دانلود و نمایش مقالات مرتبط با امنیت اطلاعات::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - امنیت اطلاعات

تعداد مقالات یافته شده: 77
ردیف عنوان نوع
1 TUI Model for data privacy assessment in IoT networks
مدل TUI برای ارزیابی حریم خصوصی داده ها در شبکه های اینترنت اشیا-2022
The development of the Internet of Things (IoT) has been at the forefront of progressing societal functionality. However, the addition of IoT devices in conventional information technology (IT) infrastructure has raised and prioritized the concern of information security and data privacy. The Common Vulnerability Scoring System (CVSS) is a framework for providing information to the public about the impact of vulnerabilities and exploits executed on a multitude of devices. While the CVSS addresses a plethora of conditions for vulnerabilities, it does not adequately make end- users aware of the impact data privacy can have on their devices. The primary objective of this research work is to extend the existing CVSS and propose a new model that acknowledges Transparency, Unlinkability, and Intervenability (TUI) to address the data privacy issues of IoT devices when scoring impacts of vulnerabilities. Our research has developed this model to provide a new sufficient score for analyzing the true impact of compromised data privacy. After the development of the new scoring for TUI, our research highlights case studies to emphasize the impact our TUI model will have on the CVSS. We strongly believe that our proposed model benefit both the individual users (consumers of IoT devices) and the industry to portray the possible vulnerabilities from a user standpoint as well as a manufacturer standpoint.
keywords: حریم خصوصی داده ها | امنیت اینترنت اشیا | مدل سیا | امتیازدهی آسیب پذیری | امنیت دستگاه | ارزیابی امنیتی | Data privacy | IoT security | CIA model | Vulnerability scoring | Device security | Security assessment
مقاله انگلیسی
2 نسبت جنبه های فنی به روانشناختی در مفاهیم آموزش امنیت اطلاعات تخصصی
سال انتشار: 2020 - تعداد صفحات فایل pdf انگلیسی: 6 - تعداد صفحات فایل doc فارسی: 14
نیاز به ایجاد تغییر در ساختار مهارتهای مورد نیاز برای متخصص امنیت اطلاعات (IS) توجیه پذیر است. در اینجا، ویژگیهای خاص مربوط به وضعیت فعلی فعالیتهای داخلی و مسائل کلاهبرداری داخلی، مشخصات اصلی توسعه سیستم های نگهداری فنی IS شامل آنالیز رفتار کاربر ، و مفهوم سیستم عامل در تنظیم امنیت ، اتوماسیون و پاسخ مورد بحث قرار می گیرد. همچنین اهمیت نقش انسان در حصول اطمینان از IS نشان داده خواهد شد. برخی رویکرد ها به منظور ارزیابی الگوهای رفتاری برای اطمینان از IS شرح داده شد. در این مقاله به آنالیز تجارب در زمینه تشکل در بین دانشجویان MEPhI ، تحصیل در رشته IS ، مهارت پیش بینی رفتار سایر افراد بر اساس داده های به دست آمده با استفاده از ماژول برنامه "سیستم آزمایش روانشناسی حرفه ای" در چارچوب آزمایشگاه تخصصی پرداخته شد.
واژه های کلیدی: آموزش امنیت اطلاعات | تحلیل رفتار | جنبه های روانشناختی امنیت | ارزیابی الگوهای رفتاری | مهارت های شناسایی کارمند داخلی
مقاله ترجمه شده
3 Understanding the rule of prevalence in the NIS directive: C-ITS as a case study
درک قانون شیوع در دستورالعمل NIS: C-ITS به عنوان یک مطالعه موردی-2020
The paper discusses the interpretation of the rule of prevalence of Article 1 (7) NIS Directive, which has not been the subject of any academic debate so far. Article 1 (7) NIS Directive organises the interface between the NIS Directive regime and other European Union sectorspecific legislations imposing (cyber)security obligations, by laying down the conditions according to which such obligations would prevail over the NIS Directive regime. Based on the case study of the recent proposal from the European Commission to regulate Cooperative Intelligent Transport Systems (‘C-ITS’), the paper unravels a number of issues and unclarities. Recommendations are made with respect to the interpretation and application of the rule of prevalence of Article 1 (7) NIS Directive. In anticipation of a potential future C-ITS regulation and in the context of a possible upcoming revision of the NIS Directive, the paper also makes suggestions to ease the regulation of the interface between the NIS Directive and other (cyber-)security regulation, particularly in the field of C-ITS.
