Results (189)
Search Parameters:
Keyword: SecurityFederated Learning with Differential Privacy and Blockchain for Security and Privacy in IoMT A Theoretical Comparison and Review
The growing integration of the Internet of Medical Things (IoMT) into healthcare has amplified the need for secure and privacy-preserving artificial intelligence. Federated Learning (FL) has emerged as a pivotal paradigm for decentralized medical data processing; however, it still faces challenges concerning data confidentiality, trust management, and scalability. This review presents an extended theoretical comparison…
Read MoreExploring Current Challenges on Security and Privacy in an Operational eHealth Information System
Bearing in mind that patient data is extremely sensitive, it is crucial to establish strong protection when the security and privacy of healthcare data are concerned. Prioritizing data security and privacy is essential for the overall healthcare industry in order to maintain the reliability of electronic healthcare (eHealth) information systems. This study explores the gathered…
Read MoreEnhancing Cloud Security: A Comprehensive Framework for Real-Time Detection, Analysis and Cyber Threat Intelligence Sharing
Cloud computing has emerged as a pivotal component of contemporary IT systems, affording organizations the agility and scalability required to meet the ever-changing demands of business. However, this technological evolution has introduced a new era of cybersecurity challenges, as attackers employ increasingly sophisticated strategies to breach cloud networks. Such breaches can have far-reaching consequences, including…
Read MorePhotoluminescence Properties of Eu(III) Complexes with Two Different Phosphine Oxide Structures and Their Potential uses in Micro-LEDs, Security, and Sensing Devices: A Review
In the field of micro-LED displays, there is strong demand for red phosphors with high photoluminescence intensity, high color purity, and small particle size. Here, we focus on Eu(III) complexes because they produce sharp photoluminescence spectra with high color purity and can be dissolved in polymer, enabling a reduction in particle size to the molecular…
Read MorePrototype to Identify the Capacity in Cybersecurity Management for a Public Organization
Public organizations are subjected to a complex security situation, which can be addressed by permanently strengthening and evaluating their cybersecurity capabilities. The objective of this research is to develop a model to identify the cybersecurity management capacity of public organizations. The deductive method was applied for the review and analysis of criteria, factors and variables…
Read MoreThe Security of Information Systems and Image Processing Supported by the Quantum Computer: A review
The knowledge and understanding of the technology of quantum computers and their superiority over classical computers are still insufficient or uncertain for many communities of researchers, manufacturers, investors and the general public. For this reason, we try in this article to present and explain some of the basic concepts of quantum computers. We explain how…
Read MoreA Comparison of Cyber Security Reports for 2020 of Central European Countries
The aim of the article is to analyze the annual reports on cyber security of Central European countries, i.e. the Czech Republic, Slovakia, Poland, Germany, and Austria. The article focuses on the development of the state of cyber security, actors of threats in cyberspace, cyber threats, and the most common types of attacks. The article…
Read MoreDeep Learning Affective Computing to Elicit Sentiment Towards Information Security Policies
Information security behaviour is an integral part of modern business and has become a central theme in many research studies. One of the essential tools available that can be used to influence information security behaviour is information security policies (ISPs). These types of policies, which is mandatory in most organisations, are formalised rules and regulations…
Read MoreTaxonomy of Security Techniques for Routing Protocols in Mobile Ad-hoc Networks
The Nodes equipped with wireless technology cooperate in an autonomous and instantaneous way to form a mobile ad hoc network. It turns out that several factors make this type of network vulnerable to various security threats. Considering the sensitivity of user data routed through nodes, routing security should be a priority in mobile ad hoc…
Read MoreEnhance Student Learning Experience in Cybersecurity Education by Designing Hands-on Labs on Stepping-stone Intrusion Detection
Stepping-stone intrusion has been widely used by professional hackers to launch their attacks. Unfortunately, this important and typical offensive skill has not been taught in most colleges and universities. In this paper, after surveying the most popular detection techniques in stepping-stone intrusion, we develop 10 hands-on labs to enhance student-learning experience in cybersecurity education. The…
Read MoreOn the Combination of Static Analysis for Software Security Assessment – A Case Study of an Open-Source e-Government Project
Static Application Security Testing (SAST) is a popular quality assurance technique in software engineering. However, integrating SAST tools into industry-level product development and security assessment poses various technical and managerial challenges. In this work, we reported a longitudinal case study of adopting SAST as a part of a human-driven security assessment for an open-source e-government…
Read MoreChallenges in IoT Technology Adoption into Information System Security Management of Smart Cities: A Review
Sustainable urban development and utilization of Internet of Things (IoT) technology is driving cities globally to evolve into Smart Cities (SC). The power of IoT services and applications will enable public agencies to provide personalized services to the citizens and inevitably improves their much-needed quality of life. However, although the use of IoT technology proves…
Read MoreA Novel Way to Design ADS-B using UML and TLA+ with Security as a Focus
