Journal of Applied Security Research最新文献

筛选
英文 中文
An Improved KNN Classifier for 3D Face Recognition Based on SURF Descriptors 一种改进的基于SURF描述符的三维人脸识别KNN分类器
IF 1.3
Journal of Applied Security Research Pub Date : 2022-07-27 DOI: 10.1080/19361610.2022.2099688
A. Boumedine, Samia Bentaieb, A. Ouamri
{"title":"An Improved KNN Classifier for 3D Face Recognition Based on SURF Descriptors","authors":"A. Boumedine, Samia Bentaieb, A. Ouamri","doi":"10.1080/19361610.2022.2099688","DOIUrl":"https://doi.org/10.1080/19361610.2022.2099688","url":null,"abstract":"Abstract In this article, we propose a three-dimensional (3D) face recognition approach for depth data captured by Kinect based on a combination of speeded up robust features (SURF) and k-nearest neighbor (KNN) algorithms. First, the shape index maps of the preprocessed 3D faces of the training gallery are computed, then the SURF feature vectors are extracted and used to form the dictionary. In the recognition process, we propose an improved KNN classifier to find the best match. The evaluation was performed using CurtinFaces and KinectFaceDB data sets, achieving rank-1 recognition rates of 96.78% and 94.23%, respectively, when using two samples per person for training.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42929214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Criminological and Victimological Support of World and National Security during Quarantine Measures Related to the Spread of Acute Respiratory Disease COVID-19 Caused by Coronavirus Sars-Cov-2 与Sars-Cov-2引起的急性呼吸道疾病COVID-19传播有关的隔离措施期间对世界和国家安全的犯罪学和受害者学支持
IF 1.3
Journal of Applied Security Research Pub Date : 2022-07-26 DOI: 10.1080/19361610.2022.2104106
R. Veresha, Alexander Dzhuzha, D. Tychyna, Anastasiya Dzhuzha
{"title":"Criminological and Victimological Support of World and National Security during Quarantine Measures Related to the Spread of Acute Respiratory Disease COVID-19 Caused by Coronavirus Sars-Cov-2","authors":"R. Veresha, Alexander Dzhuzha, D. Tychyna, Anastasiya Dzhuzha","doi":"10.1080/19361610.2022.2104106","DOIUrl":"https://doi.org/10.1080/19361610.2022.2104106","url":null,"abstract":"Abstract The study examines current challenges faced by Ukrainian legal system in matters of criminological and victimological security of society during quarantine measures related to COVID-19. Using methods of system analysis and scientific design, current legal framework of Ukraine in regulation of public relations was analyzed. The study draws attention to the fact that, Ukraine has improved its legislation on the control of medical purchases and the provision of necessary materials to medical institutions. At the same time, the authorities will have to further improve the framework for patient monitoring and the epidemiological surveillance system in the medical sector.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44698487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
BCPIS: Blockchain-based Counterfeit Product Identification System BCPIS:基于区块链的假冒产品识别系统
IF 1.3
Journal of Applied Security Research Pub Date : 2022-07-13 DOI: 10.1080/19361610.2022.2086784
M. Mhatre, Harshvivek Kashid, Tanisha Jain, P. Chavan
{"title":"BCPIS: Blockchain-based Counterfeit Product Identification System","authors":"M. Mhatre, Harshvivek Kashid, Tanisha Jain, P. Chavan","doi":"10.1080/19361610.2022.2086784","DOIUrl":"https://doi.org/10.1080/19361610.2022.2086784","url":null,"abstract":"Abstract A key aspect of sustainable business development involves protecting a company’s products from counterfeiting. Since this can impact brand’s image and often, product counterfeits are of a minor quality which can be dangerous and even pose health hazards. Counterfeiters gain profits by manufacturing products using lesser quality materials and production methods. Many counterfeit products in the market are difficult to identify for a normal customer and require to be examined by a trained professional which is time-consuming and costly. In this paper, we propose a method for identifying counterfeit by a simple scan of the quick response code on the product. Since these codes are unique and are implemented by unique algorithms, it is almost impossible to forge them. Also, implementing an encrypted peer-to-peer system for the database makes it impossible for attackers to tamper with the database. The proposed method collectively not only helps laypersons to identify the authenticity of products but also an ownership tracking system where products are linked to the owners’ account which will allow them to produce proof of purchase and authenticity when reselling products and when claiming the warranty of the product. This will help in reducing manufacturing and materials costs used from traditional methods against counterfeiting such as Radio-Frequency Identification and the Hologram technique.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49290719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Enhancing Burp Suite with Machine Learning Extension for Vulnerability Assessment of Web Applications 增强Burp套件的机器学习扩展,用于Web应用程序的漏洞评估
