首页 > 最新文献

Information & Security: An International Journal最新文献

英文 中文
IMPLEMENTATION OF THE "KINEROS" MODEL FOR ESTIMATION OF THE FLOOD PRONE TERRITORIES IN THE MALKI ISKAR RIVER BASIN 实施“kineros”模型估算malki iskar河流域洪水易发地区
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.2408
Mariyana Nikolova, S. Nedkov, V. Nikolov, I. Zuzdrov, M. Genev, T. Kotsev, R. Vatseva, J. Krumova
This article presents main results from the implementation of the KINEROS model to the Malki Iskar river basin above the town of Etropole. KINEROS is a mathematical model based on fundamental physical laws aimed at simulating the spatial distribution of water balance elements for a given meteoro- logical event. A detailed study of the set of physical geographical flood risk factors (relief, climate, waters, soils, LC/LU) has been performed. The analysis has been carried out on the basis of specific methods for estimation of the role of each factor. The results show the importance and practicality of implementation of the GIS, RS and flood risk modeling in generally unpredictable dangerous situations, which are typical for small mountain catchments. The application of the KINEROS model for simulation of events depending on the changes in the landscape conditions may in- crease significantly the effect of flood risk management in mountainous munici- palities.
本文介绍了在Etropole镇上方的Malki Iskar河流域实施KINEROS模型的主要结果。KINEROS是一个基于基本物理定律的数学模型,旨在模拟给定气象事件中水平衡元素的空间分布。对自然地理洪水风险因子(地形、气候、水、土壤、LC/LU)进行了详细的研究。分析是在具体方法的基础上进行的,以估计每个因素的作用。结果表明,在一般不可预测的危险情况下,GIS、RS和洪水风险建模的实施具有重要意义和实用性。应用KINEROS模型对依赖于景观条件变化的事件进行模拟,可以显著提高山区城市洪水风险管理的效果。
{"title":"IMPLEMENTATION OF THE \"KINEROS\" MODEL FOR ESTIMATION OF THE FLOOD PRONE TERRITORIES IN THE MALKI ISKAR RIVER BASIN","authors":"Mariyana Nikolova, S. Nedkov, V. Nikolov, I. Zuzdrov, M. Genev, T. Kotsev, R. Vatseva, J. Krumova","doi":"10.11610/ISIJ.2408","DOIUrl":"https://doi.org/10.11610/ISIJ.2408","url":null,"abstract":"This article presents main results from the implementation of the KINEROS model to the Malki Iskar river basin above the town of Etropole. KINEROS is a mathematical model based on fundamental physical laws aimed at simulating the spatial distribution of water balance elements for a given meteoro- logical event. A detailed study of the set of physical geographical flood risk factors (relief, climate, waters, soils, LC/LU) has been performed. The analysis has been carried out on the basis of specific methods for estimation of the role of each factor. The results show the importance and practicality of implementation of the GIS, RS and flood risk modeling in generally unpredictable dangerous situations, which are typical for small mountain catchments. The application of the KINEROS model for simulation of events depending on the changes in the landscape conditions may in- crease significantly the effect of flood risk management in mountainous munici- palities.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131133630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
'FOCUS': Foresight Security Scenarios to Plan for Research to Support the 'EU 2035' as a Comprehensive Security Provider “聚焦”:展望安全情景,规划研究,以支持“欧盟2035”作为综合安全提供者
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.2901
Alexander Siedschlag
This special issue of Information & Security presents selected results from the EU security research project FOCUS (“Foresight Security Scenarios – Mapping Research to a Comprehensive Approach to Exogenous EU Roles”). This project aims to define the most plausible threat scenarios that affect the “borderline” between the EU’s external and internal dimensions to security – and to derive guidance for the Union’s future possible security roles and decisions to plan research in support of those roles. Scenario foresight in the FOCUS project was done on the level of critical and creative – yet methodologically guided – forward thinking at strategic level in order to increase the EU’s ability to cope with relevant alternative futures from the near future until 2035. A first group of articles discusses methods and techniques in scenario-based foresight as integrated and applied within FOCUS. A second group of articles presents selected empirical results from FOCUS scenario foresight on threats, risk management needs, and future EU roles as a comprehensive security provider. A third group of articles introduces research planning implications from selected FOCUS security scenarios. A final set of articles addresses the way ahead: How FOCUS methods and results could be useful beyond the immediate mission and scope of the project to guide policy development and industry strategies.
