Computer Science and Cybersecurity最新文献

筛选
英文 中文
1 1
Computer Science and Cybersecurity Pub Date : 1900-01-01 DOI: 10.26565/2519-2310-2020-1
G. Thompson, L. Alba-Juez
{"title":"1","authors":"G. Thompson, L. Alba-Juez","doi":"10.26565/2519-2310-2020-1","DOIUrl":"https://doi.org/10.26565/2519-2310-2020-1","url":null,"abstract":"","PeriodicalId":194661,"journal":{"name":"Computer Science and Cybersecurity","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121529901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building a voting system with using blockchain technologies in the example of Hyperledger 以Hyperledger为例,使用区块链技术构建投票系统
Computer Science and Cybersecurity Pub Date : 1900-01-01 DOI: 10.26565/2519-2310-2019-1-05
{"title":"Building a voting system with using blockchain technologies in the example of Hyperledger","authors":"","doi":"10.26565/2519-2310-2019-1-05","DOIUrl":"https://doi.org/10.26565/2519-2310-2019-1-05","url":null,"abstract":"It discusses the characteristics and features of work in the Hyperledger Fabric system and the characteristic problems of the implementation of transactions. The registers and principles of their work in the respective systems are considered, in particular, the connection of the system to voting and the check of Blockchain blocks. Defined mechanisms for the protection of relevant systems and characteristic vulnerabilities. Considered public key infrastructure in the system.","PeriodicalId":194661,"journal":{"name":"Computer Science and Cybersecurity","volume":"249 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123443746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of cryptographic algorithms in decentralized networks and prospects for their replacement for the post-quantum period 加密算法在去中心化网络中的应用及其在后量子时代替代的前景
Computer Science and Cybersecurity Pub Date : 1900-01-01 DOI: 10.26565/2519-2310-2019-1-04
Олександр Оникійчук, Володимир Скриннік, Майдан Свободи
{"title":"Application of cryptographic algorithms in decentralized networks and prospects for their replacement for the post-quantum period","authors":"Олександр Оникійчук, Володимир Скриннік, Майдан Свободи","doi":"10.26565/2519-2310-2019-1-04","DOIUrl":"https://doi.org/10.26565/2519-2310-2019-1-04","url":null,"abstract":"The article reviewed cryptographic algorithms that are used or can be used in decentralized networks. Algorithms for protection, both from classical and from quantum attacks are given. In the work there is a general analysis of the methods already used. Reviewed algorithms for protection, both from classical and from quantum attacks are given. The results of this work show the need for cryptographic algorithms to protect against possible quantum attacks in the future.","PeriodicalId":194661,"journal":{"name":"Computer Science and Cybersecurity","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123623038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Requirements for creating tools to emulate software integration processes using HTTP/HTTPS protocols 创建使用HTTP/HTTPS协议模拟软件集成过程的工具的需求
Computer Science and Cybersecurity Pub Date : 1900-01-01 DOI: 10.26565/2519-2310-2019-2-05
{"title":"Requirements for creating tools to emulate software integration processes using HTTP/HTTPS protocols","authors":"","doi":"10.26565/2519-2310-2019-2-05","DOIUrl":"https://doi.org/10.26565/2519-2310-2019-2-05","url":null,"abstract":"Emulation of software systems integration processes using HTTP/HTTPS protocols is now widely used in the development of distributed systems software systems. The paper discusses the current state of the problem, analyzes the existing tools to solve it, identifies shortcomings, and offers a conceptual approach and program requirements that will automate and debug software development and testing processes using HTTP/HTTPS protocols.","PeriodicalId":194661,"journal":{"name":"Computer Science and Cybersecurity","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127077638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parallelization of the mathematical model of gabor filter gabor滤波器数学模型的并行化
Computer Science and Cybersecurity Pub Date : 1900-01-01 DOI: 10.26565/2519-2310-2019-2-02
Serghii Rassomakhin, A. Bykov
{"title":"Parallelization of the mathematical model of gabor filter","authors":"Serghii Rassomakhin, A. Bykov","doi":"10.26565/2519-2310-2019-2-02","DOIUrl":"https://doi.org/10.26565/2519-2310-2019-2-02","url":null,"abstract":"Due to the acceleration of the informatization of modern society and the increase in the number of flows and objects of information that must be protected from unauthorized access, problems with the use of biometric identification technologies to differentiate access to information resources are becoming increasingly important. The paper discusses some features of fingerprint preprocessing procedures using the Gabor filter. A block diagram of a parallel model of software for fingerprint preprocessing is presented. Various technologies are also briefly considered that make it possible to organize an appropriate program (parallel processing), the advantages and disadvantages of each of them are described, on the basis of which the optimal one is selected for a specific task. The results on the speed of program execution with a different number of threads and their priority are provided.","PeriodicalId":194661,"journal":{"name":"Computer Science and Cybersecurity","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128306711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation of the cross-platform Flutter framework. Will the heyday of this technology mean the disappearance of the native development on Android and iOS? 跨平台颤振框架研究。这种技术的全盛时期是否意味着Android和iOS上的本地开发将会消失?
