We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. A systematic map** study on security for systems of systems

    In the late twentieth century, the term “System of Systems” (SoS) became popular to describe a complex system made up of a combination of independent...

    Miguel Angel Olivero, Antonia Bertolino, ... Ilaria Matteucci in International Journal of Information Security
    Article Open access 18 October 2023
  2. Speech emotion recognition systems and their security aspects

    Speech emotion recognition (SER) systems leverage information derived from sound waves produced by humans to identify the concealed emotions in...

    Itzik Gurowiec, Nir Nissim in Artificial Intelligence Review
    Article Open access 21 May 2024
  3. Framework for Modeling Security Policies of Big Data Processing Systems

    Abstract

    This paper studies automatizing the analysis of access control in big data management systems by modeling security policies. It analyzes...

    M. A. Poltavtseva, D. V. Ivanov, E. V. Zavadskii in Automatic Control and Computer Sciences
    Article 01 December 2023
  4. On the Security of Smart Home Systems: A Survey

    Among the plethora of IoT (Internet of Things) applications, the smart home is one of the fastest-growing. However, the rapid development of the...

    Bin Yuan, Jun Wan, ... Hai ** in Journal of Computer Science and Technology
    Article 30 March 2023
  5. A security framework for mobile agent systems

    Security is a very important challenge in mobile agent systems due to the strong dependence of agents on the platform and vice versa. According to...

    Donies Samet, Farah Barika Ktata, Khaled Ghedira in Automated Software Engineering
    Article 09 January 2024
  6. An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems

    The Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous connectivity,...

    Shitharth Selvarajan, Gautam Srivastava, ... Jerry Chun-Wei Lin in Journal of Cloud Computing
    Article Open access 16 March 2023
  7. A Model-Based Systems Engineering Plugin for Cloud Security Architecture Design

    Security is one of the biggest concerns for cloud infrastructures. Cloud infrastructures are susceptible to a wide range of threats, including...

    Yuri Gil Dantas, Vivek Nigam, Ulrich Schöpp in SN Computer Science
    Article 16 May 2024
  8. Improving the Efficiency of Multiagent Information Security Systems by Post-Quantum Cryptography Methods

    Abstract

    The information security problems for open multiagent systems using access control schemes based on RSA algorithm are analyzed. It is shown...

    S. V. Bezzateev, S. G. Fomicheva, A. F. Suprun in Automatic Control and Computer Sciences
    Article 01 December 2023
  9. Cloud data security for distributed embedded systems using machine learning and cryptography

    In the growing demand for distributed embedded systems that efficiently execute complex processes and high-end applications, safeguarding sensitive...

    Sadaf Bashir, Zahrah Ayub, M. Tariq Banday in International Journal of Information Technology
    Article 07 May 2024
  10. Methodological Approach to Construct Models for Predicting Indicators of Properties of Information Security Systems

    Abstract

    A methodological approach to construct models for predicting indicators of properties of information security systems at evolutionary stages...

    D. P. Zegzhda, A. F. Suprun, ... E. G. Anisimov in Automatic Control and Computer Sciences
    Article 01 December 2023
  11. Exploring the role of gamified information security education systems on information security awareness and protection behavioral intention

    This study examines the effect of a gamified information security education system (ISES) on develo** users’ information security awareness and...

    Hao Chen, Yan Zhang, ... Tu Lyu in Education and Information Technologies
    Article 03 May 2023
  12. Security establishment using deep convolutional network model in cyber-physical systems

    This study develops an active security control strategy for Cyber-Physical Systems (CPSs) that are subject to attacks known as Denial-of-Service...

    R. Meganathan, Manjunath B, ... V. Murugesh in Multimedia Tools and Applications
    Article 22 February 2024
  13. Post-quantum security design for hierarchical healthcare systems based on lattices

    The need for high-quality healthcare services increases to more incredible speeds. Smart healthcare offers an ecosystem of IoT wireless networks,...

    Manel Boujelben, Mohamed Abid in The Journal of Supercomputing
    Article 25 April 2024
  14. Maritime decision-makers and cyber security: deck officers’ perception of cyber risks towards IT and OT systems

    Through a quantitative study of deck officers’ cyber risk perceptions towards information (IT) and operational (OT) systems, this paper contributes...

    Marie Haugli-Sandvik, Mass Soldal Lund, Frøy Birte Bjørneseth in International Journal of Information Security
    Article Open access 02 February 2024
  15. A bizarre synthesized cascaded optimized predictor (BizSCOP) model for enhancing security in cloud systems

    Due to growing network data dissemination in cloud, the elasticity, pay as you go options, globally accessible facilities, and security of networks...

    R. Julian Menezes, P. Jesu Jayarin, A. Chandra Sekar in Journal of Cloud Computing
    Article Open access 14 May 2024
  16. Increasing Physical Layer Security Through Hyperchaos in VLC Systems

    Visible light communication (VLC) systems have relatively higher security compared with traditional radio frequency (RF) channels due to...

    Ashish Sharma, Harshil Bhatt in SN Computer Science
    Article 11 January 2023
  17. Security Algorithm for Intelligent Transport System in Cyber-Physical Systems Perceptive: Attacks, Vulnerabilities, and Countermeasures

    Upcoming technological innovations and findings are immense in the field of intelligent transport systems (ITS). Cyber-physical systems (CPSs) are...

    R. Pavithra, Vishnu kumar Kaliappan, Sivaramakrishnan Rajendar in SN Computer Science
    Article 29 July 2023
  18. Recommendation-based trust computation and rating prediction model for security enhancement in cloud computing systems

    The cloud service providers need to deliver cloud services based on the service level agreement to their users. The services must be secure and...

    Urvashi Rahul Saxena, Taj Alam in Service Oriented Computing and Applications
    Article 21 September 2023
  19. Dependency-based security risk assessment for cyber-physical systems

    A cyber-physical attack is a security breach in cyber space that impacts on the physical environment. The number and diversity of such attacks...

    Aida Akbarzadeh, Sokratis K. Katsikas in International Journal of Information Security
    Article Open access 22 August 2022
  20. Who is controlling whom? Reframing “meaningful human control” of AI systems in security

    Decisions in security contexts, including armed conflict, law enforcement, and disaster relief, often need to be taken under circumstances of limited...

    Markus Christen, Thomas Burri, ... Pascal Vörös in Ethics and Information Technology
    Article Open access 10 February 2023
Did you find what you were looking for? Share feedback.