دانلود و نمایش مقالات مرتبط با Cybersecurity::صفحه 3
دانلود بهترین مقالات isi همراه با ترجمه فارسی
نتیجه جستجو - Cybersecurity

تعداد مقالات یافته شده: 36
ردیف عنوان نوع
21 رویکرد رمزنگاری هوشمند برای امنیت ذخیره سازی داده های بزرگ توزیع شده در محاسبات ابری
سال انتشار: 2017 - تعداد صفحات فایل pdf انگلیسی: 13 - تعداد صفحات فایل doc فارسی: 28
پیاده سازی محاسبات ابری مسیرهای زیادی را برای خدمات مبتنی بر وب که با درخواستهای گوناگون روبرو هستند، به وجود آورده است.اگرچه امنیت داده و حفظ حریم خصوصی به مباحث مهمی تبدیل شده اند که محدودیتهایی برای برنامه های ابری به وجود آورده اند.یکی از نگرانی های مهم در امنیت و حفظ حریم خصوصی نتیجه این حقیقت است که اپراتورهای ابری می توانند به داده های حساس دسترسی پیدا کنند.این مسئله باعث نگرانی کاربران شده و وفق پذیری محاسبات ابری را در بسیاری از زمینه ها مانند صنعت اقتصادی و آژانس های دولتی کاهش داده است. این مقاله بر روی این موضوع تمرکز می کند و یک روش هوشمند رمزنگاری ارائه داده است که با آن اپراتورهای سرویس ابری نمی توانند مستقیما داده های جزئی را به دست بیاورند.روش ارائه شده فایلها و محل هایی که داده های توزیع شده ابری در آن ذخیره شده اند را به بخش هایی تقسیم میکند.یک راه حل دیگر طراحی شده است تا مشخص کند که بسته های داده به چه صورت نیاز به شکسته شدن دارند تا زمان عملیات را کوتاه کند.روش ارائه شده مدل موثر ذخیره سازی توزیع شده آگاه از امنیت (SA-DES) نامیده می شود که توسط الگوریتم های ما نیز ساپورت می شود،شامل الگوریتم جایگزین توزیع داده(AD2) الگوریتم توزیع موثر داده امن (SED2) و الگوریتم تلفیق داده موثر (EDCON) .ارزیابی نتایج آزمایشگاهی ما کارایی امنیت و موثر بودن را تایید میکند و نشان میدهد که روش ما از تهدیدهای ابری ممانعت میکند و با زمان قابل قبولی برای محاسبات نیاز دارد.
کلمات کلیدی: رمزنگاری هوشمند | امنیت شبکه | ذخیره سازی توزیع شده انبوه | محاسبات ابری | داده های بزرگ
مقاله ترجمه شده
22 STPA-SafeSec: Safety and security analysis for cyber-physical systems
STPA-SafeSec: تجزیه و تحلیل ایمنی و امنیت سیستم های فیزیکی سایبری-2017
Article history:Available online 30 June 2016Keywords:Smart gridSynchronous islanded generation STPACPSSafetyCyber securityCyber-physical systems tightly integrate physical processes and information and communication technolo- gies. As today’s critical infrastructures, e.g., the power grid or water distribution networks, are complex cyber-physical systems, ensuring their safety and security becomes of paramount importance. Traditional safety analysis methods, such as HAZOP, are ill-suited to assess these systems. Furthermore, cybersecu- rity vulnerabilities are often not considered critical, because their effects on the physical processes are not fully understood. In this work, we present STPA-SafeSec, a novel analysis methodology for both safety and security. Its results show the dependencies between cybersecurity vulnerabilities and system safety. Us- ing this information, the most effective mitigation strategies to ensure safety and security of the system can be readily identified. We apply STPA-SafeSec to a use case in the power grid domain, and highlight its benefits.© 2016 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY license. (http://creativecommons.org/licenses/by/4.0/)
Keywords: Smart grid | Synchronous islanded generation | STPA | CPS | Safety | Cyber security
مقاله انگلیسی
23 Dynamic risk management response system to handle cyber threats
سیستم پاسخ ریسک پویا برای پاسخگوئی به تهدیدات سایبری-2017
Appropriate response strategies against new and ongoing cyber attacks must be able to reduce risks down to acceptable levels, without sacrificing a mission for security. Existing approaches either evaluate impacts without considering missions’ negative-side effects, or are manually based on traditional risk assess ments, leaving aside technical difficulties. In this paper we propose a dynamic risk management response system (DRMRS) consisting of a proactive and reactive management software aiming at evaluating threat scenarios in an automated manner, as well as anticipating the occurrence of potential attacks. We adopt a quantitative risk-aware approach that provides a comprehensive view of the threats, by considering their likelihood of success, the induced impact, the cost of the possible responses, and the negative side-effects of a response. Responses are selected and proposed to operators based on financial, operational and threat assessments. The DRMRS is applied to a real case study of a critical infrastructure with multiple threat scenarios.
