首页 > 最新文献

Journal of Applied Security Research最新文献

英文 中文
Public-Private Partnerships: Exploring Perceptions and Efficacy of Community Security Patrols 公私伙伴关系:探索社区安全巡逻的观念和效力
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2022-06-16 DOI: 10.1080/19361610.2022.2086782
S. Holmes, R. Wolf, Thomas Baker
{"title":"Public-Private Partnerships: Exploring Perceptions and Efficacy of Community Security Patrols","authors":"S. Holmes, R. Wolf, Thomas Baker","doi":"10.1080/19361610.2022.2086782","DOIUrl":"https://doi.org/10.1080/19361610.2022.2086782","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":" ","pages":""},"PeriodicalIF":1.3,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45245557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Enhancement of Third Parties Is Needed in Global Supply Chain Management 全球供应链管理需要加强第三方的安全
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2022-06-15 DOI: 10.1080/19361610.2022.2086785
Y. Takefuji
Abstract Incident reports show the high risk of losing trust in global supply chain management. Under the covid-19 pandemic, cloud-based global supply chains have been vulnerable to malicious attacks. The goal of this paper is to show the high risk caused by third-party access in the current global supply chains and how to mitigate it. Based on the incident reports, global supply chain leaders are unaware of the risks of third-party access. The current global supply chains must be transformed into robust and resilient systems against malicious attacks. This paper shows methods on how to mitigate the high-security risk. HIGHLIGHTS Incident reports show the high risk of losing trust in global supply chain management against malicious attacks. The high risk caused by third-party access in the current global supply chains will be illustrated. Global supply chain leaders are unaware of the risks of third-party access. The global supply chains must be transformed into robust systems. This paper shows methods on how to mitigate the high-security risk in third-party logistics. The lower the risk, the lower the chance of losing trust. The more a leader is aware of the high risks, the less likely he or she is to lose trust.
摘要事件报告显示,在全球供应链管理中,失去信任的风险很高。在新冠肺炎大流行下,基于云的全球供应链容易受到恶意攻击。本文的目的是展示当前全球供应链中第三方访问造成的高风险以及如何减轻风险。根据事件报告,全球供应链领导者并不知道第三方接入的风险。当前的全球供应链必须转变为强大和有弹性的系统,以抵御恶意攻击。本文介绍了如何降低高安全风险的方法。亮点事件报告显示,针对恶意攻击,全球供应链管理失去信任的风险很高。将说明当前全球供应链中第三方准入造成的高风险。全球供应链领导者没有意识到第三方访问的风险。全球供应链必须转变为稳健的系统。本文介绍了如何降低第三方物流中的高安全风险的方法。风险越低,失去信任的几率就越低。领导者越是意识到高风险,他或她失去信任的可能性就越小。
{"title":"Security Enhancement of Third Parties Is Needed in Global Supply Chain Management","authors":"Y. Takefuji","doi":"10.1080/19361610.2022.2086785","DOIUrl":"https://doi.org/10.1080/19361610.2022.2086785","url":null,"abstract":"Abstract Incident reports show the high risk of losing trust in global supply chain management. Under the covid-19 pandemic, cloud-based global supply chains have been vulnerable to malicious attacks. The goal of this paper is to show the high risk caused by third-party access in the current global supply chains and how to mitigate it. Based on the incident reports, global supply chain leaders are unaware of the risks of third-party access. The current global supply chains must be transformed into robust and resilient systems against malicious attacks. This paper shows methods on how to mitigate the high-security risk. HIGHLIGHTS Incident reports show the high risk of losing trust in global supply chain management against malicious attacks. The high risk caused by third-party access in the current global supply chains will be illustrated. Global supply chain leaders are unaware of the risks of third-party access. The global supply chains must be transformed into robust systems. This paper shows methods on how to mitigate the high-security risk in third-party logistics. The lower the risk, the lower the chance of losing trust. The more a leader is aware of the high risks, the less likely he or she is to lose trust.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"766 - 773"},"PeriodicalIF":1.3,"publicationDate":"2022-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43688960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modified Deterministic Approach for Size Invariant Visual Secret Sharing with Improved Quality of Recovered Secret 改进的确定性大小不变视觉秘密共享方法,提高了恢复秘密的质量
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2022-06-02 DOI: 10.1080/19361610.2022.2080470
R. Chaturvedi, Sudeep D. Thepade, Swati Ahirrao
Abstract In the digital world, securing data is very significant. Digital data can focus either on content secrecy or the quality of recovered secret content. Visual Secret Sharing (VSS) becomes vital when content secrecy is essential over quality. VSS encrypts the secret into “n” share. The individual share cannot reveal any information; the secret gets revealed only when a predefined number of shares come together. Earlier attempted probabilistic and random grid approaches of size invariant VSS compromise in quality of recovered secret. Paper presents a method as a modified deterministic approach for size invariant VSS with improved quality of recovered secret; giving minimum Mean Squared Error (MSE), maximum Peak Signal to Noise Ratio (PSNR), and Structural Similarity Index (SSIM) close to “1” as compared to other existing methods.
