{"title":"网络物理系统中的安全、隐私和信任","authors":"H. Janicke, Kevin I. Jones, L. Maglaras","doi":"10.4108/eai.8-12-2016.151724","DOIUrl":null,"url":null,"abstract":"The first issue of the third volume of the EAI transactions on Security and Safety provides an insight to methods and techniques that improve security, safety and privacy of benchmark systems. Actually, two main classes of research results are considered. The first one is on attack prevention and secure planning while the second one is focused on forensics analysis. In particular, in the area of attack preventions and secure planning the issue presents (i) a new model and an algorithm to estimate and generate a network path identified by flow performance indicators of a heterogeneous communication network, (ii) suitable procedures that e-commerce operators may apply to minimize the risk of criminal activities, and (iii) a novel pseudorandom number generator family, called filtering nonlinear feedback shift register for RFID tags. In the area of forensic research the issue presents new findings on new methods exploiting the metadata of a large corpus.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security, Privacy and Trust in Cyber Physical Systems\",\"authors\":\"H. Janicke, Kevin I. Jones, L. Maglaras\",\"doi\":\"10.4108/eai.8-12-2016.151724\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The first issue of the third volume of the EAI transactions on Security and Safety provides an insight to methods and techniques that improve security, safety and privacy of benchmark systems. Actually, two main classes of research results are considered. The first one is on attack prevention and secure planning while the second one is focused on forensics analysis. In particular, in the area of attack preventions and secure planning the issue presents (i) a new model and an algorithm to estimate and generate a network path identified by flow performance indicators of a heterogeneous communication network, (ii) suitable procedures that e-commerce operators may apply to minimize the risk of criminal activities, and (iii) a novel pseudorandom number generator family, called filtering nonlinear feedback shift register for RFID tags. In the area of forensic research the issue presents new findings on new methods exploiting the metadata of a large corpus.\",\"PeriodicalId\":335727,\"journal\":{\"name\":\"EAI Endorsed Trans. Security Safety\",\"volume\":\"37 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"EAI Endorsed Trans. Security Safety\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4108/eai.8-12-2016.151724\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"EAI Endorsed Trans. Security Safety","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4108/eai.8-12-2016.151724","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security, Privacy and Trust in Cyber Physical Systems
The first issue of the third volume of the EAI transactions on Security and Safety provides an insight to methods and techniques that improve security, safety and privacy of benchmark systems. Actually, two main classes of research results are considered. The first one is on attack prevention and secure planning while the second one is focused on forensics analysis. In particular, in the area of attack preventions and secure planning the issue presents (i) a new model and an algorithm to estimate and generate a network path identified by flow performance indicators of a heterogeneous communication network, (ii) suitable procedures that e-commerce operators may apply to minimize the risk of criminal activities, and (iii) a novel pseudorandom number generator family, called filtering nonlinear feedback shift register for RFID tags. In the area of forensic research the issue presents new findings on new methods exploiting the metadata of a large corpus.