首页 > 最新文献

International Journal of Security and Its Applications最新文献

英文 中文
Improving the Physical Security of Microchip 提高微芯片的物理安全性
Pub Date : 2019-09-30 DOI: 10.33832/ijsia.2019.13.3.03
Dominik Malcik, M. Drahanský
{"title":"Improving the Physical Security of Microchip","authors":"Dominik Malcik, M. Drahanský","doi":"10.33832/ijsia.2019.13.3.03","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.3.03","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69499491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review on Space and Security Issues in Cloud Computing 云计算中的空间与安全问题综述
Pub Date : 2019-06-30 DOI: 10.33832/ijsia.2019.13.2.01
N. Thirupathi Rao, D. Bhattacharyya
{"title":"Review on Space and Security Issues in Cloud Computing","authors":"N. Thirupathi Rao, D. Bhattacharyya","doi":"10.33832/ijsia.2019.13.2.01","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.2.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42193279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Smart Electronic Stick for Blind People: An IOT Application 盲人智能电子棒:物联网应用
Pub Date : 2019-03-31 DOI: 10.33832/ijsia.2019.13.1.01
C. Sudhakar, N. Thirupathi Rao, D. Bhattacharyya
{"title":"Smart Electronic Stick for Blind People: An IOT Application","authors":"C. Sudhakar, N. Thirupathi Rao, D. Bhattacharyya","doi":"10.33832/ijsia.2019.13.1.01","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.1.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44734868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analyzing the performance of Various Fraud Detection Techniques 分析各种欺诈检测技术的性能
Pub Date : 2018-09-30 DOI: 10.14257/ijsia.2018.12.5.03
G. Anamika, K. Mayuri, B. K. K. Reddy, N. Iyengar, Ronnie D. Caytiles
{"title":"Analyzing the performance of Various Fraud Detection Techniques","authors":"G. Anamika, K. Mayuri, B. K. K. Reddy, N. Iyengar, Ronnie D. Caytiles","doi":"10.14257/ijsia.2018.12.5.03","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.5.03","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/ijsia.2018.12.5.03","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46343077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Issues and Attacks in Wireless Sensor Networks: Some Case Studies 无线传感器网络中的安全问题和攻击:一些案例研究
Pub Date : 2018-09-30 DOI: 10.14257/ijsia.2018.12.5.01
N. Thirupathi Rao, D. Bhattacharyya, Tai-hoon Kim
{"title":"Security Issues and Attacks in Wireless Sensor Networks: Some Case Studies","authors":"N. Thirupathi Rao, D. Bhattacharyya, Tai-hoon Kim","doi":"10.14257/ijsia.2018.12.5.01","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.5.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/ijsia.2018.12.5.01","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46837069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secured Data Partitioning through Sequence based Mapping and Random Order of Data Separation 基于序列映射和随机数据分离顺序的安全数据划分
Pub Date : 2018-09-30 DOI: 10.14257/IJSIA.2018.12.5.02
Hazila Hasan, S. Chuprat, M. N. Mahrin
{"title":"Secured Data Partitioning through Sequence based Mapping and Random Order of Data Separation","authors":"Hazila Hasan, S. Chuprat, M. N. Mahrin","doi":"10.14257/IJSIA.2018.12.5.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.5.02","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46759601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ancillary Ultrasonic Rangefinder for Autonomous Vehicles 自动驾驶汽车辅助超声波测距仪
Pub Date : 2018-09-30 DOI: 10.14257/IJSIA.2018.12.5.05
Y. Wiseman
The latest fatal accidents of autonomous vehicle happened because of undetected peer vehicles or persons. These fatal accidents call attention to the rangefinder devices which are a very significant component of every autonomous vehicle. The rangefinder is the starting point for the decision whether the vehicle should continue to go, to stop, or bypassing an object. In this paper an ultrasonic based rangefinder device for autonomous vehicles is presented. The device can be used as an ancillary system in addition to standard LIDAR system used by almost all the autonomous vehicles, with the aim of overcoming the obstructions of conventional LIDAR systems.
