信息安全(英文)最新文献

筛选
英文 中文
A Trusted and Privacy-Preserving Carpooling Matching Scheme in Vehicular Networks 车辆网络中可信且隐私保护的拼车匹配方案
信息安全(英文) Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.131001
Hongliang Sun, Linfeng Wei, Libo Wang, J. Yin, W. Ma
{"title":"A Trusted and Privacy-Preserving Carpooling Matching Scheme in Vehicular Networks","authors":"Hongliang Sun, Linfeng Wei, Libo Wang, J. Yin, W. Ma","doi":"10.4236/jis.2022.131001","DOIUrl":"https://doi.org/10.4236/jis.2022.131001","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Role of Social Engineering in Cybersecurity and Its Impact 社会工程在网络安全中的作用及其影响
信息安全(英文) Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.134020
Bandar S. Almutairi, Abdurahman Alghamdi
{"title":"The Role of Social Engineering in Cybersecurity and Its Impact","authors":"Bandar S. Almutairi, Abdurahman Alghamdi","doi":"10.4236/jis.2022.134020","DOIUrl":"https://doi.org/10.4236/jis.2022.134020","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hadoop Distributed File System Security Challenges and Examination of Unauthorized Access Issue Hadoop分布式文件系统的安全挑战及未授权访问问题的检查
信息安全(英文) Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.132002
Wahid Rajeh
{"title":"Hadoop Distributed File System Security Challenges and Examination of Unauthorized Access Issue","authors":"Wahid Rajeh","doi":"10.4236/jis.2022.132002","DOIUrl":"https://doi.org/10.4236/jis.2022.132002","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Blockchain Based Redistricting with Public Participation 基于b区块链的公众参与选区划分
信息安全(英文) Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.133009
M. Ramkumar, Naresh Adhikari
{"title":"Blockchain Based Redistricting with Public Participation","authors":"M. Ramkumar, Naresh Adhikari","doi":"10.4236/jis.2022.133009","DOIUrl":"https://doi.org/10.4236/jis.2022.133009","url":null,"abstract":"Redistricting is the process of grouping all census blocks within a region to form larger subdivisions, or districts. The process is typically subject to some hard rules and some (soft) preferences to improve fairness of the solution. Achieving public consensus on the fairness of proposed redistricting plans is highly desirable. Unfortunately, fair redistricting is an NP hard optimization problem. The complexity of the process makes it even more challenging to convince the public of the fairness of the proposed solution. This paper pro-poses a completely transparent blockchain based strategy to promote public participation in the redistricting process, to increase public confidence in the outcome of the process. The proposed approach is based on the fact that one does not have to worry about how the NP hard problem was solved, as long as it is possible for anyone to compute a “goodness” metric for the proposed plan. In the proposed approach, anyone can submit a plan along with the ex-pected metric. Only the plan with the best claimed metric needs to be eva-luated in a blockchain network.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cybersecurity: Identifying the Vulnerability Intensity Function (VIF) and Vulnerability Index Indicator (VII) of a Computer Operating System 网络安全:识别计算机操作系统的漏洞强度函数(VIF)和漏洞指数指标(VII)
信息安全(英文) Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.134019
Ranju Karki, C. Tsokos
{"title":"Cybersecurity: Identifying the Vulnerability Intensity Function (<i>VIF</i>) and Vulnerability Index Indicator (<i>VII</i>) of a Computer Operating System","authors":"Ranju Karki, C. Tsokos","doi":"10.4236/jis.2022.134019","DOIUrl":"https://doi.org/10.4236/jis.2022.134019","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Forensic Investigation of Terrorism in Nigeria: An Apriori Algorithm Approach 尼日利亚恐怖主义的法医调查:Apriori算法方法
信息安全(英文) Pub Date : 2021-09-09 DOI: 10.4236/jis.2021.124015
A. Iorliam, Raymond U. Dugeri, B. O. Akumba, S. Otor
