Results (6)
Search Parameters:
Keyword: Computer systemsBased on Reconfiguring the Supercomputers Runtime Environment New Security Methods
This paper is an extension of work originally presented in 2019 Third World Conference on Smart Trends in Systems Security and Sustainability (WorldS4). Author describes two new methods: reactive protection method (without delay after detecting an attack), which consists in virtualizing the execution environment of supercomputers processes if the calculated state descriptor falls into the…
Read MoreA Proposal of Code Modification Problem for Self-study of Web Client Programming Using JavaScript
In current societies, web application systems take central roles in computer systems. Thus, web client programming using JavaScript has increased values to add dynamic features and functions in web pages by well working with HTML and CSS. In this paper, as a new type of exercise problem for its self-study, we propose a code modification…
Read MoreA Hybrid Approach for Intrusion Detection using Integrated K-Means based ANN with PSO Optimization
Many advances in computer systems and IT infrastructures increases the risks associated with the use of these technologies. Specifically, intrusion into computer systems by unauthorized users is a growing problem and it is very challenging to detect. Intrusion detection technologies are therefore becoming extremely important to improve the overall security of computer systems. In the…
Read MoreNew Neural Networks for the Affinity Functions of Binary Images with Binary and Bipolar Components Determining
The Hamming neural network is an effective tool for solving problems of recognition and classification of objects, the components of which are encoded using a binary bipolar alphabet, and as a measure of the objects’ proximity the difference between the number of identical bipolar components which compared include objects and the Hamming distance between them…
Read MoreStream Cipher by Reed-Solomon Codes
Stream cipher can be used in constrained environments to provide information security and reduce energy expense at data transmission. In this paper, it is shown that Reed-Solomon (RS) code can be used to implement stream cipher, which is widely used for error corrections of data in transmission and storages. The proposed stream cipher combines the…
Read MoreAn Encryption Key for Secure Authentication: The Dynamic Solution
In modern day technology, the Information Society is at risk. Passwords are a multi-user computer systems usual first line of defence against intrusion. A password may be textual with any combination of alphanumeric characters or biometric or 3-D. But no authentication protocol is fully secured against todays hackers as all of them are Static in…
Read More