在数字世界中,保护数据是非常重要的。数字数据既可以关注内容的保密性,也可以关注恢复的秘密内容的质量。当内容保密比质量更重要时,视觉秘密共享(VSS)变得至关重要。VSS将秘密加密为“n”共享。个人共享不能泄露任何信息;只有当预定义数量的股份聚集在一起时,这个秘密才会被披露。先前尝试的大小不变VSS的概率和随机网格方法在恢复秘密的质量上存在缺陷。本文提出了一种改进的确定性大小不变VSS方法,提高了恢复密钥的质量;与其他现有方法相比,给出最小均方误差(MSE)、最大峰值信噪比(PSNR)和接近“1”的结构相似指数(SSIM)。
{"title":"Modified Deterministic Approach for Size Invariant Visual Secret Sharing with Improved Quality of Recovered Secret","authors":"R. Chaturvedi, Sudeep D. Thepade, Swati Ahirrao","doi":"10.1080/19361610.2022.2080470","DOIUrl":"https://doi.org/10.1080/19361610.2022.2080470","url":null,"abstract":"Abstract In the digital world, securing data is very significant. Digital data can focus either on content secrecy or the quality of recovered secret content. Visual Secret Sharing (VSS) becomes vital when content secrecy is essential over quality. VSS encrypts the secret into “n” share. The individual share cannot reveal any information; the secret gets revealed only when a predefined number of shares come together. Earlier attempted probabilistic and random grid approaches of size invariant VSS compromise in quality of recovered secret. Paper presents a method as a modified deterministic approach for size invariant VSS with improved quality of recovered secret; giving minimum Mean Squared Error (MSE), maximum Peak Signal to Noise Ratio (PSNR), and Structural Similarity Index (SSIM) close to “1” as compared to other existing methods.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"700 - 717"},"PeriodicalIF":1.3,"publicationDate":"2022-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45034632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application and Criminalization of the Artificial Intelligence in Business: Recommendation to Counter the Regulatory Challenges 人工智能在商业中的应用和刑事定罪:应对监管挑战的建议
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2022-05-27 DOI: 10.1080/19361610.2022.2079939
A. Mahmud
Abstract Artificial Intelligence (AI) is playing a significant role in our social and daily life for technological development. The efficient integration of AI into business organizations or firms is improving performance and efficiency on a significant scale. Nowadays, artificial intelligence (AI) is assisting criminal activities or committing crimes through autonomous activity related to business, e-commerce, and market manipulation. AI could be used to aid criminal activity or, in certain situations, a mistake has resulted in criminal activity and most of the fields lack strong legislative safeguards due to the regulatory challenges imposed by the special nature of AI-Crime (AIC). The paper has examined the application and criminalization of AI in business and firm management. As we will have to strengthen the legislation for managing, preventing, and punishing AI-based business-related crimes, the last segment of the paper has suggested recommendations to counter the regulatory challenges.
