International Journal of Security and Its Applications最新文献

筛选
英文 中文
Improving the Physical Security of Microchip 提高微芯片的物理安全性
International Journal of Security and Its Applications Pub Date : 2019-09-30 DOI: 10.33832/ijsia.2019.13.3.03
Dominik Malcik, M. Drahanský
{"title":"Improving the Physical Security of Microchip","authors":"Dominik Malcik, M. Drahanský","doi":"10.33832/ijsia.2019.13.3.03","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.3.03","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69499491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review on Space and Security Issues in Cloud Computing 云计算中的空间与安全问题综述
International Journal of Security and Its Applications Pub Date : 2019-06-30 DOI: 10.33832/ijsia.2019.13.2.01
N. Thirupathi Rao, D. Bhattacharyya
{"title":"Review on Space and Security Issues in Cloud Computing","authors":"N. Thirupathi Rao, D. Bhattacharyya","doi":"10.33832/ijsia.2019.13.2.01","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.2.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42193279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Smart Electronic Stick for Blind People: An IOT Application 盲人智能电子棒:物联网应用
International Journal of Security and Its Applications Pub Date : 2019-03-31 DOI: 10.33832/ijsia.2019.13.1.01
C. Sudhakar, N. Thirupathi Rao, D. Bhattacharyya
{"title":"Smart Electronic Stick for Blind People: An IOT Application","authors":"C. Sudhakar, N. Thirupathi Rao, D. Bhattacharyya","doi":"10.33832/ijsia.2019.13.1.01","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.1.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44734868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analyzing the performance of Various Fraud Detection Techniques 分析各种欺诈检测技术的性能
International Journal of Security and Its Applications Pub Date : 2018-09-30 DOI: 10.14257/ijsia.2018.12.5.03
G. Anamika, K. Mayuri, B. K. K. Reddy, N. Iyengar, Ronnie D. Caytiles
{"title":"Analyzing the performance of Various Fraud Detection Techniques","authors":"G. Anamika, K. Mayuri, B. K. K. Reddy, N. Iyengar, Ronnie D. Caytiles","doi":"10.14257/ijsia.2018.12.5.03","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.5.03","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/ijsia.2018.12.5.03","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46343077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Issues and Attacks in Wireless Sensor Networks: Some Case Studies 无线传感器网络中的安全问题和攻击:一些案例研究
International Journal of Security and Its Applications Pub Date : 2018-09-30 DOI: 10.14257/ijsia.2018.12.5.01
N. Thirupathi Rao, D. Bhattacharyya, Tai-hoon Kim
{"title":"Security Issues and Attacks in Wireless Sensor Networks: Some Case Studies","authors":"N. Thirupathi Rao, D. Bhattacharyya, Tai-hoon Kim","doi":"10.14257/ijsia.2018.12.5.01","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.5.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/ijsia.2018.12.5.01","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46837069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secured Data Partitioning through Sequence based Mapping and Random Order of Data Separation 基于序列映射和随机数据分离顺序的安全数据划分
International Journal of Security and Its Applications Pub Date : 2018-09-30 DOI: 10.14257/IJSIA.2018.12.5.02
Hazila Hasan, S. Chuprat, M. N. Mahrin
{"title":"Secured Data Partitioning through Sequence based Mapping and Random Order of Data Separation","authors":"Hazila Hasan, S. Chuprat, M. N. Mahrin","doi":"10.14257/IJSIA.2018.12.5.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.5.02","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46759601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ancillary Ultrasonic Rangefinder for Autonomous Vehicles 自动驾驶汽车辅助超声波测距仪
International Journal of Security and Its Applications Pub Date : 2018-09-30 DOI: 10.14257/IJSIA.2018.12.5.05
Y. Wiseman
{"title":"Ancillary Ultrasonic Rangefinder for Autonomous Vehicles","authors":"Y. Wiseman","doi":"10.14257/IJSIA.2018.12.5.05","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.5.05","url":null,"abstract":"The latest fatal accidents of autonomous vehicle happened because of undetected peer vehicles or persons. These fatal accidents call attention to the rangefinder devices which are a very significant component of every autonomous vehicle. The rangefinder is the starting point for the decision whether the vehicle should continue to go, to stop, or bypassing an object. In this paper an ultrasonic based rangefinder device for autonomous vehicles is presented. The device can be used as an ancillary system in addition to standard LIDAR system used by almost all the autonomous vehicles, with the aim of overcoming the obstructions of conventional LIDAR systems.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49550576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Secure Prioritized Inter Cluster Channel Selection for Tracking User Attack in Cognitive Radio Networks 用于跟踪认知无线电网络中用户攻击的安全优先簇间信道选择
