دانلود و نمایش مقالات مرتبط با Unauthorized access::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Unauthorized access

تعداد مقالات یافته شده: 21
ردیف عنوان نوع
1 Trustworthy authorization method for security in Industrial Internet of Things
روش مجوز معتبر برای امنیت در اینترنت اشیا صنعتی-2021
Industrial Internet of Things (IIoT) realizes machine-to-machine communication and human–computer inter- action (HCI) through communication network, which makes industrial production automatic and intelligent. Security is critical in IIoT because of the interconnection of intelligent industrial equipment. In IIoT environment, legitimate human–computer interaction can only be performed by authorized professionals, and unauthorized access is not tolerated. In this paper, a reliable authentication method based on biological information is proposed. Specifically, the complete local binary pattern (CLPB) and the statistical local binary pattern (SLPB) are introduced to describe the local vein texture characteristics. Meanwhile, the contrast energy and frequency domain information are regarded as auxiliary information to interpret the finger vein. The distance between the features of the registration image and the test image is used to recognize the finger vein image, so as to realize identity authentication. The experiments are carried out on SDUMLA-FV database and FV-USM database, and results show that the presented method has achieved high recognition accuracy.
Keywords: Industrial Internet of Things (IIoT) | Human–computer interaction (HCI) | Biometric recognition | Comprehensive texture | Security system
مقاله انگلیسی
2 GaitCode: Gait-based continuous authentication using multimodal learning and wearable sensors
GaitCode: احراز هویت پیوسته مبتنی بر راه رفتن با استفاده از یادگیری چند حالته و حسگرهای پوشیدنی-2021
The ever-growing threats of security and privacy loss from unauthorized access to mobile devices have led to the development of various biometric authentication methods for easier and safer data access. Gait-based authentication is a popular biometric authentication as it utilizes the unique patterns of human locomotion and it requires little cooperation from the user. Existing gait-based biometric authentication methods however suffer from degraded performance when using mobile devices such as smart phones as the sensing device, due to multiple reasons, such as increased accelerometer noise, sensor orientation and positioning, and noise from body movements not related to gait. To address these drawbacks, some researchers have adopted methods that fuse information from multiple accelerometer sensors mounted on the human body at different lo- cations. In this work we present a novel gait-based continuous authentication method by applying multimodal learning on jointly recorded accelerometer and ground contact force data from smart wearable devices. Gait cycles are extracted as a basic authentication element, that can continuously authenticate a user. We use a network of auto-encoders with early or late sensor fusion for feature extraction and SVM and soft max for classification. The effectiveness of the proposed approach has been demonstrated through extensive experiments on datasets collected from two case studies, one with commercial off-the-shelf smart socks and the other with a medical-grade research prototype of smart shoes. The evaluation shows that the proposed approach can achieve a very low Equal Error Rate of 0.01% and 0.16% for identification with smart socks and smart shoes respectively, and a False Acceptance Rate of 0.54%–1.96% for leave-one-out authentication.
Keywords: Biometric authentication | Gait authentication | Autoencoders | Sensor fusion | Multimodal learning | Wearable sensors
مقاله انگلیسی
3 Corporate accounting information disclosure based on FPGA and neural network
افشای اطلاعات حسابداری شرکت بر اساس FPGA و شبکه عصبی-2021
Corporate accounting information is a measure of the company’s accounting and external reporting systems. It is routinely disclosed, which is quantitative data on its financial position and performance audit. The corporate accounting information system contains confidential information that needs to be secured. The consequences of unauthorized access are data loss from identity theft issues. To solve the problem, encrypt and decrypt the sensitive corporate accounting information and product the data using the proposed algorithm Neural Network (NN) and Field Programmable Gate Array (FPGA) is used to classify the corporate accounting information authorized person and unauthorized person. When one authorized user accesses the corporate account infor- mation, it generates the secret critical process. The proposed algorithm unauthorized person cannot access the information is not allowed for stealing. Encryption is the process of converting to something as random and meaningless as direct text data. Decryption is the process of restoring the ciphertext plaintext.
