Skip to main content

previous disabled Page of 16
and
  1. Book Series

  2. No Access

    Chapter

    GenAI Model Security

    Safeguarding GenAI models against threats and aligning them with security requirements is imperative yet challenging. This chapter provides an overview of the security landscape for generative models. It begin...

    Ken Huang, Ben Goertzel, Daniel Wu, Anita **e in Generative AI Security (2024)

  3. No Access

    Chapter

    The Future Development Trends of Privacy Computing

    We propose to abstract, condense, and foresee the future development trends of privacy computing from three aspects: the research scope of privacy computing, the evolution of privacy computing theory and techn...

    Fenghua Li, Hui Li, Ben Niu in Privacy Computing (2024)

  4. No Access

    Book

  5. No Access

    Chapter and Conference Paper

    The Key Lattice Framework for Concurrent Group Messaging

    Today, two-party secure messaging is well-understood and widely adopted, e.g., Signal and WhatsApp. Multiparty protocols for secure group messaging are less mature and many protocols with different tradeoffs ...

    Kelong Cong, Karim Eldefrawy, Nigel P. Smart in Applied Cryptography and Network Security (2024)

  6. No Access

    Chapter and Conference Paper

    A Fuzzy Logical RAT Selection Scheme in SDN-Enabled 5G HetNets

    Mobile communication systems are witnessing an ongoing-increase in connected devices and new types of services. This considerable increase has led to an exponential augmentation in mobile data traffic volume. ...

    Khitem Ben Ali, Faouzi Zarai in Parallel and Distributed Computing, Applic… (2024)

  7. No Access

    Chapter

    Introduction

    The continuous evolution and pervasive application of communication technology, network technology, and computing technology have boosted interconnection of everything and ubiquitous sharing of information. Wi...

    Fenghua Li, Hui Li, Ben Niu in Privacy Computing (2024)

  8. No Access

    Chapter

    Privacy Computing Theory

    Over the past 20 years, privacy preservation has received extensive attention. However, existing research has focused on scattered privacy-preserving methods for specific scenarios, and there is no systematic ...

    Fenghua Li, Hui Li, Ben Niu in Privacy Computing (2024)

  9. No Access

    Chapter and Conference Paper

    Improvement and Evaluation of Resilience of Adaptive Cruise Control Against Spoofing Attacks Using Intrusion Detection System

    The Adaptive Cruise Control (ACC) system automatically adjusts the vehicle speed to maintain a safe distance between the vehicle and the lead (ahead) vehicle. The controller’s decision to accelerate or deceler...

    Mubark Jedh, Lotfi ben Othmane in Risks and Security of Internet and Systems (2024)

  10. No Access

    Chapter

    Advances in Privacy Preservation Technologies

    The rapid development of information technology and the continuous evolution of new business paradigms and personalized services have promoted frequent cross-border, cross-system, and cross-ecosystem interacti...

    Fenghua Li, Hui Li, Ben Niu in Privacy Computing (2024)

  11. No Access

    Chapter

    Privacy Computing Techniques

    One of the core goals of privacy computing is to guide the research of privacy-preserving algorithms from the perspective of “computing,” and to continuously explore and iterate on the basic theory of privacy-...

    Fenghua Li, Hui Li, Ben Niu in Privacy Computing (2024)

  12. No Access

    Book

    Privacy Computing

    Theory and Technology

    Fenghua Li, Hui Li, Ben Niu (2024)

  13. No Access

    Chapter and Conference Paper

    Traffic Analysis by Adversaries with Partial Visibility

    Mixnets are a fundamental privacy enhancing technology in the context of anonymous communication that have been extensively studied in terms of a Global passive Adversary (GPA). However a more realistic advers...

    Iness Ben Guirat, Claudia Diaz, Karim Eldefrawy in Computer Security – ESORICS 2023 (2024)

  14. No Access

    Chapter and Conference Paper

    Multi-objective Hydrologic Cycle Optimization for Integrated Container Terminal Scheduling Problem

    This paper uses the multi-objective rep-guided hydrological cycle optimization (MORHCO) algorithm to solve the Integrated Container Terminal Scheduling (ICTS) Problem. To enhance the global search capability o...

    Ben Niu, Yuda Wang, Jia Liu, Qianying Liu in Machine Learning for Cyber Security (2023)

  15. No Access

    Chapter

    Log and Monitor All Access to System Components and Cardholder Data

    The overview for section 10.x of PCI DSS v4.0 reads as follows:

    Arthur B. Cooper Jr., Jeff Hall in The Definitive Guide to PCI DSS Version 4 (2023)

  16. No Access

    Chapter

    Support Information Security with Organizational Policies and Programs

    While PCI is centered around protecting cardholder data (CHD), Requirement 12 is central to all data. Requirement 12 is about data and IT governance, which is relevant to any organization.

    Arthur B. Cooper Jr., Jeff Hall in The Definitive Guide to PCI DSS Version 4 (2023)

  17. No Access

    Chapter

    Segmentation and Tokenization

    Segmentation is one of the most misunderstood aspects of PCI compliance. Many people read too deeply into the DSS about segmentation. On page 12 of PCI DSS version 4, it states that segmentation of the CDE from t...

    Arthur B. Cooper Jr., Jeff Hall in The Definitive Guide to PCI DSS Version 4 (2023)

  18. No Access

    Chapter and Conference Paper

    Designing a Digital Shadow for Pasture Management to Mitigate the Impact of Climate Change

    Pasture is a said to be a natural feed to the animal. Pastures are maintained to ensure a good quality and quantity of the feed to get the best produce from the animals. Traditional ways of managing the pastur...

    Ntebaleng Junia Lemphane in Information and Communication Technology f… (2023)

  19. No Access

    Chapter

    A Brief History of PCI

    Most people think that PCI began with the formation of the PCI Security Standards Council (PCI SSC) back in 2006, but the roots of PCI, in fact, go back to the late 1990s.

    Arthur B. Cooper Jr., Jeff Hall in The Definitive Guide to PCI DSS Version 4 (2023)

  20. No Access

    Chapter

    Apply Secure Configurations to All System Components

    While network security controls (NSCs) are discussed in Requirement 1, those NSCs and the rest of the systems and devices are covered in Requirement 2.

    Arthur B. Cooper Jr., Jeff Hall in The Definitive Guide to PCI DSS Version 4 (2023)

previous disabled Page of 16