Int. J. Inf. Comput. Secur.最新文献

筛选
英文 中文
The prediction of network security situation based on deep learning method 基于深度学习方法的网络安全态势预测
Int. J. Inf. Comput. Secur. Pub Date : 2021-07-28 DOI: 10.1504/ijics.2021.116941
Zhixing Lin, Jian Yu, Shunfa Liu
{"title":"The prediction of network security situation based on deep learning method","authors":"Zhixing Lin, Jian Yu, Shunfa Liu","doi":"10.1504/ijics.2021.116941","DOIUrl":"https://doi.org/10.1504/ijics.2021.116941","url":null,"abstract":"Network security situational awareness is one of the important issues in the research of network space security technology. In this paper, deep learning technology is applied to analyse and learn network data, generate counter network by classification for sample amplification, use sparse noise reduction autoencoder for feature selection, and then use LSTM for deep learning model of security situation prediction. After the experiment proved that the proposed model based on sparse noise reduction is not balanced since the encoder-LSTM network security situation prediction model can solve various level attacks against a small number, using the model prediction results accurately in predicting regional security situation has the advantage for a longer time. In order to solve the above problems, the network security management becomes passive to active, adapting measures in advance.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129400622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on network security defence based on big data clustering algorithms 基于大数据聚类算法的网络安全防御研究
Int. J. Inf. Comput. Secur. Pub Date : 2021-07-28 DOI: 10.1504/ijics.2021.116931
Jianchao Zhao
{"title":"Research on network security defence based on big data clustering algorithms","authors":"Jianchao Zhao","doi":"10.1504/ijics.2021.116931","DOIUrl":"https://doi.org/10.1504/ijics.2021.116931","url":null,"abstract":"To improve the security of network in big data era, the improved clustering algorithm is applied to carry out network security defence. Firstly, application of large data clustering algorithms in n...","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127151726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A hybrid approach for preserving privacy for real estate data 一种保护房地产数据隐私的混合方法
Int. J. Inf. Comput. Secur. Pub Date : 2021-07-28 DOI: 10.1504/ijics.2021.116942
Parmod Kalia, D. Bansal, S. Sofat
{"title":"A hybrid approach for preserving privacy for real estate data","authors":"Parmod Kalia, D. Bansal, S. Sofat","doi":"10.1504/ijics.2021.116942","DOIUrl":"https://doi.org/10.1504/ijics.2021.116942","url":null,"abstract":"In the present digital world, usage of the internet has increased many folds as users have become dependent on the cloud-based applications. The disclosure of personal information on such platforms becomes a prospective threat for an attack. Researchers have used randomised data distortion technique with addition of random noise to conceal the sensitive data from an unauthorised adversary. This perturbation technique has relevance for the numerical datasets only. In this paper, we propose a hybrid model of two phases encoding with additive random noise value for ensuring non-disclosure of private and sensitive information and maintaining an effective balance between data privacy and data utility. The proposed technique has been tested on different data sizes of the real estate industry in terms of efficiency and effectiveness in preserving privacy and data utility. The proposed algorithm has been evaluated in terms of privacy level and information loss. It has proved effective in comparison with other privacy-preserving techniques such as perturbation and encryption in terms of space complexity and efficiency.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128677935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
E-commerce process reengineering for customer privacy protection 面向客户隐私保护的电子商务流程再造
Int. J. Inf. Comput. Secur. Pub Date : 2021-07-28 DOI: 10.1504/ijics.2021.116940
Fengming Ma, Gang Sheng, Y. Ma
{"title":"E-commerce process reengineering for customer privacy protection","authors":"Fengming Ma, Gang Sheng, Y. Ma","doi":"10.1504/ijics.2021.116940","DOIUrl":"https://doi.org/10.1504/ijics.2021.116940","url":null,"abstract":"Privacy leakage is a major hidden danger for the healthy and orderly development of e-commerce. In this paper, we analyse the current situation of the information leakage. The main reason lies in that the customer information is stored and displayed in plaintext during the e-commerce process. We present a customer privacy protection platform on the basis of the analysis, where such technical measures as information segmentation, data encryption and access authorisation are taken. With the customer privacy protection platform, the customer information is not stored and displayed in plaintext any more, which is replaced with two-dimensional code or barcode. The traceability helps to prevent the leakage and abuse of the consumer information as much as possible. Thus, the traditional operation process of e-commerce is then reengineered and the customer information is only used on demand.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130684045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on privacy protection system of RFID personal consumption data based on internet of things and cloud computing 基于物联网和云计算的RFID个人消费数据隐私保护系统研究
Int. J. Inf. Comput. Secur. Pub Date : 2021-07-28 DOI: 10.1504/ijics.2021.116930
Ningning Du, Chongxu Chen
{"title":"Research on privacy protection system of RFID personal consumption data based on internet of things and cloud computing","authors":"Ningning Du, Chongxu Chen","doi":"10.1504/ijics.2021.116930","DOIUrl":"https://doi.org/10.1504/ijics.2021.116930","url":null,"abstract":"Internet of things and cloud computing have caused the subversion of traditional concepts in sociology, law and ethics. In order to improve the privacy protection level of personal consumption data, the internet of things and cloud computing are used to construct the privacy protection model. Firstly, legal interpretation of personal privacy data protection in RFID is carried out. Secondly, the privacy protection model based on clouding computing, and the corresponding algorithm is designed. Thirdly, the privacy protection authentication protocol of RFID personal consumption data is designed. Finally, the protocol search time-consuming comparison based on the traditional and proposed privacy protection systems are carried out based on simulation analysis. The results show that the proposed model can effectively protect the personal consumption data.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128573381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High utility differential privacy based on smooth sensitivity and individual ranking 基于平滑敏感性和个体排名的高效用差分隐私
