با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
TUI Model for data privacy assessment in IoT networks
مدل TUI برای ارزیابی حریم خصوصی داده ها در شبکه های اینترنت اشیا-2022 The development of the Internet of Things (IoT) has been at the forefront of progressing societal
functionality. However, the addition of IoT devices in conventional information technology (IT)
infrastructure has raised and prioritized the concern of information security and data privacy. The
Common Vulnerability Scoring System (CVSS) is a framework for providing information to the
public about the impact of vulnerabilities and exploits executed on a multitude of devices. While
the CVSS addresses a plethora of conditions for vulnerabilities, it does not adequately make end-
users aware of the impact data privacy can have on their devices. The primary objective of this
research work is to extend the existing CVSS and propose a new model that acknowledges
Transparency, Unlinkability, and Intervenability (TUI) to address the data privacy issues of IoT
devices when scoring impacts of vulnerabilities. Our research has developed this model to provide
a new sufficient score for analyzing the true impact of compromised data privacy. After the
development of the new scoring for TUI, our research highlights case studies to emphasize the
impact our TUI model will have on the CVSS. We strongly believe that our proposed model benefit
both the individual users (consumers of IoT devices) and the industry to portray the possible
vulnerabilities from a user standpoint as well as a manufacturer standpoint. keywords: حریم خصوصی داده ها | امنیت اینترنت اشیا | مدل سیا | امتیازدهی آسیب پذیری | امنیت دستگاه | ارزیابی امنیتی | Data privacy | IoT security | CIA model | Vulnerability scoring | Device security | Security assessment |
مقاله انگلیسی |
2 |
A Modified Key Sifting Scheme With Artificial Neural Network Based Key Reconciliation Analysis in Quantum Cryptography
یک طرح غربال کلید اصلاح شده با تحلیل آشتی کلید مبتنی بر شبکه عصبی مصنوعی در رمزنگاری کوانتومی-2022 Quantum Cryptography emerged from the limitations of classical cryptography. It will play a
vital role in information security after the availability of expected powerful quantum computers. Still many
quantum primitives like quantum money, blind quantum computation, quantum copy protection, etc. are
theoretical as they require a completely functional quantum computer for their implementation. But one
prominent quantum cryptographic primitive, the Quantum Key Distribution (QKD) is possible with current
technology. The QKD is a key establishment system having several stages namely raw key generation, key
sifting, key reconciliation, and privacy amplification. In this paper, an efficient key sifting scheme has been
developed. Successful simulation has shown that the proposed modified key sifting scheme requires less
time to build the sifted key compared to the sifted key in conventional BB84 protocol in most cases. This
paper also represents Tree Parity Machine (TPM) based key reconciliation analysis using different learning
algorithms such as Hebbian, Anti-Hebbian, and Random-Walk. This reconciliation analysis helps to choose
the optimum learning algorithm for Artificial Neural Network (ANN) based key reconciliation in future
Quantum Key Distribution systems.
INDEX TERMS: Artificial neural network | BB84 protocol | key sifting | key reconciliation | learning algorithms | quantum key distribution | quantum cryptography. |
مقاله انگلیسی |
3 |
A Remote Security Computational Ghost Imaging Method Based on Quantum Key Distribution Technology
یک روش تصویربرداری شبح محاسباتی امنیت از راه دور بر اساس فناوری توزیع کلید کوانتومی-2022 Computational ghost imaging (CGI) is a method of acquiring object information by measuring
light field intensity, which would be used to achieve imaging in a complicated environment. The main issue
to be addressed in CGI technology is how to achieve rapid and high-quality imaging while assuring the secure
transmission of detection data in practical distant imaging applications. In order to address the mentioned
issues, this paper proposes a remote secure CGI method based on quantum communication technology.
Using the quantum key distribution (QKD) network, the CGI system can be reconstructed while solving the
problem of information security transmission between the detector and the reconstructed computing device.
By exploring the influence of different random measurement matrices on the quality of image reconstruction,
it is found that the randomness of the numerical sequence constituting the matrix is positively correlated
with the imaging quality. Based on this discovery, a new type of quantum cryptography measurement
matrix is constructed using quantum cryptography with good randomness. In addition, through further
orthogonalization and normalization of the matrix, the matrix has both good randomness and orthogonality,
and high-quality imaging results can be obtained at a low sampling rate. The feasibility and effectiveness of
the method are verified by simulation imaging experiments. Compared with the traditional GI system, the
method proposed in this paper has higher transmission security and high-quality imaging under this premise,
which provides a new idea for the practical development of CGI technology.