本期《信息与安全》特刊介绍了欧盟安全研究项目FOCUS(“预见安全情景-将研究映射到外部欧盟角色的综合方法”)的精选结果。该项目旨在确定影响欧盟外部和内部安全之间“边界”的最可能的威胁情景,并为欧盟未来可能的安全角色和支持这些角色的计划研究决策提供指导。FOCUS项目中的情景预见是在战略层面的批判性和创造性水平上完成的,但在方法上是指导的,目的是提高欧盟应对从不久的将来到2035年的相关替代未来的能力。第一组文章讨论了在FOCUS中集成和应用的基于场景的预见的方法和技术。第二组文章介绍了FOCUS情景预测对威胁、风险管理需求和未来欧盟作为综合安全提供者角色的实证结果。第三组文章介绍了选定的FOCUS安全场景的研究规划含义。最后一组文章讨论了未来的道路:FOCUS方法和结果如何在项目的直接任务和范围之外发挥作用,以指导政策制定和行业战略。
{"title":"'FOCUS': Foresight Security Scenarios to Plan for Research to Support the 'EU 2035' as a Comprehensive Security Provider","authors":"Alexander Siedschlag","doi":"10.11610/ISIJ.2901","DOIUrl":"https://doi.org/10.11610/ISIJ.2901","url":null,"abstract":"This special issue of Information & Security presents selected results from the EU security research project FOCUS (“Foresight Security Scenarios – Mapping Research to a Comprehensive Approach to Exogenous EU Roles”). This project aims to define the most plausible threat scenarios that affect the “borderline” between the EU’s external and internal dimensions to security – and to derive guidance for the Union’s future possible security roles and decisions to plan research in support of those roles. Scenario foresight in the FOCUS project was done on the level of critical and creative – yet methodologically guided – forward thinking at strategic level in order to increase the EU’s ability to cope with relevant alternative futures from the near future until 2035. A first group of articles discusses methods and techniques in scenario-based foresight as integrated and applied within FOCUS. A second group of articles presents selected empirical results from FOCUS scenario foresight on threats, risk management needs, and future EU roles as a comprehensive security provider. A third group of articles introduces research planning implications from selected FOCUS security scenarios. A final set of articles addresses the way ahead: How FOCUS methods and results could be useful beyond the immediate mission and scope of the project to guide policy development and industry strategies.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"22 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131191882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hybrid Warfare Similation-based Learning: Challenges and Opportunities 基于混合战争的模拟学习:挑战与机遇
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.3919
B. Vassileva, M. Zwilling
{"title":"Hybrid Warfare Similation-based Learning: Challenges and Opportunities","authors":"B. Vassileva, M. Zwilling","doi":"10.11610/ISIJ.3919","DOIUrl":"https://doi.org/10.11610/ISIJ.3919","url":null,"abstract":"","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128866006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Cost-Effective Approach to Securing Systems through Partial Decentralization 通过部分分权保护系统的成本效益方法
Pub Date : 1900-01-01 DOI: 10.11610/isij.4707
N. Savchenko, V. Tsyganok, O. Andriichuk
A study has been conducted on the methods of secure computation and storage decentralization, based on expert and decision support systems’ needs. It identified the common disadvantages of modern, Distributed Ledger Technologybased (DLT-based) decentralized systems and suggested a solution to it – the universal transaction delegation method. This method eliminates the complexity of a decentralized system from end-users’ point of view, which during the study was identified as the main disadvantage of DLT-based systems. This article provides a brief overview of existing approaches to solve the usage complexity problem, based on data from well-known projects built with Ethereum, the leading DLT-based smart contract platform. As a result of the research, we implemented the universal transaction delegation method which does not depend on the signature standard used in the decentralized program. In addition, we present results of an experimental economic analysis of the solution based on real network tests and data as of 2020. A R T I C L E I N F O : RECEIVED: 08 JUNE 2020 REVISED: 06 SEP 2020 ONLINE: 21 SEP 2020 K E Y W O R D S : distributed ledger technology, decentralized data platforms, delegated transactions, Ethereum, data platforms Creative Commons BY-NC 4.0 N. Savchenko, V. Tsyganok & O. Andriichuk, ISIJ 47, no. 1 (2020): 109-121