keywords: اطلاعات حسابداری شرکت | شبکه عصبی (NN) | fpga | فرد مجاز | شخص غیر مجاز | رمزگذاری | رمزگشایی | Corporate accounting information | Neural network (NN) | FPGA | Authorized person | Unauthorized person | Encryption | Decryption
مقاله انگلیسی
4 BIOFUSE: A framework for multi-biometric fusion on biocryptosystem level
BIOFUSE: چارچوبی برای همجوشی چند بیومتریک در سطح بیو کریپتوسیستم-2021
Biometric cryptosystems or biocryptoystems are gaining prominence for cryptographic key generation, encryption and biometric template protection. However, the most popular state-of-the-art biocryptosystems- fuzzy commitment and fuzzy vault are prone to multiple security attacks. Recently proposed multi-biometric cryptosystems improve security and enhance recognition performance. They perform the fusion of multi-biometric characteristics with either a single biocryptosystem or independently accessed, multiple biocryptosystems. An attack on any of the involved biocryptosystems can weaken the security of the whole system. In our paper, we propose a multi-biometric fusion framework- BIOFUSE, that combines fuzzy commitment and fuzzy vault using the format-preserving encryption scheme. BIOFUSE makes it improbable for an attacker to get unauthorized access to the system without impersonation of all the biometric inputs of the genuine user at the same instant. We present 4 most basic ways of constructing BIOFUSE and found only 1 named S- BIOFUSE (S3) as a secure design. We compare the recognition performance of the proposed scheme with existing multi-biometric cryptosystems on various databases. The results show 0:98 true match rate at 0:01 false match rate on a virtual IITD-DB1 database that indicates that our proposed work achieves significantly good recognition performance while providing high security.© 2020 Elsevier Inc. All rights reserved.
Keywords: Biometric cryptosystem | Biometric template protection | Multi-biometric fusion | Fuzzy commitment | Fuzzy vault | Format-preserving encryption
مقاله انگلیسی
5 040-S0167739X210
040-S0167739X210-2021
Cyber–Physical System (CPS) are widely used in various areas such as industrial manufacturing, telemedicine and energy, etc. Specifically, industrial medical CPS utilizes various medical devices connected to the network to realize real-time management and treatment of patient. However, the underlying wireless channel makes industrial medical CPS vulnerable to external attacks, which may leak patient privacy and even threaten patients’ lives. Besides, most of the authentication schemes are not suitable for real-time applications such as medical CPS due to the latency. Hence, the artificial intelligence (AI) techniques can be useful in this environment to cater to the aforementioned challenges. It necessitates constructing a secure and lightweight authentication protocol to prevent the unauthorized access and control of medical devices. Traditional authentication schemes adopt a password-based or smartcard to validate the authenticity of users, which may suffer from password guessing or smartcard lost attack. However, the AI-assisted biometrics technique can effectively resist the aforementioned attacks. Therefore, an AI-assisted lightweight authentication protocol for real-time access using a Chebyshev map in industrial medical CPS is designed in this paper, which is robust and resolve security and privacy issues. The proposed protocol is capable of resisting various known attacks through security analysis. The proposed protocol has less computational overhead with a slight increase in communication overhead. Also, the proposed protocol supports stringent security features and functionalities compared to other existing protocols.© 2021 Elsevier B.V. All rights reserved.
Keywords: Chebyshev map | Medical CPS | Authentication | Security and privacy | AI-assisted
مقاله انگلیسی
6 Auditory perception vs: face based systems for human age estimation in unsupervised environments: from countermeasure to multimodality
ادراک شنوایی در مقابل سیستم های مبتنی بر چهره برای برآورد سن انسان در محیط های بدون نظارت: از اقدامات متقابل تا چند حالته-2021
Cyber–Physical System (CPS) are widely used in various areas such as industrial manufacturing, telemedicine and energy, etc. Specifically, industrial medical CPS utilizes various medical devices connected to the network to realize real-time management and treatment of patient. However, the underlying wireless channel makes industrial medical CPS vulnerable to external attacks, which may leak patient privacy and even threaten patients’ lives. Besides, most of the authentication schemes are not suitable for real-time applications such as medical CPS due to the latency. Hence, the artificial intelligence (AI) techniques can be useful in this environment to cater to the aforementioned challenges. It necessitates constructing a secure and lightweight authentication protocol to prevent the unauthorized access and control of medical devices. Traditional authentication schemes adopt a password-based or smartcard to validate the authenticity of users, which may suffer from password guessing or smartcard lost attack. However, the AI-assisted biometrics technique can effectively resist the aforementioned attacks. Therefore, an AI-assisted lightweight authentication protocol for real-time access using a Chebyshev map in industrial medical CPS is designed in this paper, which is robust and resolve security and privacy issues. The proposed protocol is capable of resisting various known attacks through security analysis. The proposed protocol has less computational overhead with a slight increase in communication overhead. Also, the proposed protocol supports stringent security features and functionalities compared to other existing protocols.