Keywords: Dynamic system | Automated response | Risk assessment | Graph attack | Security assurance | Cybersecurity
مقاله انگلیسی
24 مروری بر تشخیص نفوذ در اینترنت اشیا
سال انتشار: 2017 - تعداد صفحات فایل pdf انگلیسی: 13 - تعداد صفحات فایل doc فارسی: 47
اینترنت اشیا (IoT) یک نمونه جدید است که اینترنت و اشیای فیزیکی متعلق به حوزه های مختلف مانند اتوماسیون خانگی، فرآیند صنعتی، سلامت انسان و نظارت بر محیط زیست را ادغام می کند. این باعث افزایش حضور دستگاه های متصل به اینترنت در فعالیت های روزمره ما می شود، علاوه بر مزایای بسیاری، چالش های مربوط به مسائل امنیتی را نیز به همراه می آورد. برای بیش از دو دهه، سیستم های تشخیص نفوذ (IDS) ابزار مهمی برای حفاظت از شبکه ها و سیستم های اطلاعاتی بوده است. با این حال، استفاده از تکنیک های IDS سنتی به IoT، به دلیل ویژگی های خاص خود مانند دستگاه های منابع محدود، ستون های خاص پروتکل و استانداردها، فرقه ای است. در این مقاله، ما یک بررسی از تحقیقات IDS و FF برای IoT ارائه می کنیم. هدف ما این است که به شناسایی روند پیشرو، مسائل باز و امکانات تحقیقاتی آینده بپردازیم. ما IDS های پیشنهاد شده در مقالات را با توجه به ویژگی های زیر طبقه بندی کردیم: روش تشخیص، استراتژی قرار دادن IDS، تهدید امنیتی و استراتژی اعتبار سنجی. ما همچنین در مورد گزینه های مختلف برای هر ویژگی بحث کردیم، جزئیات جنبه های آثاری که یا طرح خاص برنامه های IDS را برای IoT پیشنهاد می دهند یا راهکارهای تشخیص حمله برای تهدیدات IoT را که ممکن است در IDS تعبیه شده باشد، مورد بحث قرار داده ایم.
کلمات کلیدی: سیستم تشخیص نفوذ | اینترنت اشیا | امنیت سایبری
مقاله ترجمه شده
25 The Internet-of-Things: Review and research directions
تحقیق اینترنت اشیاء : بررسی و مسیرهای تحقیقاتی -2017
This paper presents a review of the Internet-of-Things (IoT) through four conceptualizations: IoT as liquification and density of information of resources; IoT as digital materiality; IoT as as semblage or service system; and IoT as modules, transactions, and service. From the conceptu alizations, we provide a definition of IoT and present its implications and impact on future research in Marketing that interfaces with information systems, design and innovation, data science and cybersecurity, as well as organizational studies and economics. By integrating the implications of IoT with extant literature, we then propose a set of priorities for future research in this area.
Keywords: Information technology | Service | Business models | Markets | Consumer experience
مقاله انگلیسی
26 Triple bottom line accounting for optimizing natural gas sustainability: A statistical linear programming fuzzy ILOWA optimized sustainment model approach to reducing supply chain global cybersecurity vulnerability through information and communications technology
حسابداری سه گانه پایین برای بهینه سازی پایداری گاز طبیعی: برنامه نویسی خطی برنامه ریزی شده فازی ILOWA بهینه سازی رویکرد مدل پایداری برای کاهش آسیب پذیری جهانی امنیت سایبری از طریق فناوری اطلاعات و ارتباطات-2017
In this paper, we employed triple bottom line (TBL) accounting and considered threats to cybersecurity in the context of natural gas and global supply chain sustainability. The global supply chain is a diverse assortment of contingent claims contracts and relationships that span the world. It contains both risks and benefits. In this study, consideration is given to the balance of consequences. We propose a sus tainable economic model that preserves the positive dynamics of capitalism and accounting principles while improving collaboration between industry, landowners, and environmentalists to optimize return on profits for companies, provide royalties to landowners, and satisfy the planets environmental con cerns. Our TBL approach supports the need to preserve the best qualities of free enterprise and market driven regulation profits while also providing social and environmental benefits. Our proposed approach is novel and may be helpful for decision makers in all sectors, from public to private. We have endeavored to make sufficiently objective and appropriate conclusions that guide how the model can be used in other sectors or by other decision makers. This review has several aims. First, we aim to understand the technical application of TBL optimization and to associate it with the use of mathematical and statistical analysis. Second, we present a fuzzy integrated linguistic operator weighted average application to better understand TBL and to strengthen the argument for its use. Finally, we debate issues inherent in applying analyses of this type with regard to stakeholder viewpoints and objectivity.