Computer Science and Cybersecurity Pub Date : 1900-01-01 DOI: 10.26565/2519-2310-2019-2-03
{"title":"Investigation of the cross-platform Flutter framework. Will the heyday of this technology mean the disappearance of the native development on Android and iOS?","authors":"","doi":"10.26565/2519-2310-2019-2-03","DOIUrl":"https://doi.org/10.26565/2519-2310-2019-2-03","url":null,"abstract":"The work is devoted to research of the cross-platform framework for developing mobile applications Flutter from Google. A practical test of the technology was carried out to establish whether it is convenient enough and reliable. The article presents the findings of the testing. The comparison of the mechanisms of Flutter and other popular mobile cross-platform frameworks is given. The main features and differences of the technology are considered. Recommendations on its use are formulated.","PeriodicalId":194661,"journal":{"name":"Computer Science and Cybersecurity","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128983745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research of the cyberbullying phenomenon and analysis of ways to counter its manifestations 网络欺凌现象的研究与对策分析
Computer Science and Cybersecurity Pub Date : 1900-01-01 DOI: 10.26565/2519-2310-2020-1-02
{"title":"Research of the cyberbullying phenomenon and analysis of ways to counter its manifestations","authors":"","doi":"10.26565/2519-2310-2020-1-02","DOIUrl":"https://doi.org/10.26565/2519-2310-2020-1-02","url":null,"abstract":"The main characteristics of Internet harassment (cyberbullying) are investigated in the research. The main features of this phenomenon are considered. The analysis of existing types of cyberbullying and their individual characteristics is made. The examples of legislative acts of different countries is concluded that there is deficiency of relevant rules of low. It is emphasized that anyone can become a victim of in the modern world. At the same time a risk of becoming a victim of cyberbullying does not depend on any factors (for example financial position of victim, his or her age, sex, social position etc.). It is noted that communications that are made in cyberspace provide an opportunity for users to choose information they want to make public carefully and in advance. In most cases it contributes to help people show theirs strengths (for example, when communicating in chats). In results there is often false sympathy between network interlocutors and they trust each other. So the idealization of the partner happens and any his or her information is perceived more sensitive than during direct communication. This effect is successfully used during cyberbullying, when first one person inspires the trust of another and then changes communication tactics, becoming faithless and aggressive. It is emphasized that the cyberbullying phenomenon is very underestimated and that`s why it is a serious problem. The brief overview of existing technologies and means of counteracting this phenomenon is made. The comparison of their effectiveness is made. The standards that modern and effective technology of cyberbullying resistance must meet are systematized. There are examples of successful realization of user protection in most popular social network. It is emphasized that for cyberbullying resistance nowadays in most cases the protection technologies of it is to localize undesirable content in terms of the existence of cyberbullying. Based on the results of this research it is confirmed that the cyberbullying will spread further. This is due to the constant increase in the number of users of new network services and online platforms for communication. For effective defense against cyberbullying it is required the introduction of organizational and technical measures. At the end it is proposed the general assessment of further development of cyberbullying and the ways to improve appropriate countermeasures.","PeriodicalId":194661,"journal":{"name":"Computer Science and Cybersecurity","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126931298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信