Journal of Applied Security Research最新文献

筛选
英文 中文
DieRoll: A Unique Key Generation and Encryption Technique 一种独特的密钥生成和加密技术
IF 1.3
Journal of Applied Security Research Pub Date : 2022-10-13 DOI: 10.1080/19361610.2022.2124589
Dhruv Mehta, Manish Jha, Hartik Suhagiya, Ramchandra S. Mangrulkar
{"title":"DieRoll: A Unique Key Generation and Encryption Technique","authors":"Dhruv Mehta, Manish Jha, Hartik Suhagiya, Ramchandra S. Mangrulkar","doi":"10.1080/19361610.2022.2124589","DOIUrl":"https://doi.org/10.1080/19361610.2022.2124589","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":" ","pages":""},"PeriodicalIF":1.3,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46750442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Communication in Global Jihad 全球圣战中的交流
IF 1.3
Journal of Applied Security Research Pub Date : 2022-09-28 DOI: 10.1080/19361610.2022.2125253
Frank Musmar
{"title":"Communication in Global Jihad","authors":"Frank Musmar","doi":"10.1080/19361610.2022.2125253","DOIUrl":"https://doi.org/10.1080/19361610.2022.2125253","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":" ","pages":""},"PeriodicalIF":1.3,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45382865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fraud in Online Classified Ads: Strategies, Risks, and Detection Methods: A Survey 网络分类广告中的欺诈:策略、风险和检测方法:一项调查
IF 1.3
Journal of Applied Security Research Pub Date : 2022-09-22 DOI: 10.1080/19361610.2022.2124328
Jamil R. Alzghoul, E. Abdallah, Abdel-hafiz S. Al-khawaldeh
{"title":"Fraud in Online Classified Ads: Strategies, Risks, and Detection Methods: A Survey","authors":"Jamil R. Alzghoul, E. Abdallah, Abdel-hafiz S. Al-khawaldeh","doi":"10.1080/19361610.2022.2124328","DOIUrl":"https://doi.org/10.1080/19361610.2022.2124328","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":" ","pages":""},"PeriodicalIF":1.3,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45173914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
QR Codes to Prevent Copyright Infringement: Case Study of Trusmi Batik in Cirebon, Indonesia 防止侵犯版权的二维码:印度尼西亚井里汶Trusmi Batik案例研究
IF 1.3
Journal of Applied Security Research Pub Date : 2022-09-12 DOI: 10.1080/19361610.2022.2113731
Enni Soerjati Priowirjanto, Eman Suparman, M. Amirulloh, Ema Rahmawati
{"title":"QR Codes to Prevent Copyright Infringement: Case Study of Trusmi Batik in Cirebon, Indonesia","authors":"Enni Soerjati Priowirjanto, Eman Suparman, M. Amirulloh, Ema Rahmawati","doi":"10.1080/19361610.2022.2113731","DOIUrl":"https://doi.org/10.1080/19361610.2022.2113731","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":" ","pages":""},"PeriodicalIF":1.3,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48139478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Security in Industry: A Threat Model of Existing and Future Network Infrastructure 工业物联网安全:现有和未来网络基础设施的威胁模型
IF 1.3
Journal of Applied Security Research Pub Date : 2022-09-01 DOI: 10.1080/19361610.2022.2116921
Jackie McNett, Josh McNett, Xiaoli Su
{"title":"IoT Security in Industry: A Threat Model of Existing and Future Network Infrastructure","authors":"Jackie McNett, Josh McNett, Xiaoli Su","doi":"10.1080/19361610.2022.2116921","DOIUrl":"https://doi.org/10.1080/19361610.2022.2116921","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":" ","pages":""},"PeriodicalIF":1.3,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44296469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Enhanced Healthcare Data Management Using Associative Data Mining Approaches 使用关联数据挖掘方法增强隐私的医疗保健数据管理
IF 1.3
Journal of Applied Security Research Pub Date : 2022-08-29 DOI: 10.1080/19361610.2022.2099707
N. Duraimutharasan
{"title":"Privacy Enhanced Healthcare Data Management Using Associative Data Mining Approaches","authors":"N. Duraimutharasan","doi":"10.1080/19361610.2022.2099707","DOIUrl":"https://doi.org/10.1080/19361610.2022.2099707","url":null,"abstract":"Abstract Hospital medical records with health examination findings can be integrated to assist in uncovering the link between aberrant test results and illness. It is possible to establish a disease-preventive knowledge center using these integrated data by performing associated rule mining on the results. In order to integrate data, sensitive patient information must be shared. Patients’ privacy may be violated by the disclosure of sensitive information. Thus, privacy-preserving associated rule mining in physically partitioned healthcare data is addressed in this article. The suggested technique is further evaluated in terms of data protection, transmission, and computing costs.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"44 3","pages":"827 - 844"},"PeriodicalIF":1.3,"publicationDate":"2022-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41285589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting Money Laundering Using Machine Learning and Artificial Neural Networks Algorithms in Banks 利用机器学习和人工神经网络算法预测银行洗钱
IF 1.3
Journal of Applied Security Research Pub Date : 2022-08-26 DOI: 10.1080/19361610.2022.2114744
M. Lokanan