随着技术的发展,人工智能(AI)在我们的社会和日常生活中发挥着重要的作用。人工智能与商业组织或公司的有效整合正在显著提高绩效和效率。如今,人工智能(AI)正在通过与商业、电子商务、市场操纵相关的自主活动协助犯罪活动或实施犯罪。人工智能可以用来帮助犯罪活动,或者在某些情况下,一个错误导致了犯罪活动,由于人工智能犯罪(AIC)的特殊性所带来的监管挑战,大多数领域缺乏强有力的立法保障。本文考察了人工智能在商业和企业管理中的应用和犯罪化。由于我们必须加强管理、预防和惩罚基于人工智能的商业相关犯罪的立法,本文的最后一部分提出了应对监管挑战的建议。
{"title":"Application and Criminalization of the Artificial Intelligence in Business: Recommendation to Counter the Regulatory Challenges","authors":"A. Mahmud","doi":"10.1080/19361610.2022.2079939","DOIUrl":"https://doi.org/10.1080/19361610.2022.2079939","url":null,"abstract":"Abstract Artificial Intelligence (AI) is playing a significant role in our social and daily life for technological development. The efficient integration of AI into business organizations or firms is improving performance and efficiency on a significant scale. Nowadays, artificial intelligence (AI) is assisting criminal activities or committing crimes through autonomous activity related to business, e-commerce, and market manipulation. AI could be used to aid criminal activity or, in certain situations, a mistake has resulted in criminal activity and most of the fields lack strong legislative safeguards due to the regulatory challenges imposed by the special nature of AI-Crime (AIC). The paper has examined the application and criminalization of AI in business and firm management. As we will have to strengthen the legislation for managing, preventing, and punishing AI-based business-related crimes, the last segment of the paper has suggested recommendations to counter the regulatory challenges.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"689 - 699"},"PeriodicalIF":1.3,"publicationDate":"2022-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46004240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Understanding the Users’ Intention to Use the Three-Factor Authentication for Preserving the Privacy of Patient Data 了解用户使用三因素认证保护患者数据隐私的意图
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2022-05-03 DOI: 10.1080/19361610.2022.2060025
Niranjan Gandhi, Kanchan Patil
Abstract Digital health is the foundation for the future growth of healthcare. The healthcare industry is leveraging digital transformation to empower the association between physicians and patients and ameliorate health results. Researchers and experts in health informatics are eager to see how new technologies can be used in the healthcare domain to enable real-time health monitoring, such as remote access to users' health data, tracking and alerts, and real-time reporting, allowing doctors to better care for their patients. By improving the security, privacy, and interoperability of health records, as well as easing Health Information Exchanges (HIE), the adoption of healthcare technologies can be encouraged. This can be accomplished through the use of a three-factor authentication architecture, which not only increases information assurance at a cheap rate but also defends patients' privacy in dispersed systems. Hence, using Technology Acceptance Model (TAM), this paper reflects patients’ and health professionals’ intention to use and implement the three-factor authentication in the master component of information technology in health: Electronic Health Records (EHR) systems. User authentication is an important component that possibly is incorporated in Electronic Health Records (EHRs) to shield patient information and restrict access to the medical server by unauthorized individuals. This research aimed to discover the relationship between perceived usefulness, perceived ease of use, perceived risk, trust, security and privacy, Information Integrity, and computer self-efficacy and the intention to use three-factor authentication for EHR systems. Respondents were requested to fill the questionnaire on their health data using google forms and partial least squares structural equation modeling was used to analyze around 193 responses. Results stipulated that intention to use was directly influenced mainly by perceived usefulness, perceived ease of use, perceived risk, trust, and information integrity. Age, gender, and knowledge of data security and privacy were used to conduct a moderation analysis, which revealed significant variations between the groups in terms of the effectiveness of certain associations and the average responses between the variables. This will aid the researchers in identifying the latest trends and recognizing areas in the authentication system that need improvement.
