دانلود و نمایش مقالات مرتبط با Security::صفحه 9
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Security

تعداد مقالات یافته شده: 1358
ردیف عنوان نوع
81 Formalizing and analyzing security ceremonies with heterogeneous devices in ANP and PDL
رسمیت و تجزیه و تحلیل مراسم امنیتی با دستگاههای ناهمگن در ANP و PDL-2021
In today’s security protocols (also called “security ceremonies” when humans play a key role), different nodes may have different capabilities: computers can encrypt and decrypt messages, whereas humans cannot; a biometric device can capture biometric information, whereas a random number generator used in e-banking cannot; and so on. Furthermore, even if a node has the decryption capability, it must also know the encryption key to decrypt a message. Actor-network procedures (ANPs) are a well-known formal model of heterogeneous security protocols by Meadows and Pavlovic, and their procedure derivation logic (PDL) supports the logical reasoning about ANPs. However, ANPs do not support explicitly specifying node capabilities, and PDL does not support reasoning explicitly about the knowledge of the participants at different points in time. In this paper, we extend ANPs to deal with heterogeneous devices by explicitly specifying the nodes’ capabilities, as well as by adding new types of events. We also modify PDL to take into account the knowledge of participants at different points in time, and extend PDL to reason both from a “bird’s- eye” view of the system, as well from a “node’s-eye” view. All this allows us to reason about secrecy and authentication in security protocols/ceremonies with different kinds of devices and human users. We illustrate the use of our modeling notation ANP-C and our logics PDL-CK and PDL-CKL to specify and reason about a number of scenarios involving different kinds of devices, including: scenarios for updating someone’s data in a smart card reader; an SSL/TLS ceremony involving a user, a smartphone with a fingerprint reader, anda remote computer/server; and scenarios involving the YubiKey authentication device used by companies such as Google, Facebook, and Bank of America. 2021 Elsevier Inc. All rights reserved.
Keywords: Formal methods | Security protocols | Security ceremonies | Actor-network procedures | Procedure derivation logic | Authentication devices
مقاله انگلیسی
82 Cybersecurity knowledge and skills for port facility security officers of international seaports_ Perspectives of IT and security personnel
دانش و مهارت های امنیتی سایبری برای افسران امنیتی تأسیسات پورت از دریاها بین المللی، دیدگاه های IT و پرسنل امنیتی-2021
Cyberattacks on worldwide port facilities have highlighted the urgent need for port facility security officers (PFSOs) to upgrade their cybersecurity knowledge and skills. This study used the survey data from all international container ports in Thailand and analyzed the results from two perspectives, i.e., IT and security officers. Based on 73 responses, cybersecurity knowledge and skill would become essential for PFSOs than ever before because the port digitalization and automation would shape the PFSOs career to a technically- oriented specialist rather than a multi-skilled generalist. Furthermore, the responsibilities of PFSOs would extend to cover cyber risk management, which enables them to prevent the digital port facilities from emerging cyber threats. Therefore, they should learn how to incorporate the existing risk management process with cyber risk management and cybersecurity knowledge because these would be the foundation for PFSOs to practice cybersecurity skills. At the end of the learning process, PFSOs could also gain cyber- security competence once they have mature knowledge and skill, which would be the vital element of port security hygiene. © 2021 The Authors. Production and hosting by Elsevier B.V. on behalf of The Korean Association of Shipping and Logistics, Inc. This is an open access article under the CC BY-NC-ND license (http:// creativecommons.org/licenses/by-nc-nd/4.0/). CC_BY_NC_ND_4.0
keywords: دانش سایبری | مهارت های سایبری | افسران امنیتی تسهیلات پورت | بنادر کانتینر بین المللی | Cybersecurity knowledge | Cybersecurity skills | Port facility security officers | International container ports
مقاله انگلیسی
83 GaitCode: Gait-based continuous authentication using multimodal learning and wearable sensors
GaitCode: احراز هویت پیوسته مبتنی بر راه رفتن با استفاده از یادگیری چند حالته و حسگرهای پوشیدنی-2021
The ever-growing threats of security and privacy loss from unauthorized access to mobile devices have led to the development of various biometric authentication methods for easier and safer data access. Gait-based authentication is a popular biometric authentication as it utilizes the unique patterns of human locomotion and it requires little cooperation from the user. Existing gait-based biometric authentication methods however suffer from degraded performance when using mobile devices such as smart phones as the sensing device, due to multiple reasons, such as increased accelerometer noise, sensor orientation and positioning, and noise from body movements not related to gait. To address these drawbacks, some researchers have adopted methods that fuse information from multiple accelerometer sensors mounted on the human body at different lo- cations. In this work we present a novel gait-based continuous authentication method by applying multimodal learning on jointly recorded accelerometer and ground contact force data from smart wearable devices. Gait cycles are extracted as a basic authentication element, that can continuously authenticate a user. We use a network of auto-encoders with early or late sensor fusion for feature extraction and SVM and soft max for classification. The effectiveness of the proposed approach has been demonstrated through extensive experiments on datasets collected from two case studies, one with commercial off-the-shelf smart socks and the other with a medical-grade research prototype of smart shoes. The evaluation shows that the proposed approach can achieve a very low Equal Error Rate of 0.01% and 0.16% for identification with smart socks and smart shoes respectively, and a False Acceptance Rate of 0.54%–1.96% for leave-one-out authentication.