Automatic Dependent Surveillance-Broadcast (ADS-B) is the future of aviation. It is a vast system that provides situational awareness for the aviator and regulator at a very low cost and does so with the aid of multiple disparate systems working closely together and communicating with one another. ADS-B uses the Global Navigation Satellite System (GNSS/ GPS)…
Read MoreAn Enhanced Conceptual Security Model for Autonomous Vehicles
Connected and self-driving cars have emerged over the last decade as a leading example of cyber-physical systems, which seek to considerably enhance traffic safety, reduce emissions, decrease costs, and improve efficiency. Google, TESLA, Uber ATG are becoming pioneers in the autonomous vehicles industry. Autonomous vehicles can have a large codebase and with a large volume…
Read MoreMulti-Model Security and Social Media Analytics of the Digital Twin
Digital twins act through application programming interfaces to their physical counterparts to monitor, model, and control them. Beyond these traditional functions of digital twins, they must also act to secure their physical counterparts. A multi-model scheme is presented to help digital twins towards the task of securing the physical system. Additionally, this work includes an…
Read MoreMulti-layered Security Design and Evaluation for Cloud-based Web Application: Case Study of Human Resource Management System
Cloud computing is the development of information technology to provides resources that can be accessed through network. Security and privacy in cloud computing are major concern for companies. Therefore, cloud computing architecture strategy and design are needed to reduce costs and ensure the security of company assets in cloud computing. In this study, we are…
Read MoreReview of Pedagogical Principles of Cyber Security Exercises
Modern digitalized cyber domains are extremely complex ensemble. Cyber attacks or incidents against system may affect capricious effects for another system or even for physical devices. For understanding and training to encounter those effects requires an effective and complex simulation capability. Cyber Security Exercises are an effective expedient for training and learning measures and operations…
Read MoreDetailed Security Evaluation of ARANz, ARAN and AODV Protocols
Ad-Hoc networks are self-organized wireless networks. Finding a secure and efficient route leading from a specific source node to an intended destination node is one of the serious concerns in mobile Ad-Hoc networks. ARANz is one of the significant protocols that has been proposed for such networks. ARANz implements the authentication methods used with the…
Read MoreFast Stream Cipher based Chaos Neural Network for Data Security in CAN Bus
Vehicle systems are controlled by embedded electronic devices called electronic control units (ECUs). These ECUs are connected together with network protocols. The Controller Area Network (CAN) protocol is widely implemented due to its high fault tolerance. However, the CAN is a serial broadcast bus, and it has no protection against security threats. In this paper,…
Read MoreAnalysis of Security-Reliability Trade-off for Multi-hop Cognitive Relaying Protocol with TAS/SC Technique
This paper studies a trade-off between security (intercept probability (IP)) and reliability (outage probability (OP)) for a multi-hop decode-and-forward (DF) relaying protocol in an underlay cognitive radio network, in presence of a multi-antenna eavesdropper. In the considered protocol, all primary and secondary terminals are equipped with multiple antennas, and they employ transmit antenna selection (TAS)…
Read MoreAn Explanatory Review on Cybersecurity Capability Maturity Models
Cybersecurity is growing exponentially day by day in both the public and private sectors. This growth also comes with a new and dynamic cyber-threats risk that causes both sectors’ performance to halt. These sectors must update their cybersecurity measures and must understand the capability and maturity of their organization’s cybersecurity preparedness. Cybersecurity maturity models are…
Read MoreDevelopment Trends of Smart Cities in the Future – Potential Security Risks and Responsive Solutions
Smart cities are an indispensable development of the ongoing urbanization process world- wide. Currently, smart cities are being built and deployed by countries in the first steps. Based on research on the current state of developing smart cities in the world, the author forecasts the future development trends of such cities, pointing to one of…
Read MoreSurvey Analysis: Enhancing the Security of Vectorization by Using word2vec and CryptDB
Vectorization is extracting data from strings through Natural Language Processing by using different approaches; one of the best approaches used in vectorization is word2vec. To make the vectorized data secure, we must apply a security method, which will be CryptDB. The paper is analyzing the survey, which is created to interview security engineers through the…
Read MoreA Survey and an IoT Cybersecurity Recommendation for Public and Private Hospitals in Ecuador
It was analyzed the reference information on Cybersecurity architectures, models, standards, evaluations, mechanisms, and procedures applied to IoT domains, and public and private health area. The problem is the lack of proposals for IoT Cybersecurity in public and private hospitals to minimize random failures, ensure the privacy of personal data of patients, avoid the paralysis…
Read MoreMeasurement of Employee Awareness Levels for Information Security at the Center of Analysis and Information Services Judicial Commission Republic of Indonesia
The Center for Analysis and Information Services (Palinfo) at the Judicial Commission closely related to the management of information systems which are used to process organizational internal data and information systems on public services. Data processing and network management have an information system security risk. The Judicial Commission seeks to reduce risk and improve the…
Read More
