We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Ontology-based security modeling in ArchiMate

    Enterprise Risk Management involves the process of identification, evaluation, treatment, and communication regarding risks throughout the...

    Ítalo Oliveira, Tiago Prince Sales, ... Giancarlo Guizzardi in Software and Systems Modeling
    Article Open access 16 February 2024
  2. Framework for Modeling Security Policies of Big Data Processing Systems

    Abstract

    This paper studies automatizing the analysis of access control in big data management systems by modeling security policies. It analyzes...

    M. A. Poltavtseva, D. V. Ivanov, E. V. Zavadskii in Automatic Control and Computer Sciences
    Article 01 December 2023
  3. MEDICALHARM: A threat modeling designed for modern medical devices and a comprehensive study on effectiveness, user satisfaction, and security perspectives

    Modern medical devices (MMDs) are a rapidly growing field of medical technology, and recent advances have allowed them to monitor and manage...

    Emmanuel Kwarteng, Mumin Cebe in International Journal of Information Security
    Article 29 March 2024
  4. Analyzing and comparing the security of self-sovereign identity management systems through threat modeling

    The concept of Self-Sovereign Identity (SSI) promises to strengthen the security and user-centricity of identity management. Since any secure online...

    Andreas Grüner, Alexander Mühle, ... Christoph Meinel in International Journal of Information Security
    Article Open access 08 April 2023
  5. An extension of the ADVISE Meta modeling framework and its application for an early-stage security analysis of a public transport supervision system

    Early-stage security analysis can be used for a preliminary assessment of the security level of a system, thus providing useful insights to guide the...

    Francesco Mariotti, Andrea Bondavalli, ... Simone Nardi in Journal of Reliable Intelligent Environments
    Article Open access 23 June 2023
  6. Establishment Method of Knowledge Graphs for Public Security Cases

    Abstract

    With the continuous improvement of the informatization level of the police, how to make accurate intelligence analysis based on the modeling...

    Qiu Mingyue, Zhang Xueying in Automatic Control and Computer Sciences
    Article 27 November 2023
  7. Sentiment analysis of tweets on social security and medicare

    The field of politics can be greatly aided through the use of natural language processing techniques on places like social media. Twitter hosts...

    Unmesh Kumar Chakravarty, Shaikh Arifuzzaman in Social Network Analysis and Mining
    Article 17 April 2024
  8. A security framework for mobile agent systems

    Security is a very important challenge in mobile agent systems due to the strong dependence of agents on the platform and vice versa. According to...

    Donies Samet, Farah Barika Ktata, Khaled Ghedira in Automated Software Engineering
    Article 09 January 2024
  9. A descriptive study of assumptions in STRIDE security threat modeling

    Security threat modeling involves the systematic elicitation of plausible threat scenarios, and leads to the identification and articulation of the...

    Dimitri Van Landuyt, Wouter Joosen in Software and Systems Modeling
    Article 17 November 2021
  10. Exploring the role of gamified information security education systems on information security awareness and protection behavioral intention

    This study examines the effect of a gamified information security education system (ISES) on develo** users’ information security awareness and...

    Hao Chen, Yan Zhang, ... Tu Lyu in Education and Information Technologies
    Article 03 May 2023
  11. Network security AIOps for online stream data monitoring

    In cybersecurity, live production data for predictive analysis pose a significant challenge due to the inherently secure nature of the domain....

    Giang Nguyen, Stefan Dlugolinsky, ... Álvaro López García in Neural Computing and Applications
    Article Open access 11 May 2024
  12. Enhancing cloud security: harnessing bayesian game theory for a dynamic defense mechanism

    Security challenges in complex information technologies continue to grow and diversify. To improve network security, many researchers have explored...

    El Mehdi Kandoussi, Adam Houmairi, ... Mostafa Bellafkih in Cluster Computing
    Article 14 June 2024
  13. Security to text (S2T): multi-layered based security approaches for secret text content

    In the digital world, text data is produced in an unstructured manner across various communication channels. Extracting valuable information from...

    Shamal Kashid, Lalit K. Awasthi, Krishan Berwal in Multimedia Tools and Applications
    Article 19 June 2024
  14. Modeling and Verification of WPA3 Security Protocol Based on SPIN

    Wi-Fi Protected Access 3 (WPA3) is the latest generation of Wi-Fi encryption protocol, and a comprehensive and systematic analysis of its security...
    Meihua **ao, Shanshan Qiao, ... Dongming Zhan in Theoretical Computer Science
    Conference paper 2024
  15. A blockchain-based security system with light cryptography for user authentication security

    Nowadays, the Internet of Things (IoT) enables the creation of a wide range of new services, including smart cities, agriculture, energy, technology,...

    Imen Hagui, Amina Msolli, ... Fredj Hassen in Multimedia Tools and Applications
    Article 13 November 2023
  16. Data Modeling in Big Data Systems Including Polystore and Heterogeneous Information Processing Components

    Abstract

    This paper is studies modeling data in big data systems, including polystores and other heterogeneous information processing components....

    Article 01 December 2023
  17. A Model-Based Systems Engineering Plugin for Cloud Security Architecture Design

    Security is one of the biggest concerns for cloud infrastructures. Cloud infrastructures are susceptible to a wide range of threats, including...

    Yuri Gil Dantas, Vivek Nigam, Ulrich Schöpp in SN Computer Science
    Article 16 May 2024
  18. TSEE: a novel knowledge embedding framework for cyberspace security

    Knowledge representation models have been extensively studied and they provide an important foundation for artificial intelligence. However, the...

    Angxiao Zhao, Zhaoquan Gu, ... Yanchun Zhang in World Wide Web
    Article 01 November 2023
  19. Artificial intelligence algorithms for cyberspace security applications: a technological and status review

    Three technical problems should be solved urgently in cyberspace security: the timeliness and accuracy of network attack detection, the credibility...

    Article 30 August 2023
  20. Rest security framework for event streaming bus architecture

    Businesses are confronted with a massive influx of real-time data originating from various sources such as application logs, website clickstreams,...

    Jaimandeep Singh, Naveen Kumar Chaudhary in International Journal of Information Technology
    Article 13 April 2024
Did you find what you were looking for? Share feedback.