{"title":"Predicting Money Laundering Using Machine Learning and Artificial Neural Networks Algorithms in Banks","authors":"M. Lokanan","doi":"10.1080/19361610.2022.2114744","DOIUrl":"https://doi.org/10.1080/19361610.2022.2114744","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":" ","pages":""},"PeriodicalIF":1.3,"publicationDate":"2022-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48572072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Stego Detection: Image Steganalysis Using a Novel Hidden Stego Visual Geometry Group–Based CNN Classification 隐写检测:基于CNN分类的新型隐写视觉几何组的图像隐写分析
IF 1.3
Journal of Applied Security Research Pub Date : 2022-08-24 DOI: 10.1080/19361610.2022.2110637
Hemalatha Jeyaprakash, Balachander Chokkalingam, Vivek V, S. Mohan
{"title":"Stego Detection: Image Steganalysis Using a Novel Hidden Stego Visual Geometry Group–Based CNN Classification","authors":"Hemalatha Jeyaprakash, Balachander Chokkalingam, Vivek V, S. Mohan","doi":"10.1080/19361610.2022.2110637","DOIUrl":"https://doi.org/10.1080/19361610.2022.2110637","url":null,"abstract":"Abstract Steganography is the concept of embedding or hiding secret information into a cover image by maintaining the visual quality. Various algorithms are designed to classify stego images but the race still continues between Steganographer and Steganalyser. Advances in deep learning provided a solution to detect stego images. In this article, we coin a new paradigm to detect stego image as a three-step process with the following repercussions: (1) employing preprocessing step to enhance the input image, (2 feature extraction using the Mustard honey bee optimization algorithm and, thus, the extracted features will be dimensionally reduced (3) by classification using HSVGG-based CNN. Experimentation carried out on ALASKA2 data set and the results were compared.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"979 - 999"},"PeriodicalIF":1.3,"publicationDate":"2022-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47867152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial Propaganda: How Enemies Target the U.S. to Fuel Division 对抗性宣传:敌人如何瞄准美国以助长分裂
IF 1.3
Journal of Applied Security Research Pub Date : 2022-08-22 DOI: 10.1080/19361610.2022.2113730
Molly M. Dundon, S. Houck
{"title":"Adversarial Propaganda: How Enemies Target the U.S. to Fuel Division","authors":"Molly M. Dundon, S. Houck","doi":"10.1080/19361610.2022.2113730","DOIUrl":"https://doi.org/10.1080/19361610.2022.2113730","url":null,"abstract":"Abstract This article explores how foreign enemies of the United States target American citizens with propaganda intended to fuel societal division. It reviews propaganda conceptually, discusses individual, group, and cultural factors that make the United States is uniquely vulnerable to false propaganda, and details the processes and mechanisms by which adversarial propaganda attempts to create false narratives and perpetuate half-truths in the digital domain. It concludes with a discussion on how to mitigate adversarial propaganda’s effects.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"1051 - 1059"},"PeriodicalIF":1.3,"publicationDate":"2022-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44824007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Geospatial Intelligence and Artificial Intelligence for Detecting Potential Coca Paste Production Infrastructure in the Border Region of Venezuela and Colombia 用于探测委内瑞拉和哥伦比亚边境地区潜在古柯膏生产基础设施的地理空间智能和人工智能
IF 1.3
Journal of Applied Security Research Pub Date : 2022-08-18 DOI: 10.1080/19361610.2022.2111184
Jairo Jesús Pinto Hidalgo, Jorge Antonio Silva Centeno
{"title":"Geospatial Intelligence and Artificial Intelligence for Detecting Potential Coca Paste Production Infrastructure in the Border Region of Venezuela and Colombia","authors":"Jairo Jesús Pinto Hidalgo, Jorge Antonio Silva Centeno","doi":"10.1080/19361610.2022.2111184","DOIUrl":"https://doi.org/10.1080/19361610.2022.2111184","url":null,"abstract":"Abstract Cocaine production has reached record levels in recent years. Latin America and the Caribbean are the primary sources of all cocaine consumed globally, thus there are indications that cocaine production processes could spread to countries of transit and consumption, becoming a threat to the security of states. In this article, we address the challenge of detecting potential primary infrastructures to produce coca paste in the border region of Venezuela and Colombia. We use geospatial intelligence and artificial intelligence to detect these objects in remote sensing images and identify their geographic location. We generated a dataset of 16,778 training samples that we named CocaPaste-PI-DETECTION, constructed from PlanetScope satellite imagery rated at NIIRS level 3, ground truth data, and A1, A2, and B2 information sources. An advanced deep learning model, specialized for object detection tasks, was trained. A mean Average Precision (mAP) score of 90.07% was obtained, and we analyzed generalization capabilities and conducted different experiments that demonstrated how the proposed methodology could strengthen intervention strategies against drug trafficking.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"1000 - 1050"},"PeriodicalIF":1.3,"publicationDate":"2022-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42803393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信