{"title":"A Forensic Investigation of Terrorism in Nigeria: An Apriori Algorithm Approach","authors":"A. Iorliam, Raymond U. Dugeri, B. O. Akumba, S. Otor","doi":"10.4236/jis.2021.124015","DOIUrl":"https://doi.org/10.4236/jis.2021.124015","url":null,"abstract":"Investigations towards studying terrorist activities \u0000have recently attracted a great amount of research interest. In this paper, we \u0000investigate the use of the Apriori algorithm on the Global Terrorism Database \u0000(GTD) for forensic investigation purposes. Recently, the Apriori algorithm, \u0000which could be considered a forensic tool, has been used to study terrorist activities and \u0000patterns across the world. As such, our motivation is to utilise the Apriori \u0000algorithm approach on the GTD to study terrorist activities and the areas/states \u0000in Nigeria with high frequencies of terrorist activities. We observe that the \u0000most preferred method of terrorist attacks in Nigeria is through armed assault. \u0000Again, our experiment shows that attacks in Nigeria are mostly successful. \u0000Also, we observe from our investigations that most terrorists in Nigeria are \u0000not suicidal. The main application of this work can be used by forensic experts \u0000to assist law enforcement agencies in decision making when handling terrorist \u0000attacks in Nigeria.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47676930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Relevance of Cybersecurity Education at Pedagogy Levels in Schools 网络安全教育在学校教育学层面的相关性
信息安全(英文) Pub Date : 2021-09-09 DOI: 10.4236/jis.2021.124013
Eric Amankwa
{"title":"Relevance of Cybersecurity Education at Pedagogy Levels in Schools","authors":"Eric Amankwa","doi":"10.4236/jis.2021.124013","DOIUrl":"https://doi.org/10.4236/jis.2021.124013","url":null,"abstract":"Today, the internet extensively impacts people’s \u0000lives through improved communications, interactions, and the \u0000exchange of information. Despite all these positive effects, it also causes in \u0000significant negative issues. Over the recent years, cases of online fraud, \u0000cyber-bullying, racial abuse, gambling, and pornography have increased due to \u0000the lack of self-control and overall awareness among internet users. Therefore, \u0000there is a need to create awareness and training on cybersecurity in schools to \u0000protect students from cyber-bullying, online fraud, and being targets of \u0000prejudice. Research reveals that the level of self-control and awareness among \u0000internet users is still moderate and low. To ensure cybersecurity awareness and \u0000knowledge among internet users, young people need to get educated on how to operate \u0000safely in cyberspace. This education will guarantee that they understand how to \u0000protect themselves from cybercrimes. To this extent, this research paper will \u0000explore the essence of cybersecurity education in schools and provide \u0000strategies that educators can utilize to promote cybersecurity education across \u0000learning institutions. This paper will thus conclude how cybersecurity training \u0000can be implemented in a learning institution.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49462723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cutting Edge Trends in Deception Based Intrusion Detection Systems—A Survey 基于欺骗的入侵检测系统的前沿趋势综述
信息安全(英文) Pub Date : 2021-09-09 DOI: 10.4236/jis.2021.124014
O. Oluoha, Terungwa Simon Yange, G. Okereke, F. Bakpo
{"title":"Cutting Edge Trends in Deception Based Intrusion Detection Systems—A Survey","authors":"O. Oluoha, Terungwa Simon Yange, G. Okereke, F. Bakpo","doi":"10.4236/jis.2021.124014","DOIUrl":"https://doi.org/10.4236/jis.2021.124014","url":null,"abstract":"Cyber criminals have become a formidable treat in \u0000today’s world. This present reality has placed cloud computing platforms under \u0000constant treats of cyber-attacks at all levels, with an ever-evolving treat \u0000landscape. It has been observed that the number of threats faced in cloud \u0000computing is rising exponentially mainly due to its widespread adoption, rapid \u0000expansion and a vast attack surface. One of the front-line tools employed in \u0000defense against cyber-attacks is the Intrusion Detection Systems (IDSs). In \u0000recent times, an increasing number of researchers and cyber security practitioners \u0000alike have advocated the use of deception-based techniques in IDS and other \u0000cyber security defenses as against the use of traditional methods. This paper \u0000presents an extensive overview of the deception technology environment, as well \u0000as a review of current trends and implementation models in deception-based \u0000Intrusion Detection Systems. Issues mitigating the implementation of deception \u0000based cyber security defenses are also investigated.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46248386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems 功能逻辑在电子商务系统中应用的安全保障技术过程