数字健康是未来医疗保健发展的基础。医疗保健行业正在利用数字化转型来增强医生和患者之间的联系,并改善健康结果。健康信息学领域的研究人员和专家渴望看到如何在医疗保健领域使用新技术来实现实时健康监测,例如远程访问用户的健康数据、跟踪和警报以及实时报告,从而使医生能够更好地照顾患者。通过改进健康记录的安全性、隐私性和互操作性,以及简化健康信息交换(HIE),可以鼓励采用医疗保健技术。这可以通过使用三因素身份验证架构来实现,这不仅可以以低成本增加信息保障,还可以在分散的系统中保护患者的隐私。因此,本文使用技术接受模型(TAM)来反映患者和卫生专业人员在健康信息技术的主要组成部分:电子健康档案(EHR)系统中使用和实施三因素认证的意图。用户身份验证是电子健康记录(Electronic Health Records, EHRs)中可能包含的一个重要组件,用于保护患者信息并限制未经授权的个人访问医疗服务器。本研究旨在探讨感知有用性、感知易用性、感知风险、信任、安全和隐私、信息完整性和计算机自我效能感与电子病历系统使用三因素认证意愿之间的关系。受访者被要求使用谷歌表格填写关于他们健康数据的问卷,并使用偏最小二乘结构方程模型分析了大约193份回答。结果表明,使用意向主要受感知有用性、感知易用性、感知风险、信任和信息完整性的直接影响。年龄、性别和数据安全和隐私知识被用来进行适度分析,这揭示了组之间在某些关联的有效性和变量之间的平均反应方面的显着差异。这将有助于研究人员识别认证系统中需要改进的最新趋势和领域。
{"title":"Understanding the Users’ Intention to Use the Three-Factor Authentication for Preserving the Privacy of Patient Data","authors":"Niranjan Gandhi, Kanchan Patil","doi":"10.1080/19361610.2022.2060025","DOIUrl":"https://doi.org/10.1080/19361610.2022.2060025","url":null,"abstract":"Abstract Digital health is the foundation for the future growth of healthcare. The healthcare industry is leveraging digital transformation to empower the association between physicians and patients and ameliorate health results. Researchers and experts in health informatics are eager to see how new technologies can be used in the healthcare domain to enable real-time health monitoring, such as remote access to users' health data, tracking and alerts, and real-time reporting, allowing doctors to better care for their patients. By improving the security, privacy, and interoperability of health records, as well as easing Health Information Exchanges (HIE), the adoption of healthcare technologies can be encouraged. This can be accomplished through the use of a three-factor authentication architecture, which not only increases information assurance at a cheap rate but also defends patients' privacy in dispersed systems. Hence, using Technology Acceptance Model (TAM), this paper reflects patients’ and health professionals’ intention to use and implement the three-factor authentication in the master component of information technology in health: Electronic Health Records (EHR) systems. User authentication is an important component that possibly is incorporated in Electronic Health Records (EHRs) to shield patient information and restrict access to the medical server by unauthorized individuals. This research aimed to discover the relationship between perceived usefulness, perceived ease of use, perceived risk, trust, security and privacy, Information Integrity, and computer self-efficacy and the intention to use three-factor authentication for EHR systems. Respondents were requested to fill the questionnaire on their health data using google forms and partial least squares structural equation modeling was used to analyze around 193 responses. Results stipulated that intention to use was directly influenced mainly by perceived usefulness, perceived ease of use, perceived risk, trust, and information integrity. Age, gender, and knowledge of data security and privacy were used to conduct a moderation analysis, which revealed significant variations between the groups in terms of the effectiveness of certain associations and the average responses between the variables. This will aid the researchers in identifying the latest trends and recognizing areas in the authentication system that need improvement.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"597 - 626"},"PeriodicalIF":1.3,"publicationDate":"2022-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46904550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Classification Performance for Malware Detection Using Genetic Programming Feature Selection Techniques 利用遗传规划特征选择技术改进恶意软件检测的分类性能
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2022-05-01 DOI: 10.1080/19361610.2022.2067459
Heba Harahsheh, M. Alshraideh, S. Al-Sharaeh, R. Al-Sayyed
Abstract Malware is the term used to describe any malicious software or code that is harmful to systems. From day to day, new malicious programs appear. To classify malware according to its characteristics, machine learning is now being used; this is because most new malware contains patterns that are similar to old ones. This paper proposes two feature selection methods based on Genetic Programming (GP) for predicting malware; the first is called Genetic Programming-Mean (GPM), and the second is called Genetic Programming-Mean Plus (GPMP). The results of these two methods were compared with three state-of-the-art popular feature selection techniques: filter-based, wrapper-based, and Chi-square. In this work, we compare the two proposed methods (GPM and GPMP) with these three widely used feature selection techniques. The results demonstrate that the proposed techniques beat these state-of-the-art ones in terms of accuracy and F-score. The results also revealed that the proposed methods employed less computation time and hence an enhanced performance when compared with filter-based, and wrapper-based feature selection. The proposed methods were evaluated using four datasets. Two classifiers were used to evaluate the proposed feature selection methods: Random Forest and Decision Tree. When a Random Forest classifier is used, our results showed that it outperformed the Decision Tree classifier in indicators, such as F1-score, recall, and precision. The analysis of results using Random Forest and Decision Tree proves that the proposed method is highly efficient.