最近的自动驾驶汽车致命事故是由于未被发现的同行车辆或人员造成的。这些致命事故引起了人们对测距装置的关注,测距装置是每辆自动驾驶汽车的重要组成部分。测距仪是决定车辆是否应该继续行驶、停止或绕过物体的起点。本文介绍了一种用于自动驾驶汽车的超声波测距装置。除了几乎所有自动驾驶汽车使用的标准激光雷达系统外,该设备还可以用作辅助系统,目的是克服传统激光雷达系统的障碍。
{"title":"Ancillary Ultrasonic Rangefinder for Autonomous Vehicles","authors":"Y. Wiseman","doi":"10.14257/IJSIA.2018.12.5.05","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.5.05","url":null,"abstract":"The latest fatal accidents of autonomous vehicle happened because of undetected peer vehicles or persons. These fatal accidents call attention to the rangefinder devices which are a very significant component of every autonomous vehicle. The rangefinder is the starting point for the decision whether the vehicle should continue to go, to stop, or bypassing an object. In this paper an ultrasonic based rangefinder device for autonomous vehicles is presented. The device can be used as an ancillary system in addition to standard LIDAR system used by almost all the autonomous vehicles, with the aim of overcoming the obstructions of conventional LIDAR systems.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49550576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Secure Prioritized Inter Cluster Channel Selection for Tracking User Attack in Cognitive Radio Networks 用于跟踪认知无线电网络中用户攻击的安全优先簇间信道选择
Pub Date : 2018-09-30 DOI: 10.14257/ijsia.2018.12.5.04
Chandra Sekhar Musinana, K. Chilukuri, P. Reddy
Dynamic spectrum allocation evolved in order to allow the spectrum holes to be occupied by secondary users (SUs), but they have to handoff when primary users (PUs) come back, which brings new security problems like Tracking User Attack (TUA) into consideration. TUA might block the control information shared by a Cognitive Radio Network (CRN), if the attacker predicts the control channel frequency based on traffic analysis. This is a typical Denial of Service (DOS) attack preventing users from handoff to available channels. In cluster based channel selection, cluster heads will receive the channel information, about two users at a time and transmit the common preferred channel that was allocated to the base station. The base station selects a channel and returns it to the cluster head which returns them to the requesting CR users. For secure channel selection, the information could be encrypted by the base station and decrypted at the cluster heads to prevent DOS attacks. In this work, we propose selection of available channels based on the priority of the cluster which we term Prioritized Inter Cluster Channel Selection (PICCS). The priority is essentially the history based reputation of the cluster calculated from the attackers in the cluster. Thus, instead of a random choice of a cluster for the available channel, during inter-cluster channel selection, we select a channel from the best available cluster. We observe the effect of such selection on both the delay and the handoffs in the presence of attackers and compare it with the channel selection scheme based on the nearest available cluster.
动态频谱分配的发展是为了允许备用用户占用频谱漏洞,但当主用户返回时,备用用户必须切换,这就带来了跟踪用户攻击(Tracking User Attack, TUA)等新的安全问题。如果攻击者基于流量分析预测控制信道频率,则TUA可能会阻断认知无线网络(CRN)共享的控制信息。这是一种典型的拒绝服务(DOS)攻击,阻止用户切换到可用通道。在基于集群的信道选择中,集群头将一次接收大约两个用户的信道信息,并发送分配给基站的公共首选信道。基站选择一个信道并将其返回给集群头,集群头将它们返回给请求CR用户。在安全信道选择方面,可以通过基站对信息进行加密,在集群头部进行解密,防止DOS攻击。在这项工作中,我们提出了基于集群优先级的可用通道选择,我们称之为优先集群间通道选择(PICCS)。优先级本质上是根据集群中的攻击者计算出的基于历史的集群声誉。因此,在集群间通道选择期间,我们从最佳可用集群中选择一个通道,而不是随机选择可用通道的集群。我们观察了这种选择在攻击者存在时对延迟和切换的影响,并将其与基于最近可用集群的信道选择方案进行了比较。
{"title":"Secure Prioritized Inter Cluster Channel Selection for Tracking User Attack in Cognitive Radio Networks","authors":"Chandra Sekhar Musinana, K. Chilukuri, P. Reddy","doi":"10.14257/ijsia.2018.12.5.04","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.5.04","url":null,"abstract":"Dynamic spectrum allocation evolved in order to allow the spectrum holes to be occupied by secondary users (SUs), but they have to handoff when primary users (PUs) come back, which brings new security problems like Tracking User Attack (TUA) into consideration. TUA might block the control information shared by a Cognitive Radio Network (CRN), if the attacker predicts the control channel frequency based on traffic analysis. This is a typical Denial of Service (DOS) attack preventing users from handoff to available channels. In cluster based channel selection, cluster heads will receive the channel information, about two users at a time and transmit the common preferred channel that was allocated to the base station. The base station selects a channel and returns it to the cluster head which returns them to the requesting CR users. For secure channel selection, the information could be encrypted by the base station and decrypted at the cluster heads to prevent DOS attacks. In this work, we propose selection of available channels based on the priority of the cluster which we term Prioritized Inter Cluster Channel Selection (PICCS). The priority is essentially the history based reputation of the cluster calculated from the attackers in the cluster. Thus, instead of a random choice of a cluster for the available channel, during inter-cluster channel selection, we select a channel from the best available cluster. We observe the effect of such selection on both the delay and the handoffs in the presence of attackers and compare it with the channel selection scheme based on the nearest available cluster.