信息安全(英文) Pub Date : 2021-05-13 DOI: 10.4236/JIS.2021.123010
Faisal Nabi, Muhammad Saqib Malhi, Muhammad Farhan, Umar Mahmood
{"title":"Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems","authors":"Faisal Nabi, Muhammad Saqib Malhi, Muhammad Farhan, Umar Mahmood","doi":"10.4236/JIS.2021.123010","DOIUrl":"https://doi.org/10.4236/JIS.2021.123010","url":null,"abstract":"Security \u0000practices such as Audits that often focus on penetration testing are performed \u0000to find flaws in some types of vulnerability & use tools, which have been \u0000tailored to resolve certain risks based on code errors, code conceptual assumptions bugs, etc. Most existing security practices in e-Commerce \u0000are dealt with as an auditing activity. They may have \u0000policies of security, which are enforced by auditors who enable a particular \u0000set of items to be reviewed, but also fail \u0000to find vulnerabilities, which have been established in compliance with application logic. In this paper, we will \u0000investigate the problem of business logic vulnerability in the \u0000component-based rapid development of e-commerce applications while reusing \u0000design specification of component. We propose secure application functional \u0000processing Logic Security technique for component-based \u0000e-commerce application, based on security requirement of e-business process and security assurance logical component \u0000behaviour specification approach to \u0000formulize and design a solution for business logic vulnerability phenomena.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44294765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blockchain Implications in the Management of Patient Complaints in Healthcare 区块链在医疗保健患者投诉管理中的意义
信息安全(英文) Pub Date : 2021-05-13 DOI: 10.4236/JIS.2021.123011
Yazan M. Alkhateeb
{"title":"Blockchain Implications in the Management of Patient Complaints in Healthcare","authors":"Yazan M. Alkhateeb","doi":"10.4236/JIS.2021.123011","DOIUrl":"https://doi.org/10.4236/JIS.2021.123011","url":null,"abstract":"Blockchain is an emerging technology that has recently been the focus for many researchers who have highlighted its \u0000diverse applications including healthcare. Transparency in managing \u0000unsolicited patient complaints is important in healthcare for both patients and \u0000healthcare providers; in addition, patient complaints analysis is significant \u0000to the continued quality improvement. Accordingly, the purpose of this study is \u0000to understand the nature of patient complaints management in the healthcare \u0000settings, explore the implications of blockchain on the management of patient \u0000complaints, and identify limitations in the usage of blockchain. Structured \u0000qualitative review and content analysis of the literature methods were used \u0000through multiple inclusion and exclusion phases for the scope of this research. \u0000Blockchain technology characteristics have been analyzed and approximated with \u0000desired features in the patients’ complaint management. Patient complaints \u0000provide valuable information to drive continuous improvements in healthcare. Blockchain is described as transparent, decentralized, immutable and anonymous. \u0000Results of this research found that a complaint Management system that is built \u0000on blockchain technology might have desired features that involve data \u0000integrity, security and transparency. Blockchain does have certain limitations \u0000that involve cybersecurity, scalability, confidentiality, readiness to adopt \u0000it, and is uncertainty about its impact. As a conclusion, implementing a system to manage patient complaints that is based \u0000on blockchain technology is promising, due to its desired possible features.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48874949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信