INDEX TERMS: Computational ghost imaging | quantum key distribution | quantum cryptography | measurement matrix | randomness | schimidt orthogonalization. |
مقاله انگلیسی |
4 |
Human identification driven by deep CNN and transfer learning based on multiview feature representations of ECG
Human identification driven by deep CNN and transfer learning based on multiview feature representations of ECG-2021 Increasingly smart techniques for counterfeiting face and fingerprint traits have increased the potential threats to information security systems, creating a substantial demand for improved security and better privacy and identity protection. The internet of Things (IoT)-driven fingertip electrocardiogram (ECG) acquisition provides broad application prospects for ECG-based identity systems. This study focused on three major impediments to fingertip ECG: the impact of variations in acquisition status, the high computational complexity of traditional convolutional neural network (CNN) models and the feasibility of model migration, and a lack of sufficient fingertip samples. Our main contribution is a novel fingertip ECG identification system that integrates transfer learning and a deep CNN. The proposed system does not require manual feature extraction or suffer from complex model calculations, which improves its speed, and it is effective even when only a small set of training data exists. Using 1200 ECG recordings from 600 individuals, we consider 5 simulated yet potentially practical scenarios. When analyzing the overall training accuracy of the model, its mean accuracy for the 540 chest- collected ECG from PhysioNet exceeded 97.60 %, and for 60 subjects from the CYBHi fingertip-collected ECG, its mean accuracy reached 98.77 %. When simulating a real-world human recognition system on 5 public datasets, the validation accuracy of the proposed model can nearly reach 100 % recognition, outperforming the original GoogLeNet network by a maximum of 3.33 %. To some degree, the developed architecture provides a reference for practical applications of fingertip-collected ECG-based biometric systems and for information network security. Keywords: Off-the-person | Fingertip ECG biometric | Human identification | Convolutional neural network (CNN) | Transfer learning |
مقاله انگلیسی |
5 |
نسبت جنبه های فنی به روانشناختی در مفاهیم آموزش امنیت اطلاعات تخصصی
سال انتشار: 2020 - تعداد صفحات فایل pdf انگلیسی: 6 - تعداد صفحات فایل doc فارسی: 14 نیاز به ایجاد تغییر در ساختار مهارتهای مورد نیاز برای متخصص امنیت اطلاعات (IS) توجیه پذیر است. در اینجا، ویژگیهای خاص مربوط به وضعیت فعلی فعالیتهای داخلی و مسائل کلاهبرداری داخلی، مشخصات اصلی توسعه سیستم های نگهداری فنی IS شامل آنالیز رفتار کاربر ، و مفهوم سیستم عامل در تنظیم امنیت ، اتوماسیون و پاسخ مورد بحث قرار می گیرد. همچنین اهمیت نقش انسان در حصول اطمینان از IS نشان داده خواهد شد. برخی رویکرد ها به منظور ارزیابی الگوهای رفتاری برای اطمینان از IS شرح داده شد. در این مقاله به آنالیز تجارب در زمینه تشکل در بین دانشجویان MEPhI ، تحصیل در رشته IS ، مهارت پیش بینی رفتار سایر افراد بر اساس داده های به دست آمده با استفاده از ماژول برنامه "سیستم آزمایش روانشناسی حرفه ای" در چارچوب آزمایشگاه تخصصی پرداخته شد.
واژه های کلیدی: آموزش امنیت اطلاعات | تحلیل رفتار | جنبه های روانشناختی امنیت | ارزیابی الگوهای رفتاری | مهارت های شناسایی کارمند داخلی |
مقاله ترجمه شده |
6 |
Understanding the rule of prevalence in the NIS directive: C-ITS as a case study
درک قانون شیوع در دستورالعمل NIS: C-ITS به عنوان یک مطالعه موردی-2020 The paper discusses the interpretation of the rule of prevalence of Article 1 (7) NIS Directive, which has not been the subject of any academic debate so far. Article 1 (7) NIS Directive
organises the interface between the NIS Directive regime and other European Union sectorspecific legislations imposing (cyber)security obligations, by laying down the conditions according to which such obligations would prevail over the NIS Directive regime. Based on the
case study of the recent proposal from the European Commission to regulate Cooperative
Intelligent Transport Systems (‘C-ITS’), the paper unravels a number of issues and unclarities. Recommendations are made with respect to the interpretation and application of the
rule of prevalence of Article 1 (7) NIS Directive. In anticipation of a potential future C-ITS
regulation and in the context of a possible upcoming revision of the NIS Directive, the paper
also makes suggestions to ease the regulation of the interface between the NIS Directive
and other (cyber-)security regulation, particularly in the field of C-ITS. Keywords: NIS directive | Cooperative intelligent transport | systems (C-ITS) | ITS directive | Cybersecurity | Rule of prevalence | Information security | Network and information systems |
مقاله انگلیسی |
7 |
Information security and storage of Internet of Things based on block chains
امنیت اطلاعات و ذخیره اینترنت اشیاء بر اساس زنجیره های بلوک-2020 With progress in science and technology and the rapid development of the Internet of Things, we
have entered the intelligent era of the Internet of Things. With many devices connected to the Internet,
hackers have opportunities to attack; thus, the security of the Internet of Things has attracted increased
attention. In the era of big data, the demand for information storage is increasing. This paper considers
block chains and proposes an ECC (Ellipse Curve Cryptography) asymmetric algorithm to encrypt
information. For storage, this paper proposes compressed sensing for data compression reconstruction
to improve information storage speed in the Internet of Things. The experimental results show that
the proposed algorithm is superior to comparable algorithms in security and storage performance. Keywords: Block chain | Internet of Things | Information security and storage |
مقاله انگلیسی |
8 |
ردپای سخت افزاری S-box در رمزنگاری های بلوک متقارن سبک برای سیستم های امنیتی اطلاعات IoT و CPS
Hardware footprints of S-box in lightweight symmetric block ciphers for IoT and CPS information security systems-2019 The hardware footprint for S-box specification in lightweight block cipher as appropriate to IoT and CPS information
security systems is presented in this paper. The S-box Boolean function in the lightweight block cipher is
defined using the Reed-Muller structure. A Rule Based–Common Sub-structure Sharing Optimization (RB-CSSO)
algorithm has been proposed towards improving the performance efficiency of Reed-Muller structure. This novel
hybrid RB-CSSO optimization mechanism first transforms the direct Positive Polarity Reed Muller (PPRM) S-box
representation into Mixed Polarity Reed-Muller (MPRM) S-box architecture using local rule based transformation.