IF 1.3
Journal of Applied Security Research Pub Date : 2022-07-10 DOI: 10.1080/19361610.2022.2096387
Rrezearta Thaqi, Kamer Vishi, Blerim Rexha
{"title":"Enhancing Burp Suite with Machine Learning Extension for Vulnerability Assessment of Web Applications","authors":"Rrezearta Thaqi, Kamer Vishi, Blerim Rexha","doi":"10.1080/19361610.2022.2096387","DOIUrl":"https://doi.org/10.1080/19361610.2022.2096387","url":null,"abstract":"Abstract Today’s web represents the most extensive engineered system ever created by humankind. Web security is critical to web application providers and end-users. Burp Suite is established as a state-of-the-art and fully featured set of tools for web vulnerability scanners. This paper presents a novel approach using state of the art Machine Learning algorithms applied to the Burp Suite extension. These algorithms were used to scan for: SQL injection, Cross-Site Request Forgery, and XML External Entity vulnerabilities in university web applications. The results show that the best algorithm is Long Short-Term Memory and that the targeted website is safe to use.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42328192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
One-Chance Transit Crime and Commuters’ Victimization Experiences in Ibadan City, Nigeria 尼日利亚伊巴丹市一次性交通犯罪与通勤者受害经历
IF 1.3
Journal of Applied Security Research Pub Date : 2022-07-07 DOI: 10.1080/19361610.2022.2094209
Olusegun I. Olaniyan, U. Ojedokun, A. Aderinto
{"title":"One-Chance Transit Crime and Commuters’ Victimization Experiences in Ibadan City, Nigeria","authors":"Olusegun I. Olaniyan, U. Ojedokun, A. Aderinto","doi":"10.1080/19361610.2022.2094209","DOIUrl":"https://doi.org/10.1080/19361610.2022.2094209","url":null,"abstract":"Abstract One-chance transit crime is a prevalent yet under-researched form of transit crime in Nigeria. Thus, this study investigated the crime and the victimization experiences of commuters in Ibadan city. Routine activity theory was employed as theoretical framework. Data were generated from victims of the crime, police personnel and motor-park officials through in-depth interviews and focus group discussion methods. Findings revealed that one-chance transit crime is commonly perpetrated by criminals making use of taxis for commercial transportation. Money and mobile phones of commuters were the major targets of this category of criminals. One-chance transit criminals are luring their victims through different strategies.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44865231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Where One Door Shuts, Another Opens: Honesty Is the Best Virtue 一扇门关上,另一扇门就会打开:诚实是最好的美德
IF 1.3
Journal of Applied Security Research Pub Date : 2022-06-21 DOI: 10.1080/19361610.2022.2084497
Hyeyoung Lim
{"title":"Where One Door Shuts, Another Opens: Honesty Is the Best Virtue","authors":"Hyeyoung Lim","doi":"10.1080/19361610.2022.2084497","DOIUrl":"https://doi.org/10.1080/19361610.2022.2084497","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43374798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public-Private Partnerships: Exploring Perceptions and Efficacy of Community Security Patrols 公私伙伴关系:探索社区安全巡逻的观念和效力
IF 1.3
Journal of Applied Security Research Pub Date : 2022-06-16 DOI: 10.1080/19361610.2022.2086782
S. Holmes, R. Wolf, Thomas Baker
{"title":"Public-Private Partnerships: Exploring Perceptions and Efficacy of Community Security Patrols","authors":"S. Holmes, R. Wolf, Thomas Baker","doi":"10.1080/19361610.2022.2086782","DOIUrl":"https://doi.org/10.1080/19361610.2022.2086782","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45245557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Enhancement of Third Parties Is Needed in Global Supply Chain Management 全球供应链管理需要加强第三方的安全
IF 1.3
Journal of Applied Security Research Pub Date : 2022-06-15 DOI: 10.1080/19361610.2022.2086785
Y. Takefuji
