دانلود و نمایش مقالات مرتبط با Information security::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Information security

تعداد مقالات یافته شده: 103
ردیف عنوان نوع
1 TUI Model for data privacy assessment in IoT networks
مدل TUI برای ارزیابی حریم خصوصی داده ها در شبکه های اینترنت اشیا-2022
The development of the Internet of Things (IoT) has been at the forefront of progressing societal functionality. However, the addition of IoT devices in conventional information technology (IT) infrastructure has raised and prioritized the concern of information security and data privacy. The Common Vulnerability Scoring System (CVSS) is a framework for providing information to the public about the impact of vulnerabilities and exploits executed on a multitude of devices. While the CVSS addresses a plethora of conditions for vulnerabilities, it does not adequately make end- users aware of the impact data privacy can have on their devices. The primary objective of this research work is to extend the existing CVSS and propose a new model that acknowledges Transparency, Unlinkability, and Intervenability (TUI) to address the data privacy issues of IoT devices when scoring impacts of vulnerabilities. Our research has developed this model to provide a new sufficient score for analyzing the true impact of compromised data privacy. After the development of the new scoring for TUI, our research highlights case studies to emphasize the impact our TUI model will have on the CVSS. We strongly believe that our proposed model benefit both the individual users (consumers of IoT devices) and the industry to portray the possible vulnerabilities from a user standpoint as well as a manufacturer standpoint.
keywords: حریم خصوصی داده ها | امنیت اینترنت اشیا | مدل سیا | امتیازدهی آسیب پذیری | امنیت دستگاه | ارزیابی امنیتی | Data privacy | IoT security | CIA model | Vulnerability scoring | Device security | Security assessment
مقاله انگلیسی
2 A Modified Key Sifting Scheme With Artificial Neural Network Based Key Reconciliation Analysis in Quantum Cryptography
یک طرح غربال کلید اصلاح شده با تحلیل آشتی کلید مبتنی بر شبکه عصبی مصنوعی در رمزنگاری کوانتومی-2022
Quantum Cryptography emerged from the limitations of classical cryptography. It will play a vital role in information security after the availability of expected powerful quantum computers. Still many quantum primitives like quantum money, blind quantum computation, quantum copy protection, etc. are theoretical as they require a completely functional quantum computer for their implementation. But one prominent quantum cryptographic primitive, the Quantum Key Distribution (QKD) is possible with current technology. The QKD is a key establishment system having several stages namely raw key generation, key sifting, key reconciliation, and privacy amplification. In this paper, an efficient key sifting scheme has been developed. Successful simulation has shown that the proposed modified key sifting scheme requires less time to build the sifted key compared to the sifted key in conventional BB84 protocol in most cases. This paper also represents Tree Parity Machine (TPM) based key reconciliation analysis using different learning algorithms such as Hebbian, Anti-Hebbian, and Random-Walk. This reconciliation analysis helps to choose the optimum learning algorithm for Artificial Neural Network (ANN) based key reconciliation in future Quantum Key Distribution systems.
INDEX TERMS: Artificial neural network | BB84 protocol | key sifting | key reconciliation | learning algorithms | quantum key distribution | quantum cryptography.
مقاله انگلیسی
3 A Remote Security Computational Ghost Imaging Method Based on Quantum Key Distribution Technology
یک روش تصویربرداری شبح محاسباتی امنیت از راه دور بر اساس فناوری توزیع کلید کوانتومی-2022
Computational ghost imaging (CGI) is a method of acquiring object information by measuring light field intensity, which would be used to achieve imaging in a complicated environment. The main issue to be addressed in CGI technology is how to achieve rapid and high-quality imaging while assuring the secure transmission of detection data in practical distant imaging applications. In order to address the mentioned issues, this paper proposes a remote secure CGI method based on quantum communication technology. Using the quantum key distribution (QKD) network, the CGI system can be reconstructed while solving the problem of information security transmission between the detector and the reconstructed computing device. By exploring the influence of different random measurement matrices on the quality of image reconstruction, it is found that the randomness of the numerical sequence constituting the matrix is positively correlated with the imaging quality. Based on this discovery, a new type of quantum cryptography measurement matrix is constructed using quantum cryptography with good randomness. In addition, through further orthogonalization and normalization of the matrix, the matrix has both good randomness and orthogonality, and high-quality imaging results can be obtained at a low sampling rate. The feasibility and effectiveness of the method are verified by simulation imaging experiments. Compared with the traditional GI system, the method proposed in this paper has higher transmission security and high-quality imaging under this premise, which provides a new idea for the practical development of CGI technology.
INDEX TERMS: Computational ghost imaging | quantum key distribution | quantum cryptography | measurement matrix | randomness | schimidt orthogonalization.