Keywords: Chebyshev map | Medical CPS | Authentication | Security and privacy | AI-assisted
مقاله انگلیسی
7 Port cybersecurity and threat: A structural model for prevention andpolicy development
امنیت سایبری و تهدید بندر: الگوی ساختاری برای پیشگیری و تدوین سیاست ها-2020
Most port operators have increasingly integrated cybertechnology into port activities to increase theircompetitiveness; unfortunately, this digitalization becomes the major vulnerability for the emergingcyberthreat. To help port policymakers develop cybersecurity measures, this study conceptualized anddeveloped three dimensions of port cybersecurity hygiene (i.e. human, infrastructure, and procedurefactors) and investigated the relationships between port cybersecurity hygiene and cyberthreats (i.e.hacktivism, cyber criminality, cyber espionage, cyber terrorism, and cyber war). A questionnaire surveywas used to collect data from all international container port operators and shipping lines with branchesin Thailand, and the proposed relationships were tested by structural equation modeling. The resultsindicated that container ports tended to encounter hacktivism when their human, infrastructure, andprocedure factors were vulnerable. The weakness of the human factor could also lead to cyber terrorism,while the deficiency of the infrastructure factor could lead to cyber criminality. Moreover, containerports were likely to be harmed by cyber espionage if their procedure factor was poorly implemented.Hence, the provision of training and education to all port workers, including top executives, managers,and supervisors, are necessary to ensure a cyberthreat-awareness culture at all organizational levels.Improving cybersecurity equipment could prevent unauthorized access to port business data and keepimportant information secure, while the ISPS Code-based procedures and other preventive measuresshould be strictly implemented by container ports to reduce the risk of cyberthreats.
Keywords: Cyberthreat | Port cybersecurity hygiene | Cybertechnology | Prevention and policy development | Port digitalization | Structural equation modeling
مقاله انگلیسی
8 Medical research, Big Data and the need for privacy by design
تحقیقات پزشکی، داده های بزرگ و نیاز به حریم خصوصی توسط طراحی-2019
Medical research data is sensitive personal data that needs to be protected from unauthorized access and unintentional disclosure. In a research setting, sharing of (big) data within the scientific community is necessary in order to make progress and maximize scientific benefits derived from valuable and costly data. At the same time, convincingly protecting the privacy of people (patients) participating in medical research is a prerequisite for maintaining trust and willingness to share. In this commentary, we will address this issue and the pitfalls involved in the context of the PEP project1 that provides the infrastructure for the Personalized Parkinson’s Project,2 a large cohort study on Parkinson’s disease from Radboud University Medical Center (Radboudumc), in cooperation with Verily life Sciences, an Alphabet subsidiary.
Keywords:Big Data | GDPR compliance | informed consent | medical cohort study | polymorphic encryption | privacy by design
مقاله انگلیسی
9 Unauthorized access crime in Jordanian law (comparative study)
جرم دسترسی غیرمجاز در قانون اردن (مطالعه مقایسه ای)-2019
This research cared about clarifying the legal provisions of the unauthorized access crime contained in article 3 of the Jordanian Cybercrime act of 2015 and comparing it to other Arabic legislations and French law as well as clarifying the position of international conventions on this crime. The analysis of the crime included clarifying its elements, its sanction and the aggravating circumstances of its penalty. At the end of the research we reached some recommendations which we hope from the Jordanian legislator to adopt.
Keywords: Cybercrimes | Penal code | Unauthorized access | Jordanian law
مقاله انگلیسی
10 Crime control in the sphere of information technologies in the Republic of Turkey
کنترل جرم در حوزه فناوری های اطلاعات در جمهوری ترکیه-2019
Cybercrime is considered an issue of both local and global concern. Therefore, this study focuses on the local experience in cybercrime control of different countries, including the Republic of Turkey. The article discusses issues in cybersecurity policy and analyzes the legislative framework of the Republic of Turkey on cybercrime issues. The findings underlie the continuing education policy for cybersecurity employees. The study concludes that Turkey handles the current cybercrime situation with efficiency.
Keywords: Cybercrime | Unauthorized access | Criminal law | Ratification | Training of police officers
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 3188 :::::::: بازدید دیروز: 3097 :::::::: بازدید کل: 37455 :::::::: افراد آنلاین: 47