Keywords: Biometric authentication | Gait authentication | Autoencoders | Sensor fusion | Multimodal learning | Wearable sensors
مقاله انگلیسی
84 Multifactor authentication scheme using physically unclonable functions
طرح احراز هویت چند عاملی با استفاده از توابع غیرقابل تنظیم فیزیکی-2021
We propose a secure telehealth system using multifactor authentication for the mobile de- vices as well as the IoT edge devices in the system. These two types of devices constitute the weakest link in telehealth systems. The mobile devices and edge devices are typically unsecured and contain vulnerable processors. The mobile devices use the healthcare professional’s biometric and endowing the edge device with biometrics is accomplished by using physically unclonable functions (PUFs). The embedded PUF acts as a means of enabling mutual authentication and key exchange. Evaluating the security of the proposed authentication scheme is conducted using three approaches: (a) formal analysis based on Burrows–Abadi–Needham logic (BAN); (b) informal security analysis for protection against many attack types.; (c) model checking using automated validation of internet security protocols and applications (AVISPA) tool.© 2020 Elsevier B.V. All rights reserved.1.
Keywords: Internet of Things | Device authentication | Hardware security | Embedded systems | PUF | AVISPA | BAN | Three-factor authentication
مقاله انگلیسی
85 The use of IT systems in financial and accounting services for enterprises in the conditions of the COVID-19 pandemic
استفاده از سیستم های فناوری اطلاعات در خدمات مالی و حسابداری برای شرکت ها در شرایط همه گیر COVID-19-2021
In Poland, remote teams and work outside of the company were rare by this time. Almost all organizations had to virtualize at a faster rate by delegating their employees to work remotely, facing many challenges that they had to overcome in a short time. This article aims to check the directions and effects of changes in the digitalization of financial-accounting processes concerning the COVID-19 pandemic. The rate of use financial-accounting programs in remote work and upgrade of work organization, availability to internet platforms, identification security level of data, defining barriers that influence the limit of digitalization processes and financial-accounting programs were made.
Keywords: finance | IT systems | financial and accounting programs | company | pandemic | COVID-19.
مقاله انگلیسی
86 How viable is password cracking in digital forensic investigation? Analyzing the guessability of over 3:9 billion real-world accounts
شکستن رمز عبور در تحقیقات پزشکی قانونی دیجیتال چقدر قابل اجرا است؟ تجزیه و تحلیل قابلیت حدس زدن بیش از 3:9 میلیارد حساب در دنیای واقعی-2021
Passwords have been and still remain the most common method of authentication in computer systems. These systems are therefore privileged targets of attackers, and the number of data breaches in the last few years attests to that. A detailed analysis of such data can provide insight on password trends and patterns users follow when they create a password. To this end, this paper presents the largest and most comprehensive analysis of real-world passwords to date e associated with over 3.9 billion accounts from Have I Been Pwned. This analysis includes statistics on use and most common patterns found in passwords and innovates with a breakdown of the constituent fragments that make each password. Furthermore, a classification of these fragments according to their semantic meaning, provides insight on the role of context in password selection. Finally, we provide an in-depth analysis on the guessability of these real-world passwords.
keywords: Password security | Password-based authentication | Context-based password cracking | Password strength meters
مقاله انگلیسی
87 Evolving challenges and strategies for fungal control in the food supply chain
چالش ها و استراتژی های در حال کنترل برای کنترل قارچ در زنجیره تامین مواد غذایی-2021
Fungi that spoil foods or infect crops can have major socioeconomic impacts, posing threats to food security. The strategies needed to manage these fungi are evolving, given the growing incidence of fungicide resistance, tightening regulations of chemicals use and market trends imposing new food-preservation challenges. For example, alternative methods for crop protection such as RNA-based fungicides, biocontrol, or stimulation of natural plant defences may lessen concerns like environmental toxicity of chemical fungicides. There is renewed focus on natural product preservatives and fungicides, which can bypass regulations for ‘clean label’ food products. These require investment to find effective, safe activities within complex mixtures such as plant extracts. Alternatively, physical measures may be one key for fungal control, such as polymer materials which passively resist attachment and colonization by fungi. Reducing or replacing traditional chlorine treatments (e.g. of post-harvest produce) is desirable to limit formation of disinfection by-products. In addition, the current growth in lower sugar food products can alter metabolic routing of carbon utilization in spoilage yeasts, with implications for efficacy of food preservatives acting via metabolism. The use of preservative or fungicide combinations, while involving more than one chemical, can reduce total chemicals usage where these act synergistically. Such approaches might also help target different subpopulations within heteroresistant fungal populations. These approaches are discussed in the context of cur- rent challenges for food preservation, focussing on pre-harvest fungal control, fresh pro- duce and stored food preservation. Several strategies show growing potential for mitigating or reversing the risks posed by fungi in the food supply chain.ª 2021 The Author(s). Published by Elsevier Ltd on behalf of British Mycological Society. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/). * Corresponding author. E-mail address: Simon.Avery@nottingham.ac.uk (S. V. Avery).1 Authors made equal contributions. https://doi.org/10.1016/j.fbr.2021.01.0031749-4613/ª 2021 The Author(s). Published by Elsevier Ltd on behalf of British Mycological Society. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).