مقاله انگلیسی
4 Human identification driven by deep CNN and transfer learning based on multiview feature representations of ECG
Human identification driven by deep CNN and transfer learning based on multiview feature representations of ECG-2021
Increasingly smart techniques for counterfeiting face and fingerprint traits have increased the potential threats to information security systems, creating a substantial demand for improved security and better privacy and identity protection. The internet of Things (IoT)-driven fingertip electrocardiogram (ECG) acquisition provides broad application prospects for ECG-based identity systems. This study focused on three major impediments to fingertip ECG: the impact of variations in acquisition status, the high computational complexity of traditional convolutional neural network (CNN) models and the feasibility of model migration, and a lack of sufficient fingertip samples. Our main contribution is a novel fingertip ECG identification system that integrates transfer learning and a deep CNN. The proposed system does not require manual feature extraction or suffer from complex model calculations, which improves its speed, and it is effective even when only a small set of training data exists. Using 1200 ECG recordings from 600 individuals, we consider 5 simulated yet potentially practical scenarios. When analyzing the overall training accuracy of the model, its mean accuracy for the 540 chest- collected ECG from PhysioNet exceeded 97.60 %, and for 60 subjects from the CYBHi fingertip-collected ECG, its mean accuracy reached 98.77 %. When simulating a real-world human recognition system on 5 public datasets, the validation accuracy of the proposed model can nearly reach 100 % recognition, outperforming the original GoogLeNet network by a maximum of 3.33 %. To some degree, the developed architecture provides a reference for practical applications of fingertip-collected ECG-based biometric systems and for information network security.
Keywords: Off-the-person | Fingertip ECG biometric | Human identification | Convolutional neural network (CNN) | Transfer learning
مقاله انگلیسی
5 نسبت جنبه های فنی به روانشناختی در مفاهیم آموزش امنیت اطلاعات تخصصی
سال انتشار: 2020 - تعداد صفحات فایل pdf انگلیسی: 6 - تعداد صفحات فایل doc فارسی: 14
نیاز به ایجاد تغییر در ساختار مهارتهای مورد نیاز برای متخصص امنیت اطلاعات (IS) توجیه پذیر است. در اینجا، ویژگیهای خاص مربوط به وضعیت فعلی فعالیتهای داخلی و مسائل کلاهبرداری داخلی، مشخصات اصلی توسعه سیستم های نگهداری فنی IS شامل آنالیز رفتار کاربر ، و مفهوم سیستم عامل در تنظیم امنیت ، اتوماسیون و پاسخ مورد بحث قرار می گیرد. همچنین اهمیت نقش انسان در حصول اطمینان از IS نشان داده خواهد شد. برخی رویکرد ها به منظور ارزیابی الگوهای رفتاری برای اطمینان از IS شرح داده شد. در این مقاله به آنالیز تجارب در زمینه تشکل در بین دانشجویان MEPhI ، تحصیل در رشته IS ، مهارت پیش بینی رفتار سایر افراد بر اساس داده های به دست آمده با استفاده از ماژول برنامه "سیستم آزمایش روانشناسی حرفه ای" در چارچوب آزمایشگاه تخصصی پرداخته شد.
واژه های کلیدی: آموزش امنیت اطلاعات | تحلیل رفتار | جنبه های روانشناختی امنیت | ارزیابی الگوهای رفتاری | مهارت های شناسایی کارمند داخلی
مقاله ترجمه شده
6 Understanding the rule of prevalence in the NIS directive: C-ITS as a case study
درک قانون شیوع در دستورالعمل NIS: C-ITS به عنوان یک مطالعه موردی-2020
The paper discusses the interpretation of the rule of prevalence of Article 1 (7) NIS Directive, which has not been the subject of any academic debate so far. Article 1 (7) NIS Directive organises the interface between the NIS Directive regime and other European Union sectorspecific legislations imposing (cyber)security obligations, by laying down the conditions according to which such obligations would prevail over the NIS Directive regime. Based on the case study of the recent proposal from the European Commission to regulate Cooperative Intelligent Transport Systems (‘C-ITS’), the paper unravels a number of issues and unclarities. Recommendations are made with respect to the interpretation and application of the rule of prevalence of Article 1 (7) NIS Directive. In anticipation of a potential future C-ITS regulation and in the context of a possible upcoming revision of the NIS Directive, the paper also makes suggestions to ease the regulation of the interface between the NIS Directive and other (cyber-)security regulation, particularly in the field of C-ITS.
Keywords: NIS directive | Cooperative intelligent transport | systems (C-ITS) | ITS directive | Cybersecurity | Rule of prevalence | Information security | Network and information systems
مقاله انگلیسی
7 Information security and storage of Internet of Things based on block chains
امنیت اطلاعات و ذخیره اینترنت اشیاء بر اساس زنجیره های بلوک-2020
With progress in science and technology and the rapid development of the Internet of Things, we have entered the intelligent era of the Internet of Things. With many devices connected to the Internet, hackers have opportunities to attack; thus, the security of the Internet of Things has attracted increased attention. In the era of big data, the demand for information storage is increasing. This paper considers block chains and proposes an ECC (Ellipse Curve Cryptography) asymmetric algorithm to encrypt information. For storage, this paper proposes compressed sensing for data compression reconstruction to improve information storage speed in the Internet of Things. The experimental results show that the proposed algorithm is superior to comparable algorithms in security and storage performance.