摘要恶意软件是用来描述对系统有害的任何恶意软件或代码的术语。每天都有新的恶意程序出现。为了根据恶意软件的特征对其进行分类,现在正在使用机器学习;这是因为大多数新的恶意软件都包含与旧的相似的模式。本文提出了两种基于遗传规划的恶意软件特征选择方法;第一种称为遗传规划均值(GPM),第二种称为基因规划均值加(GPMP)。将这两种方法的结果与三种最先进的流行特征选择技术进行了比较:基于过滤器、基于包装器和卡方。在这项工作中,我们将提出的两种方法(GPM和GPMP)与这三种广泛使用的特征选择技术进行了比较。结果表明,所提出的技术在准确性和F分数方面优于这些最先进的技术。结果还表明,与基于滤波器和基于包装器的特征选择相比,所提出的方法使用了更少的计算时间,从而提高了性能。使用四个数据集对所提出的方法进行了评估。使用两个分类器来评估所提出的特征选择方法:随机森林和决策树。当使用随机森林分类器时,我们的结果表明,它在F1分数、召回率和精度等指标上优于决策树分类器。使用随机森林和决策树对结果进行分析,证明了该方法的有效性。
{"title":"Improving Classification Performance for Malware Detection Using Genetic Programming Feature Selection Techniques","authors":"Heba Harahsheh, M. Alshraideh, S. Al-Sharaeh, R. Al-Sayyed","doi":"10.1080/19361610.2022.2067459","DOIUrl":"https://doi.org/10.1080/19361610.2022.2067459","url":null,"abstract":"Abstract Malware is the term used to describe any malicious software or code that is harmful to systems. From day to day, new malicious programs appear. To classify malware according to its characteristics, machine learning is now being used; this is because most new malware contains patterns that are similar to old ones. This paper proposes two feature selection methods based on Genetic Programming (GP) for predicting malware; the first is called Genetic Programming-Mean (GPM), and the second is called Genetic Programming-Mean Plus (GPMP). The results of these two methods were compared with three state-of-the-art popular feature selection techniques: filter-based, wrapper-based, and Chi-square. In this work, we compare the two proposed methods (GPM and GPMP) with these three widely used feature selection techniques. The results demonstrate that the proposed techniques beat these state-of-the-art ones in terms of accuracy and F-score. The results also revealed that the proposed methods employed less computation time and hence an enhanced performance when compared with filter-based, and wrapper-based feature selection. The proposed methods were evaluated using four datasets. Two classifiers were used to evaluate the proposed feature selection methods: Random Forest and Decision Tree. When a Random Forest classifier is used, our results showed that it outperformed the Decision Tree classifier in indicators, such as F1-score, recall, and precision. The analysis of results using Random Forest and Decision Tree proves that the proposed method is highly efficient.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"627 - 647"},"PeriodicalIF":1.3,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44410983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
New Signature Scheme Based on Elliptic Curve and Factoring Problems Using Chaotic Map 基于椭圆曲线和混沌映射分解问题的新签名方案
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2022-03-02 DOI: 10.1080/19361610.2022.2041157
N. Tahat, S. Shatnawi
Abstract In this paper, we present the new signature scheme based on elliptic curve (EC) and factoring (FAC) problems using chaotic maps (CMs). The newly developed scheme requires only minimal and low-complexity computations, which makes it very efficient. We compare our scheme with the other schemes with respect to signature generation cost, signature size, and verification cost and show that our scheme is superior to the other schemes. To the best of our knowledge, this is the first time a signature scheme based on EC and FAC problems using CMs has been proposed.
