Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- articleNovember 2024
Securing Machine Learning Against Data Poisoning Attacks
International Journal of Data Warehousing and Mining (IJDWM-IGI), Volume 20, Issue 1Pages 1–21https://doi.org/10.4018/IJDWM.358335The emergence of intelligent networks has revolutionized the use of machine learning (ML), allowing it to be applied in various domains of human life. This literature review paper provides in-depth analysis of the existing research on data poisoning ...
- research-articleOctober 2023
SoK: A First Order Survey of Quantum Supply Dynamics and Threat Landscapes
HASP '23: Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and PrivacyPages 82–90https://doi.org/10.1145/3623652.3623664Quantum computing, with its transformative computational potential, is gaining prominence in the technological landscape. As a new and exotic technology, quantum computers involve innumerable Intellectual Property (IP) in the form of fabrication recipe, ...
- ArticleSeptember 2023
A Game-Based Approach for Mitigating the Sybil Attacks on Blockchain Applications
Computer Information Systems and Industrial ManagementPages 108–123https://doi.org/10.1007/978-3-031-42823-4_9AbstractThe data explosion of this digital century encourages the necessity of data security and maintaining privacy. The generated data through online transactions in different sectors have been increased a million times. Therefore, the trustful ...
- ArticleAugust 2023
Research on Security Threats Using VPN in Zero Trust Environments
AbstractThe United States issued an executive order requiring all federal agencies to adopt the Zero Trust security framework, and instructed each federal government department to devise a plan for its implementation. This development has generated a ...
- articleNovember 2022
Towards a New Quantitative Availability Model for Computer Systems Based on Classifications of Security Requirements
International Journal of Systems and Software Security and Protection (IJSSSP), Volume 13, Issue 1Pages 1–20https://doi.org/10.4018/IJSSSP.314626Cloud computing is an emerging computing paradigm that replaces computing as a personal asset with computing as a public service. As such, it offers all the advantages of a public utility system, in terms of economy of scale, flexibility, and ...
- research-articleJanuary 2022
Prevention of SQL Injection Attack by Using Black Box Testing
ICDCN '22: Proceedings of the 23rd International Conference on Distributed Computing and NetworkingPages 266–272https://doi.org/10.1145/3491003.3493233SQL injection attacks are diverse and have fast variations, making it convenient to handle them. An SQL attack can affect the entire system to a great extent, adversely affecting the website, as well as data loss and leaking. In the past, enormous ...
- articleApril 2020
Employee Information Security Practices: A Framework and Research Agenda
International Journal of E-Services and Mobile Applications (IJESMA), Volume 12, Issue 2Pages 1–14https://doi.org/10.4018/IJESMA.2020040101Employee information security practices are pivotal to prevent, detect, and respond to security incidents. This article synthesizes insights from research on challenges related to employee information security practices and measures to address them. ...
- research-articleMarch 2016
Securing Sensor to Cloud Ecosystem using Internet of Things (IoT) Security Framework
ICC '16: Proceedings of the International Conference on Internet of things and Cloud ComputingArticle No.: 79, Pages 1–5https://doi.org/10.1145/2896387.2906198The Internet of things (IoT) refers to every object, which is connected over a network with the ability to transfer data. Users perceive this interaction and connection as useful in their daily life. However any improperly designed and configured ...
- articleJuly 2014
A Security Risk Management Metric for Cloud Computing Systems
International Journal of Organizational and Collective Intelligence (IJOCI-IGI), Volume 4, Issue 3Pages 1–21https://doi.org/10.4018/ijoci.2014070101Cloud computing is a growing technology used by several organizations because it presents a cost effective policy to manage and control Information Technology (IT). It delivers computing services as a public utility rather than a personal one. However, ...
- ArticleApril 2014
IAMTT - New Method for Resisting Network Layer Denial of Service Attack on MANET
CSNT '14: Proceedings of the 2014 Fourth International Conference on Communication Systems and Network TechnologiesPages 762–766https://doi.org/10.1109/CSNT.2014.160A Mobile Ad-hoc Network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop network without fixed infrastructure using special routing protocols. AODV (Ad hoc On demand Distance Vector) is a reactive ...
- articleJuly 2013
A Composite Framework for Behavioral Compliance with Information Security Policies
To combat potential security threats, organizations rely upon information security policies to guide employee actions. Unfortunately, employee violations of such policies are common and costly enough that users are often considered the weakest link in ...
- ArticleApril 2013
Security Concerns in Cloud Computing
ITNG '13: Proceedings of the 2013 10th International Conference on Information Technology: New GenerationsPages 411–416https://doi.org/10.1109/ITNG.2013.127The rate of threats against IT systems is directly proportional to the rate of growing technology. The emergence of new technology requires researchers and practitioner's attention to discover new threats in order to make it reliable. Cloud computing is ...
- articleJanuary 2012
A Secure Architecture for Nomadic User in IMS Network
International Journal of Mobile Computing and Multimedia Communications (IJMCMC-IGI), Volume 4, Issue 1Pages 1–17https://doi.org/10.4018/jmcmc.2012010101The IP multimedia subsystem IMS is a basis for a significant new architecture which offers network operators the opportunity to expand their services, by integrating voice and multimedia communications and delivering them into new environments with new ...
- ArticleDecember 2009
Analysis of Packets Abnormalities in Wireless Sensor Network
ICMENS '09: Proceedings of the 2009 Fifth International Conference on MEMS NANO, and Smart SystemsPages 259–264https://doi.org/10.1109/ICMENS.2009.64Wireless Sensor Networks (WSNs) use tiny, inexpensive sensor nodes with several distinguishing characteristics: they have very low processing power and radio ranges, permit very low energy consumption and perform limited and specific monitoring and ...
- ArticleJanuary 2009
Security in Ad Hoc Networks: A Location Based Impersonation Detection Method
ICCET '09: Proceedings of the 2009 International Conference on Computer Engineering and Technology - Volume 02Pages 380–384https://doi.org/10.1109/ICCET.2009.220Ad-hoc networks have a promising future in network area. It is highly demandable for its sudden and emergency utility. Ever changing topology adorned it with high flexibility. Due to its characteristics it is vulnerable to the various attacks, which are ...
- ArticleAugust 2007
Protecting IP Multimedia Subsystem (IMS) Service Delivery Platform from Time Independent Attacks
IAS '07: Proceedings of the Third International Symposium on Information Assurance and SecurityPages 171–176https://doi.org/10.1109/IAS.2007.68With the emergence of mobile multimedia services, such as unified messaging, click to dial, cross network multiparty conferencing and seamless multimedia streaming services, the fixed-mobile convergence and voice-data integration has started, leading to ...