Keywords: NIS directive | Cooperative intelligent transport | systems (C-ITS) | ITS directive | Cybersecurity | Rule of prevalence | Information security | Network and information systems
مقاله انگلیسی
4 Information security and storage of Internet of Things based on block chains
امنیت اطلاعات و ذخیره اینترنت اشیاء بر اساس زنجیره های بلوک-2020
With progress in science and technology and the rapid development of the Internet of Things, we have entered the intelligent era of the Internet of Things. With many devices connected to the Internet, hackers have opportunities to attack; thus, the security of the Internet of Things has attracted increased attention. In the era of big data, the demand for information storage is increasing. This paper considers block chains and proposes an ECC (Ellipse Curve Cryptography) asymmetric algorithm to encrypt information. For storage, this paper proposes compressed sensing for data compression reconstruction to improve information storage speed in the Internet of Things. The experimental results show that the proposed algorithm is superior to comparable algorithms in security and storage performance.
Keywords: Block chain | Internet of Things | Information security and storage
مقاله انگلیسی
5 Public key digital contents confidentiality scheme based on quantum spin and finite state automation
طرح محرمانه بودن محتویات دیجیتالی کلید عمومی مبتنی بر چرخش کوانتومی و اتوماسیون حالت محدود-2019
Numerous encryption plans are legitimately founded on the transformation of frameworks or by characterizing the strict guidelines. Most of the security systems are based on mathematical structures and their applications in diverse applied sciences. We propose here an advanced digital contents confidentiality scheme to simulate the phenomenon rather than creating rigid rules. We operate digital data trailed by quantum spin states for specific phase and finite state machine for limited number of rounds. The extent of the presented article revolves around the development and deployment of public key cryptosystem basis on the concepts of quantum spin states and finite state machine effectively. Both states (spin and finite state machine) provide the high degree of naturalness contrasted with ordinary cryptosystem.
Keywords: Information security | Digital contents privacy | Public key cryptography | Image encryption | Quantum cryptography | Quantum spin states | Finite state machine applications in | information security
مقاله انگلیسی
6 Insight into hackers’ reaction toward information security breach
Insight into hackers’ reaction toward information security breach-2019
This study provides insight into hackers’ reaction toward an information security breach perpetuated either with an ill or good intention. To our knowledge, limited research is available for promoting understanding of whether intent induces different perceived moral affect (i.e., a perpetrator should have feelings of regret, sorrow, guilt, and shame) which explains the effect of perceived intensity of emotional distress on responsibility judgment. Further, research is sparse on enhancing understanding of whether the nature of a perpetrator’s intent affects the moderating role of consideration of the consequences in the relationship between perceived moral affect and responsibility judgment. Increased understanding of the relationships among perceived moral affect, perceived intensity of emotional distress, consideration of the consequences, and responsibility judgment of an information security breach from the hackers’ perspective may shed light on their continued engagement in the act despite society’s disapproval. Analyzes of the responses of 166 hackers recruited at two major hacker conferences reveal that perceived moral affect mediates the effect of perceived intensity of emotional distress on responsibility judgment only in an ill intention breach, and consideration of the consequences strengthens the relationship between perceived moral affect and responsibility judgment only in a good intention breach.
Keywords: Information security breach | Moral affect | Moral intensity | Consequences | Responsibility judgment
مقاله انگلیسی
7 Device-independent quantum secure direct communication against collective attacks
ارتباط مستقیم امن کوانتومی مستقل از دستگاه در برابر حملات جمعی-2019
‘‘Device-independent” not only represents a relaxation of the security assumptions about the internal working of the quantum devices, but also can enhance the security of the quantum communication. In the paper, we put forward the first device-independent quantum secure direct communication (DIQSDC) protocol and analyze its security and communication efficiency against collective attacks. Under practical noisy quantum channel condition, the photon transmission loss and photon state decoherence would reduce DI-QSDC’s communication quality and threaten its absolute security. For solving the photon transmission loss and decoherence problems, we adopt noiseless linear amplification (NLA) protocol and entanglement purification protocol (EPP) to modify the DI-QSDC protocol. With the help of the NLA and EPP, we can guarantee DI-QSDC’s absolute security and effectively improve its communication quality.