基于专家和决策支持系统的需求,对安全计算和存储分散的方法进行了研究。它确定了现代基于分布式账本技术(dlt)的去中心化系统的共同缺点,并提出了一种解决方案——通用交易委托方法。从最终用户的角度来看,这种方法消除了分散系统的复杂性,这在研究期间被确定为基于dlt的系统的主要缺点。本文简要概述了解决使用复杂性问题的现有方法,基于使用以太坊构建的知名项目的数据,以太坊是领先的基于dlt的智能合约平台。研究的结果是,我们实现了一种不依赖于去中心化方案中使用的签名标准的通用事务委托方法。此外,我们还介绍了基于真实网络测试和截至2020年的数据的解决方案的实验性经济分析结果。A R T I C L EI N F O:收稿日期:2020年6月08日修订日期:2020年9月06日在线日期:2020年9月21日K E Y W O R D S:分布式账本技术,去中心化数据平台,委托交易,以太坊,数据平台创作共用BY-NC 4.0 N. Savchenko, V. Tsyganok & O. Andriichuk, ISIJ 47, no。[j] (2020): 109-121
{"title":"A Cost-Effective Approach to Securing Systems through Partial Decentralization","authors":"N. Savchenko, V. Tsyganok, O. Andriichuk","doi":"10.11610/isij.4707","DOIUrl":"https://doi.org/10.11610/isij.4707","url":null,"abstract":"A study has been conducted on the methods of secure computation and storage decentralization, based on expert and decision support systems’ needs. It identified the common disadvantages of modern, Distributed Ledger Technologybased (DLT-based) decentralized systems and suggested a solution to it – the universal transaction delegation method. This method eliminates the complexity of a decentralized system from end-users’ point of view, which during the study was identified as the main disadvantage of DLT-based systems. This article provides a brief overview of existing approaches to solve the usage complexity problem, based on data from well-known projects built with Ethereum, the leading DLT-based smart contract platform. As a result of the research, we implemented the universal transaction delegation method which does not depend on the signature standard used in the decentralized program. In addition, we present results of an experimental economic analysis of the solution based on real network tests and data as of 2020. A R T I C L E I N F O : RECEIVED: 08 JUNE 2020 REVISED: 06 SEP 2020 ONLINE: 21 SEP 2020 K E Y W O R D S : distributed ledger technology, decentralized data platforms, delegated transactions, Ethereum, data platforms Creative Commons BY-NC 4.0 N. Savchenko, V. Tsyganok & O. Andriichuk, ISIJ 47, no. 1 (2020): 109-121","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134470285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Principles of Mitigating and Managing Human System Risks 减轻和管理人类系统风险的原则
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.2802
D. Procházková
The security situation in a territory continuously evolves and, therefore, a new safety culture is formed that takes into account the actual knowledge and experience with interdependencies among public assets, including experience with extreme social crises. In dealing with disasters, historical development of human activities has included numerous preventive and mitigation measures applied according to legal rules, technical standards, norms and public instructions, response systems and ways of recovery. As a rule, these ensure protection against basic disasters and not to ‘calamities’ or random combinations of phenomena that may cause catastrophes. Problem solving the complex territory safety requires proactive, strategic risk management based on qualified data, methods, knowledge and good practices in their application. This paper summarizes the set of principles that ensures qualified decision-making for risk management, or ‘whole-of-life risk governance,’ directed at provision of human security and sustainable development. It addresses the key domains related to effective risk management.