Keywords: Agrichemicals | Antimicrobial resistance | Food spoilage | Phytopathogens | Spoilage fungi
مقاله انگلیسی
88 Uncovering research streams on agri-food supply chain management: A bibliometric study
کشف جریانهای تحقیق در مورد مدیریت زنجیره تأمین مواد غذایی کشاورزی: یک مطالعه کتابشناختی-2021
This study carried out a bibliometric analysis to critically review the evolution of the agri-food supply chain (AFSC) research field over the period of 2008–2019. A set of 1236 articles was analyzed from the Web of Science database. Besides using different analytical scientometric tools (topic mapping, co-citation, co-authorship and overlay visualization networks), this study identified frequently-used keywords, new and hot research topics and frequently-studied supply chain management (SCM) practices. Frequently used keywords are food supply chain, food waste, sustainability, food safety, SCM, food industry, and food security. New research themes include contract, blockchain, internet of things, resilience, and short food supply chain, a topic that demands further research especially due to the international COVID-19 pandemic and the need of farmers to be closer to the consumers. Hot research topics, that is, subjects that have been studied in highly cited papers were also identified include life cycle assessment, environmental impact, packaging, water use, food waste prevention, food waste generation, blockchain and carbon footprint. Among SCM practices, this study observed that risk and sustainable SCM are frequently used keywords. Procurement and reverse logistics were observed in fewer studies. SCM, food waste, food quality, GHG emissions and risk management are sustainable SCM practices frequently observed.
Keywords: Agri-food supply chain | Bibliometric analysis | Co-authorship | Co-citation analysis | Scientometrics | Supply chain management practices
مقاله انگلیسی
89 A dataset for accounting, finance and economics research on US data breaches
یک مجموعه داده برای حسابداری، مالی و تحقیقات اقتصاد در مورد نقض داده های ایالات متحده-2021
This data article describes a dataset of data breaches in US listed firms over a ten-year period. Data breaches represent major events that pose serious challenges to organisations. The number of incidents has been on the increase over the last decade and this has attracted the interest of the media, consumers and regulators. While there is a well-established literature on cybersecurity in Computer Science and Information Systems journals, studies exploring the economic and business impacts of data breaches represent a relatively recent phenomenon. There is a nascent but fast-growing literature in accounting, finance and economics that focuses on the financial impacts of data breaches and this dataset provides a useful resource for future studies in this space. By providing data on the company identifier, the type of breach, the dates of breach disclosure, and relates these dates to the company’s fiscal year, the dataset can be merged quickly with existing accounting and finance datasets. The dataset includes data on 506 incidents over a ten-year period thereby enabling cross-sectional and longitudinal analyses.
Keywords: Cyber security | Data breaches | Finance | Accounting | Event study
مقاله انگلیسی
90 Circular economy for phosphorus supply chain and its impact on social sustainable development goals
اقتصاد مدور برای زنجیره تأمین فسفر و تأثیر آن بر اهداف توسعه پایدار اجتماعی-2021
To be able to grow crops, we have interfered with Earths reserves of one of top three essential elements, phosphorus (P), as to which we face a problem related to its high consumption compared to available resources. This forces us to follow the alternative of closing the phosphorus loop from a circular economy perspective. However, there is a lack of research on regional and global social sustainability in this area, as emphasized in the United Nations Agenda 2030 goals for sustainable development. In this paper, we address social challenges involved in global phosphorus supply chain, such as eradicating poverty, child labor and malnutrition; promoting gender equality; providing decent work and economic growth; maintaining sustainable water use; and achieving food security. Our research is driven by the question of whether the circular economy aims to direct phosphorus management towards tackling social issues associated with its supply chain. We use system dynamics modelling by combining the concept of material flow analysis and social life cycle assessment. Detailed analysis at regional and global levels indicates a paradoxical social impact of phosphorus circular model. This reflects the multiple stakeholders involved, and the regional interactions with phosphorus circular economy transitions. Improvements can be demonstrated in reducing poverty and providing safer work environment in many regions, e.g., Western Asia (93%), New Zealand, Central Asia, and Europe (44–61%), while achieving employment targets is limited in Northern and Eastern Europe. Circular model fails to promote gender equality, it also exacerbates exploitative child work problem for the Caribbean and most Africa. It provides sufficient nutrition to North America, Australia/New Zealand, and Northern Europe. It achieves water use targets in several regions with 53% savings worldwide. Finally, circular model contributes to P efficiency (average balance of 1.21 kgP/ha) and strengthens P security within most regions with an average of 64%.
Keywords: Critical materials | Phosphorus | Social sustainability | Circular economy | Dynamic modelling
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 7139 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 7139 :::::::: افراد آنلاین: 80