Results (9)
Search Parameters:
Keyword: VulnerabilityOperating Systems Vulnerability – An Examination of Windows 10, macOS, and Ubuntu from 2015 to 2021
This study investigated the vulnerabilities of three operating systems: Windows 10, macOS, and Ubuntu. The analysis of secondary data obtained from the CVE and NVD databases for the study period demonstrates varying OS vulnerability. Quantitative assessment of the vulnerability (using the vulnerability score) for the investigated operating systems found consistent results in the security vulnerability…
Read MoreInvestigating the Expertise Indicators of Vulnerability Discovery Professionals
In crowdsourcing, selecting the person with suitable expertise is very important; especially since the task requester is not always in direct contact with the worker. Recently, this has become increasingly important particularly when the crowdsourced tasks are complex and require skillful workers (e.g. software development, software testing, vulnerability discovery, and open innovation). In this paper,…
Read MoreOn Adversarial Robustness of Quantized Neural Networks Against Direct Attacks
Deep Neural Networks (DNNs) prove to be susceptible to synthetically generated samples, so-called adversarial examples. Such adversarial examples aim at generating misclassifications by specifically optimizing input data for a matching perturbation. With the increasing use of deep learning on embedded devices and the resulting use of quantization techniques to compress deep neural networks, it is…
Read MoreIntegration Information Systems Design of Material Planning in the Manufacturing Industry using Service Oriented Architecture
PT XYZ has an Enterprise Resource Planning application that is used by the Planning Department to view stocks and plan production materials. Currently calculation of production materials takes more than 30 seconds just to export to Excel then a few minutes to adjust the data format to the planning form and the data used is…
Read MoreOn the Combination of Static Analysis for Software Security Assessment – A Case Study of an Open-Source e-Government Project
Static Application Security Testing (SAST) is a popular quality assurance technique in software engineering. However, integrating SAST tools into industry-level product development and security assessment poses various technical and managerial challenges. In this work, we reported a longitudinal case study of adopting SAST as a part of a human-driven security assessment for an open-source e-government…
Read MoreAnalysis of Vulnerabilities, Risks and Threats in the Process of Quota Allocation for the State University of Ecuador
Different models and standards of information security were analyzed, to adopt a model that mitigates vulnerabilities, risks and threats in the quota allocation process for the State University in Ecuador. The main objective is defining a prototype for the management of processes and information security in this type of organization. It was used the deductive…
Read MoreComputer Security as an Engineering Practice: A System Engineering Discussion
We examine design principles from more than 20 years of experience in the implementation and protection of mission critical flight systems used by the Mission Design and Navigation Section at NASA’s Jet Propulsion Laboratory. Spacecraft navigation has rigorous requirements for completeness and accuracy, often under critical and uncompromising time pressure. Fault tolerant and robust design…
Read MoreSpatial Modeling of Flood Risk in Karawang
Conceptually, flood modeling can be done based on process and data availability (data driven model). The implementation of flood mitigation requires accurate data, which can be obtained from high resolution satellite imagery, vertical air photos and high-resolution Digital Elevation Model (DEM). Modeling using high accuracy DEM data can detect landforms in more detail. The objective…
Read MoreIntrusion detection in cloud computing based attack patterns and risk assessment
This paper is an extension of work originally presented in SYSCO CONF.We extend our previous work by presenting the initial results of the implementation of intrusion detection based on risk assessment on cloud computing. The idea focuses on a novel approach for detecting cyber-attacks on the cloud environment by analyzing attacks pattern using risk assessment…
Read More