一个领土的安全局势不断发展,因此,一种新的安全文化形成,这种文化考虑到公共资产之间相互依赖的实际知识和经验,包括极端社会危机的经验。在应对灾害方面,人类活动的历史发展包括根据法律规则、技术标准、规范和公共指示、反应系统和恢复方式采取许多预防和减轻措施。作为一项规则,这些确保了对基本灾害的保护,而不是对“灾难”或可能导致灾难的随机现象组合的保护。解决复杂的领土安全问题需要基于合格数据、方法、知识和良好实践的前瞻性、战略性风险管理。本文总结了一套确保风险管理决策合格的原则,或“终身风险治理”,旨在提供人类安全和可持续发展。它涉及与有效风险管理相关的关键领域。
{"title":"Principles of Mitigating and Managing Human System Risks","authors":"D. Procházková","doi":"10.11610/ISIJ.2802","DOIUrl":"https://doi.org/10.11610/ISIJ.2802","url":null,"abstract":"The security situation in a territory continuously evolves and, therefore, a new safety culture is formed that takes into account the actual knowledge and experience with interdependencies among public assets, including experience with extreme social crises. In dealing with disasters, historical development of human activities has included numerous preventive and mitigation measures applied according to legal rules, technical standards, norms and public instructions, response systems and ways of recovery. As a rule, these ensure protection against basic disasters and not to ‘calamities’ or random combinations of phenomena that may cause catastrophes. Problem solving the complex territory safety requires proactive, strategic risk management based on qualified data, methods, knowledge and good practices in their application. This paper summarizes the set of principles that ensures qualified decision-making for risk management, or ‘whole-of-life risk governance,’ directed at provision of human security and sustainable development. It addresses the key domains related to effective risk management.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127248316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Building Societal Resilience against Hybrid Threats 建立社会抵御混合威胁的能力
Pub Date : 1900-01-01 DOI: 10.11610/isij.3908
Orlin Nikolov
This article addresses the efforts of NATO to improve societal resilience in the fight against hybrid threats. It examines hybrid threats as a military strategy that blends conventional warfare, irregular warfare and cyber warfare. From another point of view, the article sees over establishing a safe and secure environment for protection of civilians, as well as how to improve resilience through civil preparedness and tailored NATO support to national authorities. NATO requires a concept to be developed that operationalizes the NATO Policy with emphasis on its implementation through the planning and conduct of operations, training, education and exercises, lessons learned, as well as defence related capacity building activities. The article tackles the question of using the Centres of Excellence as an education and training network in building resilience in society against threats, including hybrid threats and protection of civilians.
本文论述了北约在打击混合威胁中提高社会弹性的努力。它将混合威胁视为一种混合了常规战争、非常规战争和网络战的军事战略。从另一个角度来看,本文着眼于建立一个安全可靠的环境来保护平民,以及如何通过民事准备和量身定制的北约对国家当局的支持来提高复原力。北约需要制定一个概念,使北约政策付诸实施,重点是通过规划和开展行动、培训、教育和演习、吸取教训以及与国防有关的能力建设活动来实施北约政策。本文讨论了如何利用卓越中心作为教育和培训网络,在社会中建立抵御威胁的能力,包括混合威胁和保护平民。
{"title":"Building Societal Resilience against Hybrid Threats","authors":"Orlin Nikolov","doi":"10.11610/isij.3908","DOIUrl":"https://doi.org/10.11610/isij.3908","url":null,"abstract":"This article addresses the efforts of NATO to improve societal resilience in the fight against hybrid threats. It examines hybrid threats as a military strategy that blends conventional warfare, irregular warfare and cyber warfare. From another point of view, the article sees over establishing a safe and secure environment for protection of civilians, as well as how to improve resilience through civil preparedness and tailored NATO support to national authorities. NATO requires a concept to be developed that operationalizes the NATO Policy with emphasis on its implementation through the planning and conduct of operations, training, education and exercises, lessons learned, as well as defence related capacity building activities. The article tackles the question of using the Centres of Excellence as an education and training network in building resilience in society against threats, including hybrid threats and protection of civilians.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115417449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Developing South East European Cooperative Crisis Management Capacity 发展东南欧合作危机管理能力
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.1006
T. Tagarev
Now, with the launch of the Multinational Peace Force South-East Europe (SEE), the Stability Pact and the encouraging developments in the Federal Republic of Yugoslavia, for the first time in history all SEE countries demonstrated their willingness to cooperate in conflict prevention and crisis management and to take responsibility for security and stability in their own home. However, given cultural diversity, resource constraints, and lack of market experience in some of the countries, the challenge is in their ability to do so.