Keywords: Block chain | Internet of Things | Information security and storage
مقاله انگلیسی
8 ردپای سخت افزاری S-box در رمزنگاری های بلوک متقارن سبک برای سیستم های امنیتی اطلاعات IoT و CPS
Hardware footprints of S-box in lightweight symmetric block ciphers for IoT and CPS information security systems-2019
The hardware footprint for S-box specification in lightweight block cipher as appropriate to IoT and CPS information security systems is presented in this paper. The S-box Boolean function in the lightweight block cipher is defined using the Reed-Muller structure. A Rule Based–Common Sub-structure Sharing Optimization (RB-CSSO) algorithm has been proposed towards improving the performance efficiency of Reed-Muller structure. This novel hybrid RB-CSSO optimization mechanism first transforms the direct Positive Polarity Reed Muller (PPRM) S-box representation into Mixed Polarity Reed-Muller (MPRM) S-box architecture using local rule based transformation. Secondly, the Common Sub Term (CST) and Common Sub-expression (CSE) merging/elimination are employed over the resulting MPRM structure. The combined rule-based transformation and the common sub-function sharing demonstrate an overall reduction in area, delay and power of the Reed-Muller S-box structure. Both the theoretical analysis and the experimental verification demonstrate reduction in area and delay of S-box. Post synthesis results based on ASIC standard cell based implementations have been used to analyze area, delay and power values across Process, Voltage and Temperature (PVT) corners for a wide range of operating conditions. Extensive comparisons between direct PPRM and optimized MPRM implementations have been carried out. The post layout simulations of S-box structures realized show the advantages of lower area-delay product, power-area product and power-delay product. This work thus authenticates the application of proposed structure for lightweight, resource constrained security systems. Industry standard full suite of Cadence® tools have been employed in the simulations using 65 nm TCBN65GPLUS standard cells of TSMC technology library.
Keywords: Lightweight cryptography | Symmetric block ciphers | Substitution box | Reed-muller structure
مقاله انگلیسی
9 Public key digital contents confidentiality scheme based on quantum spin and finite state automation
طرح محرمانه بودن محتویات دیجیتالی کلید عمومی مبتنی بر چرخش کوانتومی و اتوماسیون حالت محدود-2019
Numerous encryption plans are legitimately founded on the transformation of frameworks or by characterizing the strict guidelines. Most of the security systems are based on mathematical structures and their applications in diverse applied sciences. We propose here an advanced digital contents confidentiality scheme to simulate the phenomenon rather than creating rigid rules. We operate digital data trailed by quantum spin states for specific phase and finite state machine for limited number of rounds. The extent of the presented article revolves around the development and deployment of public key cryptosystem basis on the concepts of quantum spin states and finite state machine effectively. Both states (spin and finite state machine) provide the high degree of naturalness contrasted with ordinary cryptosystem.
Keywords: Information security | Digital contents privacy | Public key cryptography | Image encryption | Quantum cryptography | Quantum spin states | Finite state machine applications in | information security
مقاله انگلیسی
10 Based blockchain-PSO-AES techniques in finger vein biometrics: A novel verification secure framework for patient authentication
روش های مبتنی بر بلاکچین-PSO-AES در بیومتریک رگ های انگشت: یک چارچوب تأیید صحت جدید برای احراز هویت بیمار-2019
The main objective of this study is to propose a novel verification secure framework for patient authentication between an access point (patient enrolment device) and a node database. For this purpose, two stages are used. Firstly, we propose a new hybrid biometric pattern model based on a merge algorithm to combine radio frequency identification and finger vein (FV) biometric features to increase the randomisation and security levels in pattern structure. Secondly, we developed a combination of encryption, blockchain and steganography techniques for the hybrid pattern model. When sending the pattern from an enrolment device (access point) to the node database, this process ensures that the FV biometric verification system remains secure during authentication by meeting the information security standard requirements of confidentiality, integrity and availability. Blockchain is used to achieve data integrity and availability. Particle swarm optimisation steganography and advanced encryption standard techniques are used for confidentiality in a transmission channel. Then, we discussed how the proposed framework can be implemented on a decentralised network architecture, including access point and various databases node without a central point. The proposed framework was evaluated by 106 samples chosen from a dataset that comprises 6000 samples of FV images. Results showed that (1) high-resistance verification framework is protected against spoofing and brute-force attacks; most biometric verification systems are vulnerable to such attacks. (2) The proposed framework had an advantage over the benchmark with a percentage of 55.56% in securing biometric templates during data transmission between the enrolment device and the node database.
Keywords: Finger vein | Blockchain | Cryptography | Steganography | RFID | CIA
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 3113 :::::::: بازدید دیروز: 2317 :::::::: بازدید کل: 5430 :::::::: افراد آنلاین: 12