{"title":"Security Enhancement of Third Parties Is Needed in Global Supply Chain Management","authors":"Y. Takefuji","doi":"10.1080/19361610.2022.2086785","DOIUrl":"https://doi.org/10.1080/19361610.2022.2086785","url":null,"abstract":"Abstract Incident reports show the high risk of losing trust in global supply chain management. Under the covid-19 pandemic, cloud-based global supply chains have been vulnerable to malicious attacks. The goal of this paper is to show the high risk caused by third-party access in the current global supply chains and how to mitigate it. Based on the incident reports, global supply chain leaders are unaware of the risks of third-party access. The current global supply chains must be transformed into robust and resilient systems against malicious attacks. This paper shows methods on how to mitigate the high-security risk. HIGHLIGHTS Incident reports show the high risk of losing trust in global supply chain management against malicious attacks. The high risk caused by third-party access in the current global supply chains will be illustrated. Global supply chain leaders are unaware of the risks of third-party access. The global supply chains must be transformed into robust systems. This paper shows methods on how to mitigate the high-security risk in third-party logistics. The lower the risk, the lower the chance of losing trust. The more a leader is aware of the high risks, the less likely he or she is to lose trust.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43688960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modified Deterministic Approach for Size Invariant Visual Secret Sharing with Improved Quality of Recovered Secret 改进的确定性大小不变视觉秘密共享方法,提高了恢复秘密的质量
IF 1.3
Journal of Applied Security Research Pub Date : 2022-06-02 DOI: 10.1080/19361610.2022.2080470
R. Chaturvedi, Sudeep D. Thepade, Swati Ahirrao
{"title":"Modified Deterministic Approach for Size Invariant Visual Secret Sharing with Improved Quality of Recovered Secret","authors":"R. Chaturvedi, Sudeep D. Thepade, Swati Ahirrao","doi":"10.1080/19361610.2022.2080470","DOIUrl":"https://doi.org/10.1080/19361610.2022.2080470","url":null,"abstract":"Abstract In the digital world, securing data is very significant. Digital data can focus either on content secrecy or the quality of recovered secret content. Visual Secret Sharing (VSS) becomes vital when content secrecy is essential over quality. VSS encrypts the secret into “n” share. The individual share cannot reveal any information; the secret gets revealed only when a predefined number of shares come together. Earlier attempted probabilistic and random grid approaches of size invariant VSS compromise in quality of recovered secret. Paper presents a method as a modified deterministic approach for size invariant VSS with improved quality of recovered secret; giving minimum Mean Squared Error (MSE), maximum Peak Signal to Noise Ratio (PSNR), and Structural Similarity Index (SSIM) close to “1” as compared to other existing methods.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45034632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application and Criminalization of the Artificial Intelligence in Business: Recommendation to Counter the Regulatory Challenges 人工智能在商业中的应用和刑事定罪:应对监管挑战的建议
IF 1.3
Journal of Applied Security Research Pub Date : 2022-05-27 DOI: 10.1080/19361610.2022.2079939
A. Mahmud
{"title":"Application and Criminalization of the Artificial Intelligence in Business: Recommendation to Counter the Regulatory Challenges","authors":"A. Mahmud","doi":"10.1080/19361610.2022.2079939","DOIUrl":"https://doi.org/10.1080/19361610.2022.2079939","url":null,"abstract":"Abstract Artificial Intelligence (AI) is playing a significant role in our social and daily life for technological development. The efficient integration of AI into business organizations or firms is improving performance and efficiency on a significant scale. Nowadays, artificial intelligence (AI) is assisting criminal activities or committing crimes through autonomous activity related to business, e-commerce, and market manipulation. AI could be used to aid criminal activity or, in certain situations, a mistake has resulted in criminal activity and most of the fields lack strong legislative safeguards due to the regulatory challenges imposed by the special nature of AI-Crime (AIC). The paper has examined the application and criminalization of AI in business and firm management. As we will have to strengthen the legislation for managing, preventing, and punishing AI-based business-related crimes, the last segment of the paper has suggested recommendations to counter the regulatory challenges.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46004240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信