Search
Search Results
-
Ontology-based security modeling in ArchiMate
Enterprise Risk Management involves the process of identification, evaluation, treatment, and communication regarding risks throughout the...
-
Framework for Modeling Security Policies of Big Data Processing Systems
AbstractThis paper studies automatizing the analysis of access control in big data management systems by modeling security policies. It analyzes...
-
MEDICALHARM: A threat modeling designed for modern medical devices and a comprehensive study on effectiveness, user satisfaction, and security perspectives
Modern medical devices (MMDs) are a rapidly growing field of medical technology, and recent advances have allowed them to monitor and manage...
-
Analyzing and comparing the security of self-sovereign identity management systems through threat modeling
The concept of Self-Sovereign Identity (SSI) promises to strengthen the security and user-centricity of identity management. Since any secure online...
-
An extension of the ADVISE Meta modeling framework and its application for an early-stage security analysis of a public transport supervision system
Early-stage security analysis can be used for a preliminary assessment of the security level of a system, thus providing useful insights to guide the...
-
Establishment Method of Knowledge Graphs for Public Security Cases
AbstractWith the continuous improvement of the informatization level of the police, how to make accurate intelligence analysis based on the modeling...
-
Sentiment analysis of tweets on social security and medicare
The field of politics can be greatly aided through the use of natural language processing techniques on places like social media. Twitter hosts...
-
A security framework for mobile agent systems
Security is a very important challenge in mobile agent systems due to the strong dependence of agents on the platform and vice versa. According to...
-
A descriptive study of assumptions in STRIDE security threat modeling
Security threat modeling involves the systematic elicitation of plausible threat scenarios, and leads to the identification and articulation of the...
-
Exploring the role of gamified information security education systems on information security awareness and protection behavioral intention
This study examines the effect of a gamified information security education system (ISES) on develo** users’ information security awareness and...
-
Network security AIOps for online stream data monitoring
In cybersecurity, live production data for predictive analysis pose a significant challenge due to the inherently secure nature of the domain....
-
Enhancing cloud security: harnessing bayesian game theory for a dynamic defense mechanism
Security challenges in complex information technologies continue to grow and diversify. To improve network security, many researchers have explored...
-
Security to text (S2T): multi-layered based security approaches for secret text content
In the digital world, text data is produced in an unstructured manner across various communication channels. Extracting valuable information from...
-
Modeling and Verification of WPA3 Security Protocol Based on SPIN
Wi-Fi Protected Access 3 (WPA3) is the latest generation of Wi-Fi encryption protocol, and a comprehensive and systematic analysis of its security... -
A blockchain-based security system with light cryptography for user authentication security
Nowadays, the Internet of Things (IoT) enables the creation of a wide range of new services, including smart cities, agriculture, energy, technology,...
-
Data Modeling in Big Data Systems Including Polystore and Heterogeneous Information Processing Components
AbstractThis paper is studies modeling data in big data systems, including polystores and other heterogeneous information processing components....
-
A Model-Based Systems Engineering Plugin for Cloud Security Architecture Design
Security is one of the biggest concerns for cloud infrastructures. Cloud infrastructures are susceptible to a wide range of threats, including...
-
TSEE: a novel knowledge embedding framework for cyberspace security
Knowledge representation models have been extensively studied and they provide an important foundation for artificial intelligence. However, the...
-
Artificial intelligence algorithms for cyberspace security applications: a technological and status review
Three technical problems should be solved urgently in cyberspace security: the timeliness and accuracy of network attack detection, the credibility...
-
Rest security framework for event streaming bus architecture
Businesses are confronted with a massive influx of real-time data originating from various sources such as application logs, website clickstreams,...