Computer Security
239,643 Followers
Recent papers in Computer Security
Current trend in health-care industry is to shift its data on the cloud, to increase availability of Electronic Health Records (EHR) e.g. Patient’s medical history in real time, which will allow sharing of EHR with ease. However, this... more
Recently there have been several high-profile ransomware attacks involving hospitals around the world. Ransomware is intended to damage or disable a user's computer unless the user makes a payment. Once the attack has been launched,... more
In Industrial environments, huge amount of data is being generated which in turn collected indatabase anddata warehouses from all involved areas such as planning, process design, materials, assembly, production, quality, process control,... more
Internet of Things provides truly ubiquitous and smart environment. The multilayer distributed architecture with a variety of different components together with end devices, applications and the association with its framework poses... more
Self-healing concretes are being widely recognized as a remedial technique to improve the durability o f concrete. Although, few review papers on self-healing concret e were published, a strong review on all aspects of self-healing... more
La présente analyse a pour but d'établir le niveau de risque que représente l'utilisation système de gestion de production SCADA dans l'ABC Energie Portée (scope) : La portée de cette analyse est sur le système de gestion de production... more
The world of internet today has become a parallel form of life and living. Public are now capable of doing things which were not imaginable few years ago. The Internet is fast becoming a way of life for millions of people and also a way... more
ࡗ Sponsors high-level conferences and symposia around the world. ࡗ Offers as an open standard (www.isaca.org/cobit) Control Objectives for Information and related Technology (COBIT ® ), a breakthrough IT governance tool that uses... more
ISO is one of the principal publishers of standards in the world with superior than 21000 , covering almost every industry, from technology, to foodstuff safety, to farming and healthcare.
This presentation captures the historical adaptation of medieval warriors’ methods for security and thwarts toward adversarial attacks on fortifications for protective areas. History can often be a good teacher for modern day designers... more
Solution Manual for Unit Operations of Chemical Engineering 7th Edition by Mc Cabe. Full file at https://testbanku.eu/
Software Defined Wide Area Network (SD-WAN or SDWAN) is a modern conception and an attractive trend in network technologies. SD-WAN is defined as a specific application of software-defined networking (SDN) to WAN connections. There is... more
Despite a growing amount of scholarly and policy attention to cyber threats, little progress seems to have been made in building effective deterrence against them. State and non-state actors continue to act with an unacceptable level of... more
The rise of machine-to-machine (M2M) communications (hardware and software) in internet of things (IoT), let local/overseas organizations such as information systems, schools, hospitals/healthcare, libraries, environment, transportation... more
The use of bacteriorhodopsin (BR) as an active layer in write-once-read-many optical storage is presented. This novel feature of BR materials may be used on a wide variety of substrates, among them transparent substrates but also paper... more
Pattern classification systems based on machine learning algorithms are commonly used in securityrelated applications like biometric authentication, network intrusion detection, and spam filtering, to discriminate between a "legitimate"... more
Information security in the banking sector is heavily controlled as banks store and manage their clients' private information. Information security has always been the responsibility of the information technology (IT) department in... more
This paper proposes coronavirus disease tracing system acts as a portal for the health center to update and track their patients' contacts and collect data for further analysis. All of the contents are handpicked, filtered, and selected... more
Research in the broader IT context highlights that there are two main sources for vulnerabilities in IT systems. Firstly, there are technical flaws and architectural vulnerabilities that open back-doors into otherwise safe systems.... more
With the quick advancement of flexible cloud administrations, it turns out to be progressively helpless to utilize cloud administrations to share information in a companion hover in the distributed computing condition. Since it is not... more
The security mechanism are not used directly in wireless sensor networks compare to wired networks, there is no user control and insufficient energy resources. In wireless environment, proposing the scheme of detection of distributed... more
In any organization that operates in cyberspace, it is necessary to understand the information battlespace. Defensive information battlespace knowledge can be provided by detailed analysis of carefully selected metrics using automated... more
The new information technology is becoming an important factor in the future development of financial services industry, and especially banking industry. Growing international trading and problems in transferring money have motivated... more
This report focuses on vulnerabilities on web-applications and web-sites from Cross-Site Scripting attacks (XSS). The different types of XSS attacks are examined: DOM-based, active and passive attacks. The spread of XSS attacks across... more
NoSQL databases have become more popular and preferable in modern data architecture. It has become a powerful way to store data in a specialized format that yields fast performance for a large amount of data. NoSQL databases are designed... more
Data integration is the technique of merging data residing at different sources at different locations, and providing users with an integrated, reconciled view of these data. Such unified view is called global or mediated schema. It... more
The necessity of the companies and organizations to adapt the technological and computer science change takes to formulated key questions: What type of Computer science Security needs my company, financial organization, or government? My... more
Malware is one of the major security threats that can break computer operation. However, commercial antivirus or anti-spyware that used signature-based matching to detects malware cannot solve that kind of threats. Nowadays malware... more
— Today’s growing number of security threats to computers and networks also increase the importance of log inspections to support the detection of possible breaches. The investigation and assessment of security incidents becomes more and... more
Automatic voice recognition system aims to limit fraudulent access to sensitive areas as labs. Our primary objective of this paper is to increase the accuracy of the voice recognition in noisy environment of the Microsoft Research (MSR)... more
Bu yazımı üniversitede aldığım ders notlarımdan oluşturdum. Bilişim Sistemleri Güvenliğine girişi ve yaklaşımları kapsamaktadır.
Prezentowany tekst jest zapisem wykładu, jaki wygłosił autor w trakcie uroczystości nadania mu godności doktora honoris causa Uniwersytetu Ekonomicznego w Krakowie (26.05.2008). W wykładzie najpierw zdefiniowano zagrożenia, jakie mogą... more
Our Security Agencies to provide the most professional security services available in and around Chennai.Prior to placing our security personnel we ensure he/she is well prepared to handle with real world challenges. visit @... more
Although awareness is constantly rising, that industrial computer networks (in a very broad sense) can be exposed to serious cyber threats, many people still think that the same countermeasures, developed to protect general-purpose... more
previous sections, are: scalability with respect to the number of nodes in the network, self-organization, self-healing, energy efficiency, a sufficient degree of connectivity among nodes, low-complexity, low cost and size of nodes. Those... more