现在,随着东南欧多国和平部队的成立、《稳定公约》和南斯拉夫联邦共和国令人鼓舞的事态发展,所有东南欧国家在历史上第一次表明它们愿意在预防冲突和处理危机方面进行合作,并为本国的安全与稳定承担责任。然而,鉴于一些国家的文化多样性、资源限制和缺乏市场经验,挑战在于它们做到这一点的能力。
{"title":"Developing South East European Cooperative Crisis Management Capacity","authors":"T. Tagarev","doi":"10.11610/ISIJ.1006","DOIUrl":"https://doi.org/10.11610/ISIJ.1006","url":null,"abstract":"Now, with the launch of the Multinational Peace Force South-East Europe (SEE), the Stability Pact and the encouraging developments in the Federal Republic of Yugoslavia, for the first time in history all SEE countries demonstrated their willingness to cooperate in conflict prevention and crisis management and to take responsibility for security and stability in their own home. However, given cultural diversity, resource constraints, and lack of market experience in some of the countries, the challenge is in their ability to do so.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115455918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A BTC-Based Watermarking Scheme for Digital Images 一种基于btc的数字图像水印方案
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.1515
Shu-Fen Tu, Ching-Sheng Hsu
This article presents a novel watermarking scheme for digital images based on Block Truncation Coding (BTC). Unlike other watermarking schemes, the proposed method does not alter the original image during the process of watermark casting. Instead, an ownership share is constructed as a key to reveal the watermark without resorting to the original image. Moreover, it is possible to register multiple watermarks for a single host image in the proposed scheme. During watermark casting, the feature of the host image, which is extracted by means of BTC, is com- bined with the watermark to generate an ownership share. When revealing the wa- termark, the author can address his/her ownership share to extract the watermark. Even though the host image has been attacked, the extracted watermark is still per- ceivable. Altogether, the method has many other applications besides copyright protection. For example, it can be used to cover the transmission of confidential images. The experimental results of this study show the robustness of the novel scheme against several common attacks.
提出了一种基于块截断编码(BTC)的数字图像水印方案。与其他水印方案不同,该方法在水印投影过程中不改变原始图像。取而代之的是,一个所有权份额被构造为一个密钥来显示水印而不诉诸于原始图像。此外,该方案还可以对单个主机图像注册多个水印。在水印转换过程中,通过BTC提取的主机图像特征与水印相结合,生成所有权份额。在显示水印时,作者可以通过定位自己的所有权份额来提取水印。即使宿主图像受到攻击,提取出来的水印仍然是可识别的。总之,除了版权保护之外,该方法还有许多其他应用。例如,它可以用来掩盖机密图像的传输。实验结果表明,该方案对几种常见攻击具有较强的鲁棒性。
{"title":"A BTC-Based Watermarking Scheme for Digital Images","authors":"Shu-Fen Tu, Ching-Sheng Hsu","doi":"10.11610/ISIJ.1515","DOIUrl":"https://doi.org/10.11610/ISIJ.1515","url":null,"abstract":"This article presents a novel watermarking scheme for digital images based on Block Truncation Coding (BTC). Unlike other watermarking schemes, the proposed method does not alter the original image during the process of watermark casting. Instead, an ownership share is constructed as a key to reveal the watermark without resorting to the original image. Moreover, it is possible to register multiple watermarks for a single host image in the proposed scheme. During watermark casting, the feature of the host image, which is extracted by means of BTC, is com- bined with the watermark to generate an ownership share. When revealing the wa- termark, the author can address his/her ownership share to extract the watermark. Even though the host image has been attacked, the extracted watermark is still per- ceivable. Altogether, the method has many other applications besides copyright protection. For example, it can be used to cover the transmission of confidential images. The experimental results of this study show the robustness of the novel scheme against several common attacks.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115592081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Adopting Machine Learning for Images Transferred with LoRaWAN LoRaWAN传输图像采用机器学习
Pub Date : 1900-01-01 DOI: 10.11610/isij.4712
Maksym Brazhenenko, V. Shevchenko, O. Bychkov, Boyan Jekov, P. Petrova, E. Kovatcheva