Keywords: Quantum cryptography | Device-independent quantum secure direct | communication | Information security | Communication efficiency
مقاله انگلیسی
8 Improved Cohort Intelligence: A high capacity, swift and secure approach on JPEG image steganography
بهبود هوش گروهی: رویکردی با ظرفیت بالا ، سریع و ایمن در استگانوگرافی تصویر JPEG -2019
In the recent high level of information security was attained by combining the concepts of cryptogra- phy, steganography along with the nature inspired optimization algorithms. However, in today’s world computational speed plays a vital role for the success of any scientific method. The optimization algo- rithms, such as cohort Intelligence with Cognitive Computing (CICC) and Modified-Multi Random Start Local Search (M-MRSLS) were already implemented and applied for JPEG image steganography for 8 ×8 as well as 16 ×16 quantization table, respectively. Although results were satisfactory in terms of image quality and capacity, the computational time was high for most of the test images. To overcome this challenge, the paper proposes modified version of cohort intelligence (CI) algorithm referred to as Im- proved Cohort Intelligence (CI). The Improved CI algorithm was considered as a cryptography technique and implemented to generate optimized cipher text. Improved CI algorithm was further employed for JPEG image steganography to propose a reversible data hiding scheme. Experimentation was done on grey scale image, of size 256 ×256; both for 8 ×8 and 16 ×16 quantization table. Results validation of the proposed work exhibited very encouraging improvements in the computational cost
Keywords: Information security | Cryptography | Steganography | JPEG compression | Grey scale image | Improved CI
مقاله انگلیسی
9 A novel approach for the development of the Twofish algorithm based on multi-level key space
یک رویکرد جدید برای توسعه الگوریتم Twofish مبتنی بر فضای کلیدی چند سطح-2019
This paper presents a new modification of the Twofish algorithm for strengthening security. This is done by using two additional control keys during 16 rounds of the standard Feistel Encryption algorithm. Our proposed algorithm uses three keys in the encryption and decryption processes instead of only one key for controlling variable bit sizes of the blocks (either 1or 2, or 4 or 8 bits), which determine the state ta- ble numbers. These tables are constructed from the addition in a Galois field (GF(2 n )) based on the block bit size to increase the complexity of the proposed algorithm. Results are evaluated based on the criteria of complexity, time encryption, throughput, National Institute of Standards and Technology (NIST), his- togram analysis, Number of Pixel of Change Rate (NPCR) and Unified Average Changing Intensity (UACI). The simulation results show that our proposed algorithm exceeds the original algorithm in complexity, where it obtained (2 4,722,900 ) probabilities for 16 rounds. In addition, NIST tests and histogram analysis provide better results for our proposed algorithm compared with the original. Also, NPCR of our pro- posed Twofish is close to the ideal value of this standard. All these results prove that our modification of the Twofish algorithm makes it stronger against attacks by increasing its complexity
Keywords: Cryptography | Information security | Symmetric block cipher | Twofish algorithm | Multi-states | Multi-level keys | Image encryption
مقاله انگلیسی
10 Information hiding with adaptive steganography based on novel fuzzy edge identification
پنهان سازی اطلاعات با استگانوگرافی تطبیقی ​​بر اساس شناسایی لبه فازی-2019
The evolution in communication techniques has created wide threats for crucial information transfer through a communication channel. Covert communication with steganography is a skill of concealing secret information within cover object and hence shields the data theft over rapidly growing network. Recently, diverse steganography techniques using edge identification have been proposed in literature. Numerous methods however utilize certain pixels in the cover image for inserting edge information, resulting in significant deformation. The conventional edge detection method limits the deployment of edge detection in steganography as concealing the information would introduce some variations to the cover image. Hence inserting data in pixel areas recognized by existing conventional edge detection techniques like canny cannot ensure the recognition of the exact edge locations for the cover and stego images. In this paper, an Adaptive steganography method based on novel fuzzy edge identification is proposed. The method proposed is proficient of estimating the precise edge areas of a cover image and also ensures the exact edge location after embedding the secret message. Experimental results reveal that the technique has attained good imperceptibility compared to the Hayat Al-Dmour and Ahmed Al- Ani Edge XOR method in spatial domain.
Keywords: Information security | Adaptive steganography | Fuzzy edge detection | Pattern recognition
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 3016 :::::::: بازدید دیروز: 2317 :::::::: بازدید کل: 5333 :::::::: افراد آنلاین: 13