|
|
|
Fahad Alqahtani, Mohammed Almutairi and Frederick T. Sheldon
This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhead o...
ver más
|
|
|
|
|
|
|
Evgenia Novikova, Elena Doynikova and Sergey Golubev
One of the challenges in the Internet of Things systems is the security of the critical data, for example, data used for intrusion detection. The paper research construction of an intrusion detection system that ensures the confidentiality of critical da...
ver más
|
|
|
|
|
|
|
Daniel Yonto, L. Michele Issel and Jean-Claude Thill
Spatial data analytics can detect patterns of clustering of events in small geographies across an urban region. This study presents and demonstrates a robust research design to study the longitudinal stability of spatial clustering with small case number...
ver más
|
|
|
|
|
|
|
|
Arun Kumar Rai, Hari Om, Satish Chand and Chia-Chen Lin
In today?s digital age, ensuring the secure transmission of confidential data through various means of communication is crucial. Protecting the data from malicious attacks during transmission poses a significant challenge. To achieve this, reversible dat...
ver más
|
|
|
|
|
|
|
Ishu Gupta,Niharika Singh,Ashutosh Kumar Singh
Pág. 173 - 185
The management of data while maintaining its utility and preservation of security scheme is a matter of concern for the cloud owner. In order to minimize the overhead at cloud service provider of applying security over each document and then send it to t...
ver más
|
|
|
|
|
|
|
Xue Jun Li, Maode Ma and Yihan Sun
Modern smart grids are built based on top of advanced computing and networking technologies, where condition monitoring relies on secure cyberphysical connectivity. Over the network infrastructure, transported data containing confidential information, mu...
ver más
|
|
|
|
|
|
|
Gurtaj Singh, Vincenzo Violi and Marco Fisichella
Healthcare data are distributed and confidential, making it difficult to use centralized automatic diagnostic techniques. For example, different hospitals hold the electronic health records (EHRs) of different patient populations; however, transferring t...
ver más
|
|
|
|
|
|
|
Christoph Stach, Clémentine Gritti, Julia Bräcker, Michael Behringer and Bernhard Mitschang
The present information age is characterized by an ever-increasing digitalization. Smart devices quantify our entire lives. These collected data provide the foundation for data-driven services called smart services. They are able to adapt to a given cont...
ver más
|
|
|
|
|
|
|
Elena Fedorchenko, Evgenia Novikova and Anton Shulepov
In order to provide an accurate and timely response to different types of the attacks, intrusion and anomaly detection systems collect and analyze a lot of data that may include personal and other sensitive data. These systems could be considered a sourc...
ver más
|
|
|
|
|
|
|
Elena Kuleshova, Anatoly Marukhlenko, Vyacheslav Dobritsa and Maxim Tanygin
Currently, the following applications of the theory of cellular automata are known: symmetric encryption, data compression, digital image processing and some others. There are also studies suggesting the possibility of building a public key system based ...
ver más
|
|
|
|
|
|
|
Cheonshik Kim, Dong-Kyoo Shin, Ching-Nung Yang and Lu Leng
The image-based data hiding method is a technology used to transmit confidential information secretly. Since images (e.g., grayscale images) usually have sufficient redundancy information, they are a very suitable medium for hiding data. Absolute Moment ...
ver más
|
|
|
|
|
|
|
Nicklas Guldåker
Swedish emergency services still have relatively limited resources and time for proactive fire prevention. As a result of this, there is an extensive need for strategic working methods and knowledge to take advantage of spatial analyses. In addition, dec...
ver más
|
|
|
|
|
|
|
Nam Kyu Park and Jung Hun Lee
The purpose of this study is to prove the concept of the performance monitoring system of container terminals. PoC (Proof of Concept) is a realization of a certain method or idea in order to demonstrate its feasibility. The port authorities, such as gove...
ver más
|
|
|
|
|
|
|
N.A. Naraliyev,D.I. Samal
Pág. 94 - 104
IoT is a whole ecosystem that contains intelligent devices equipped with sensors (sensors) that provide remote control, storage, transmission and security of data. The Internet of Things (IoT) is an innovative solution in various areas such as healthcare...
ver más
|
|
|
|
|
|
|
Novi Aryani Fitri, M. Udin Harun Al Rasyid, Amang Sudarsono
Pág. 151 - 175
Information on medical record is very sensitive data due to the number of confidential information about a patient's condition. Therefore, a secure and reliable storage mechanism is needed so that the data remains original without any changes during it w...
ver más
|
|
|
|
|
|
|
Tzu-Ying Chiu and Ying-Chih Lai
The study of managing risk in aviation is the key to improving flight safety. Compared to the other flight operation phases, the approach and landing phases are more critical and dangerous. This study aims to detect and analyze unstable approaches in Tai...
ver más
|
|
|
|
|
|
|
Shamil Magomedov
Pág. 36 - 43
The article is devoted to the development of the architecture of computing systems with multilevel access control to web services over public networks. Information technologies are becoming global and cross-border which leads them to become an integral p...
ver más
|
|
|
|
|
|
|
Saad Said Alqahtany, Ahmad B. Alkhodre, Abdulwahid Al Abdulwahid and Manar Alohaly
Steganography is a widely used technique for concealing confidential data within images, videos, and audio. However, using text for steganography has not been sufficiently explored. Text-based steganography has the advantage of a low bandwidth overhead, ...
ver más
|
|
|
|
|
|
|
Konstantinos Psychogyios, Andreas Papadakis, Stavroula Bourou, Nikolaos Nikolaou, Apostolos Maniatis and Theodore Zahariadis
The advent of computer networks and the internet has drastically altered the means by which we share information and interact with each other. However, this technological advancement has also created opportunities for malevolent behavior, with individual...
ver más
|
|
|
|