A R T I C L E I N F O : RECEIVED: 08 JUNE 2020 REVISED: 09 SEP 2020 ONLINE: 22 SEP 2020 K E Y W O R D S : IoT, LoRa, Raspberry PI, security, cloud, machine learning Creative Commons BY-NC 4.0 Adopting Machine Learning for Images Transferred with LoRaWAN 173 Introduction Internet of Things (IoT) denotes the concept of connected smart devices that communicate seamlessly over the Internet. As the market keeps growing, we can classify IoT solution into several major categories. The most common way to denote them is – mission-critical application and massive IoT, based on the technical and commercial requirements they prioritize. Mission-critical solutions are those which require very low latency levels on ultra-reliable networks, often combined with very high throughput. Massive IoT applications, on the other hand, refers to applications which are less latency-sensitive and have lower throughput requirements but require many low-cost, low-energy consumption devices on a network with excellent coverage. The growing popularity of IoT has driven up the demand for massive IoT technologies and the number of smart devices worldwide continues to increase at a dramatic pace. The key requirements for massive IoT are long battery life, good coverage, low cost, and performance flexibility. The technology category that addressing those requirements is low power wide area network (LPWAN) technologies. Nevertheless, modern LPWAN networks being actively analysed 3 within past years still do not have appropriate information security solutions. Probably the first complete analysis of threats and vulnerabilities was published recently. They figured out that LoRa devices have coexisting problems with other LoRa networks and devices. Devices using lower spreading factors can corrupt signals from devices using higher spreading factor in the same network. Furthermore, most LoRaWAN security measures such as the key management and frame counters need to be implemented and taken care of by developers or manufacturers. Therefore, poor implementation also may put end-devices and gateways in danger. A series of articles on key management for LoRa based networks 5,6 was published later advocating for key-management solutions. There was also proposed a way to secure communication for healthcare monitoring system. Another great post describe interference vulnerability. Information security threats should be analysed for many aspects of IoT solutions flow including but not limiting data collection by sensors, data transmission, data transformation, and analysis. All of the described aspects should be considered as sensitive. Threats rate for the given type of system can be classified with the following order for CIA triad (given order of importance from 1 to N) – 1. Integrity, 2. Availability, 3. Confidentiality. This order is driven by the fact, that majority of issues related to confidentiality has human nature, where’s integrity and availability are more technology concerns. In
需要注意的重要一点是,物联网通信范围内的术语完整性与其他更常见的web或桌面应用程序不同。数据完整性是维护和保证数据在其生命周期内的准确性和一致性。我们肯定无法以同样的方式评估大多数物联网解决方案的完整性,因为LPWAN无法实现表达质量。然而,即使丢失大部分数据也不会阻止机器学习算法产生完全相同的输出。综上所述,我们建议定义通过LPWAN网络发送的信号的数据完整性,如果客户端(机器)对初始信号的解释和接收的信号没有差异。对LoRaWAN 175传输的图像采用机器学习保护配置文件。需求概要1概要2概要3概要4概要5 OR 1 1 TI 1 1 1 1 1 4 4 4
{"title":"Adopting Machine Learning for Images Transferred with LoRaWAN","authors":"Maksym Brazhenenko, V. Shevchenko, O. Bychkov, Boyan Jekov, P. Petrova, E. Kovatcheva","doi":"10.11610/isij.4712","DOIUrl":"https://doi.org/10.11610/isij.4712","url":null,"abstract":"A R T I C L E I N F O : RECEIVED: 08 JUNE 2020 REVISED: 09 SEP 2020 ONLINE: 22 SEP 2020 K E Y W O R D S : IoT, LoRa, Raspberry PI, security, cloud, machine learning Creative Commons BY-NC 4.0 Adopting Machine Learning for Images Transferred with LoRaWAN 173 Introduction Internet of Things (IoT) denotes the concept of connected smart devices that communicate seamlessly over the Internet. As the market keeps growing, we can classify IoT solution into several major categories. The most common way to denote them is – mission-critical application and massive IoT, based on the technical and commercial requirements they prioritize. Mission-critical solutions are those which require very low latency levels on ultra-reliable networks, often combined with very high throughput. Massive IoT applications, on the other hand, refers to applications which are less latency-sensitive and have lower throughput requirements but require many low-cost, low-energy consumption devices on a network with excellent coverage. The growing popularity of IoT has driven up the demand for massive IoT technologies and the number of smart devices worldwide continues to increase at a dramatic pace. The key requirements for massive IoT are long battery life, good coverage, low cost, and performance flexibility. The technology