International Journal of Security and Its Applications Pub Date : 2018-09-30 DOI: 10.14257/ijsia.2018.12.5.04
Chandra Sekhar Musinana, K. Chilukuri, P. Reddy
{"title":"Secure Prioritized Inter Cluster Channel Selection for Tracking User Attack in Cognitive Radio Networks","authors":"Chandra Sekhar Musinana, K. Chilukuri, P. Reddy","doi":"10.14257/ijsia.2018.12.5.04","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.5.04","url":null,"abstract":"Dynamic spectrum allocation evolved in order to allow the spectrum holes to be occupied by secondary users (SUs), but they have to handoff when primary users (PUs) come back, which brings new security problems like Tracking User Attack (TUA) into consideration. TUA might block the control information shared by a Cognitive Radio Network (CRN), if the attacker predicts the control channel frequency based on traffic analysis. This is a typical Denial of Service (DOS) attack preventing users from handoff to available channels. In cluster based channel selection, cluster heads will receive the channel information, about two users at a time and transmit the common preferred channel that was allocated to the base station. The base station selects a channel and returns it to the cluster head which returns them to the requesting CR users. For secure channel selection, the information could be encrypted by the base station and decrypted at the cluster heads to prevent DOS attacks. In this work, we propose selection of available channels based on the priority of the cluster which we term Prioritized Inter Cluster Channel Selection (PICCS). The priority is essentially the history based reputation of the cluster calculated from the attackers in the cluster. Thus, instead of a random choice of a cluster for the available channel, during inter-cluster channel selection, we select a channel from the best available cluster. We observe the effect of such selection on both the delay and the handoffs in the presence of attackers and compare it with the channel selection scheme based on the nearest available cluster.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46251164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and Assurance Aspects to be Observed in Cloud Computing Based Data Centers: A Study 基于云计算的数据中心应注意的安全和保证方面:一项研究
International Journal of Security and Its Applications Pub Date : 2018-07-31 DOI: 10.14257/ijsia.2018.12.4.01
N. Thirupathi Rao, A. Sravani, D. Bhattacharyya, Tai-hoon Kim
{"title":"Security and Assurance Aspects to be Observed in Cloud Computing Based Data Centers: A Study","authors":"N. Thirupathi Rao, A. Sravani, D. Bhattacharyya, Tai-hoon Kim","doi":"10.14257/ijsia.2018.12.4.01","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.4.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/ijsia.2018.12.4.01","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49353899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Survey of Cyber Security Approaches for Attack Detection, Prediction, and Prevention 网络安全攻击检测、预测和预防方法综述
International Journal of Security and Its Applications Pub Date : 2018-07-31 DOI: 10.14257/IJSIA.2018.12.4.02
Ayei E. Ibor, F. Oladeji, O. Okunoye
{"title":"A Survey of Cyber Security Approaches for Attack Detection, Prediction, and Prevention","authors":"Ayei E. Ibor, F. Oladeji, O. Okunoye","doi":"10.14257/IJSIA.2018.12.4.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.4.02","url":null,"abstract":"The expanding threat landscape has come with a plethora of consequences for most organizations and individuals. This is witnessed in the high volume of cyber-attacks prevalent in the cyberspace. Though several approaches have been proposed and deployed in recent times, most of them are only theoretical masterpieces while others remain computationally infeasible due to the computational requirements for implementing them. Where implementation is possible, the issue of computational complexity becomes a significant overhead in which case a large amount of computing resources such as CPU cycle, memory, network bandwidth and data structures are consumed culminating in tedious, time consuming, and error prone processes. Similarly, most of these techniques are basically reactive and as such can only be triggered when an incident is reported while most depend on the administrator to apply the necessary mitigation processes after an attack has occurred. To this effect, this paper presents a survey of cyber security approaches that have been proposed in the Literature. The paper also reviews the methodologies, strengths and weaknesses of these approaches, and finally identifies areas where further research could focus.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67048212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信