Secondly, the Common Sub Term (CST) and Common Sub-expression (CSE) merging/elimination are employed
over the resulting MPRM structure. The combined rule-based transformation and the common sub-function
sharing demonstrate an overall reduction in area, delay and power of the Reed-Muller S-box structure. Both
the theoretical analysis and the experimental verification demonstrate reduction in area and delay of S-box. Post
synthesis results based on ASIC standard cell based implementations have been used to analyze area, delay and
power values across Process, Voltage and Temperature (PVT) corners for a wide range of operating conditions.
Extensive comparisons between direct PPRM and optimized MPRM implementations have been carried out. The
post layout simulations of S-box structures realized show the advantages of lower area-delay product, power-area
product and power-delay product. This work thus authenticates the application of proposed structure for lightweight,
resource constrained security systems. Industry standard full suite of Cadence® tools have been employed
in the simulations using 65 nm TCBN65GPLUS standard cells of TSMC technology library. Keywords: Lightweight cryptography | Symmetric block ciphers | Substitution box | Reed-muller structure |
مقاله انگلیسی |
9 |
Public key digital contents confidentiality scheme based on quantum spin and finite state automation
طرح محرمانه بودن محتویات دیجیتالی کلید عمومی مبتنی بر چرخش کوانتومی و اتوماسیون حالت محدود-2019 Numerous encryption plans are legitimately founded on the transformation of frameworks
or by characterizing the strict guidelines. Most of the security systems are
based on mathematical structures and their applications in diverse applied sciences.
We propose here an advanced digital contents confidentiality scheme to simulate the
phenomenon rather than creating rigid rules. We operate digital data trailed by quantum
spin states for specific phase and finite state machine for limited number of rounds. The
extent of the presented article revolves around the development and deployment of
public key cryptosystem basis on the concepts of quantum spin states and finite state
machine effectively. Both states (spin and finite state machine) provide the high degree
of naturalness contrasted with ordinary cryptosystem. Keywords: Information security | Digital contents privacy | Public key cryptography | Image encryption | Quantum cryptography | Quantum spin states | Finite state machine applications in | information security |
مقاله انگلیسی |
10 |
Based blockchain-PSO-AES techniques in finger vein biometrics: A novel verification secure framework for patient authentication
روش های مبتنی بر بلاکچین-PSO-AES در بیومتریک رگ های انگشت: یک چارچوب تأیید صحت جدید برای احراز هویت بیمار-2019 The main objective of this study is to propose a novel verification secure framework for patient authentication
between an access point (patient enrolment device) and a node database. For this purpose, two stages are used.
Firstly, we propose a new hybrid biometric pattern model based on a merge algorithm to combine radio frequency
identification and finger vein (FV) biometric features to increase the randomisation and security levels in
pattern structure. Secondly, we developed a combination of encryption, blockchain and steganography techniques
for the hybrid pattern model. When sending the pattern from an enrolment device (access point) to the
node database, this process ensures that the FV biometric verification system remains secure during authentication
by meeting the information security standard requirements of confidentiality, integrity and availability.
Blockchain is used to achieve data integrity and availability. Particle swarm optimisation steganography and
advanced encryption standard techniques are used for confidentiality in a transmission channel. Then, we discussed
how the proposed framework can be implemented on a decentralised network architecture, including
access point and various databases node without a central point. The proposed framework was evaluated by 106
samples chosen from a dataset that comprises 6000 samples of FV images. Results showed that (1) high-resistance
verification framework is protected against spoofing and brute-force attacks; most biometric verification
systems are vulnerable to such attacks. (2) The proposed framework had an advantage over the benchmark with
a percentage of 55.56% in securing biometric templates during data transmission between the enrolment device
and the node database. Keywords: Finger vein | Blockchain | Cryptography | Steganography | RFID | CIA |
مقاله انگلیسی |