摘要本文提出了一种新的基于椭圆曲线(EC)和混沌映射因子分解(FAC)问题的签名方案。新开发的方案只需要最小且低复杂度的计算,这使得它非常高效。我们将我们的方案与其他方案在签名生成成本、签名大小和验证成本方面进行了比较,表明我们的方案优于其他方案。据我们所知,这是第一次提出一种使用CMs的基于EC和FAC问题的签名方案。
{"title":"New Signature Scheme Based on Elliptic Curve and Factoring Problems Using Chaotic Map","authors":"N. Tahat, S. Shatnawi","doi":"10.1080/19361610.2022.2041157","DOIUrl":"https://doi.org/10.1080/19361610.2022.2041157","url":null,"abstract":"Abstract In this paper, we present the new signature scheme based on elliptic curve (EC) and factoring (FAC) problems using chaotic maps (CMs). The newly developed scheme requires only minimal and low-complexity computations, which makes it very efficient. We compare our scheme with the other schemes with respect to signature generation cost, signature size, and verification cost and show that our scheme is superior to the other schemes. To the best of our knowledge, this is the first time a signature scheme based on EC and FAC problems using CMs has been proposed.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"588 - 596"},"PeriodicalIF":1.3,"publicationDate":"2022-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45707981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Statement of Retraction: A Survey on Malware Detection and Classification 撤回声明:恶意软件检测与分类综述
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2022-02-22 DOI: 10.1080/19361610.2022.2039530
Rupali Komatwara, M. Kokare, A. Souri
Alireza Souri & Rahil Hosseini (2018). A state-of-the-art survey of malware detection approaches using data mining techniques. Human-centric Computing and Information Sciences, 8. Lakshmanan Nataraj, Gregorie Jacob & B. S. Manjunath (2010). Detecting Packed Executables Based on Raw Binary Data. Technical Report, Vision Research Lab, University of California Santa Barbara. Lakshmanan Nataraj (2011). Malware Images: Visualization and Automatic Classification. Proceedings of the 8th International Symposium on Visualization for Cyber Security. Lakshmanan Nataraj (2015). A Signal Processing Approach to Malware Analysis. Ph.D. thesis, University of California Santa Barbara.
Alireza Souri和Rahil Hosseini(2018)。使用数据挖掘技术的恶意软件检测方法的最新调查。以人为中心的计算与信息科学,8。Lakshmanan Nataraj,Gregorie Jacob和B.S.Manjunath(2010)。基于原始二进制数据检测压缩可执行文件。技术报告,加州大学圣巴巴拉分校视觉研究实验室。Lakshmanan Nataraj(2011)。恶意软件图像:可视化和自动分类。第八届网络安全可视化国际研讨会论文集。Lakshmanan Nataraj(2015)。一种用于恶意软件分析的信号处理方法。加州大学圣巴巴拉分校博士论文。
{"title":"Statement of Retraction: A Survey on Malware Detection and Classification","authors":"Rupali Komatwara, M. Kokare, A. Souri","doi":"10.1080/19361610.2022.2039530","DOIUrl":"https://doi.org/10.1080/19361610.2022.2039530","url":null,"abstract":"Alireza Souri & Rahil Hosseini (2018). A state-of-the-art survey of malware detection approaches using data mining techniques. Human-centric Computing and Information Sciences, 8. Lakshmanan Nataraj, Gregorie Jacob & B. S. Manjunath (2010). Detecting Packed Executables Based on Raw Binary Data. Technical Report, Vision Research Lab, University of California Santa Barbara. Lakshmanan Nataraj (2011). Malware Images: Visualization and Automatic Classification. Proceedings of the 8th International Symposium on Visualization for Cyber Security. Lakshmanan Nataraj (2015). A Signal Processing Approach to Malware Analysis. Ph.D. thesis, University of California Santa Barbara.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"663 - 663"},"PeriodicalIF":1.3,"publicationDate":"2022-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45807993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comprehensive Comparison of Security Measurement Models 安全度量模型的综合比较
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2022-02-10 DOI: 10.1080/19361610.2021.1981089
M. Khaleghi, M. Aref, M. Rasti
Abstract Security measurement models (SMMs) and their corresponding derived metrics form the main pillars of a systematic security measurement. Providing a desirable SMM is very challenging and has been investigated over the past two decades, so that numerous SMMs have been proposed and several surveys on SMMs have been performed. However, to the best of our knowledge, neither a systematic taxonomy nor a comprehensive comparison has yet been proposed for SMMs. This paper focuses on the comprehensive comparison of SMMs relying on a feature-based approach. The plurality and diversity of the compared SMMs enable us to deduce all the open issues.