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46251164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and Assurance Aspects to be Observed in Cloud Computing Based Data Centers: A Study 基于云计算的数据中心应注意的安全和保证方面:一项研究
Pub Date : 2018-07-31 DOI: 10.14257/ijsia.2018.12.4.01
N. Thirupathi Rao, A. Sravani, D. Bhattacharyya, Tai-hoon Kim
{"title":"Security and Assurance Aspects to be Observed in Cloud Computing Based Data Centers: A Study","authors":"N. Thirupathi Rao, A. Sravani, D. Bhattacharyya, Tai-hoon Kim","doi":"10.14257/ijsia.2018.12.4.01","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.4.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/ijsia.2018.12.4.01","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49353899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Survey of Cyber Security Approaches for Attack Detection, Prediction, and Prevention 网络安全攻击检测、预测和预防方法综述
Pub Date : 2018-07-31 DOI: 10.14257/IJSIA.2018.12.4.02
Ayei E. Ibor, F. Oladeji, O. Okunoye
The expanding threat landscape has come with a plethora of consequences for most organizations and individuals. This is witnessed in the high volume of cyber-attacks prevalent in the cyberspace. Though several approaches have been proposed and deployed in recent times, most of them are only theoretical masterpieces while others remain computationally infeasible due to the computational requirements for implementing them. Where implementation is possible, the issue of computational complexity becomes a significant overhead in which case a large amount of computing resources such as CPU cycle, memory, network bandwidth and data structures are consumed culminating in tedious, time consuming, and error prone processes. Similarly, most of these techniques are basically reactive and as such can only be triggered when an incident is reported while most depend on the administrator to apply the necessary mitigation processes after an attack has occurred. To this effect, this paper presents a survey of cyber security approaches that have been proposed in the Literature. The paper also reviews the methodologies, strengths and weaknesses of these approaches, and finally identifies areas where further research could focus.
不断扩大的威胁形势给大多数组织和个人带来了过多的后果。网络空间中大量的网络攻击就是明证。虽然近年来已经提出和部署了几种方法,但大多数方法只是理论上的杰作,而其他方法由于实现它们的计算要求而在计算上不可行的。在可能实现的情况下,计算复杂性的问题成为一个重要的开销,在这种情况下,大量的计算资源(如CPU周期、内存、网络带宽和数据结构)被消耗,最终导致冗长、耗时和容易出错的过程。类似地,这些技术中的大多数基本上都是被动的,因此只能在报告事件时触发,而大多数技术依赖于管理员在攻击发生后应用必要的缓解流程。为此,本文提出了文献中提出的网络安全方法的调查。本文还回顾了这些方法的方法、优缺点,并最终确定了进一步研究的重点领域。
{"title":"A Survey of Cyber Security Approaches for Attack Detection, Prediction, and Prevention","authors":"Ayei E. Ibor, F. Oladeji, O. Okunoye","doi":"10.14257/IJSIA.2018.12.4.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.4.02","url":null,"abstract":"The expanding threat landscape has come with a plethora of consequences for most organizations and individuals. This is witnessed in the high volume of cyber-attacks prevalent in the cyberspace. Though several approaches have been proposed and deployed in recent times, most of them are only theoretical masterpieces while others remain computationally infeasible due to the computational requirements for implementing them. Where implementation is possible, the issue of computational complexity becomes a significant overhead in which case a large amount of computing resources such as CPU cycle, memory, network bandwidth and data structures are consumed culminating in tedious, time consuming, and error prone processes. Similarly, most of these techniques are basically reactive and as such can only be triggered when an incident is reported while most depend on the administrator to apply the necessary mitigation processes after an attack has occurred. To this effect, this paper presents a survey of cyber security approaches that have been proposed in the Literature. The paper also reviews the methodologies, strengths and weaknesses of these approaches, and finally identifies areas where further research could focus.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67048212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
International Journal of Security and Its Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1