Int. J. Inf. Comput. Secur. Pub Date : 2021-07-09 DOI: 10.1504/IJICS.2021.116306
Fagen Song, Tinghuai Ma
{"title":"High utility differential privacy based on smooth sensitivity and individual ranking","authors":"Fagen Song, Tinghuai Ma","doi":"10.1504/IJICS.2021.116306","DOIUrl":"https://doi.org/10.1504/IJICS.2021.116306","url":null,"abstract":"Differential privacy can provide provable privacy security protection. In recent years, a great improvement has been made, however, in practical applications, the utility of original data is highly susceptible to noise, and thus, it limits its application and extension. To address the above problem, a new differential privacy method based on smooth sensitivity has been proposed in this paper. Using this method, the dataset's utility is improved greatly by reducing the amount of noise that is added, and this was validated by experiments.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122230151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
New approach in the applications and forensics of the networks of the internet of things based on the fog infrastructure using SDN 基于SDN的雾基础设施的物联网网络应用和取证的新方法
Int. J. Inf. Comput. Secur. Pub Date : 2021-07-09 DOI: 10.1504/IJICS.2021.116309
Shahrzad Sedaghat
{"title":"New approach in the applications and forensics of the networks of the internet of things based on the fog infrastructure using SDN","authors":"Shahrzad Sedaghat","doi":"10.1504/IJICS.2021.116309","DOIUrl":"https://doi.org/10.1504/IJICS.2021.116309","url":null,"abstract":"Ubiquitous computing with smart mobile devices, internet of things, virtualisation, cloud, and fog is changing yesteryears' static networks to dynamic networks of mobile smart devices. Fog computing is a pattern which expands cloud computing and the provision of related services to the network edge. Therefore, fog computing was recently introduced to provide storage and network services between end users and traditional cloud computing data centres. The present study aimed to consider the structure, architecture and applications of fog computing and analyse its differences and similarities with cloud computing, examine forensics in these networks and finally, present a new approach in this regard. This paper describes how the emerging technology - software defined networking (SDN) can be deployed a single infrastructure and leveraged to provide scalable flexible forensic solutions in this diverse and service providers/IT in a deal with the dynamic nature of today's networks attacks.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121702633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A provably secure lightweight certificateless aggregate signature scheme for healthcare wireless sensor network 一种可证明安全的医疗无线传感器网络轻量级无证书聚合签名方案
Int. J. Inf. Comput. Secur. Pub Date : 2021-07-09 DOI: 10.1504/IJICS.2021.116305
I. Kamil, S. Ogundoyin
{"title":"A provably secure lightweight certificateless aggregate signature scheme for healthcare wireless sensor network","authors":"I. Kamil, S. Ogundoyin","doi":"10.1504/IJICS.2021.116305","DOIUrl":"https://doi.org/10.1504/IJICS.2021.116305","url":null,"abstract":"In healthcare wireless sensor networks (HWSNs), a patient's body usually contains several wearable or implantable wireless sensors which generate and transmit physiological data to a medical server...","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128810046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On QoS-aware location privacy in mobile networks 移动网络中qos感知的位置隐私
Int. J. Inf. Comput. Secur. Pub Date : 2021-07-09 DOI: 10.1504/IJICS.2021.116304
Nour El Houda Senoussi, A. Bachir, A. Bouabdallah
{"title":"On QoS-aware location privacy in mobile networks","authors":"Nour El Houda Senoussi, A. Bachir, A. Bouabdallah","doi":"10.1504/IJICS.2021.116304","DOIUrl":"https://doi.org/10.1504/IJICS.2021.116304","url":null,"abstract":"We deal with the threats to user privacy in the context of wireless local networks. We focus on location privacy where an adversary tries to learn a user's past and current locations. The current Wi-Fi standard is vulnerable to location privacy and mobility profiling attacks due to the transmission of personally identifying information such as the MAC address in plain text. We provide a generic mathematical model to quantify and express the privacy and elaborate a decentralised algorithm that allows users to attain their desired levels of privacy while lowering its effect on the QoS perceived by them. We evaluate our proposal with numerical simulation and mobility traces collected from Wi-Fi users in an office environment. We show that higher privacy can be obtained with a variable effect on the throughput available to users.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"312 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121176529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the adoption of scramble keypad for unlocking PIN-protected smartphones 关于采用紧急键盘解锁密码保护的智能手机
Int. J. Inf. Comput. Secur. Pub Date : 2021-05-25 DOI: 10.1504/IJICS.2021.115345
Geetika Kovelamudi, Bryan Watson, Jun Zheng, Srinivas Mukkamala
{"title":"On the adoption of scramble keypad for unlocking PIN-protected smartphones","authors":"Geetika Kovelamudi, Bryan Watson, Jun Zheng, Srinivas Mukkamala","doi":"10.1504/IJICS.2021.115345","DOIUrl":"https://doi.org/10.1504/IJICS.2021.115345","url":null,"abstract":"Personal identification number (PIN) is a simple and effective mechanism for screen unlocking but is susceptible to a number of attacks. Scramble keypad is a method that can improve the security of PIN by changing the keypad layout in each PIN-entry process. However, scramble keypad has not been provided as a standard feature in Android and iOS. In this work, we conducted a security and usability analysis of scramble keypad through theoretical analysis and user studies. The security analysis shows that scramble keypad can perfectly defend smudge attacks and greatly reduce the threats of side-channel attacks. It also has a significantly better chance to defend shoulder surfing attacks than standard keypad. The compromising of usability of scramble keypad for the improved security was also investigated. The results suggest that it is worthy to provide scramble keypad as a standard option of mobile operating systems for unlocking PIN-protected smartphones.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128329277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信