Keywords:Triple bottom line|Sustainability|Supply chain management|Information and communications|technology|Risk|Security
مقاله انگلیسی
27 A survey of intrusion detection in Internet of Things
مروری بر تشخیص نفوذ در اینترنت اشیا-2017
Internet of Things (IoT) is a new paradigm that integrates the Internet and physical objects belonging to different domains such as home automation, industrial process, human health and environmental monitoring. It deepens the presence of Internet-connected devices in our daily activities, bringing, in addition to many benefits, challenges related to security issues. For more than two decades, Intrusion Detection Systems (IDS) have been an important tool for the protection of networks and information systems. However, applying traditional IDS techniques to IoT is difficult due to its particular characteristics such as constrained-resource devices, specific protocol stacks, and standards. In this paper, we present a survey of IDS research efforts for IoT. Our objective is to identify leading trends, open issues, and future research possibilities. We classified the IDSs proposed in the literature according to the following attributes: detection method, IDS placement strategy, security threat and validation strategy. We also discussed the different possibilities for each attribute, detailing aspects of works that either propose specific IDS schemes for IoT or develop attack detection strategies for IoT threats that might be embedded in IDSs.
Keywords: Intrusion detection system | Internet of Things | Cybersecurity
مقاله انگلیسی
28 Deployment of cybersecurity for managing traffic efficiency and safety in smart cities
استقرار امنیت سایبری برای مدیریت کارایی ترافیک و ایمنی در شهرهای هوشمند-2017
Boosting the concept of smart cities for implementing an intelligent management of traffic congestion while reducing cybersecurity concerns will not only be more efficient for reducing traffic congestion but also more resilient to cyber incidents. In this paper we proposed a framework that can act as a generalized firewall and work interactively with several critical infrastructures in a smart city to protect the respective operations from a variety of cyber threats. The objective is to develop several steps for a comprehensive traffic management framework in smart cities that facilitates the cooperation among drivers and between drivers and the traffic management authority. The transformative nature of the proposed study supports its applications to a variety of networked critical infrastructures, including electricity, gas, water, rails, and telecommunications, as they intend to respond effectively to a wide range of weather- or human-related disruptions. The contributions of this paper include: Improving the traffic management performance in urban transportation systems, assessing and mitigating the cybersecurity risk in urban traffic management, and facilitating efficient and cyber-secure traffic management in metropolitan areas; Developing and testing an interactive simulation platform for evaluating the traffic management performance under various traffic conditions; Validating and demonstrating the applications in a practical urban transportation system; Disseminating the proposed study results to a wide range of concerned audiences via user-group meetings, detailed education forums, and a close collaboration with the local traffic management authority.
Keywords: Smart cities | Smart grid | Cybersecurity | Traffic management | Energy efficiency
مقاله انگلیسی
29 Intelligent cryptography approach for secure distributed big data storage in cloud computing
روش رمزنگاری هوشمند برای داده های بزرگ توزیع شده امن در محاسبات ابری-2017
Implementing cloud computing empowers numerous paths for Web-based service offer ings to meet diverse needs. However, the data security and privacy has become a critical issue that restricts many cloud applications. One of the major concerns in security and privacy is caused by the fact that cloud operators have chances to reach the sensitive data. This concern dramatically increases users’ anxiety and reduces the adoptability of cloud computing in many fields, such as the financial industry and governmental agencies. This paper focuses on this issue and proposes an intelligent cryptography approach, by which the cloud service operators cannot directly reach partial data. The proposed approach di vides the file and separately stores the data in the distributed cloud servers. An alterna tive approach is designed to determine whether the data packets need a split in order to shorten the operation time. The proposed scheme is entitled Security-Aware Efficient Dis tributed Storage (SA-EDS) model, which is mainly supported by our proposed algorithms, including Alternative Data Distribution (AD2) Algorithm, Secure Efficient Data Distributions (SED2) Algorithm and Efficient Data Conflation (EDCon) Algorithm. Our experimental evalua tions have assessed both security and efficiency performances and the experimental results depict that our approach can effectively defend main threats from clouds and requires with an acceptable computation time.
Keywords:Intelligent cryptography|Cybersecurity|Mass distributed storage|Cloud computing|Big data
مقاله انگلیسی
30 Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours
عوامل انسانی در امنیت سایبری؛ بررسی ارتباط بین اعتياد به اینترنت، تکانشگری، نگرش نسبت به امنیت سایبری و رفتارهای خطرناکی در زمینه امنیت سایبری-2017
The present study explored the relationship between risky cybersecurity behaviours, attitudes towards cybersecurity in a business environment, Internet addiction, and impulsivity. 538 participants in part-time or full-time employment in the UK completed an online questionnaire, with responses from 515 being used in the data analysis. The survey included an attitude towards cybercrime and cybersecurity in business scale, a measure of impulsivity, Internet addiction and a ‘risky’ cybersecurity behaviours scale. The results demonstrated that Internet addiction was a significant predictor for risky cybersecurity behaviours. A positive attitude towards cybersecurity in business was negatively related to risky cybersecurity behaviours. Finally, the measure of impulsivity revealed that both attentional and motor impulsivity were both significant positive predictors of risky cybersecurity behaviours, with non-planning being a significant negative predictor. The results present a further step in understanding the individual differences that may govern good cybersecurity practices, highlighting the need to focus directly on more effective training and awareness mechanisms.
Keywords: Psychology
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi