.  ... 
arXiv:1403.0054v2 fatcat:mi24klini5fllomxtsrj37sudq

Demadroid: Object Reference Graph-Based Malware Detection in Android

Huanran Wang, Hui He, Weizhe Zhang
2018 Security and Communication Networks  
We obtain the dynamic information to build Object Reference Graph and propose λ-VF2 algorithm for graph matching.  ...  However, in this case, the amount of data and the network traffic of the system are relatively large, and the problem of data security is brought at the same time.  ...  Research from security company Trend Micro shows that the premium service abuse is the most common type.  ... 
doi:10.1155/2018/7064131 fatcat:cqkeiaa5wbfpdeszncvaunpinu

Genetic Feature Fusion for Object Skeleton Detection

Yang Qiao, Yunjie Tian, Yue Liu, Jianbin Jiao, Liguo Zhang
2021 Security and Communication Networks  
Object skeleton detection requires the convolutional neural networks to recognize objects and their parts in the cluttered background, overcome the image definition degradation brought by the pooling layers  ...  Most existing object skeleton detection methods take great efforts into the designing of side-output networks for multiscale feature fusion.  ...  VGG FHN [38] 0.480 0.675 8 Security and Communication Networks  ... 
doi:10.1155/2021/6621760 fatcat:3ivs6ebaw5guplqcv547t6cfdq

Security and Privacy Objectives for Sensing Applications in Wireless Community Networks

Delphine Christin, Matthias Hollick, Mark Manulis
2010 2010 Proceedings of 19th International Conference on Computer Communications and Networks  
In particular, we identify main research questions and highlight the challenges of using various security and privacy approaches from networking and cryptography to make sensing applications in WCNs security  ...  Sensing application scenarios for WCNs differ from traditional sensor network applications with respect to their security and privacy requirements.  ...  ACKNOWLEDGMENT This work was supported by the Center of Advanced Security Research Darmstadt -CASED (  ... 
doi:10.1109/icccn.2010.5560129 dblp:conf/icccn/ChristinHM10 fatcat:qjksyxu3nvdfrhcnmh75erdce4

Securing Passive Objects in Mobile Ad-Hoc Peer-to-Peer Networks

Rene Mayrhofer, Florian Ortner, Alois Ferscha, Manfred Hechinger
2003 Electronical Notes in Theoretical Computer Science  
In this paper, we will focus on privacy and security aspects of ad-hoc, peer-to-peer networks within the SmartInteraction project.  ...  We introduce a method for integrating such objects into a peer-to-peer environment without infrastructure components while providing a high level of privacy and security for peers interacting with objects  ...  Security in sensor networks is currently also a very active research topic (e.g. [13] ).  ... 
doi:10.1016/s1571-0661(04)80687-x fatcat:nx6tkmfcfrhatidwripum55rii
« Previous Showing results 1 — 15 out of 823,592 results