category that addressing those requirements is low power wide area network (LPWAN) technologies. Nevertheless, modern LPWAN networks being actively analysed 3 within past years still do not have appropriate information security solutions. Probably the first complete analysis of threats and vulnerabilities was published recently. They figured out that LoRa devices have coexisting problems with other LoRa networks and devices. Devices using lower spreading factors can corrupt signals from devices using higher spreading factor in the same network. Furthermore, most LoRaWAN security measures such as the key management and frame counters need to be implemented and taken care of by developers or manufacturers. Therefore, poor implementation also may put end-devices and gateways in danger. A series of articles on key management for LoRa based networks 5,6 was published later advocating for key-management solutions. There was also proposed a way to secure communication for healthcare monitoring system. Another great post describe interference vulnerability. Information security threats should be analysed for many aspects of IoT solutions flow including but not limiting data collection by sensors, data transmission, data transformation, and analysis. All of the described aspects should be considered as sensitive. Threats rate for the given type of system can be classified with the following order for CIA triad (given order of importance from 1 to N) – 1. Integrity, 2. Availability, 3. Confidentiality. This order is driven by the fact, that majority of issues related to confidentiality has human nature, where’s integrity and availability are more technology concerns. In ","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115765456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Volunteers in Disaster Relief in Zones of Armed Conflict: The Case of Syrian Refugee Camps in Jordan 武装冲突地区的救灾志愿者:约旦境内叙利亚难民营的案例
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.4013
Naill M. Momani, M. Alzaghal
Volunteerism plays an essential role in the development of any society. Society’s level of culture and awareness can be rated by measuring the amount and thrust of volunteerism movements. Volunteerism has proven to be essential in emergency management. Individual volunteers and volunteer groups provide a variety of skills and resources that can be used in emergencies. In Jordan, the concept of volunteerism already plays a considerable role in both the economy and in social development. This paper reviews the implementation of current and future trends for volunteerism systems in Syrian refugee camps’ management in Jordan and provides a social analysis of why, or why not, people volunteer in different aspects of society. It suggests a volunteer system for disaster management aiming to enhance mitigation and response capabilities for future disasters.
志愿服务在任何社会的发展中都起着重要的作用。社会的文化和意识水平可以通过衡量志愿服务运动的数量和力度来衡量。志愿服务已被证明在应急管理中至关重要。志愿者个人和志愿者团体提供各种可以在紧急情况下使用的技能和资源。在约旦,志愿服务的概念已经在经济和社会发展中发挥了相当大的作用。本文回顾了志愿服务系统在约旦叙利亚难民营管理中的实施现状和未来趋势,并对社会不同方面的人们为什么或为什么不做志愿服务提供了社会分析。它建议建立一个志愿者灾害管理系统,旨在提高对未来灾害的缓解和反应能力。
{"title":"Volunteers in Disaster Relief in Zones of Armed Conflict: The Case of Syrian Refugee Camps in Jordan","authors":"Naill M. Momani, M. Alzaghal","doi":"10.11610/ISIJ.4013","DOIUrl":"https://doi.org/10.11610/ISIJ.4013","url":null,"abstract":"Volunteerism plays an essential role in the development of any society. Society’s level of culture and awareness can be rated by measuring the amount and thrust of volunteerism movements. Volunteerism has proven to be essential in emergency management. Individual volunteers and volunteer groups provide a variety of skills and resources that can be used in emergencies. In Jordan, the concept of volunteerism already plays a considerable role in both the economy and in social development. This paper reviews the implementation of current and future trends for volunteerism systems in Syrian refugee camps’ management in Jordan and provides a social analysis of why, or why not, people volunteer in different aspects of society. It suggests a volunteer system for disaster management aiming to enhance mitigation and response capabilities for future disasters.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"19 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115790719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Information & Security: An International Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1