摘要安全度量模型及其相应的派生度量构成了系统安全度量的主要支柱。提供理想的SMM是非常具有挑战性的,并且在过去二十年中已经进行了研究,因此已经提出了许多SMM,并对SMM进行了几次调查。然而,据我们所知,既没有系统的分类法,也没有对SMM进行全面的比较。本文侧重于基于特征的方法对SMM进行综合比较。所比较的SMM的多样性和多样性使我们能够推断出所有悬而未决的问题。
{"title":"Comprehensive Comparison of Security Measurement Models","authors":"M. Khaleghi, M. Aref, M. Rasti","doi":"10.1080/19361610.2021.1981089","DOIUrl":"https://doi.org/10.1080/19361610.2021.1981089","url":null,"abstract":"Abstract Security measurement models (SMMs) and their corresponding derived metrics form the main pillars of a systematic security measurement. Providing a desirable SMM is very challenging and has been investigated over the past two decades, so that numerous SMMs have been proposed and several surveys on SMMs have been performed. However, to the best of our knowledge, neither a systematic taxonomy nor a comprehensive comparison has yet been proposed for SMMs. This paper focuses on the comprehensive comparison of SMMs relying on a feature-based approach. The plurality and diversity of the compared SMMs enable us to deduce all the open issues.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"333 - 401"},"PeriodicalIF":1.3,"publicationDate":"2022-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43201293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Queen of Cuba 古巴女王
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2022-02-09 DOI: 10.1080/19361610.2022.2034476
A. R. Pereira
Abstract Ana Montes, a senior intelligence analyst, spied on the Defense Intelligence Agency for Cubans. Highly specialized in Latin American military intelligence, she was known as “Queen of Cuba.” Her traumatic childhood made her susceptible to recruitment and her motivation was ideological. Using classic espionage techniques, mainly memorization, she managed to spy for 16 years until she was discovered. The findings of an American spy in Cuba, a bad relationship with coworkers, and the lack of a support agent led to her exposure. Ana was sentenced to 25 years in prison and five to probation. Her case indicates 10 conclusions about espionage.
高级情报分析师安娜·蒙特斯(Ana Montes)在美国国防情报局(Defense intelligence Agency)为古巴人充当间谍。她非常擅长拉丁美洲的军事情报,被称为“古巴女王”。她的创伤童年使她容易被招募,她的动机是意识形态的。利用经典的间谍技巧,主要是记忆,她成功地当了16年的间谍,直到她被发现。在古巴发现一名美国间谍,与同事的关系不好,以及缺乏支持代理人导致了她的曝光。安娜被判25年监禁,缓刑5年。她的案例表明了关于间谍活动的10个结论。
{"title":"Queen of Cuba","authors":"A. R. Pereira","doi":"10.1080/19361610.2022.2034476","DOIUrl":"https://doi.org/10.1080/19361610.2022.2034476","url":null,"abstract":"Abstract Ana Montes, a senior intelligence analyst, spied on the Defense Intelligence Agency for Cubans. Highly specialized in Latin American military intelligence, she was known as “Queen of Cuba.” Her traumatic childhood made her susceptible to recruitment and her motivation was ideological. Using classic espionage techniques, mainly memorization, she managed to spy for 16 years until she was discovered. The findings of an American spy in Cuba, a bad relationship with coworkers, and the lack of a support agent led to her exposure. Ana was sentenced to 25 years in prison and five to probation. Her case indicates 10 conclusions about espionage.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"576 - 587"},"PeriodicalIF":1.3,"publicationDate":"2022-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48649583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Applied Security Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1